PowerPC, use size_t rather than long for indices
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
82704155 2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 128#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 129#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 130#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 131
5bd4f169
AM
132/* The name of the dynamic interpreter. This is put in the .interp
133 section. */
134#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
135
136/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 137#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 138#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
139
140/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 141#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 142
a078d95a
AM
143/* Offsets to some stack save slots. */
144#define STK_LR 16
145#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 146/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
147 CR save slot. Used only by optimised __tls_get_addr call stub,
148 relying on __tls_get_addr_opt not saving CR.. */
149#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
150
5bd4f169 151/* TOC base pointers offset from start of TOC. */
411e1bfb 152#define TOC_BASE_OFF 0x8000
a27e685f
AM
153/* TOC base alignment. */
154#define TOC_BASE_ALIGN 256
411e1bfb
AM
155
156/* Offset of tp and dtp pointers from start of TLS block. */
157#define TP_OFFSET 0x7000
158#define DTP_OFFSET 0x8000
5bd4f169 159
ad8e1ba5
AM
160/* .plt call stub instructions. The normal stub is like this, but
161 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 162 insert an addi to adjust r11. */
a078d95a 163#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
164#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
165#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
166#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
167#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
168#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
169#define BCTR 0x4e800420 /* bctr */
170
07d6d2b8 171#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
172#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
173#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
174#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
175#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
176
177#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
178#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
179#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
180#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
181#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
182#define BNECTR 0x4ca20420 /* bnectr+ */
183#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 184
71a39c98 185#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 186#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 187#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 188
07d6d2b8
AM
189#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
190#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
191#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 192
04bdff6a 193#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 194#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 195#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 196#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
197#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
198#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 199#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 200#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 201#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 202#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 203#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 204#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 205#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
206#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
207#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
208#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
209#define PADDI_R12_PC 0x0610000039800000ULL
210#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 211#define PNOP 0x0700000000000000ULL
a345bc8d 212
9e390558
AM
213/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
214#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 215 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
216 /* 0: */
217 /* .quad plt0-1f */
218 /* __glink: */
219#define MFLR_R12 0x7d8802a6 /* mflr %12 */
220#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
221 /* 1: */
222#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 223 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 224#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
225#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
226 /* ld %12,0(%11) */
227 /* ld %2,8(%11) */
228 /* mtctr %12 */
229 /* ld %11,16(%11) */
ee4bf8d2 230 /* bctr */
b9e5796b
AM
231#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
232#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
233#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
234#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
235#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
236
237/* Pad with this. */
238#define NOP 0x60000000
239
721956f4
AM
240/* Some other nops. */
241#define CROR_151515 0x4def7b82
242#define CROR_313131 0x4ffffb82
243
cedb70c5 244/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
245#define LI_R0_0 0x38000000 /* li %r0,0 */
246#define B_DOT 0x48000000 /* b . */
247
248/* After that, we need two instructions to load the index, followed by
249 a branch. */
250#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 251#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 252
deb0e272
AM
253/* Instructions used by the save and restore reg functions. */
254#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
255#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
256#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
257#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
258#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
259#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
260#define LI_R12_0 0x39800000 /* li %r12,0 */
261#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
262#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
263#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
264#define BLR 0x4e800020 /* blr */
265
41bd81ab
AM
266/* Since .opd is an array of descriptors and each entry will end up
267 with identical R_PPC64_RELATIVE relocs, there is really no need to
268 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 269 relocate .opd without reloc entries. */
41bd81ab
AM
270#ifndef NO_OPD_RELOCS
271#define NO_OPD_RELOCS 0
272#endif
810d4e75 273
a4b6fadd
AM
274#ifndef ARRAY_SIZE
275#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
276#endif
277
810d4e75
AM
278static inline int
279abiversion (bfd *abfd)
280{
281 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
282}
283
284static inline void
285set_abiversion (bfd *abfd, int ver)
286{
287 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
288 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
289}
5bd4f169
AM
290\f
291/* Relocation HOWTO's. */
46807bf4
AM
292/* Like other ELF RELA targets that don't apply multiple
293 field-altering relocations to the same localation, src_mask is
294 always zero and pcrel_offset is the same as pc_relative.
295 PowerPC can always use a zero bitpos, even when the field is not at
296 the LSB. For example, a REL24 could use rightshift=2, bisize=24
297 and bitpos=2 which matches the ABI description, or as we do here,
298 rightshift=0, bitsize=26 and bitpos=0. */
299#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
300 complain, special_func) \
301 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
302 complain_overflow_ ## complain, special_func, \
303 #type, FALSE, 0, mask, pc_relative)
304
04c9666a 305static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 306
f3185997
NC
307static reloc_howto_type ppc64_elf_howto_raw[] =
308{
5bd4f169 309 /* This reloc does nothing. */
46807bf4
AM
310 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
311 bfd_elf_generic_reloc),
5bd4f169
AM
312
313 /* A standard 32 bit relocation. */
46807bf4
AM
314 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
315 bfd_elf_generic_reloc),
5bd4f169
AM
316
317 /* An absolute 26 bit branch; the lower two bits must be zero.
318 FIXME: we don't check that, we just clear them. */
46807bf4
AM
319 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
320 bfd_elf_generic_reloc),
5bd4f169
AM
321
322 /* A standard 16 bit relocation. */
46807bf4
AM
323 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
324 bfd_elf_generic_reloc),
5bd4f169
AM
325
326 /* A 16 bit relocation without overflow. */
46807bf4
AM
327 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
328 bfd_elf_generic_reloc),
5bd4f169
AM
329
330 /* Bits 16-31 of an address. */
46807bf4
AM
331 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
332 bfd_elf_generic_reloc),
5bd4f169
AM
333
334 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
335 bits, treated as a signed number, is negative. */
46807bf4
AM
336 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
337 ppc64_elf_ha_reloc),
5bd4f169
AM
338
339 /* An absolute 16 bit branch; the lower two bits must be zero.
340 FIXME: we don't check that, we just clear them. */
46807bf4
AM
341 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
342 ppc64_elf_branch_reloc),
5bd4f169
AM
343
344 /* An absolute 16 bit branch, for which bit 10 should be set to
345 indicate that the branch is expected to be taken. The lower two
346 bits must be zero. */
46807bf4
AM
347 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
348 ppc64_elf_brtaken_reloc),
5bd4f169
AM
349
350 /* An absolute 16 bit branch, for which bit 10 should be set to
351 indicate that the branch is not expected to be taken. The lower
352 two bits must be zero. */
46807bf4
AM
353 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
354 ppc64_elf_brtaken_reloc),
5bd4f169
AM
355
356 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
357 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
358 ppc64_elf_branch_reloc),
5bd4f169 359
05d0e962 360 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
361 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
362 ppc64_elf_branch_reloc),
05d0e962 363
5bd4f169 364 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
365 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
366 ppc64_elf_branch_reloc),
5bd4f169
AM
367
368 /* A relative 16 bit branch. Bit 10 should be set to indicate that
369 the branch is expected to be taken. The lower two bits must be
370 zero. */
46807bf4
AM
371 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
372 ppc64_elf_brtaken_reloc),
5bd4f169
AM
373
374 /* A relative 16 bit branch. Bit 10 should be set to indicate that
375 the branch is not expected to be taken. The lower two bits must
376 be zero. */
46807bf4
AM
377 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
378 ppc64_elf_brtaken_reloc),
5bd4f169
AM
379
380 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
381 symbol. */
46807bf4
AM
382 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
383 ppc64_elf_unhandled_reloc),
5bd4f169
AM
384
385 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
386 the symbol. */
46807bf4
AM
387 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
388 ppc64_elf_unhandled_reloc),
5bd4f169
AM
389
390 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
391 the symbol. */
46807bf4
AM
392 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
393 ppc64_elf_unhandled_reloc),
5bd4f169
AM
394
395 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
396 the symbol. */
46807bf4
AM
397 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
398 ppc64_elf_unhandled_reloc),
5bd4f169
AM
399
400 /* This is used only by the dynamic linker. The symbol should exist
401 both in the object being run and in some shared library. The
402 dynamic linker copies the data addressed by the symbol from the
403 shared library into the object, because the object being
404 run has to have the data at some particular address. */
46807bf4
AM
405 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
406 ppc64_elf_unhandled_reloc),
5bd4f169
AM
407
408 /* Like R_PPC64_ADDR64, but used when setting global offset table
409 entries. */
46807bf4
AM
410 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
411 ppc64_elf_unhandled_reloc),
5bd4f169
AM
412
413 /* Created by the link editor. Marks a procedure linkage table
414 entry for a symbol. */
46807bf4
AM
415 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
416 ppc64_elf_unhandled_reloc),
5bd4f169
AM
417
418 /* Used only by the dynamic linker. When the object is run, this
419 doubleword64 is set to the load address of the object, plus the
420 addend. */
46807bf4
AM
421 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
422 bfd_elf_generic_reloc),
5bd4f169
AM
423
424 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
425 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
426 bfd_elf_generic_reloc),
5bd4f169
AM
427
428 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
429 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
430 bfd_elf_generic_reloc),
5bd4f169
AM
431
432 /* 32-bit PC relative. */
46807bf4
AM
433 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
434 bfd_elf_generic_reloc),
5bd4f169 435
10ed1bba 436 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
437 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
438 ppc64_elf_unhandled_reloc),
5bd4f169
AM
439
440 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
441 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
442 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
443 ppc64_elf_unhandled_reloc),
5bd4f169
AM
444
445 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
446 the symbol. */
46807bf4
AM
447 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
448 ppc64_elf_unhandled_reloc),
5bd4f169
AM
449
450 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
451 the symbol. */
46807bf4
AM
452 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
453 ppc64_elf_unhandled_reloc),
5bd4f169
AM
454
455 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
456 the symbol. */
46807bf4
AM
457 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
458 ppc64_elf_unhandled_reloc),
5bd4f169 459
c061c2d8 460 /* 16-bit section relative relocation. */
46807bf4
AM
461 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
462 ppc64_elf_sectoff_reloc),
5bd4f169 463
c061c2d8 464 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
465 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
466 ppc64_elf_sectoff_reloc),
5bd4f169
AM
467
468 /* 16-bit upper half section relative relocation. */
46807bf4
AM
469 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
470 ppc64_elf_sectoff_reloc),
5bd4f169
AM
471
472 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
473 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
474 ppc64_elf_sectoff_ha_reloc),
5bd4f169 475
04c9666a 476 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
477 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
478 bfd_elf_generic_reloc),
5bd4f169
AM
479
480 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
481
482 /* A standard 64-bit relocation. */
46807bf4
AM
483 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
484 bfd_elf_generic_reloc),
5bd4f169
AM
485
486 /* The bits 32-47 of an address. */
46807bf4
AM
487 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
488 bfd_elf_generic_reloc),
5bd4f169
AM
489
490 /* The bits 32-47 of an address, plus 1 if the contents of the low
491 16 bits, treated as a signed number, is negative. */
46807bf4
AM
492 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
493 ppc64_elf_ha_reloc),
5bd4f169
AM
494
495 /* The bits 48-63 of an address. */
46807bf4
AM
496 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
497 bfd_elf_generic_reloc),
5bd4f169
AM
498
499 /* The bits 48-63 of an address, plus 1 if the contents of the low
500 16 bits, treated as a signed number, is negative. */
46807bf4
AM
501 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
502 ppc64_elf_ha_reloc),
5bd4f169
AM
503
504 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
505 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
506 bfd_elf_generic_reloc),
5bd4f169
AM
507
508 /* 64-bit relative relocation. */
46807bf4
AM
509 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
510 bfd_elf_generic_reloc),
5bd4f169 511
cedb70c5 512 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
513 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
514 ppc64_elf_unhandled_reloc),
5bd4f169
AM
515
516 /* 64-bit PC relative relocation to the symbol's procedure linkage
517 table. */
518 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
519 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
520 ppc64_elf_unhandled_reloc),
5bd4f169
AM
521
522 /* 16 bit TOC-relative relocation. */
5bd4f169 523 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
524 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
525 ppc64_elf_toc_reloc),
5bd4f169
AM
526
527 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 528 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
529 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
530 ppc64_elf_toc_reloc),
5bd4f169
AM
531
532 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 533 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
534 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
535 ppc64_elf_toc_reloc),
5bd4f169
AM
536
537 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
538 contents of the low 16 bits, treated as a signed number, is
539 negative. */
5bd4f169 540 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
541 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
542 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
543
544 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 545 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
546 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
547 ppc64_elf_toc64_reloc),
5bd4f169
AM
548
549 /* Like R_PPC64_GOT16, but also informs the link editor that the
550 value to relocate may (!) refer to a PLT entry which the link
551 editor (a) may replace with the symbol value. If the link editor
552 is unable to fully resolve the symbol, it may (b) create a PLT
553 entry and store the address to the new PLT entry in the GOT.
554 This permits lazy resolution of function symbols at run time.
555 The link editor may also skip all of this and just (c) emit a
556 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
557 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
558 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
559 ppc64_elf_unhandled_reloc),
411e1bfb
AM
560
561 /* Like R_PPC64_PLTGOT16, but without overflow. */
562 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
563 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
564 ppc64_elf_unhandled_reloc),
411e1bfb
AM
565
566 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
567 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
568 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
569 ppc64_elf_unhandled_reloc),
411e1bfb
AM
570
571 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
572 1 if the contents of the low 16 bits, treated as a signed number,
573 is negative. */
574 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
575 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
576 ppc64_elf_unhandled_reloc),
411e1bfb
AM
577
578 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
579 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
580 bfd_elf_generic_reloc),
411e1bfb
AM
581
582 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
583 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
584 bfd_elf_generic_reloc),
411e1bfb
AM
585
586 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
587 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
588 ppc64_elf_unhandled_reloc),
411e1bfb
AM
589
590 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
591 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
592 ppc64_elf_unhandled_reloc),
411e1bfb
AM
593
594 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
595 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
596 ppc64_elf_unhandled_reloc),
411e1bfb
AM
597
598 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
599 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
600 ppc64_elf_sectoff_reloc),
411e1bfb
AM
601
602 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
603 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
604 ppc64_elf_sectoff_reloc),
411e1bfb
AM
605
606 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
607 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
608 ppc64_elf_toc_reloc),
411e1bfb
AM
609
610 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
611 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
612 ppc64_elf_toc_reloc),
411e1bfb
AM
613
614 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
615 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
616 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
617 ppc64_elf_unhandled_reloc),
411e1bfb
AM
618
619 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
620 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
621 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
622 ppc64_elf_unhandled_reloc),
411e1bfb 623
727fc41e 624 /* Marker relocs for TLS. */
46807bf4
AM
625 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
632 bfd_elf_generic_reloc),
727fc41e 633
23cedd1d
AM
634 /* Marker reloc for optimizing r2 save in prologue rather than on
635 each plt call stub. */
46807bf4
AM
636 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
637 bfd_elf_generic_reloc),
3b421ab3 638
23cedd1d 639 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
640 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
642
643 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
644 bfd_elf_generic_reloc),
23cedd1d 645
411e1bfb
AM
646 /* Computes the load module index of the load module that contains the
647 definition of its TLS sym. */
46807bf4
AM
648 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
649 ppc64_elf_unhandled_reloc),
411e1bfb
AM
650
651 /* Computes a dtv-relative displacement, the difference between the value
652 of sym+add and the base address of the thread-local storage block that
653 contains the definition of sym, minus 0x8000. */
46807bf4
AM
654 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
655 ppc64_elf_unhandled_reloc),
411e1bfb
AM
656
657 /* A 16 bit dtprel reloc. */
46807bf4
AM
658 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
659 ppc64_elf_unhandled_reloc),
411e1bfb
AM
660
661 /* Like DTPREL16, but no overflow. */
46807bf4
AM
662 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
663 ppc64_elf_unhandled_reloc),
411e1bfb
AM
664
665 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
666 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
667 ppc64_elf_unhandled_reloc),
411e1bfb
AM
668
669 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
670 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
671 ppc64_elf_unhandled_reloc),
411e1bfb
AM
672
673 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
674 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
675 ppc64_elf_unhandled_reloc),
411e1bfb
AM
676
677 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
678 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
679 ppc64_elf_unhandled_reloc),
411e1bfb
AM
680
681 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
682 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
683 ppc64_elf_unhandled_reloc),
411e1bfb
AM
684
685 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
686 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
687 ppc64_elf_unhandled_reloc),
411e1bfb
AM
688
689 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
690 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
691 ppc64_elf_unhandled_reloc),
411e1bfb
AM
692
693 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
694 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
695 ppc64_elf_unhandled_reloc),
411e1bfb
AM
696
697 /* Computes a tp-relative displacement, the difference between the value of
698 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
699 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
700 ppc64_elf_unhandled_reloc),
411e1bfb
AM
701
702 /* A 16 bit tprel reloc. */
46807bf4
AM
703 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
704 ppc64_elf_unhandled_reloc),
411e1bfb
AM
705
706 /* Like TPREL16, but no overflow. */
46807bf4
AM
707 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
708 ppc64_elf_unhandled_reloc),
411e1bfb
AM
709
710 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
711 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
712 ppc64_elf_unhandled_reloc),
411e1bfb
AM
713
714 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
715 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
716 ppc64_elf_unhandled_reloc),
411e1bfb
AM
717
718 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
719 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
720 ppc64_elf_unhandled_reloc),
411e1bfb
AM
721
722 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
723 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
724 ppc64_elf_unhandled_reloc),
411e1bfb
AM
725
726 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
727 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
728 ppc64_elf_unhandled_reloc),
411e1bfb
AM
729
730 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
731 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
732 ppc64_elf_unhandled_reloc),
411e1bfb
AM
733
734 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
735 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
736 ppc64_elf_unhandled_reloc),
411e1bfb
AM
737
738 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
739 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
740 ppc64_elf_unhandled_reloc),
411e1bfb
AM
741
742 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
743 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
744 to the first entry relative to the TOC base (r2). */
46807bf4
AM
745 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
746 ppc64_elf_unhandled_reloc),
5bd4f169 747
411e1bfb 748 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
749 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
750 ppc64_elf_unhandled_reloc),
5bd4f169 751
411e1bfb 752 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
753 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
754 ppc64_elf_unhandled_reloc),
5bd4f169 755
411e1bfb 756 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
757 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
758 ppc64_elf_unhandled_reloc),
5bd4f169 759
411e1bfb
AM
760 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
761 with values (sym+add)@dtpmod and zero, and computes the offset to the
762 first entry relative to the TOC base (r2). */
46807bf4
AM
763 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
764 ppc64_elf_unhandled_reloc),
5bd4f169 765
411e1bfb 766 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
767 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
768 ppc64_elf_unhandled_reloc),
5bd4f169 769
411e1bfb 770 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
771 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
772 ppc64_elf_unhandled_reloc),
5bd4f169 773
411e1bfb 774 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
775 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
776 ppc64_elf_unhandled_reloc),
5bd4f169 777
411e1bfb
AM
778 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
779 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
780 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
781 ppc64_elf_unhandled_reloc),
5bd4f169 782
411e1bfb 783 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
784 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
785 ppc64_elf_unhandled_reloc),
5bd4f169 786
411e1bfb 787 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
788 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
789 ppc64_elf_unhandled_reloc),
5bd4f169 790
411e1bfb 791 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
792 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
793 ppc64_elf_unhandled_reloc),
411e1bfb
AM
794
795 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
796 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
797 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
798 ppc64_elf_unhandled_reloc),
5bd4f169 799
411e1bfb 800 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
801 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
802 ppc64_elf_unhandled_reloc),
5bd4f169 803
411e1bfb 804 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
805 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
806 ppc64_elf_unhandled_reloc),
5bd4f169 807
411e1bfb 808 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
809 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
813 ppc64_elf_unhandled_reloc),
814
815 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
816 bfd_elf_generic_reloc),
e054468f 817
25f23106 818 /* A 16 bit relative relocation. */
46807bf4
AM
819 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
820 bfd_elf_generic_reloc),
25f23106
AM
821
822 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
823 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
824 bfd_elf_generic_reloc),
25f23106
AM
825
826 /* The high order 16 bits of a relative address. */
46807bf4
AM
827 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
828 bfd_elf_generic_reloc),
25f23106
AM
829
830 /* The high order 16 bits of a relative address, plus 1 if the contents of
831 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
832 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
833 ppc64_elf_ha_reloc),
25f23106 834
4a969973
AM
835 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
836 bfd_elf_generic_reloc),
837
838 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
839 ppc64_elf_ha_reloc),
840
841 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
842 bfd_elf_generic_reloc),
843
844 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
845 ppc64_elf_ha_reloc),
846
847 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
848 bfd_elf_generic_reloc),
849
850 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
851 ppc64_elf_ha_reloc),
852
a680de9a 853 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
854 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
855 ppc64_elf_ha_reloc),
a680de9a 856
7ba71655 857 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
858 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
859 ppc64_elf_ha_reloc),
7ba71655 860
f9c6b907 861 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
862 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
863 bfd_elf_generic_reloc),
f9c6b907
AM
864
865 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
866 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
867 ppc64_elf_ha_reloc),
f9c6b907
AM
868
869 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
870 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
871 ppc64_elf_unhandled_reloc),
f9c6b907
AM
872
873 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
874 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
875 ppc64_elf_unhandled_reloc),
f9c6b907
AM
876
877 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
878 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
879 ppc64_elf_unhandled_reloc),
f9c6b907
AM
880
881 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
882 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
883 ppc64_elf_unhandled_reloc),
f9c6b907 884
006589cf 885 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
886 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
887 bfd_elf_generic_reloc),
006589cf 888
45965137 889 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
890 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
45965137 892
5663e321
AM
893 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
900 bfd_elf_generic_reloc),
901
902 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_prefix_reloc),
916
917 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
923 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
924 ppc64_elf_unhandled_reloc),
925
c213164a
AM
926 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
941 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
942 ppc64_elf_unhandled_reloc),
943
5663e321
AM
944 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
945 bfd_elf_generic_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
948 ppc64_elf_ha_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
951 bfd_elf_generic_reloc),
952
953 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
954 ppc64_elf_ha_reloc),
955
956 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
957 bfd_elf_generic_reloc),
958
959 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
960 ppc64_elf_ha_reloc),
961
962 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
963 bfd_elf_generic_reloc),
964
965 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
966 ppc64_elf_ha_reloc),
967
968 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
969 ppc64_elf_prefix_reloc),
970
971 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
972 ppc64_elf_prefix_reloc),
973
5bd4f169 974 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
975 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
976 NULL),
5bd4f169
AM
977
978 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
979 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
980 NULL),
5bd4f169
AM
981};
982
983\f
984/* Initialize the ppc64_elf_howto_table, so that linear accesses can
985 be done. */
986
987static void
4ce794b7 988ppc_howto_init (void)
5bd4f169
AM
989{
990 unsigned int i, type;
991
a4b6fadd 992 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
993 {
994 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 995 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
996 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
997 }
998}
999
1000static reloc_howto_type *
f3185997 1001ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 1002 bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
1282 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1283 break;
1284 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1285 break;
1286 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1287 break;
1288 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7
AM
1319static reloc_howto_type *
1320ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1321 const char *r_name)
1322{
1323 unsigned int i;
1324
a4b6fadd 1325 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1326 if (ppc64_elf_howto_raw[i].name != NULL
1327 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1328 return &ppc64_elf_howto_raw[i];
1329
1330 return NULL;
1331}
1332
5bd4f169
AM
1333/* Set the howto pointer for a PowerPC ELF reloc. */
1334
f3185997 1335static bfd_boolean
4aef7643 1336ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1337 Elf_Internal_Rela *dst)
5bd4f169 1338{
65f38f15
AM
1339 unsigned int type;
1340
ef60b7ff 1341 /* Initialize howto table if needed. */
5bd4f169 1342 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1343 ppc_howto_init ();
1344
65f38f15 1345 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1346 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1347 {
695344c0 1348 /* xgettext:c-format */
0aa13fee 1349 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1350 abfd, type);
f3185997
NC
1351 bfd_set_error (bfd_error_bad_value);
1352 return FALSE;
d0fb9a8d 1353 }
65f38f15 1354 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1355 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1356 {
1357 /* xgettext:c-format */
1358 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1359 abfd, type);
1360 bfd_set_error (bfd_error_bad_value);
1361 return FALSE;
1362 }
2cdcc330 1363
f3185997 1364 return TRUE;
5bd4f169
AM
1365}
1366
04c9666a 1367/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1368
1369static bfd_reloc_status_type
4ce794b7
AM
1370ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1371 void *data, asection *input_section,
1372 bfd *output_bfd, char **error_message)
5bd4f169 1373{
a680de9a
PB
1374 enum elf_ppc64_reloc_type r_type;
1375 long insn;
1376 bfd_size_type octets;
3de43e7b 1377 bfd_vma value;
a680de9a 1378
805fc799
AM
1379 /* If this is a relocatable link (output_bfd test tells us), just
1380 call the generic function. Any adjustment will be done at final
1381 link time. */
1382 if (output_bfd != NULL)
cedb70c5 1383 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1384 input_section, output_bfd, error_message);
1385
5663e321
AM
1386 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1387 We won't actually be using the low bits, so trashing them
805fc799 1388 doesn't matter. */
a680de9a 1389 r_type = reloc_entry->howto->type;
5663e321
AM
1390 if (r_type == R_PPC64_ADDR16_HIGHERA34
1391 || r_type == R_PPC64_ADDR16_HIGHESTA34
1392 || r_type == R_PPC64_REL16_HIGHERA34
1393 || r_type == R_PPC64_REL16_HIGHESTA34)
1394 reloc_entry->addend += 1ULL << 33;
1395 else
1396 reloc_entry->addend += 1U << 15;
a680de9a
PB
1397 if (r_type != R_PPC64_REL16DX_HA)
1398 return bfd_reloc_continue;
1399
1400 value = 0;
1401 if (!bfd_is_com_section (symbol->section))
1402 value = symbol->value;
1403 value += (reloc_entry->addend
1404 + symbol->section->output_offset
1405 + symbol->section->output_section->vma);
1406 value -= (reloc_entry->address
1407 + input_section->output_offset
1408 + input_section->output_section->vma);
3de43e7b 1409 value = (bfd_signed_vma) value >> 16;
a680de9a 1410
bb294208 1411 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1412 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1413 insn &= ~0x1fffc1;
3de43e7b 1414 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1415 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1416 if (value + 0x8000 > 0xffff)
a680de9a
PB
1417 return bfd_reloc_overflow;
1418 return bfd_reloc_ok;
805fc799 1419}
5bd4f169 1420
2441e016
AM
1421static bfd_reloc_status_type
1422ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1423 void *data, asection *input_section,
1424 bfd *output_bfd, char **error_message)
1425{
1426 if (output_bfd != NULL)
1427 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1428 input_section, output_bfd, error_message);
1429
699733f6
AM
1430 if (strcmp (symbol->section->name, ".opd") == 0
1431 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1432 {
1433 bfd_vma dest = opd_entry_value (symbol->section,
1434 symbol->value + reloc_entry->addend,
aef36ac1 1435 NULL, NULL, FALSE);
2441e016
AM
1436 if (dest != (bfd_vma) -1)
1437 reloc_entry->addend = dest - (symbol->value
1438 + symbol->section->output_section->vma
1439 + symbol->section->output_offset);
1440 }
810d4e75
AM
1441 else
1442 {
1443 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1444
1445 if (symbol->section->owner != abfd
9f284bf9 1446 && symbol->section->owner != NULL
810d4e75
AM
1447 && abiversion (symbol->section->owner) >= 2)
1448 {
1449 unsigned int i;
1450
1451 for (i = 0; i < symbol->section->owner->symcount; ++i)
1452 {
1453 asymbol *symdef = symbol->section->owner->outsymbols[i];
1454
1455 if (strcmp (symdef->name, symbol->name) == 0)
1456 {
1457 elfsym = (elf_symbol_type *) symdef;
1458 break;
1459 }
1460 }
1461 }
1462 reloc_entry->addend
1463 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1464 }
2441e016
AM
1465 return bfd_reloc_continue;
1466}
1467
805fc799 1468static bfd_reloc_status_type
4ce794b7
AM
1469ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1470 void *data, asection *input_section,
1471 bfd *output_bfd, char **error_message)
805fc799
AM
1472{
1473 long insn;
04c9666a 1474 enum elf_ppc64_reloc_type r_type;
805fc799 1475 bfd_size_type octets;
794e51c0
AM
1476 /* Assume 'at' branch hints. */
1477 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1478
1479 /* If this is a relocatable link (output_bfd test tells us), just
1480 call the generic function. Any adjustment will be done at final
1481 link time. */
5bd4f169 1482 if (output_bfd != NULL)
cedb70c5 1483 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1484 input_section, output_bfd, error_message);
1485
bb294208 1486 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1487 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1488 insn &= ~(0x01 << 21);
4ce794b7 1489 r_type = reloc_entry->howto->type;
805fc799
AM
1490 if (r_type == R_PPC64_ADDR14_BRTAKEN
1491 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1492 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1493
794e51c0 1494 if (is_isa_v2)
5bd4f169 1495 {
805fc799
AM
1496 /* Set 'a' bit. This is 0b00010 in BO field for branch
1497 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1498 for branch on CTR insns (BO == 1a00t or 1a01t). */
1499 if ((insn & (0x14 << 21)) == (0x04 << 21))
1500 insn |= 0x02 << 21;
1501 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1502 insn |= 0x08 << 21;
1503 else
2441e016 1504 goto out;
5bd4f169 1505 }
805fc799
AM
1506 else
1507 {
1508 bfd_vma target = 0;
1509 bfd_vma from;
5bd4f169 1510
805fc799
AM
1511 if (!bfd_is_com_section (symbol->section))
1512 target = symbol->value;
1513 target += symbol->section->output_section->vma;
1514 target += symbol->section->output_offset;
1515 target += reloc_entry->addend;
5bd4f169 1516
805fc799
AM
1517 from = (reloc_entry->address
1518 + input_section->output_offset
1519 + input_section->output_section->vma);
5bd4f169 1520
805fc799
AM
1521 /* Invert 'y' bit if not the default. */
1522 if ((bfd_signed_vma) (target - from) < 0)
1523 insn ^= 0x01 << 21;
1524 }
4ce794b7 1525 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1526 out:
1527 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1528 input_section, output_bfd, error_message);
805fc799 1529}
5bd4f169 1530
805fc799 1531static bfd_reloc_status_type
4ce794b7
AM
1532ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1533 void *data, asection *input_section,
1534 bfd *output_bfd, char **error_message)
805fc799
AM
1535{
1536 /* If this is a relocatable link (output_bfd test tells us), just
1537 call the generic function. Any adjustment will be done at final
1538 link time. */
1539 if (output_bfd != NULL)
cedb70c5 1540 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1541 input_section, output_bfd, error_message);
5bd4f169 1542
805fc799
AM
1543 /* Subtract the symbol section base address. */
1544 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1545 return bfd_reloc_continue;
1546}
1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1558 input_section, output_bfd, error_message);
1559
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
1562
1563 /* Adjust the addend for sign extension of the low 16 bits. */
1564 reloc_entry->addend += 0x8000;
1565 return bfd_reloc_continue;
1566}
1567
1568static bfd_reloc_status_type
4ce794b7
AM
1569ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1570 void *data, asection *input_section,
1571 bfd *output_bfd, char **error_message)
805fc799
AM
1572{
1573 bfd_vma TOCstart;
1574
1575 /* If this is a relocatable link (output_bfd test tells us), just
1576 call the generic function. Any adjustment will be done at final
1577 link time. */
1578 if (output_bfd != NULL)
cedb70c5 1579 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1580 input_section, output_bfd, error_message);
1581
1582 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1583 if (TOCstart == 0)
1c865ab2 1584 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1585
1586 /* Subtract the TOC base address. */
1587 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1588 return bfd_reloc_continue;
1589}
1590
1591static bfd_reloc_status_type
4ce794b7
AM
1592ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1593 void *data, asection *input_section,
1594 bfd *output_bfd, char **error_message)
805fc799
AM
1595{
1596 bfd_vma TOCstart;
1597
1598 /* If this is a relocatable link (output_bfd test tells us), just
1599 call the generic function. Any adjustment will be done at final
1600 link time. */
1601 if (output_bfd != NULL)
cedb70c5 1602 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1603 input_section, output_bfd, error_message);
1604
1605 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1606 if (TOCstart == 0)
1c865ab2 1607 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1608
1609 /* Subtract the TOC base address. */
1610 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1611
1612 /* Adjust the addend for sign extension of the low 16 bits. */
1613 reloc_entry->addend += 0x8000;
1614 return bfd_reloc_continue;
1615}
1616
1617static bfd_reloc_status_type
4ce794b7
AM
1618ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1619 void *data, asection *input_section,
1620 bfd *output_bfd, char **error_message)
805fc799
AM
1621{
1622 bfd_vma TOCstart;
1623 bfd_size_type octets;
1624
1625 /* If this is a relocatable link (output_bfd test tells us), just
1626 call the generic function. Any adjustment will be done at final
1627 link time. */
1628 if (output_bfd != NULL)
cedb70c5 1629 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1630 input_section, output_bfd, error_message);
1631
1632 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1633 if (TOCstart == 0)
1c865ab2 1634 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1635
bb294208 1636 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1637 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1638 return bfd_reloc_ok;
1639}
1640
5663e321
AM
1641static bfd_reloc_status_type
1642ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1643 void *data, asection *input_section,
1644 bfd *output_bfd, char **error_message)
1645{
1646 uint64_t insn;
1647 bfd_vma targ;
1648
1649 if (output_bfd != NULL)
1650 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1651 input_section, output_bfd, error_message);
1652
1653 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1654 insn <<= 32;
1655 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1656
1657 targ = (symbol->section->output_section->vma
1658 + symbol->section->output_offset
1659 + reloc_entry->addend);
1660 if (!bfd_is_com_section (symbol->section))
1661 targ += symbol->value;
1662 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1663 targ += 1ULL << 33;
1664 if (reloc_entry->howto->pc_relative)
1665 {
1666 bfd_vma from = (reloc_entry->address
1667 + input_section->output_offset
1668 + input_section->output_section->vma);
1669 targ -=from;
1670 }
1671 targ >>= reloc_entry->howto->rightshift;
1672 insn &= ~reloc_entry->howto->dst_mask;
1673 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1674 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1675 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1676 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1677 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1678 >= 1ULL << reloc_entry->howto->bitsize))
1679 return bfd_reloc_overflow;
1680 return bfd_reloc_ok;
1681}
1682
805fc799 1683static bfd_reloc_status_type
4ce794b7
AM
1684ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1685 void *data, asection *input_section,
1686 bfd *output_bfd, char **error_message)
805fc799
AM
1687{
1688 /* If this is a relocatable link (output_bfd test tells us), just
1689 call the generic function. Any adjustment will be done at final
1690 link time. */
1691 if (output_bfd != NULL)
cedb70c5 1692 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1693 input_section, output_bfd, error_message);
1694
1695 if (error_message != NULL)
1696 {
1697 static char buf[60];
1698 sprintf (buf, "generic linker can't handle %s",
1699 reloc_entry->howto->name);
1700 *error_message = buf;
1701 }
1702 return bfd_reloc_dangerous;
1703}
1704
927be08e
AM
1705/* Track GOT entries needed for a given symbol. We might need more
1706 than one got entry per symbol. */
1707struct got_entry
1708{
1709 struct got_entry *next;
1710
1711 /* The symbol addend that we'll be placing in the GOT. */
1712 bfd_vma addend;
1713
1714 /* Unlike other ELF targets, we use separate GOT entries for the same
1715 symbol referenced from different input files. This is to support
1716 automatic multiple TOC/GOT sections, where the TOC base can vary
1717 from one input file to another. After partitioning into TOC groups
1718 we merge entries within the group.
1719
1720 Point to the BFD owning this GOT entry. */
1721 bfd *owner;
1722
1723 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1724 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1725 unsigned char tls_type;
927be08e
AM
1726
1727 /* Non-zero if got.ent points to real entry. */
f961d9dd 1728 unsigned char is_indirect;
927be08e
AM
1729
1730 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1731 union
2cdcc330
AM
1732 {
1733 bfd_signed_vma refcount;
1734 bfd_vma offset;
1735 struct got_entry *ent;
1736 } got;
927be08e
AM
1737};
1738
1739/* The same for PLT. */
1740struct plt_entry
1741{
1742 struct plt_entry *next;
1743
1744 bfd_vma addend;
1745
1746 union
2cdcc330
AM
1747 {
1748 bfd_signed_vma refcount;
1749 bfd_vma offset;
1750 } plt;
927be08e
AM
1751};
1752
e717da7e
AM
1753struct ppc64_elf_obj_tdata
1754{
1755 struct elf_obj_tdata elf;
1756
1757 /* Shortcuts to dynamic linker sections. */
1758 asection *got;
1759 asection *relgot;
1760
b3fac117
AM
1761 /* Used during garbage collection. We attach global symbols defined
1762 on removed .opd entries to this section so that the sym is removed. */
1763 asection *deleted_section;
81688140 1764
927be08e 1765 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1766 sections means we potentially need one of these for each input bfd. */
927be08e 1767 struct got_entry tlsld_got;
8860955f 1768
2cdcc330
AM
1769 union
1770 {
729eabd5
AM
1771 /* A copy of relocs before they are modified for --emit-relocs. */
1772 Elf_Internal_Rela *relocs;
1773
1774 /* Section contents. */
1775 bfd_byte *contents;
1776 } opd;
d77c8a4b
AM
1777
1778 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1779 the reloc to be in the range -32768 to 32767. */
98528052
AM
1780 unsigned int has_small_toc_reloc : 1;
1781
560c8763
AM
1782 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1783 instruction not one we handle. */
1784 unsigned int unexpected_toc_insn : 1;
066f4018 1785
903b777d
AM
1786 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1787 this file. */
1788 unsigned int has_optrel : 1;
e717da7e
AM
1789};
1790
1791#define ppc64_elf_tdata(bfd) \
1792 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1793
1794#define ppc64_tlsld_got(bfd) \
1795 (&ppc64_elf_tdata (bfd)->tlsld_got)
1796
0c8d6e5c
AM
1797#define is_ppc64_elf(bfd) \
1798 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1799 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1800
e717da7e
AM
1801/* Override the generic function because we store some extras. */
1802
1803static bfd_boolean
1804ppc64_elf_mkobject (bfd *abfd)
1805{
0ffa91dd 1806 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1807 PPC64_ELF_DATA);
e717da7e
AM
1808}
1809
feee612b 1810/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1811 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1812
b34976b6 1813static bfd_boolean
4ce794b7 1814ppc64_elf_object_p (bfd *abfd)
feee612b 1815{
14b57c7c
AM
1816 if (!abfd->arch_info->the_default)
1817 return TRUE;
1818
1819 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1820 {
1821 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1822
1823 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1824 {
1825 /* Relies on arch after 32 bit default being 64 bit default. */
1826 abfd->arch_info = abfd->arch_info->next;
1827 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1828 }
1829 }
14b57c7c 1830 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1831}
1832
d37c89e5
AM
1833/* Support for core dump NOTE sections. */
1834
1835static bfd_boolean
1836ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1837{
eea6121a 1838 size_t offset, size;
d37c89e5
AM
1839
1840 if (note->descsz != 504)
1841 return FALSE;
1842
1843 /* pr_cursig */
228e534f 1844 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1845
1846 /* pr_pid */
228e534f 1847 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1848
1849 /* pr_reg */
1850 offset = 112;
eea6121a 1851 size = 384;
d37c89e5
AM
1852
1853 /* Make a ".reg/999" section. */
1854 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1855 size, note->descpos + offset);
d37c89e5
AM
1856}
1857
1858static bfd_boolean
1859ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1860{
1861 if (note->descsz != 136)
1862 return FALSE;
1863
228e534f 1864 elf_tdata (abfd)->core->pid
bc989cdc 1865 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1866 elf_tdata (abfd)->core->program
d37c89e5 1867 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1868 elf_tdata (abfd)->core->command
d37c89e5
AM
1869 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1870
1871 return TRUE;
1872}
1873
183e98be
AM
1874static char *
1875ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1876 ...)
1877{
1878 switch (note_type)
1879 {
1880 default:
1881 return NULL;
1882
1883 case NT_PRPSINFO:
1884 {
9ef6d1e3 1885 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1886 va_list ap;
1887
1888 va_start (ap, note_type);
75cd47ed 1889 memset (data, 0, sizeof (data));
183e98be 1890 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1891#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1892 DIAGNOSTIC_PUSH;
be3e27bb 1893 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1894 -Wstringop-truncation:
1895 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1896 */
95da9854
L
1897 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1898#endif
183e98be 1899 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1900#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1901 DIAGNOSTIC_POP;
fe75810f 1902#endif
183e98be
AM
1903 va_end (ap);
1904 return elfcore_write_note (abfd, buf, bufsiz,
1905 "CORE", note_type, data, sizeof (data));
1906 }
1907
1908 case NT_PRSTATUS:
1909 {
1910 char data[504];
1911 va_list ap;
1912 long pid;
1913 int cursig;
1914 const void *greg;
1915
1916 va_start (ap, note_type);
1917 memset (data, 0, 112);
1918 pid = va_arg (ap, long);
1919 bfd_put_32 (abfd, pid, data + 32);
1920 cursig = va_arg (ap, int);
1921 bfd_put_16 (abfd, cursig, data + 12);
1922 greg = va_arg (ap, const void *);
1923 memcpy (data + 112, greg, 384);
1924 memset (data + 496, 0, 8);
1925 va_end (ap);
1926 return elfcore_write_note (abfd, buf, bufsiz,
1927 "CORE", note_type, data, sizeof (data));
1928 }
1929 }
1930}
1931
5d35169e
AM
1932/* Add extra PPC sections. */
1933
2cdcc330 1934static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1935{
07d6d2b8
AM
1936 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1937 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1938 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1939 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1941 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1942 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1943};
1944
7c8fe5c4
AM
1945enum _ppc64_sec_type {
1946 sec_normal = 0,
1947 sec_opd = 1,
1948 sec_toc = 2
1949};
1950
f0abc2a1
AM
1951struct _ppc64_elf_section_data
1952{
1953 struct bfd_elf_section_data elf;
411e1bfb 1954
f0abc2a1
AM
1955 union
1956 {
51aecdc5
AM
1957 /* An array with one entry for each opd function descriptor,
1958 and some spares since opd entries may be either 16 or 24 bytes. */
1959#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1960 struct _opd_sec_data
1961 {
1962 /* Points to the function code section for local opd entries. */
1963 asection **func_sec;
1964
1965 /* After editing .opd, adjust references to opd local syms. */
1966 long *adjust;
1967 } opd;
7c8fe5c4 1968
3a71aa26
AM
1969 /* An array for toc sections, indexed by offset/8. */
1970 struct _toc_sec_data
1971 {
1972 /* Specifies the relocation symbol index used at a given toc offset. */
1973 unsigned *symndx;
1974
1975 /* And the relocation addend. */
1976 bfd_vma *add;
1977 } toc;
7c8fe5c4
AM
1978 } u;
1979
1980 enum _ppc64_sec_type sec_type:2;
411e1bfb 1981
7c8fe5c4
AM
1982 /* Flag set when small branches are detected. Used to
1983 select suitable defaults for the stub group size. */
1984 unsigned int has_14bit_branch:1;
3e04d765
AM
1985
1986 /* Flag set when PLTCALL relocs are detected. */
1987 unsigned int has_pltcall:1;
066f4018 1988
903b777d
AM
1989 /* Flag set when section has PLT/GOT/TOC relocations that can be
1990 optimised. */
1991 unsigned int has_optrel:1;
f0abc2a1
AM
1992};
1993
1994#define ppc64_elf_section_data(sec) \
411e1bfb 1995 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1996
1997static bfd_boolean
4ce794b7 1998ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1999{
f592407e
AM
2000 if (!sec->used_by_bfd)
2001 {
2002 struct _ppc64_elf_section_data *sdata;
2003 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 2004
f592407e
AM
2005 sdata = bfd_zalloc (abfd, amt);
2006 if (sdata == NULL)
2007 return FALSE;
2008 sec->used_by_bfd = sdata;
2009 }
f0abc2a1
AM
2010
2011 return _bfd_elf_new_section_hook (abfd, sec);
2012}
4025353c 2013
74f0fb50 2014static struct _opd_sec_data *
4025353c
AM
2015get_opd_info (asection * sec)
2016{
2017 if (sec != NULL
2018 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2019 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2020 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2021 return NULL;
2022}
90e3cdf2
JJ
2023\f
2024/* Parameters for the qsort hook. */
90e3cdf2 2025static bfd_boolean synthetic_relocatable;
cd285db5 2026static asection *synthetic_opd;
90e3cdf2 2027
699733f6 2028/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2029
2030static int
2031compare_symbols (const void *ap, const void *bp)
2032{
2cdcc330
AM
2033 const asymbol *a = *(const asymbol **) ap;
2034 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2035
699733f6
AM
2036 /* Section symbols first. */
2037 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2038 return -1;
699733f6 2039 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2040 return 1;
2041
699733f6 2042 /* then .opd symbols. */
cd285db5
AM
2043 if (synthetic_opd != NULL)
2044 {
2045 if (strcmp (a->section->name, ".opd") == 0
2046 && strcmp (b->section->name, ".opd") != 0)
2047 return -1;
2048 if (strcmp (a->section->name, ".opd") != 0
2049 && strcmp (b->section->name, ".opd") == 0)
2050 return 1;
2051 }
90e3cdf2 2052
699733f6 2053 /* then other code symbols. */
2cdcc330
AM
2054 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2055 == (SEC_CODE | SEC_ALLOC))
2056 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2057 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2058 return -1;
2059
2cdcc330
AM
2060 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2061 != (SEC_CODE | SEC_ALLOC))
2062 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2063 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2064 return 1;
2065
2066 if (synthetic_relocatable)
2067 {
2068 if (a->section->id < b->section->id)
2069 return -1;
2070
2071 if (a->section->id > b->section->id)
2072 return 1;
2073 }
2074
2075 if (a->value + a->section->vma < b->value + b->section->vma)
2076 return -1;
2077
2078 if (a->value + a->section->vma > b->value + b->section->vma)
2079 return 1;
2080
4d35a0aa
AM
2081 /* For syms with the same value, prefer strong dynamic global function
2082 syms over other syms. */
2083 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2084 return -1;
2085
2086 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2087 return 1;
2088
2089 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2090 return -1;
2091
2092 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2093 return 1;
2094
2095 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2096 return -1;
2097
2098 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2099 return 1;
2100
2101 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2102 return -1;
2103
2104 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2105 return 1;
2106
dcea6a95
AM
2107 /* Finally, sort on where the symbol is in memory. The symbols will
2108 be in at most two malloc'd blocks, one for static syms, one for
2109 dynamic syms, and we distinguish the two blocks above by testing
2110 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2111 originally in the same order as the symbols (and we're not
2112 sorting the symbols themselves), this ensures a stable sort. */
2113 if (a < b)
2114 return -1;
2115 if (a > b)
2116 return 1;
2117 return 0;
90e3cdf2
JJ
2118}
2119
699733f6 2120/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2121
699733f6 2122static asymbol *
9ad9b810
AM
2123sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2124 bfd_vma value)
90e3cdf2 2125{
9ad9b810 2126 size_t mid;
90e3cdf2 2127
7292b3ac 2128 if (id == (unsigned) -1)
699733f6
AM
2129 {
2130 while (lo < hi)
2131 {
2132 mid = (lo + hi) >> 1;
2133 if (syms[mid]->value + syms[mid]->section->vma < value)
2134 lo = mid + 1;
2135 else if (syms[mid]->value + syms[mid]->section->vma > value)
2136 hi = mid;
2137 else
2138 return syms[mid];
2139 }
2140 }
2141 else
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->section->id < id)
2147 lo = mid + 1;
2148 else if (syms[mid]->section->id > id)
2149 hi = mid;
2150 else if (syms[mid]->value < value)
2151 lo = mid + 1;
2152 else if (syms[mid]->value > value)
2153 hi = mid;
2154 else
2155 return syms[mid];
2156 }
2157 }
2158 return NULL;
90e3cdf2
JJ
2159}
2160
468392fb
AM
2161static bfd_boolean
2162section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2163{
2164 bfd_vma vma = *(bfd_vma *) ptr;
2165 return ((section->flags & SEC_ALLOC) != 0
2166 && section->vma <= vma
2167 && vma < section->vma + section->size);
2168}
2169
699733f6 2170/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2171 entry syms. Also generate @plt symbols for the glink branch table.
2172 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2173
2174static long
a7535cf3
AM
2175ppc64_elf_get_synthetic_symtab (bfd *abfd,
2176 long static_count, asymbol **static_syms,
2177 long dyn_count, asymbol **dyn_syms,
c9727e01 2178 asymbol **ret)
90e3cdf2
JJ
2179{
2180 asymbol *s;
0ccf57bd 2181 size_t i, j, count;
90e3cdf2 2182 char *names;
0ccf57bd 2183 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2184 asection *opd = NULL;
90e3cdf2 2185 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2186 asymbol **syms;
ee67d69a 2187 int abi = abiversion (abfd);
90e3cdf2
JJ
2188
2189 *ret = NULL;
2190
ee67d69a
AM
2191 if (abi < 2)
2192 {
2193 opd = bfd_get_section_by_name (abfd, ".opd");
2194 if (opd == NULL && abi == 1)
2195 return 0;
2196 }
90e3cdf2 2197
a5259595
AM
2198 syms = NULL;
2199 codesecsym = 0;
2200 codesecsymend = 0;
2201 secsymend = 0;
2202 opdsymend = 0;
2203 symcount = 0;
2204 if (opd != NULL)
c9727e01 2205 {
a5259595
AM
2206 symcount = static_count;
2207 if (!relocatable)
2208 symcount += dyn_count;
2209 if (symcount == 0)
2210 return 0;
c9727e01 2211
a5259595
AM
2212 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2213 if (syms == NULL)
2214 return -1;
90e3cdf2 2215
a5259595
AM
2216 if (!relocatable && static_count != 0 && dyn_count != 0)
2217 {
2218 /* Use both symbol tables. */
2219 memcpy (syms, static_syms, static_count * sizeof (*syms));
2220 memcpy (syms + static_count, dyn_syms,
2221 (dyn_count + 1) * sizeof (*syms));
2222 }
2223 else if (!relocatable && static_count == 0)
2224 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2225 else
2226 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2227
0ccf57bd
AM
2228 /* Trim uninteresting symbols. Interesting symbols are section,
2229 function, and notype symbols. */
2230 for (i = 0, j = 0; i < symcount; ++i)
2231 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2232 | BSF_RELC | BSF_SRELC)) == 0)
2233 syms[j++] = syms[i];
2234 symcount = j;
2235
a5259595
AM
2236 synthetic_relocatable = relocatable;
2237 synthetic_opd = opd;
2238 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2239
a5259595
AM
2240 if (!relocatable && symcount > 1)
2241 {
bfa5bd2a
PA
2242 /* Trim duplicate syms, since we may have merged the normal
2243 and dynamic symbols. Actually, we only care about syms
2244 that have different values, so trim any with the same
2245 value. Don't consider ifunc and ifunc resolver symbols
2246 duplicates however, because GDB wants to know whether a
2247 text symbol is an ifunc resolver. */
a5259595 2248 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2249 {
2250 const asymbol *s0 = syms[i - 1];
2251 const asymbol *s1 = syms[i];
2252
2253 if ((s0->value + s0->section->vma
2254 != s1->value + s1->section->vma)
2255 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2256 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2257 syms[j++] = syms[i];
2258 }
a5259595
AM
2259 symcount = j;
2260 }
699733f6 2261
a5259595
AM
2262 i = 0;
2263 /* Note that here and in compare_symbols we can't compare opd and
2264 sym->section directly. With separate debug info files, the
2265 symbols will be extracted from the debug file while abfd passed
2266 to this function is the real binary. */
0ccf57bd 2267 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2268 ++i;
2269 codesecsym = i;
2270
2271 for (; i < symcount; ++i)
2272 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2273 | SEC_THREAD_LOCAL))
2274 != (SEC_CODE | SEC_ALLOC))
2275 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2276 break;
2277 codesecsymend = i;
2278
2279 for (; i < symcount; ++i)
2280 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2281 break;
2282 secsymend = i;
2283
2284 for (; i < symcount; ++i)
2285 if (strcmp (syms[i]->section->name, ".opd") != 0)
2286 break;
2287 opdsymend = i;
2288
2289 for (; i < symcount; ++i)
2cdcc330
AM
2290 if (((syms[i]->section->flags
2291 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2292 != (SEC_CODE | SEC_ALLOC))
2293 break;
2294 symcount = i;
2295 }
c9727e01 2296 count = 0;
90e3cdf2 2297
699733f6 2298 if (relocatable)
90e3cdf2 2299 {
699733f6
AM
2300 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2301 arelent *r;
2302 size_t size;
0ccf57bd 2303 size_t relcount;
90e3cdf2 2304
468392fb
AM
2305 if (opdsymend == secsymend)
2306 goto done;
2307
699733f6 2308 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2309 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2310 if (relcount == 0)
c9727e01 2311 goto done;
90e3cdf2 2312
7356fed5
AM
2313 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2314 {
2315 count = -1;
2316 goto done;
2317 }
2318
699733f6 2319 size = 0;
595da8c5 2320 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2321 {
2322 asymbol *sym;
90e3cdf2 2323
595da8c5 2324 while (r < opd->relocation + relcount
699733f6
AM
2325 && r->address < syms[i]->value + opd->vma)
2326 ++r;
90e3cdf2 2327
595da8c5 2328 if (r == opd->relocation + relcount)
699733f6 2329 break;
90e3cdf2 2330
699733f6
AM
2331 if (r->address != syms[i]->value + opd->vma)
2332 continue;
90e3cdf2 2333
699733f6
AM
2334 if (r->howto->type != R_PPC64_ADDR64)
2335 continue;
90e3cdf2 2336
699733f6
AM
2337 sym = *r->sym_ptr_ptr;
2338 if (!sym_exists_at (syms, opdsymend, symcount,
2339 sym->section->id, sym->value + r->addend))
2340 {
2341 ++count;
2342 size += sizeof (asymbol);
2343 size += strlen (syms[i]->name) + 2;
2344 }
2345 }
90e3cdf2 2346
c4b0b099
AM
2347 if (size == 0)
2348 goto done;
699733f6
AM
2349 s = *ret = bfd_malloc (size);
2350 if (s == NULL)
2351 {
7356fed5 2352 count = -1;
c9727e01 2353 goto done;
699733f6 2354 }
90e3cdf2 2355
699733f6 2356 names = (char *) (s + count);
90e3cdf2 2357
595da8c5 2358 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2359 {
699733f6 2360 asymbol *sym;
90e3cdf2 2361
595da8c5 2362 while (r < opd->relocation + relcount
699733f6
AM
2363 && r->address < syms[i]->value + opd->vma)
2364 ++r;
90e3cdf2 2365
595da8c5 2366 if (r == opd->relocation + relcount)
699733f6
AM
2367 break;
2368
2369 if (r->address != syms[i]->value + opd->vma)
2370 continue;
2371
2372 if (r->howto->type != R_PPC64_ADDR64)
2373 continue;
90e3cdf2 2374
699733f6
AM
2375 sym = *r->sym_ptr_ptr;
2376 if (!sym_exists_at (syms, opdsymend, symcount,
2377 sym->section->id, sym->value + r->addend))
2378 {
2379 size_t len;
2380
2381 *s = *syms[i];
6ba2a415 2382 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2383 s->section = sym->section;
2384 s->value = sym->value + r->addend;
2385 s->name = names;
2386 *names++ = '.';
2387 len = strlen (syms[i]->name);
2388 memcpy (names, syms[i]->name, len + 1);
2389 names += len + 1;
6f610d07
UW
2390 /* Have udata.p point back to the original symbol this
2391 synthetic symbol was derived from. */
2392 s->udata.p = syms[i];
699733f6
AM
2393 s++;
2394 }
2395 }
2396 }
2397 else
90e3cdf2 2398 {
468392fb 2399 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2400 bfd_byte *contents = NULL;
699733f6 2401 size_t size;
0ccf57bd 2402 size_t plt_count = 0;
468392fb
AM
2403 bfd_vma glink_vma = 0, resolv_vma = 0;
2404 asection *dynamic, *glink = NULL, *relplt = NULL;
2405 arelent *p;
90e3cdf2 2406
ee67d69a 2407 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2408 {
c4b0b099
AM
2409 free_contents_and_exit_err:
2410 count = -1;
ee67d69a 2411 free_contents_and_exit:
699733f6 2412 if (contents)
ee67d69a 2413 free (contents);
c9727e01 2414 goto done;
699733f6 2415 }
90e3cdf2 2416
699733f6
AM
2417 size = 0;
2418 for (i = secsymend; i < opdsymend; ++i)
2419 {
2420 bfd_vma ent;
90e3cdf2 2421
5ef11c02
AM
2422 /* Ignore bogus symbols. */
2423 if (syms[i]->value > opd->size - 8)
2424 continue;
2425
699733f6
AM
2426 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2427 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2428 {
2429 ++count;
2430 size += sizeof (asymbol);
2431 size += strlen (syms[i]->name) + 2;
2432 }
2433 }
90e3cdf2 2434
468392fb 2435 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2436 if (dyn_count != 0
2437 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2438 {
2439 bfd_byte *dynbuf, *extdyn, *extdynend;
2440 size_t extdynsize;
2441 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2442
2443 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2444 goto free_contents_and_exit_err;
468392fb
AM
2445
2446 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2447 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2448
2449 extdyn = dynbuf;
2450 extdynend = extdyn + dynamic->size;
2451 for (; extdyn < extdynend; extdyn += extdynsize)
2452 {
2453 Elf_Internal_Dyn dyn;
2454 (*swap_dyn_in) (abfd, extdyn, &dyn);
2455
2456 if (dyn.d_tag == DT_NULL)
2457 break;
2458
2459 if (dyn.d_tag == DT_PPC64_GLINK)
2460 {
9e390558
AM
2461 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2462 See comment in ppc64_elf_finish_dynamic_sections. */
2463 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2464 /* The .glink section usually does not survive the final
2465 link; search for the section (usually .text) where the
2466 glink stubs now reside. */
2467 glink = bfd_sections_find_if (abfd, section_covers_vma,
2468 &glink_vma);
2469 break;
2470 }
2471 }
2472
2473 free (dynbuf);
2474 }
2475
2476 if (glink != NULL)
2477 {
2478 /* Determine __glink trampoline by reading the relative branch
2479 from the first glink stub. */
2480 bfd_byte buf[4];
b9e5796b
AM
2481 unsigned int off = 0;
2482
2483 while (bfd_get_section_contents (abfd, glink, buf,
2484 glink_vma + off - glink->vma, 4))
468392fb
AM
2485 {
2486 unsigned int insn = bfd_get_32 (abfd, buf);
2487 insn ^= B_DOT;
2488 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2489 {
2cdcc330
AM
2490 resolv_vma
2491 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2492 break;
2493 }
2494 off += 4;
2495 if (off > 4)
2496 break;
468392fb
AM
2497 }
2498
2499 if (resolv_vma)
2500 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2501
066ee829
AM
2502 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2503 if (relplt != NULL)
2504 {
2505 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2506 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2507 goto free_contents_and_exit_err;
68ffbac6 2508
066ee829
AM
2509 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2510 size += plt_count * sizeof (asymbol);
468392fb 2511
066ee829
AM
2512 p = relplt->relocation;
2513 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2514 {
2515 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2516 if (p->addend != 0)
2517 size += sizeof ("+0x") - 1 + 16;
2518 }
066ee829 2519 }
468392fb
AM
2520 }
2521
c4b0b099
AM
2522 if (size == 0)
2523 goto free_contents_and_exit;
699733f6
AM
2524 s = *ret = bfd_malloc (size);
2525 if (s == NULL)
c4b0b099 2526 goto free_contents_and_exit_err;
90e3cdf2 2527
468392fb 2528 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2529
699733f6 2530 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2531 {
699733f6 2532 bfd_vma ent;
90e3cdf2 2533
5ef11c02
AM
2534 if (syms[i]->value > opd->size - 8)
2535 continue;
2536
699733f6
AM
2537 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2538 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2539 {
0ccf57bd 2540 size_t lo, hi;
699733f6 2541 size_t len;
c9727e01 2542 asection *sec = abfd->sections;
90e3cdf2 2543
699733f6
AM
2544 *s = *syms[i];
2545 lo = codesecsym;
2546 hi = codesecsymend;
2547 while (lo < hi)
2548 {
0ccf57bd 2549 size_t mid = (lo + hi) >> 1;
699733f6
AM
2550 if (syms[mid]->section->vma < ent)
2551 lo = mid + 1;
2552 else if (syms[mid]->section->vma > ent)
2553 hi = mid;
2554 else
c9727e01
AM
2555 {
2556 sec = syms[mid]->section;
2557 break;
2558 }
699733f6
AM
2559 }
2560
c9727e01 2561 if (lo >= hi && lo > codesecsym)
699733f6 2562 sec = syms[lo - 1]->section;
699733f6
AM
2563
2564 for (; sec != NULL; sec = sec->next)
2565 {
2566 if (sec->vma > ent)
2567 break;
63524580
JK
2568 /* SEC_LOAD may not be set if SEC is from a separate debug
2569 info file. */
2570 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2571 break;
2572 if ((sec->flags & SEC_CODE) != 0)
2573 s->section = sec;
2574 }
6ba2a415 2575 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2576 s->value = ent - s->section->vma;
2577 s->name = names;
2578 *names++ = '.';
2579 len = strlen (syms[i]->name);
2580 memcpy (names, syms[i]->name, len + 1);
2581 names += len + 1;
6f610d07
UW
2582 /* Have udata.p point back to the original symbol this
2583 synthetic symbol was derived from. */
2584 s->udata.p = syms[i];
699733f6 2585 s++;
90e3cdf2 2586 }
90e3cdf2 2587 }
699733f6 2588 free (contents);
468392fb
AM
2589
2590 if (glink != NULL && relplt != NULL)
2591 {
2592 if (resolv_vma)
2593 {
2594 /* Add a symbol for the main glink trampoline. */
86a4952b 2595 memset (s, 0, sizeof *s);
468392fb 2596 s->the_bfd = abfd;
6ba2a415 2597 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2598 s->section = glink;
2599 s->value = resolv_vma - glink->vma;
2600 s->name = names;
2cdcc330
AM
2601 memcpy (names, "__glink_PLTresolve",
2602 sizeof ("__glink_PLTresolve"));
468392fb
AM
2603 names += sizeof ("__glink_PLTresolve");
2604 s++;
2605 count++;
2606 }
2607
2608 /* FIXME: It would be very much nicer to put sym@plt on the
2609 stub rather than on the glink branch table entry. The
2610 objdump disassembler would then use a sensible symbol
2611 name on plt calls. The difficulty in doing so is
2612 a) finding the stubs, and,
2613 b) matching stubs against plt entries, and,
2614 c) there can be multiple stubs for a given plt entry.
2615
2616 Solving (a) could be done by code scanning, but older
2617 ppc64 binaries used different stubs to current code.
2618 (b) is the tricky one since you need to known the toc
2619 pointer for at least one function that uses a pic stub to
2620 be able to calculate the plt address referenced.
2621 (c) means gdb would need to set multiple breakpoints (or
2622 find the glink branch itself) when setting breakpoints
2623 for pending shared library loads. */
2624 p = relplt->relocation;
2625 for (i = 0; i < plt_count; i++, p++)
2626 {
2627 size_t len;
2628
2629 *s = **p->sym_ptr_ptr;
2630 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2631 we are defining a symbol, ensure one of them is set. */
2632 if ((s->flags & BSF_LOCAL) == 0)
2633 s->flags |= BSF_GLOBAL;
6ba2a415 2634 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2635 s->section = glink;
2636 s->value = glink_vma - glink->vma;
2637 s->name = names;
2638 s->udata.p = NULL;
2639 len = strlen ((*p->sym_ptr_ptr)->name);
2640 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2641 names += len;
e054468f
AM
2642 if (p->addend != 0)
2643 {
2644 memcpy (names, "+0x", sizeof ("+0x") - 1);
2645 names += sizeof ("+0x") - 1;
2646 bfd_sprintf_vma (abfd, names, p->addend);
2647 names += strlen (names);
2648 }
468392fb
AM
2649 memcpy (names, "@plt", sizeof ("@plt"));
2650 names += sizeof ("@plt");
2651 s++;
b9e5796b
AM
2652 if (abi < 2)
2653 {
2654 glink_vma += 8;
2655 if (i >= 0x8000)
2656 glink_vma += 4;
2657 }
2658 else
468392fb
AM
2659 glink_vma += 4;
2660 }
2661 count += plt_count;
2662 }
90e3cdf2
JJ
2663 }
2664
c9727e01 2665 done:
a7535cf3 2666 free (syms);
90e3cdf2
JJ
2667 return count;
2668}
5bd4f169 2669\f
65f38f15
AM
2670/* The following functions are specific to the ELF linker, while
2671 functions above are used generally. Those named ppc64_elf_* are
2672 called by the main ELF linker code. They appear in this file more
2673 or less in the order in which they are called. eg.
2674 ppc64_elf_check_relocs is called early in the link process,
2675 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2676 called.
2677
2678 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2679 functions have both a function code symbol and a function descriptor
2680 symbol. A call to foo in a relocatable object file looks like:
2681
2682 . .text
2683 . x:
2684 . bl .foo
2685 . nop
2686
2687 The function definition in another object file might be:
2688
2689 . .section .opd
2690 . foo: .quad .foo
2691 . .quad .TOC.@tocbase
2692 . .quad 0
2693 .
2694 . .text
2695 . .foo: blr
2696
2697 When the linker resolves the call during a static link, the branch
2698 unsurprisingly just goes to .foo and the .opd information is unused.
2699 If the function definition is in a shared library, things are a little
2700 different: The call goes via a plt call stub, the opd information gets
2701 copied to the plt, and the linker patches the nop.
2702
2703 . x:
2704 . bl .foo_stub
2705 . ld 2,40(1)
2706 .
2707 .
2708 . .foo_stub:
71a39c98
AM
2709 . std 2,40(1) # in practice, the call stub
2710 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2711 . addi 11,11,Lfoo@toc@l # this is the general idea
2712 . ld 12,0(11)
2713 . ld 2,8(11)
2714 . mtctr 12
2715 . ld 11,16(11)
e86ce104
AM
2716 . bctr
2717 .
2718 . .section .plt
2719 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2720
2721 The "reloc ()" notation is supposed to indicate that the linker emits
2722 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2723 copying.
2724
2725 What are the difficulties here? Well, firstly, the relocations
2726 examined by the linker in check_relocs are against the function code
2727 sym .foo, while the dynamic relocation in the plt is emitted against
2728 the function descriptor symbol, foo. Somewhere along the line, we need
2729 to carefully copy dynamic link information from one symbol to the other.
2730 Secondly, the generic part of the elf linker will make .foo a dynamic
2731 symbol as is normal for most other backends. We need foo dynamic
2732 instead, at least for an application final link. However, when
2733 creating a shared library containing foo, we need to have both symbols
2734 dynamic so that references to .foo are satisfied during the early
2735 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2736 definition from some other object, eg. a static library.
2737
2738 Update: As of August 2004, we support a new convention. Function
2739 calls may use the function descriptor symbol, ie. "bl foo". This
2740 behaves exactly as "bl .foo". */
65f38f15 2741
7c8bbca5
AM
2742/* Of those relocs that might be copied as dynamic relocs, this
2743 function selects those that must be copied when linking a shared
2744 library or PIE, even when the symbol is local. */
65f38f15 2745
1d483afe
AM
2746static int
2747must_be_dyn_reloc (struct bfd_link_info *info,
2748 enum elf_ppc64_reloc_type r_type)
2749{
2750 switch (r_type)
2751 {
2752 default:
7c8bbca5
AM
2753 /* Only relative relocs can be resolved when the object load
2754 address isn't fixed. DTPREL64 is excluded because the
2755 dynamic linker needs to differentiate global dynamic from
2756 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2757 return 1;
2758
2759 case R_PPC64_REL32:
2760 case R_PPC64_REL64:
2761 case R_PPC64_REL30:
1bdd8fac
AM
2762 case R_PPC64_TOC16:
2763 case R_PPC64_TOC16_DS:
2764 case R_PPC64_TOC16_LO:
2765 case R_PPC64_TOC16_HI:
2766 case R_PPC64_TOC16_HA:
2767 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2768 return 0;
2769
2770 case R_PPC64_TPREL16:
2771 case R_PPC64_TPREL16_LO:
2772 case R_PPC64_TPREL16_HI:
2773 case R_PPC64_TPREL16_HA:
2774 case R_PPC64_TPREL16_DS:
2775 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2776 case R_PPC64_TPREL16_HIGH:
2777 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2778 case R_PPC64_TPREL16_HIGHER:
2779 case R_PPC64_TPREL16_HIGHERA:
2780 case R_PPC64_TPREL16_HIGHEST:
2781 case R_PPC64_TPREL16_HIGHESTA:
2782 case R_PPC64_TPREL64:
c213164a 2783 case R_PPC64_TPREL34:
7c8bbca5
AM
2784 /* These relocations are relative but in a shared library the
2785 linker doesn't know the thread pointer base. */
2786 return bfd_link_dll (info);
1d483afe
AM
2787 }
2788}
65f38f15 2789
f4656909
AM
2790/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2791 copying dynamic variables from a shared lib into an app's dynbss
2792 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2793 shared lib. With code that gcc generates, it's vital that this be
2794 enabled; In the PowerPC64 ABI, the address of a function is actually
2795 the address of a function descriptor, which resides in the .opd
2796 section. gcc uses the descriptor directly rather than going via the
2797 GOT as some other ABI's do, which means that initialized function
2798 pointers must reference the descriptor. Thus, a function pointer
2799 initialized to the address of a function in a shared library will
2800 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2801 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2802 presents a problem as a plt entry for that function is also
2803 initialized from the function descriptor symbol and the copy reloc
2804 may not be initialized first. */
a23b6845 2805#define ELIMINATE_COPY_RELOCS 1
f4656909 2806
721956f4 2807/* Section name for stubs is the associated section name plus this
29942be8
NC
2808 string. */
2809#define STUB_SUFFIX ".stub"
721956f4
AM
2810
2811/* Linker stubs.
2812 ppc_stub_long_branch:
2813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2814 destination, but a 24 bit branch in a stub section will reach.
2815 . b dest
2816
2817 ppc_stub_plt_branch:
2818 Similar to the above, but a 24 bit branch in the stub section won't
2819 reach its destination.
71a39c98
AM
2820 . addis %r11,%r2,xxx@toc@ha
2821 . ld %r12,xxx@toc@l(%r11)
2822 . mtctr %r12
721956f4
AM
2823 . bctr
2824
2825 ppc_stub_plt_call:
2c66dc6c
AM
2826 Used to call a function in a shared library. If it so happens that
2827 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2829 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2830 . addis %r11,%r2,xxx@toc@ha
2831 . ld %r12,xxx+0@toc@l(%r11)
2832 . mtctr %r12
2833 . ld %r2,xxx+8@toc@l(%r11)
2834 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2835 . bctr
ad8e1ba5
AM
2836
2837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2838 code to adjust the value and save r2 to support multiple toc sections.
2839 A ppc_stub_long_branch with an r2 offset looks like:
2840 . std %r2,40(%r1)
2841 . addis %r2,%r2,off@ha
2842 . addi %r2,%r2,off@l
2843 . b dest
2844
2845 A ppc_stub_plt_branch with an r2 offset looks like:
2846 . std %r2,40(%r1)
71a39c98
AM
2847 . addis %r11,%r2,xxx@toc@ha
2848 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2849 . addis %r2,%r2,off@ha
2850 . addi %r2,%r2,off@l
71a39c98 2851 . mtctr %r12
ad8e1ba5 2852 . bctr
ac2df442 2853
05d0e962
AM
2854 All of the above stubs are shown as their ELFv1 variants. ELFv2
2855 variants exist too, simpler for plt calls since a new toc pointer
2856 and static chain are not loaded by the stub. In addition, ELFv2
2857 has some more complex stubs to handle calls marked with NOTOC
2858 relocs from functions where r2 is not a valid toc pointer. These
2859 come in two flavours, the ones shown below, and _both variants that
2860 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2861 one call is from a function where r2 is used as the toc pointer but
2862 needs a toc adjusting stub for small-model multi-toc, and another
2863 call is from a function where r2 is not valid.
2864 ppc_stub_long_branch_notoc:
2865 . mflr %r12
2866 . bcl 20,31,1f
2867 . 1:
2868 . mflr %r11
2869 . mtlr %r12
2cdcc330
AM
2870 . addis %r12,%r11,dest-1b@ha
2871 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2872 . b dest
2873
2874 ppc_stub_plt_branch_notoc:
2875 . mflr %r12
2876 . bcl 20,31,1f
2877 . 1:
2878 . mflr %r11
2879 . mtlr %r12
2880 . lis %r12,xxx-1b@highest
f891966f 2881 . ori %r12,%r12,xxx-1b@higher
05d0e962 2882 . sldi %r12,%r12,32
f891966f 2883 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2884 . ori %r12,%r12,xxx-1b@l
2885 . add %r12,%r11,%r12
2886 . mtctr %r12
2887 . bctr
2888
2889 ppc_stub_plt_call_notoc:
2890 . mflr %r12
2891 . bcl 20,31,1f
2892 . 1:
2893 . mflr %r11
2894 . mtlr %r12
2895 . lis %r12,xxx-1b@highest
f891966f 2896 . ori %r12,%r12,xxx-1b@higher
05d0e962 2897 . sldi %r12,%r12,32
f891966f 2898 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2899 . ori %r12,%r12,xxx-1b@l
2900 . ldx %r12,%r11,%r12
2901 . mtctr %r12
2902 . bctr
2903
04bdff6a
AM
2904 There are also ELFv1 powerxx variants of these stubs.
2905 ppc_stub_long_branch_notoc:
d4b87b1e 2906 . pla %r12,dest@pcrel
04bdff6a
AM
2907 . b dest
2908 ppc_stub_plt_branch_notoc:
2909 . lis %r11,(dest-1f)@highesta34
2910 . ori %r11,%r11,(dest-1f)@highera34
2911 . sldi %r11,%r11,34
d4b87b1e 2912 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916 ppc_stub_plt_call_notoc:
2917 . lis %r11,(xxx-1f)@highesta34
2918 . ori %r11,%r11,(xxx-1f)@highera34
2919 . sldi %r11,%r11,34
d4b87b1e 2920 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2921 . ldx %r12,%r11,%r12
2922 . mtctr %r12
2923 . bctr
2924
05d0e962
AM
2925 In cases where the high instructions would add zero, they are
2926 omitted and following instructions modified in some cases.
04bdff6a
AM
2927 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2928 to
2929 . pld %r12,xxx@pcrel
2930 . mtctr %r12
2931 . bctr
05d0e962
AM
2932
2933 For a given stub group (a set of sections all using the same toc
2934 pointer value) there will be just one stub type used for any
2935 particular function symbol. For example, if printf is called from
2936 code with the tocsave optimization (ie. r2 saved in function
2937 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2938 and from other code without the tocsave optimization requiring a
2939 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2940 type will be created. Calls with the tocsave optimization will
2941 enter this stub after the instruction saving r2. A similar
2942 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2943 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2944 to call an external function like printf. If other calls to printf
2945 require a ppc_stub_plt_call linkage stub then a single
2946 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2947 call. If other calls to printf require a ppc_stub_plt_call_r2save
2948 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2949 be created and calls not requiring r2 to be saved will enter the
2950 stub after the r2 save instruction. There is an analogous
2951 hierarchy of long branch and plt branch stubs for local call
2952 linkage. */
721956f4 2953
2cdcc330
AM
2954enum ppc_stub_type
2955{
721956f4
AM
2956 ppc_stub_none,
2957 ppc_stub_long_branch,
ad8e1ba5 2958 ppc_stub_long_branch_r2off,
05d0e962
AM
2959 ppc_stub_long_branch_notoc,
2960 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2961 ppc_stub_plt_branch,
ad8e1ba5 2962 ppc_stub_plt_branch_r2off,
05d0e962
AM
2963 ppc_stub_plt_branch_notoc,
2964 ppc_stub_plt_branch_both,
794e51c0 2965 ppc_stub_plt_call,
7341d5e2 2966 ppc_stub_plt_call_r2save,
05d0e962
AM
2967 ppc_stub_plt_call_notoc,
2968 ppc_stub_plt_call_both,
a4b6fadd
AM
2969 ppc_stub_global_entry,
2970 ppc_stub_save_res
721956f4
AM
2971};
2972
6f20ed8a
AM
2973/* Information on stub grouping. */
2974struct map_stub
2975{
2976 /* The stub section. */
2977 asection *stub_sec;
2978 /* This is the section to which stubs in the group will be attached. */
2979 asection *link_sec;
a4b6fadd
AM
2980 /* Next group. */
2981 struct map_stub *next;
2982 /* Whether to emit a copy of register save/restore functions in this
2983 group. */
2984 int needs_save_res;
df136d64
AM
2985 /* Current offset within stubs after the insn restoring lr in a
2986 _notoc or _both stub using bcl for pc-relative addressing, or
2987 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2988 unsigned int lr_restore;
2989 /* Accumulated size of EH info emitted to describe return address
2990 if stubs modify lr. Does not include 17 byte FDE header. */
2991 unsigned int eh_size;
2992 /* Offset in glink_eh_frame to the start of EH info for this group. */
2993 unsigned int eh_base;
6f20ed8a
AM
2994};
2995
2cdcc330
AM
2996struct ppc_stub_hash_entry
2997{
721956f4
AM
2998 /* Base hash table entry structure. */
2999 struct bfd_hash_entry root;
3000
ad8e1ba5
AM
3001 enum ppc_stub_type stub_type;
3002
6f20ed8a
AM
3003 /* Group information. */
3004 struct map_stub *group;
721956f4
AM
3005
3006 /* Offset within stub_sec of the beginning of this stub. */
3007 bfd_vma stub_offset;
3008
3009 /* Given the symbol's value and its section we can determine its final
3010 value when building the stubs (so the stub knows where to jump. */
3011 bfd_vma target_value;
3012 asection *target_section;
3013
721956f4
AM
3014 /* The symbol table entry, if any, that this was derived from. */
3015 struct ppc_link_hash_entry *h;
e054468f 3016 struct plt_entry *plt_ent;
721956f4 3017
2d7ad24e
AM
3018 /* Symbol type. */
3019 unsigned char symtype;
3020
6911b7dc
AM
3021 /* Symbol st_other. */
3022 unsigned char other;
721956f4
AM
3023};
3024
2cdcc330
AM
3025struct ppc_branch_hash_entry
3026{
721956f4
AM
3027 /* Base hash table entry structure. */
3028 struct bfd_hash_entry root;
3029
c456f082 3030 /* Offset within branch lookup table. */
721956f4
AM
3031 unsigned int offset;
3032
3033 /* Generation marker. */
3034 unsigned int iter;
3035};
65f38f15 3036
19e08130
AM
3037/* Used to track dynamic relocations for local symbols. */
3038struct ppc_dyn_relocs
3039{
3040 struct ppc_dyn_relocs *next;
3041
3042 /* The input section of the reloc. */
3043 asection *sec;
3044
3045 /* Total number of relocs copied for the input section. */
3046 unsigned int count : 31;
3047
3048 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3049 unsigned int ifunc : 1;
3050};
3051
65f38f15
AM
3052struct ppc_link_hash_entry
3053{
3054 struct elf_link_hash_entry elf;
3055
2cdcc330
AM
3056 union
3057 {
b3fac117
AM
3058 /* A pointer to the most recently used stub hash entry against this
3059 symbol. */
3060 struct ppc_stub_hash_entry *stub_cache;
3061
3062 /* A pointer to the next symbol starting with a '.' */
3063 struct ppc_link_hash_entry *next_dot_sym;
3064 } u;
721956f4 3065
65f38f15 3066 /* Track dynamic relocs copied for this symbol. */
6061a67d 3067 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3068
721956f4 3069 /* Link between function code and descriptor symbols. */
34814b9f 3070 struct ppc_link_hash_entry *oh;
721956f4 3071
e86ce104
AM
3072 /* Flag function code and descriptor symbols. */
3073 unsigned int is_func:1;
3074 unsigned int is_func_descriptor:1;
908b32fc 3075 unsigned int fake:1;
411e1bfb 3076
c5614fa4
AM
3077 /* Whether global opd/toc sym has been adjusted or not.
3078 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3079 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3080 unsigned int adjust_done:1;
3081
a4b6fadd
AM
3082 /* Set if this is an out-of-line register save/restore function,
3083 with non-standard calling convention. */
3084 unsigned int save_res:1;
3085
8b5f1ed8
AM
3086 /* Set if a duplicate symbol with non-zero localentry is detected,
3087 even when the duplicate symbol does not provide a definition. */
3088 unsigned int non_zero_localentry:1;
3089
411e1bfb 3090 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3091 Bits are or'd into the mask as the corresponding relocs are
3092 encountered during check_relocs, with TLS_TLS being set when any
3093 of the other TLS bits are set. tls_optimize clears bits when
3094 optimizing to indicate the corresponding GOT entry type is not
3095 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3096 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3097 These flags are also kept for local symbols. */
3098#define TLS_TLS 1 /* Any TLS reloc. */
3099#define TLS_GD 2 /* GD reloc. */
3100#define TLS_LD 4 /* LD reloc. */
3101#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3102#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3103#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3104#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3105#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3106 unsigned char tls_mask;
37da22e5
AM
3107
3108 /* The above field is also used to mark function symbols. In which
3109 case TLS_TLS will be 0. */
3110#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3111#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3112#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3113};
3114
3115/* ppc64 ELF linker hash table. */
3116
3117struct ppc_link_hash_table
3118{
3119 struct elf_link_hash_table elf;
3120
721956f4
AM
3121 /* The stub hash table. */
3122 struct bfd_hash_table stub_hash_table;
3123
3124 /* Another hash table for plt_branch stubs. */
3125 struct bfd_hash_table branch_hash_table;
3126
3b421ab3
AM
3127 /* Hash table for function prologue tocsave. */
3128 htab_t tocsave_htab;
3129
e7d1c40c
AM
3130 /* Various options and other info passed from the linker. */
3131 struct ppc64_elf_params *params;
721956f4 3132
6f20ed8a
AM
3133 /* The size of sec_info below. */
3134 unsigned int sec_info_arr_size;
3135
3136 /* Per-section array of extra section info. Done this way rather
3137 than as part of ppc64_elf_section_data so we have the info for
3138 non-ppc64 sections. */
3139 struct
3140 {
3141 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3142 bfd_vma toc_off;
6f20ed8a
AM
3143
3144 union
3145 {
3146 /* The section group that this section belongs to. */
3147 struct map_stub *group;
3148 /* A temp section list pointer. */
3149 asection *list;
3150 } u;
3151 } *sec_info;
721956f4 3152
a4b6fadd
AM
3153 /* Linked list of groups. */
3154 struct map_stub *group;
3155
ad8e1ba5
AM
3156 /* Temp used when calculating TOC pointers. */
3157 bfd_vma toc_curr;
bf102f86
AM
3158 bfd *toc_bfd;
3159 asection *toc_first_sec;
ad8e1ba5 3160
b3fac117
AM
3161 /* Used when adding symbols. */
3162 struct ppc_link_hash_entry *dot_syms;
3163
33e44f2e 3164 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3165 asection *glink;
9e390558 3166 asection *global_entry;
82bd7b59 3167 asection *sfpr;
2d7ad24e
AM
3168 asection *pltlocal;
3169 asection *relpltlocal;
4ce794b7
AM
3170 asection *brlt;
3171 asection *relbrlt;
58d180e8 3172 asection *glink_eh_frame;
ec338859 3173
8387904d
AM
3174 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3175 struct ppc_link_hash_entry *tls_get_addr;
3176 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3177
927be08e
AM
3178 /* The size of reliplt used by got entry relocs. */
3179 bfd_size_type got_reli_size;
3180
9b5ecbd0 3181 /* Statistics. */
7341d5e2 3182 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3183
ee75fd95
AM
3184 /* Number of stubs against global syms. */
3185 unsigned long stub_globals;
3186
ee67d69a
AM
3187 /* Set if we're linking code with function descriptors. */
3188 unsigned int opd_abi:1;
3189
4c52953f 3190 /* Support for multiple toc sections. */
33c0ec9d 3191 unsigned int do_multi_toc:1;
4c52953f 3192 unsigned int multi_toc_needed:1;
927be08e 3193 unsigned int second_toc_pass:1;
67f0cbdb 3194 unsigned int do_toc_opt:1;
4c52953f 3195
9a23f96e
AM
3196 /* Set if tls optimization is enabled. */
3197 unsigned int do_tls_opt:1;
3198
3e04d765
AM
3199 /* Set if inline plt calls should be converted to direct calls. */
3200 unsigned int can_convert_all_inline_plt:1;
3201
5d1634d7 3202 /* Set on error. */
99877b66 3203 unsigned int stub_error:1;
721956f4 3204
8c5b4e52
AM
3205 /* Whether func_desc_adjust needs to be run over symbols. */
3206 unsigned int need_func_desc_adj:1;
721956f4 3207
82e66161
AM
3208 /* Whether there exist local gnu indirect function resolvers,
3209 referenced by dynamic relocations. */
3210 unsigned int local_ifunc_resolver:1;
3211 unsigned int maybe_local_ifunc_resolver:1;
3212
f378ab09
AM
3213 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3214 unsigned int has_plt_localentry0:1;
3215
5663e321
AM
3216 /* Whether calls are made via the PLT from NOTOC functions. */
3217 unsigned int notoc_plt:1;
3218
04bdff6a
AM
3219 /* Whether to use powerxx instructions in linkage stubs. */
3220 unsigned int powerxx_stubs:1;
3221
721956f4
AM
3222 /* Incremented every time we size stubs. */
3223 unsigned int stub_iteration;
5d1634d7 3224
87d72d41
AM
3225 /* Small local sym cache. */
3226 struct sym_cache sym_cache;
65f38f15
AM
3227};
3228
4c52953f
AM
3229/* Rename some of the generic section flags to better document how they
3230 are used here. */
b0dddeec
AM
3231
3232/* Nonzero if this section has TLS related relocations. */
3233#define has_tls_reloc sec_flg0
3234
9737e8af
AM
3235/* Nonzero if this section has a call to __tls_get_addr lacking marker
3236 relocations. */
3237#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3238
3239/* Nonzero if this section has any toc or got relocs. */
3240#define has_toc_reloc sec_flg2
3241
3242/* Nonzero if this section has a call to another section that uses
3243 the toc or got. */
d77c8a4b 3244#define makes_toc_func_call sec_flg3
b0dddeec
AM
3245
3246/* Recursion protection when determining above flag. */
d77c8a4b 3247#define call_check_in_progress sec_flg4
70cc837d 3248#define call_check_done sec_flg5
4c52953f 3249
65f38f15
AM
3250/* Get the ppc64 ELF linker hash table from a link_info structure. */
3251
3252#define ppc_hash_table(p) \
4dfe6ac6
NC
3253 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3254 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3255
721956f4
AM
3256#define ppc_stub_hash_lookup(table, string, create, copy) \
3257 ((struct ppc_stub_hash_entry *) \
3258 bfd_hash_lookup ((table), (string), (create), (copy)))
3259
3260#define ppc_branch_hash_lookup(table, string, create, copy) \
3261 ((struct ppc_branch_hash_entry *) \
3262 bfd_hash_lookup ((table), (string), (create), (copy)))
3263
3264/* Create an entry in the stub hash table. */
3265
3266static struct bfd_hash_entry *
4ce794b7
AM
3267stub_hash_newfunc (struct bfd_hash_entry *entry,
3268 struct bfd_hash_table *table,
3269 const char *string)
721956f4
AM
3270{
3271 /* Allocate the structure if it has not already been allocated by a
3272 subclass. */
3273 if (entry == NULL)
3274 {
3275 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3276 if (entry == NULL)
3277 return entry;
3278 }
3279
3280 /* Call the allocation method of the superclass. */
3281 entry = bfd_hash_newfunc (entry, table, string);
3282 if (entry != NULL)
3283 {
3284 struct ppc_stub_hash_entry *eh;
3285
3286 /* Initialize the local fields. */
3287 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3288 eh->stub_type = ppc_stub_none;
6f20ed8a 3289 eh->group = NULL;
721956f4
AM
3290 eh->stub_offset = 0;
3291 eh->target_value = 0;
3292 eh->target_section = NULL;
721956f4 3293 eh->h = NULL;
6911b7dc 3294 eh->plt_ent = NULL;
6911b7dc 3295 eh->other = 0;
721956f4
AM
3296 }
3297
3298 return entry;
3299}
3300
3301/* Create an entry in the branch hash table. */
3302
3303static struct bfd_hash_entry *
4ce794b7
AM
3304branch_hash_newfunc (struct bfd_hash_entry *entry,
3305 struct bfd_hash_table *table,
3306 const char *string)
721956f4
AM
3307{
3308 /* Allocate the structure if it has not already been allocated by a
3309 subclass. */
3310 if (entry == NULL)
3311 {
3312 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3313 if (entry == NULL)
3314 return entry;
3315 }
3316
3317 /* Call the allocation method of the superclass. */
3318 entry = bfd_hash_newfunc (entry, table, string);
3319 if (entry != NULL)
3320 {
3321 struct ppc_branch_hash_entry *eh;
3322
3323 /* Initialize the local fields. */
3324 eh = (struct ppc_branch_hash_entry *) entry;
3325 eh->offset = 0;
3326 eh->iter = 0;
3327 }
3328
3329 return entry;
3330}
3331
65f38f15
AM
3332/* Create an entry in a ppc64 ELF linker hash table. */
3333
3334static struct bfd_hash_entry *
4ce794b7
AM
3335link_hash_newfunc (struct bfd_hash_entry *entry,
3336 struct bfd_hash_table *table,
3337 const char *string)
65f38f15
AM
3338{
3339 /* Allocate the structure if it has not already been allocated by a
3340 subclass. */
3341 if (entry == NULL)
3342 {
3343 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3344 if (entry == NULL)
3345 return entry;
3346 }
3347
3348 /* Call the allocation method of the superclass. */
3349 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3350 if (entry != NULL)
3351 {
3352 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3353
b3fac117 3354 memset (&eh->u.stub_cache, 0,
908b32fc 3355 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3356 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3357
3358 /* When making function calls, old ABI code references function entry
3359 points (dot symbols), while new ABI code references the function
3360 descriptor symbol. We need to make any combination of reference and
3361 definition work together, without breaking archive linking.
3362
3363 For a defined function "foo" and an undefined call to "bar":
3364 An old object defines "foo" and ".foo", references ".bar" (possibly
3365 "bar" too).
3366 A new object defines "foo" and references "bar".
3367
3368 A new object thus has no problem with its undefined symbols being
3369 satisfied by definitions in an old object. On the other hand, the
3370 old object won't have ".bar" satisfied by a new object.
3371
3372 Keep a list of newly added dot-symbols. */
3373
3374 if (string[0] == '.')
3375 {
3376 struct ppc_link_hash_table *htab;
3377
3378 htab = (struct ppc_link_hash_table *) table;
3379 eh->u.next_dot_sym = htab->dot_syms;
3380 htab->dot_syms = eh;
3381 }
65f38f15
AM
3382 }
3383
3384 return entry;
3385}
3386
2cdcc330
AM
3387struct tocsave_entry
3388{
3b421ab3
AM
3389 asection *sec;
3390 bfd_vma offset;
3391};
3392
3393static hashval_t
3394tocsave_htab_hash (const void *p)
3395{
3396 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3397 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3398}
3399
3400static int
3401tocsave_htab_eq (const void *p1, const void *p2)
3402{
3403 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3404 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3405 return e1->sec == e2->sec && e1->offset == e2->offset;
3406}
3407
68faa637
AM
3408/* Destroy a ppc64 ELF linker hash table. */
3409
3410static void
d495ab0d 3411ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3412{
d495ab0d 3413 struct ppc_link_hash_table *htab;
68faa637 3414
d495ab0d 3415 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3416 if (htab->tocsave_htab)
3417 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3418 bfd_hash_table_free (&htab->branch_hash_table);
3419 bfd_hash_table_free (&htab->stub_hash_table);
3420 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3421}
3422
65f38f15
AM
3423/* Create a ppc64 ELF linker hash table. */
3424
3425static struct bfd_link_hash_table *
4ce794b7 3426ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3427{
3428 struct ppc_link_hash_table *htab;
3429 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3430
4ce794b7 3431 htab = bfd_zmalloc (amt);
65f38f15
AM
3432 if (htab == NULL)
3433 return NULL;
3434
66eb6687 3435 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3436 sizeof (struct ppc_link_hash_entry),
3437 PPC64_ELF_DATA))
65f38f15 3438 {
e2d34d7d 3439 free (htab);
65f38f15
AM
3440 return NULL;
3441 }
3442
721956f4 3443 /* Init the stub hash table too. */
66eb6687
AM
3444 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3445 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3446 {
d495ab0d 3447 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3448 return NULL;
3449 }
721956f4
AM
3450
3451 /* And the branch hash table. */
66eb6687
AM
3452 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3453 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3454 {
3455 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3456 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3457 return NULL;
3458 }
721956f4 3459
3b421ab3
AM
3460 htab->tocsave_htab = htab_try_create (1024,
3461 tocsave_htab_hash,
3462 tocsave_htab_eq,
3463 NULL);
3464 if (htab->tocsave_htab == NULL)
2915c55b 3465 {
d495ab0d 3466 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3467 return NULL;
3468 }
d495ab0d 3469 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3470
3254fd24
AM
3471 /* Initializing two fields of the union is just cosmetic. We really
3472 only care about glist, but when compiled on a 32-bit host the
3473 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3474 debugger inspection of these fields look nicer. */
a6aa5195
AM
3475 htab->elf.init_got_refcount.refcount = 0;
3476 htab->elf.init_got_refcount.glist = NULL;
3477 htab->elf.init_plt_refcount.refcount = 0;
3478 htab->elf.init_plt_refcount.glist = NULL;
3479 htab->elf.init_got_offset.offset = 0;
3480 htab->elf.init_got_offset.glist = NULL;
3481 htab->elf.init_plt_offset.offset = 0;
3482 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3483
65f38f15
AM
3484 return &htab->elf.root;
3485}
3486
bfeb4a28
AM
3487/* Create sections for linker generated code. */
3488
3489static bfd_boolean
3490create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3491{
3492 struct ppc_link_hash_table *htab;
3493 flagword flags;
3494
3495 htab = ppc_hash_table (info);
3496
bfeb4a28
AM
3497 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3498 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3499 if (htab->params->save_restore_funcs)
3500 {
3501 /* Create .sfpr for code to save and restore fp regs. */
3502 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3503 flags);
3504 if (htab->sfpr == NULL
fd361982 3505 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3506 return FALSE;
3507 }
3508
3509 if (bfd_link_relocatable (info))
3510 return TRUE;
bfeb4a28
AM
3511
3512 /* Create .glink for lazy dynamic linking support. */
3513 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3514 flags);
3515 if (htab->glink == NULL
fd361982 3516 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3517 return FALSE;
3518
9e390558
AM
3519 /* The part of .glink used by global entry stubs, separate so that
3520 it can be aligned appropriately without affecting htab->glink. */
3521 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3522 flags);
3523 if (htab->global_entry == NULL
fd361982 3524 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3525 return FALSE;
3526
bfeb4a28
AM
3527 if (!info->no_ld_generated_unwind_info)
3528 {
3529 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3530 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3531 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3532 ".eh_frame",
3533 flags);
3534 if (htab->glink_eh_frame == NULL
fd361982 3535 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3536 return FALSE;
3537 }
3538
3539 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3540 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3541 if (htab->elf.iplt == NULL
fd361982 3542 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3543 return FALSE;
3544
3545 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3546 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3547 htab->elf.irelplt
3548 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3549 if (htab->elf.irelplt == NULL
fd361982 3550 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3551 return FALSE;
3552
3553 /* Create branch lookup table for plt_branch stubs. */
3554 flags = (SEC_ALLOC | SEC_LOAD
3555 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3556 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3557 flags);
3558 if (htab->brlt == NULL
fd361982 3559 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3560 return FALSE;
3561
2d7ad24e
AM
3562 /* Local plt entries, put in .branch_lt but a separate section for
3563 convenience. */
3564 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3565 flags);
3566 if (htab->pltlocal == NULL
fd361982 3567 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3568 return FALSE;
3569
0e1862bb 3570 if (!bfd_link_pic (info))
bfeb4a28
AM
3571 return TRUE;
3572
3573 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3574 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3575 htab->relbrlt
3576 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3577 if (htab->relbrlt == NULL
fd361982 3578 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3579 return FALSE;
3580
2d7ad24e
AM
3581 htab->relpltlocal
3582 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3583 if (htab->relpltlocal == NULL
fd361982 3584 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3585 return FALSE;
3586
bfeb4a28
AM
3587 return TRUE;
3588}
3589
e717da7e
AM
3590/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3591
bfeb4a28 3592bfd_boolean
e7d1c40c
AM
3593ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3594 struct ppc64_elf_params *params)
e717da7e
AM
3595{
3596 struct ppc_link_hash_table *htab;
3597
e7d1c40c 3598 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3599
3600/* Always hook our dynamic sections into the first bfd, which is the
3601 linker created stub bfd. This ensures that the GOT header is at
3602 the start of the output TOC section. */
3603 htab = ppc_hash_table (info);
e7d1c40c
AM
3604 htab->elf.dynobj = params->stub_bfd;
3605 htab->params = params;
bfeb4a28 3606
bfeb4a28 3607 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3608}
3609
721956f4
AM
3610/* Build a name for an entry in the stub hash table. */
3611
3612static char *
4ce794b7
AM
3613ppc_stub_name (const asection *input_section,
3614 const asection *sym_sec,
3615 const struct ppc_link_hash_entry *h,
3616 const Elf_Internal_Rela *rel)
721956f4
AM
3617{
3618 char *stub_name;
bcaa2f82 3619 ssize_t len;
721956f4
AM
3620
3621 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3622 offsets from a sym as a branch target? In fact, we could
3623 probably assume the addend is always zero. */
3624 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3625
3626 if (h)
3627 {
3628 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3629 stub_name = bfd_malloc (len);
46de2a7c
AM
3630 if (stub_name == NULL)
3631 return stub_name;
3632
bcaa2f82
AM
3633 len = sprintf (stub_name, "%08x.%s+%x",
3634 input_section->id & 0xffffffff,
3635 h->elf.root.root.string,
3636 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3637 }
3638 else
3639 {
ad8e1ba5 3640 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3641 stub_name = bfd_malloc (len);
46de2a7c
AM
3642 if (stub_name == NULL)
3643 return stub_name;
3644
bcaa2f82
AM
3645 len = sprintf (stub_name, "%08x.%x:%x+%x",
3646 input_section->id & 0xffffffff,
3647 sym_sec->id & 0xffffffff,
3648 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3649 (int) rel->r_addend & 0xffffffff);
721956f4 3650 }
bcaa2f82 3651 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3652 stub_name[len - 2] = 0;
721956f4
AM
3653 return stub_name;
3654}
3655
3656/* Look up an entry in the stub hash. Stub entries are cached because
3657 creating the stub name takes a bit of time. */
3658
3659static struct ppc_stub_hash_entry *
4ce794b7
AM
3660ppc_get_stub_entry (const asection *input_section,
3661 const asection *sym_sec,
039b3fef 3662 struct ppc_link_hash_entry *h,
4ce794b7
AM
3663 const Elf_Internal_Rela *rel,
3664 struct ppc_link_hash_table *htab)
721956f4
AM
3665{
3666 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3667 struct map_stub *group;
721956f4
AM
3668
3669 /* If this input section is part of a group of sections sharing one
3670 stub section, then use the id of the first section in the group.
3671 Stub names need to include a section id, as there may well be
3672 more than one stub used to reach say, printf, and we need to
3673 distinguish between them. */
6f20ed8a 3674 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3675 if (group == NULL)
3676 return NULL;
721956f4 3677
b3fac117
AM
3678 if (h != NULL && h->u.stub_cache != NULL
3679 && h->u.stub_cache->h == h
6f20ed8a 3680 && h->u.stub_cache->group == group)
721956f4 3681 {
b3fac117 3682 stub_entry = h->u.stub_cache;
721956f4
AM
3683 }
3684 else
3685 {
3686 char *stub_name;
3687
6f20ed8a 3688 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3689 if (stub_name == NULL)
3690 return NULL;
3691
3692 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3693 stub_name, FALSE, FALSE);
721956f4 3694 if (h != NULL)
b3fac117 3695 h->u.stub_cache = stub_entry;
721956f4
AM
3696
3697 free (stub_name);
3698 }
3699
3700 return stub_entry;
3701}
3702
3703/* Add a new stub entry to the stub hash. Not all fields of the new
3704 stub entry are initialised. */
3705
3706static struct ppc_stub_hash_entry *
4ce794b7
AM
3707ppc_add_stub (const char *stub_name,
3708 asection *section,
25f53a85 3709 struct bfd_link_info *info)
721956f4 3710{
25f53a85 3711 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3712 struct map_stub *group;
721956f4
AM
3713 asection *link_sec;
3714 asection *stub_sec;
3715 struct ppc_stub_hash_entry *stub_entry;
3716
6f20ed8a
AM
3717 group = htab->sec_info[section->id].u.group;
3718 link_sec = group->link_sec;
3719 stub_sec = group->stub_sec;
721956f4
AM
3720 if (stub_sec == NULL)
3721 {
6f20ed8a
AM
3722 size_t namelen;
3723 bfd_size_type len;
3724 char *s_name;
721956f4 3725
6f20ed8a
AM
3726 namelen = strlen (link_sec->name);
3727 len = namelen + sizeof (STUB_SUFFIX);
3728 s_name = bfd_alloc (htab->params->stub_bfd, len);
3729 if (s_name == NULL)
3730 return NULL;
721956f4 3731
6f20ed8a
AM
3732 memcpy (s_name, link_sec->name, namelen);
3733 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3734 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3735 if (stub_sec == NULL)
3736 return NULL;
3737 group->stub_sec = stub_sec;
721956f4
AM
3738 }
3739
3740 /* Enter this entry into the linker stub hash table. */
3741 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3742 TRUE, FALSE);
721956f4
AM
3743 if (stub_entry == NULL)
3744 {
695344c0 3745 /* xgettext:c-format */
cf97bcb0
AM
3746 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3747 section->owner, stub_name);
721956f4
AM
3748 return NULL;
3749 }
3750
6f20ed8a 3751 stub_entry->group = group;
721956f4 3752 stub_entry->stub_offset = 0;
721956f4
AM
3753 return stub_entry;
3754}
3755
e717da7e
AM
3756/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3757 not already done. */
65f38f15 3758
b34976b6 3759static bfd_boolean
e717da7e 3760create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3761{
e717da7e
AM
3762 asection *got, *relgot;
3763 flagword flags;
3764 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3765
0c8d6e5c 3766 if (!is_ppc64_elf (abfd))
0ffa91dd 3767 return FALSE;
4dfe6ac6
NC
3768 if (htab == NULL)
3769 return FALSE;
0ffa91dd 3770
33e44f2e
AM
3771 if (!htab->elf.sgot
3772 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3773 return FALSE;
e717da7e
AM
3774
3775 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3776 | SEC_LINKER_CREATED);
3777
c456f082 3778 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3779 if (!got
fd361982 3780 || !bfd_set_section_alignment (got, 3))
e717da7e 3781 return FALSE;
65f38f15 3782
c456f082
AM
3783 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3784 flags | SEC_READONLY);
e717da7e 3785 if (!relgot
fd361982 3786 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3787 return FALSE;
e717da7e
AM
3788
3789 ppc64_elf_tdata (abfd)->got = got;
3790 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3791 return TRUE;
65f38f15 3792}
5bd4f169 3793
b31867b6
AM
3794/* Follow indirect and warning symbol links. */
3795
3796static inline struct bfd_link_hash_entry *
3797follow_link (struct bfd_link_hash_entry *h)
3798{
3799 while (h->type == bfd_link_hash_indirect
3800 || h->type == bfd_link_hash_warning)
3801 h = h->u.i.link;
3802 return h;
3803}
3804
3805static inline struct elf_link_hash_entry *
3806elf_follow_link (struct elf_link_hash_entry *h)
3807{
3808 return (struct elf_link_hash_entry *) follow_link (&h->root);
3809}
3810
3811static inline struct ppc_link_hash_entry *
3812ppc_follow_link (struct ppc_link_hash_entry *h)
3813{
3814 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3815}
3816
40d16e0b
AM
3817/* Merge PLT info on FROM with that on TO. */
3818
3819static void
3820move_plt_plist (struct ppc_link_hash_entry *from,
3821 struct ppc_link_hash_entry *to)
3822{
3823 if (from->elf.plt.plist != NULL)
3824 {
3825 if (to->elf.plt.plist != NULL)
3826 {
3827 struct plt_entry **entp;
3828 struct plt_entry *ent;
3829
3830 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3831 {
3832 struct plt_entry *dent;
3833
3834 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3835 if (dent->addend == ent->addend)
3836 {
3837 dent->plt.refcount += ent->plt.refcount;
3838 *entp = ent->next;
3839 break;
3840 }
3841 if (dent == NULL)
3842 entp = &ent->next;
3843 }
3844 *entp = to->elf.plt.plist;
3845 }
3846
3847 to->elf.plt.plist = from->elf.plt.plist;
3848 from->elf.plt.plist = NULL;
3849 }
3850}
3851
65f38f15
AM
3852/* Copy the extra info we tack onto an elf_link_hash_entry. */
3853
3854static void
fcfa13d2
AM
3855ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3856 struct elf_link_hash_entry *dir,
3857 struct elf_link_hash_entry *ind)
65f38f15
AM
3858{
3859 struct ppc_link_hash_entry *edir, *eind;
3860
3861 edir = (struct ppc_link_hash_entry *) dir;
3862 eind = (struct ppc_link_hash_entry *) ind;
3863
c79d6685
AM
3864 edir->is_func |= eind->is_func;
3865 edir->is_func_descriptor |= eind->is_func_descriptor;
3866 edir->tls_mask |= eind->tls_mask;
3867 if (eind->oh != NULL)
3868 edir->oh = ppc_follow_link (eind->oh);
3869
474436e6 3870 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3871 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3872 edir->elf.ref_regular |= eind->elf.ref_regular;
3873 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3874 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3875 edir->elf.needs_plt |= eind->elf.needs_plt;
3876 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3877
d311bc8b
AM
3878 /* If we were called to copy over info for a weak sym, don't copy
3879 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3880 in order to simplify readonly_dynrelocs and save a field in the
3881 symbol hash entry, but that means dyn_relocs can't be used in any
3882 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3883 are then tested. */
d311bc8b 3884 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3885 return;
d311bc8b 3886
411e1bfb 3887 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3888 if (eind->dyn_relocs != NULL)
65f38f15 3889 {
bbd7ec4a
AM
3890 if (edir->dyn_relocs != NULL)
3891 {
6061a67d
AM
3892 struct elf_dyn_relocs **pp;
3893 struct elf_dyn_relocs *p;
bbd7ec4a 3894
fcfa13d2 3895 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3896 list. Merge any entries against the same section. */
3897 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3898 {
6061a67d 3899 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3900
3901 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3902 if (q->sec == p->sec)
3903 {
3904 q->pc_count += p->pc_count;
3905 q->count += p->count;
3906 *pp = p->next;
3907 break;
3908 }
3909 if (q == NULL)
3910 pp = &p->next;
3911 }
3912 *pp = edir->dyn_relocs;
3913 }
3914
65f38f15
AM
3915 edir->dyn_relocs = eind->dyn_relocs;
3916 eind->dyn_relocs = NULL;
3917 }
65f38f15 3918
81848ca0
AM
3919 /* Copy over got entries that we may have already seen to the
3920 symbol which just became indirect. */
411e1bfb
AM
3921 if (eind->elf.got.glist != NULL)
3922 {
3923 if (edir->elf.got.glist != NULL)
3924 {
3925 struct got_entry **entp;
3926 struct got_entry *ent;
3927
3928 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3929 {
3930 struct got_entry *dent;
3931
3932 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3933 if (dent->addend == ent->addend
e717da7e 3934 && dent->owner == ent->owner
411e1bfb
AM
3935 && dent->tls_type == ent->tls_type)
3936 {
3937 dent->got.refcount += ent->got.refcount;
3938 *entp = ent->next;
3939 break;
3940 }
3941 if (dent == NULL)
3942 entp = &ent->next;
3943 }
3944 *entp = edir->elf.got.glist;
3945 }
3946
3947 edir->elf.got.glist = eind->elf.got.glist;
3948 eind->elf.got.glist = NULL;
3949 }
3950
3951 /* And plt entries. */
40d16e0b 3952 move_plt_plist (eind, edir);
411e1bfb 3953
fcfa13d2 3954 if (eind->elf.dynindx != -1)
411e1bfb 3955 {
fcfa13d2
AM
3956 if (edir->elf.dynindx != -1)
3957 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3958 edir->elf.dynstr_index);
411e1bfb
AM
3959 edir->elf.dynindx = eind->elf.dynindx;
3960 edir->elf.dynstr_index = eind->elf.dynstr_index;
3961 eind->elf.dynindx = -1;
3962 eind->elf.dynstr_index = 0;
3963 }
411e1bfb
AM
3964}
3965
8387904d
AM
3966/* Find the function descriptor hash entry from the given function code
3967 hash entry FH. Link the entries via their OH fields. */
3968
3969static struct ppc_link_hash_entry *
b31867b6 3970lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3971{
3972 struct ppc_link_hash_entry *fdh = fh->oh;
3973
3974 if (fdh == NULL)
3975 {
3976 const char *fd_name = fh->elf.root.root.string + 1;
3977
3978 fdh = (struct ppc_link_hash_entry *)
3979 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3980 if (fdh == NULL)
3981 return fdh;
3982
3983 fdh->is_func_descriptor = 1;
3984 fdh->oh = fh;
3985 fh->is_func = 1;
3986 fh->oh = fdh;
8387904d
AM
3987 }
3988
8c5b4e52
AM
3989 fdh = ppc_follow_link (fdh);
3990 fdh->is_func_descriptor = 1;
3991 fdh->oh = fh;
3992 return fdh;
8387904d
AM
3993}
3994
8c5b4e52 3995/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3996
3997static struct ppc_link_hash_entry *
3998make_fdh (struct bfd_link_info *info,
908b32fc 3999 struct ppc_link_hash_entry *fh)
bb700d78 4000{
8c5b4e52
AM
4001 bfd *abfd = fh->elf.root.u.undef.abfd;
4002 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4003 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4004 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4005 ? BSF_WEAK
4006 : BSF_GLOBAL);
4007
4008 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4009 fh->elf.root.root.string + 1,
4010 flags, bfd_und_section_ptr, 0,
4011 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4012 return NULL;
4013
4014 fdh = (struct ppc_link_hash_entry *) bh;
4015 fdh->elf.non_elf = 0;
908b32fc
AM
4016 fdh->fake = 1;
4017 fdh->is_func_descriptor = 1;
4018 fdh->oh = fh;
4019 fh->is_func = 1;
4020 fh->oh = fdh;
bb700d78
AM
4021 return fdh;
4022}
4023
8387904d
AM
4024/* Fix function descriptor symbols defined in .opd sections to be
4025 function type. */
555cd476
AM
4026
4027static bfd_boolean
c16153ae 4028ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4029 struct bfd_link_info *info,
555cd476 4030 Elf_Internal_Sym *isym,
6911b7dc 4031 const char **name,
555cd476
AM
4032 flagword *flags ATTRIBUTE_UNUSED,
4033 asection **sec,
b53dfeb2 4034 bfd_vma *value)
555cd476 4035{
b53dfeb2 4036 if (*sec != NULL
f1885d1e 4037 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4038 {
4039 asection *code_sec;
4040
4041 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4042 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4043 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4044
4045 /* If the symbol is a function defined in .opd, and the function
4046 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4047 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4048 && (*sec)->reloc_count != 0
4049 && opd_entry_value (*sec, *value, &code_sec, NULL,
4050 FALSE) != (bfd_vma) -1
4051 && discarded_section (code_sec))
4052 {
4053 *sec = bfd_und_section_ptr;
4054 isym->st_shndx = SHN_UNDEF;
4055 }
4056 }
dbd1e97e
AM
4057 else if (*sec != NULL
4058 && strcmp ((*sec)->name, ".toc") == 0
4059 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4060 {
4061 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4062 if (htab != NULL)
4063 htab->params->object_in_toc = 1;
4064 }
433817dd 4065
6911b7dc
AM
4066 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4067 {
4068 if (abiversion (ibfd) == 0)
4069 set_abiversion (ibfd, 2);
4070 else if (abiversion (ibfd) == 1)
4071 {
cf97bcb0
AM
4072 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4073 " for ABI version 1"), *name);
6911b7dc
AM
4074 bfd_set_error (bfd_error_bad_value);
4075 return FALSE;
4076 }
4077 }
4078
555cd476
AM
4079 return TRUE;
4080}
4081
6911b7dc
AM
4082/* Merge non-visibility st_other attributes: local entry point. */
4083
4084static void
4085ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4086 const Elf_Internal_Sym *isym,
4087 bfd_boolean definition,
4088 bfd_boolean dynamic)
4089{
f378ab09 4090 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4091 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4092 | ELF_ST_VISIBILITY (h->other));
4093}
4094
8c5b4e52
AM
4095/* Hook called on merging a symbol. We use this to clear "fake" since
4096 we now have a real symbol. */
4097
4098static bfd_boolean
4099ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4100 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4101 asection **psec ATTRIBUTE_UNUSED,
4102 bfd_boolean newdef ATTRIBUTE_UNUSED,
4103 bfd_boolean olddef ATTRIBUTE_UNUSED,
4104 bfd *oldbfd ATTRIBUTE_UNUSED,
4105 const asection *oldsec ATTRIBUTE_UNUSED)
4106{
4107 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
4108 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4109 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
4110 return TRUE;
4111}
4112
8387904d 4113/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4114 inclusion of a new ABI object archive that defines "bar".
4115 NAME is a symbol defined in an archive. Return a symbol in the hash
4116 table that might be satisfied by the archive symbols. */
8387904d
AM
4117
4118static struct elf_link_hash_entry *
4119ppc64_elf_archive_symbol_lookup (bfd *abfd,
4120 struct bfd_link_info *info,
4121 const char *name)
4122{
4123 struct elf_link_hash_entry *h;
4124 char *dot_name;
4125 size_t len;
4126
4127 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4128 if (h != NULL
4129 /* Don't return this sym if it is a fake function descriptor
4130 created by add_symbol_adjust. */
8c5b4e52 4131 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
4132 return h;
4133
4134 if (name[0] == '.')
4135 return h;
4136
4137 len = strlen (name);
4138 dot_name = bfd_alloc (abfd, len + 2);
4139 if (dot_name == NULL)
e99955cd 4140 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4141 dot_name[0] = '.';
4142 memcpy (dot_name + 1, name, len + 1);
4143 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4144 bfd_release (abfd, dot_name);
4145 return h;
4146}
4147
4148/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4149 new ABI object defines "bar". Well, at least, undefined dot symbols
4150 are made weak. This stops later archive searches from including an
4151 object if we already have a function descriptor definition. It also
35b0ce59
AM
4152 prevents the linker complaining about undefined symbols.
4153 We also check and correct mismatched symbol visibility here. The
4154 most restrictive visibility of the function descriptor and the
4155 function entry symbol is used. */
8387904d
AM
4156
4157static bfd_boolean
b3fac117 4158add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4159{
8387904d
AM
4160 struct ppc_link_hash_table *htab;
4161 struct ppc_link_hash_entry *fdh;
4162
b3fac117
AM
4163 if (eh->elf.root.type == bfd_link_hash_warning)
4164 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4165
8400d40d
AM
4166 if (eh->elf.root.type == bfd_link_hash_indirect)
4167 return TRUE;
4168
b3fac117
AM
4169 if (eh->elf.root.root.string[0] != '.')
4170 abort ();
8387904d 4171
b3fac117 4172 htab = ppc_hash_table (info);
4dfe6ac6
NC
4173 if (htab == NULL)
4174 return FALSE;
4175
b31867b6 4176 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4177 if (fdh == NULL
4178 && !bfd_link_relocatable (info)
4179 && (eh->elf.root.type == bfd_link_hash_undefined
4180 || eh->elf.root.type == bfd_link_hash_undefweak)
4181 && eh->elf.ref_regular)
4182 {
4183 /* Make an undefined function descriptor sym, in order to
4184 pull in an --as-needed shared lib. Archives are handled
4185 elsewhere. */
4186 fdh = make_fdh (info, eh);
4187 if (fdh == NULL)
4188 return FALSE;
bb700d78 4189 }
8c5b4e52
AM
4190
4191 if (fdh != NULL)
8387904d 4192 {
35b0ce59
AM
4193 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4194 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4195
4196 /* Make both descriptor and entry symbol have the most
4197 constraining visibility of either symbol. */
35b0ce59
AM
4198 if (entry_vis < descr_vis)
4199 fdh->elf.other += entry_vis - descr_vis;
4200 else if (entry_vis > descr_vis)
4201 eh->elf.other += descr_vis - entry_vis;
4202
8c5b4e52
AM
4203 /* Propagate reference flags from entry symbol to function
4204 descriptor symbol. */
bc4e12de 4205 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4206 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4207 fdh->elf.ref_regular |= eh->elf.ref_regular;
4208 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4209
4210 if (!fdh->elf.forced_local
4211 && fdh->elf.dynindx == -1
4212 && fdh->elf.versioned != versioned_hidden
4213 && (bfd_link_dll (info)
4214 || fdh->elf.def_dynamic
4215 || fdh->elf.ref_dynamic)
4216 && (eh->elf.ref_regular
4217 || eh->elf.def_regular))
4218 {
2cdcc330 4219 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4220 return FALSE;
35b0ce59 4221 }
8387904d 4222 }
99877b66 4223
8387904d
AM
4224 return TRUE;
4225}
4226
f6c7c3e8
AM
4227/* Set up opd section info and abiversion for IBFD, and process list
4228 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4229
8387904d 4230static bfd_boolean
f6c7c3e8 4231ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4232{
99877b66 4233 struct ppc_link_hash_table *htab;
b3fac117 4234 struct ppc_link_hash_entry **p, *eh;
459609d6 4235 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4236
459609d6 4237 if (opd != NULL && opd->size != 0)
b3fac117 4238 {
b9399fcf
AM
4239 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4240 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4241
459609d6
AM
4242 if (abiversion (ibfd) == 0)
4243 set_abiversion (ibfd, 1);
8a2058b5 4244 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4245 {
695344c0 4246 /* xgettext:c-format */
cf97bcb0
AM
4247 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4248 ibfd, abiversion (ibfd));
459609d6
AM
4249 bfd_set_error (bfd_error_bad_value);
4250 return FALSE;
f6c7c3e8 4251 }
b9399fcf 4252 }
f6c7c3e8 4253
b9399fcf
AM
4254 if (is_ppc64_elf (info->output_bfd))
4255 {
4256 /* For input files without an explicit abiversion in e_flags
4257 we should have flagged any with symbol st_other bits set
4258 as ELFv1 and above flagged those with .opd as ELFv2.
4259 Set the output abiversion if not yet set, and for any input
4260 still ambiguous, take its abiversion from the output.
4261 Differences in ABI are reported later. */
4262 if (abiversion (info->output_bfd) == 0)
4263 set_abiversion (info->output_bfd, abiversion (ibfd));
4264 else if (abiversion (ibfd) == 0)
4265 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4266 }
4267
459609d6
AM
4268 htab = ppc_hash_table (info);
4269 if (htab == NULL)
b9399fcf 4270 return TRUE;
459609d6 4271
b9399fcf
AM
4272 if (opd != NULL && opd->size != 0
4273 && (ibfd->flags & DYNAMIC) == 0
4274 && (opd->flags & SEC_RELOC) != 0
4275 && opd->reloc_count != 0
4276 && !bfd_is_abs_section (opd->output_section)
4277 && info->gc_sections)
4278 {
4279 /* Garbage collection needs some extra help with .opd sections.
4280 We don't want to necessarily keep everything referenced by
4281 relocs in .opd, as that would keep all functions. Instead,
4282 if we reference an .opd symbol (a function descriptor), we
4283 want to keep the function code symbol's section. This is
4284 easy for global symbols, but for local syms we need to keep
4285 information about the associated function section. */
4286 bfd_size_type amt;
4287 asection **opd_sym_map;
4288 Elf_Internal_Shdr *symtab_hdr;
4289 Elf_Internal_Rela *relocs, *rel_end, *rel;
4290
4291 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4292 opd_sym_map = bfd_zalloc (ibfd, amt);
4293 if (opd_sym_map == NULL)
4294 return FALSE;
4295 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4296 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4297 info->keep_memory);
4298 if (relocs == NULL)
4299 return FALSE;
4300 symtab_hdr = &elf_symtab_hdr (ibfd);
4301 rel_end = relocs + opd->reloc_count - 1;
4302 for (rel = relocs; rel < rel_end; rel++)
4303 {
4304 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4305 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4306
4307 if (r_type == R_PPC64_ADDR64
4308 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4309 && r_symndx < symtab_hdr->sh_info)
4310 {
4311 Elf_Internal_Sym *isym;
4312 asection *s;
4313
4314 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4315 if (isym == NULL)
4316 {
4317 if (elf_section_data (opd)->relocs != relocs)
4318 free (relocs);
4319 return FALSE;
4320 }
4321
4322 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4323 if (s != NULL && s != opd)
4324 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4325 }
4326 }
4327 if (elf_section_data (opd)->relocs != relocs)
4328 free (relocs);
4329 }
459609d6
AM
4330
4331 p = &htab->dot_syms;
4332 while ((eh = *p) != NULL)
4333 {
4334 *p = NULL;
4335 if (&eh->elf == htab->elf.hgot)
4336 ;
4337 else if (htab->elf.hgot == NULL
4338 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4339 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4340 else if (abiversion (ibfd) <= 1)
4341 {
4342 htab->need_func_desc_adj = 1;
4343 if (!add_symbol_adjust (eh, info))
4344 return FALSE;
4345 }
459609d6
AM
4346 p = &eh->u.next_dot_sym;
4347 }
b3fac117 4348 return TRUE;
8387904d
AM
4349}
4350
97fed1c9
JJ
4351/* Undo hash table changes when an --as-needed input file is determined
4352 not to be needed. */
4353
4354static bfd_boolean
e5034e59
AM
4355ppc64_elf_notice_as_needed (bfd *ibfd,
4356 struct bfd_link_info *info,
4357 enum notice_asneeded_action act)
97fed1c9 4358{
e5034e59
AM
4359 if (act == notice_not_needed)
4360 {
4361 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4362
e5034e59
AM
4363 if (htab == NULL)
4364 return FALSE;
4dfe6ac6 4365
e5034e59
AM
4366 htab->dot_syms = NULL;
4367 }
4368 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4369}
4370
aa374f67
AM
4371/* If --just-symbols against a final linked binary, then assume we need
4372 toc adjusting stubs when calling functions defined there. */
4373
4374static void
4375ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4376{
4377 if ((sec->flags & SEC_CODE) != 0
4378 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4379 && is_ppc64_elf (sec->owner))
4380 {
2c3f079f
AM
4381 if (abiversion (sec->owner) >= 2
4382 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4383 sec->has_toc_reloc = 1;
4384 }
4385 _bfd_elf_link_just_syms (sec, info);
4386}
4387
e054468f 4388static struct plt_entry **
4ce794b7
AM
4389update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4390 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4391{
4392 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4393 struct plt_entry **local_plt;
f961d9dd 4394 unsigned char *local_got_tls_masks;
411e1bfb
AM
4395
4396 if (local_got_ents == NULL)
4397 {
4398 bfd_size_type size = symtab_hdr->sh_info;
4399
e054468f
AM
4400 size *= (sizeof (*local_got_ents)
4401 + sizeof (*local_plt)
4402 + sizeof (*local_got_tls_masks));
4ce794b7 4403 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4404 if (local_got_ents == NULL)
e054468f 4405 return NULL;
411e1bfb
AM
4406 elf_local_got_ents (abfd) = local_got_ents;
4407 }
4408
37da22e5 4409 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4410 {
4411 struct got_entry *ent;
4412
4413 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4414 if (ent->addend == r_addend
4415 && ent->owner == abfd
4416 && ent->tls_type == tls_type)
411e1bfb
AM
4417 break;
4418 if (ent == NULL)
4419 {
4420 bfd_size_type amt = sizeof (*ent);
4ce794b7 4421 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4422 if (ent == NULL)
4423 return FALSE;
4424 ent->next = local_got_ents[r_symndx];
4425 ent->addend = r_addend;
e717da7e 4426 ent->owner = abfd;
411e1bfb 4427 ent->tls_type = tls_type;
927be08e 4428 ent->is_indirect = FALSE;
411e1bfb
AM
4429 ent->got.refcount = 0;
4430 local_got_ents[r_symndx] = ent;
4431 }
4432 ent->got.refcount += 1;
4433 }
4434
e054468f 4435 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4436 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4437 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4438
4439 return local_plt + r_symndx;
65f38f15
AM
4440}
4441
411e1bfb 4442static bfd_boolean
e054468f 4443update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4444{
411e1bfb 4445 struct plt_entry *ent;
1e2f5b6e 4446
e054468f 4447 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4448 if (ent->addend == addend)
4449 break;
4450 if (ent == NULL)
1e2f5b6e 4451 {
411e1bfb 4452 bfd_size_type amt = sizeof (*ent);
4ce794b7 4453 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4454 if (ent == NULL)
4455 return FALSE;
e054468f 4456 ent->next = *plist;
411e1bfb
AM
4457 ent->addend = addend;
4458 ent->plt.refcount = 0;
e054468f 4459 *plist = ent;
1e2f5b6e 4460 }
411e1bfb 4461 ent->plt.refcount += 1;
b34976b6 4462 return TRUE;
1e2f5b6e
AM
4463}
4464
e054468f
AM
4465static bfd_boolean
4466is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4467{
4468 return (r_type == R_PPC64_REL24
05d0e962 4469 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4470 || r_type == R_PPC64_REL14
4471 || r_type == R_PPC64_REL14_BRTAKEN
4472 || r_type == R_PPC64_REL14_BRNTAKEN
4473 || r_type == R_PPC64_ADDR24
4474 || r_type == R_PPC64_ADDR14
4475 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4476 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4477 || r_type == R_PPC64_PLTCALL
4478 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4479}
4480
4481/* Relocs on inline plt call sequence insns prior to the call. */
4482
4483static bfd_boolean
4484is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4485{
4486 return (r_type == R_PPC64_PLT16_HA
4487 || r_type == R_PPC64_PLT16_HI
4488 || r_type == R_PPC64_PLT16_LO
4489 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4490 || r_type == R_PPC64_PLT_PCREL34
4491 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4492 || r_type == R_PPC64_PLTSEQ
4493 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4494}
4495
5bd4f169 4496/* Look through the relocs for a section during the first phase, and
65f38f15 4497 calculate needed space in the global offset table, procedure
5d1634d7 4498 linkage table, and dynamic reloc sections. */
5bd4f169 4499
b34976b6 4500static bfd_boolean
4ce794b7
AM
4501ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4502 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4503{
65f38f15 4504 struct ppc_link_hash_table *htab;
5bd4f169 4505 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4506 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4507 const Elf_Internal_Rela *rel;
4508 const Elf_Internal_Rela *rel_end;
5bd4f169 4509 asection *sreloc;
3a71aa26 4510 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4511 bfd_boolean is_opd;
5bd4f169 4512
0e1862bb 4513 if (bfd_link_relocatable (info))
b34976b6 4514 return TRUE;
5bd4f169 4515
680a3378
AM
4516 /* Don't do anything special with non-loaded, non-alloced sections.
4517 In particular, any relocs in such sections should not affect GOT
4518 and PLT reference counting (ie. we don't allow them to create GOT
4519 or PLT entries), there's no possibility or desire to optimize TLS
4520 relocs, and there's not much point in propagating relocs to shared
4521 libs that the dynamic linker won't relocate. */
4522 if ((sec->flags & SEC_ALLOC) == 0)
4523 return TRUE;
4524
0c8d6e5c 4525 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4526
65f38f15 4527 htab = ppc_hash_table (info);
4dfe6ac6
NC
4528 if (htab == NULL)
4529 return FALSE;
4530
3a71aa26
AM
4531 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4532 FALSE, FALSE, TRUE);
4533 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4534 FALSE, FALSE, TRUE);
0ffa91dd 4535 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4536 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4537 sreloc = NULL;
b9399fcf 4538 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4539 rel_end = relocs + sec->reloc_count;
4540 for (rel = relocs; rel < rel_end; rel++)
4541 {
4542 unsigned long r_symndx;
4543 struct elf_link_hash_entry *h;
04c9666a 4544 enum elf_ppc64_reloc_type r_type;
727fc41e 4545 int tls_type;
7c8fe5c4 4546 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4547 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4548
4549 r_symndx = ELF64_R_SYM (rel->r_info);
4550 if (r_symndx < symtab_hdr->sh_info)
4551 h = NULL;
4552 else
973a3492
L
4553 {
4554 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4555 h = elf_follow_link (h);
1c865ab2
AM
4556
4557 if (h == htab->elf.hgot)
4558 sec->has_toc_reloc = 1;
973a3492 4559 }
5bd4f169 4560
5663e321
AM
4561 r_type = ELF64_R_TYPE (rel->r_info);
4562 switch (r_type)
4563 {
04bdff6a
AM
4564 case R_PPC64_D34:
4565 case R_PPC64_D34_LO:
4566 case R_PPC64_D34_HI30:
4567 case R_PPC64_D34_HA30:
4568 case R_PPC64_D28:
c213164a
AM
4569 case R_PPC64_TPREL34:
4570 case R_PPC64_DTPREL34:
04bdff6a 4571 case R_PPC64_PCREL34:
5663e321 4572 case R_PPC64_GOT_PCREL34:
c213164a
AM
4573 case R_PPC64_GOT_TLSGD34:
4574 case R_PPC64_GOT_TLSLD34:
4575 case R_PPC64_GOT_TPREL34:
4576 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4577 case R_PPC64_PLT_PCREL34:
4578 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4579 case R_PPC64_PCREL28:
4580 htab->powerxx_stubs = 1;
133a1f60
AM
4581 break;
4582 default:
5663e321
AM
4583 break;
4584 }
903b777d
AM
4585
4586 switch (r_type)
4587 {
4588 case R_PPC64_PLT16_HA:
4589 case R_PPC64_GOT_TLSLD16_HA:
4590 case R_PPC64_GOT_TLSGD16_HA:
4591 case R_PPC64_GOT_TPREL16_HA:
4592 case R_PPC64_GOT_DTPREL16_HA:
4593 case R_PPC64_GOT16_HA:
4594 case R_PPC64_TOC16_HA:
4595 case R_PPC64_PLT16_LO:
4596 case R_PPC64_PLT16_LO_DS:
4597 case R_PPC64_GOT_TLSLD16_LO:
4598 case R_PPC64_GOT_TLSGD16_LO:
4599 case R_PPC64_GOT_TPREL16_LO_DS:
4600 case R_PPC64_GOT_DTPREL16_LO_DS:
4601 case R_PPC64_GOT16_LO:
4602 case R_PPC64_GOT16_LO_DS:
4603 case R_PPC64_TOC16_LO:
4604 case R_PPC64_TOC16_LO_DS:
4605 case R_PPC64_GOT_PCREL34:
4606 ppc64_elf_tdata (abfd)->has_optrel = 1;
4607 ppc64_elf_section_data (sec)->has_optrel = 1;
4608 break;
4609 default:
4610 break;
4611 }
4612
f749f26e 4613 ifunc = NULL;
25f23106
AM
4614 if (h != NULL)
4615 {
4616 if (h->type == STT_GNU_IFUNC)
4617 {
4618 h->needs_plt = 1;
4619 ifunc = &h->plt.plist;
4620 }
4621 }
4622 else
4623 {
4624 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4625 abfd, r_symndx);
4626 if (isym == NULL)
4627 return FALSE;
4628
4629 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4630 {
4631 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4632 rel->r_addend,
37da22e5 4633 NON_GOT | PLT_IFUNC);
25f23106
AM
4634 if (ifunc == NULL)
4635 return FALSE;
4636 }
4637 }
727fc41e 4638
f749f26e 4639 tls_type = 0;
a33d1f77 4640 switch (r_type)
5bd4f169 4641 {
727fc41e
AM
4642 case R_PPC64_TLSGD:
4643 case R_PPC64_TLSLD:
4644 /* These special tls relocs tie a call to __tls_get_addr with
4645 its parameter symbol. */
37da22e5
AM
4646 if (h != NULL)
4647 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4648 else
4649 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4650 rel->r_addend,
37da22e5
AM
4651 NON_GOT | TLS_TLS | TLS_MARK))
4652 return FALSE;
4653 sec->has_tls_reloc = 1;
727fc41e
AM
4654 break;
4655
411e1bfb
AM
4656 case R_PPC64_GOT_TLSLD16:
4657 case R_PPC64_GOT_TLSLD16_LO:
4658 case R_PPC64_GOT_TLSLD16_HI:
4659 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4660 case R_PPC64_GOT_TLSLD34:
951fd09b 4661 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4662 goto dogottls;
4663
4664 case R_PPC64_GOT_TLSGD16:
4665 case R_PPC64_GOT_TLSGD16_LO:
4666 case R_PPC64_GOT_TLSGD16_HI:
4667 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4668 case R_PPC64_GOT_TLSGD34:
951fd09b 4669 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4670 goto dogottls;
4671
4672 case R_PPC64_GOT_TPREL16_DS:
4673 case R_PPC64_GOT_TPREL16_LO_DS:
4674 case R_PPC64_GOT_TPREL16_HI:
4675 case R_PPC64_GOT_TPREL16_HA:
c213164a 4676 case R_PPC64_GOT_TPREL34:
7c8bbca5 4677 if (bfd_link_dll (info))
411e1bfb
AM
4678 info->flags |= DF_STATIC_TLS;
4679 tls_type = TLS_TLS | TLS_TPREL;
4680 goto dogottls;
4681
4682 case R_PPC64_GOT_DTPREL16_DS:
4683 case R_PPC64_GOT_DTPREL16_LO_DS:
4684 case R_PPC64_GOT_DTPREL16_HI:
4685 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4686 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4687 tls_type = TLS_TLS | TLS_DTPREL;
4688 dogottls:
4689 sec->has_tls_reloc = 1;
066f4018 4690 goto dogot;
411e1bfb 4691
903b777d
AM
4692 case R_PPC64_GOT16:
4693 case R_PPC64_GOT16_LO:
4694 case R_PPC64_GOT16_HI:
65f38f15 4695 case R_PPC64_GOT16_HA:
903b777d 4696 case R_PPC64_GOT16_DS:
066f4018 4697 case R_PPC64_GOT16_LO_DS:
4a421c53 4698 case R_PPC64_GOT_PCREL34:
066f4018 4699 dogot:
65f38f15 4700 /* This symbol requires a global offset table entry. */
4c52953f 4701 sec->has_toc_reloc = 1;
33c0ec9d
AM
4702 if (r_type == R_PPC64_GOT_TLSLD16
4703 || r_type == R_PPC64_GOT_TLSGD16
4704 || r_type == R_PPC64_GOT_TPREL16_DS
4705 || r_type == R_PPC64_GOT_DTPREL16_DS
4706 || r_type == R_PPC64_GOT16
4707 || r_type == R_PPC64_GOT16_DS)
4708 {
4709 htab->do_multi_toc = 1;
d77c8a4b 4710 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4711 }
4712
e717da7e
AM
4713 if (ppc64_elf_tdata (abfd)->got == NULL
4714 && !create_got_section (abfd, info))
b34976b6 4715 return FALSE;
5bd4f169
AM
4716
4717 if (h != NULL)
4718 {
411e1bfb
AM
4719 struct ppc_link_hash_entry *eh;
4720 struct got_entry *ent;
65f38f15 4721
411e1bfb
AM
4722 eh = (struct ppc_link_hash_entry *) h;
4723 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4724 if (ent->addend == rel->r_addend
e717da7e 4725 && ent->owner == abfd
411e1bfb
AM
4726 && ent->tls_type == tls_type)
4727 break;
4728 if (ent == NULL)
5bd4f169 4729 {
411e1bfb 4730 bfd_size_type amt = sizeof (*ent);
4ce794b7 4731 ent = bfd_alloc (abfd, amt);
411e1bfb 4732 if (ent == NULL)
b34976b6 4733 return FALSE;
411e1bfb 4734 ent->next = eh->elf.got.glist;
133a1f60 4735 ent->addend = rel->r_addend;
e717da7e 4736 ent->owner = abfd;
411e1bfb 4737 ent->tls_type = tls_type;
927be08e 4738 ent->is_indirect = FALSE;
411e1bfb
AM
4739 ent->got.refcount = 0;
4740 eh->elf.got.glist = ent;
5bd4f169 4741 }
411e1bfb 4742 ent->got.refcount += 1;
e7b938ca 4743 eh->tls_mask |= tls_type;
5bd4f169 4744 }
411e1bfb
AM
4745 else
4746 /* This is a global offset table entry for a local symbol. */
4747 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4748 rel->r_addend, tls_type))
411e1bfb 4749 return FALSE;
a345bc8d
AM
4750
4751 /* We may also need a plt entry if the symbol turns out to be
4752 an ifunc. */
0e1862bb 4753 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4754 {
133a1f60 4755 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
a345bc8d
AM
4756 return FALSE;
4757 }
5bd4f169
AM
4758 break;
4759
5bd4f169 4760 case R_PPC64_PLT16_HA:
65f38f15
AM
4761 case R_PPC64_PLT16_HI:
4762 case R_PPC64_PLT16_LO:
08be3224 4763 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4764 case R_PPC64_PLT_PCREL34:
4765 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4766 case R_PPC64_PLT32:
4767 case R_PPC64_PLT64:
cbf95972
AM
4768 /* This symbol requires a procedure linkage table entry. */
4769 plt_list = ifunc;
4770 if (h != NULL)
e054468f 4771 {
e054468f
AM
4772 h->needs_plt = 1;
4773 if (h->root.root.string[0] == '.'
4774 && h->root.root.string[1] != '\0')
4775 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4776 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4777 plt_list = &h->plt.plist;
4778 }
4779 if (plt_list == NULL)
2d7ad24e 4780 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4781 rel->r_addend,
2d7ad24e 4782 NON_GOT | PLT_KEEP);
133a1f60 4783 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4784 return FALSE;
5bd4f169
AM
4785 break;
4786
4787 /* The following relocations don't need to propagate the
4788 relocation if linking a shared object since they are
4789 section relative. */
4790 case R_PPC64_SECTOFF:
4791 case R_PPC64_SECTOFF_LO:
4792 case R_PPC64_SECTOFF_HI:
4793 case R_PPC64_SECTOFF_HA:
4794 case R_PPC64_SECTOFF_DS:
4795 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4796 case R_PPC64_DTPREL16:
4797 case R_PPC64_DTPREL16_LO:
4798 case R_PPC64_DTPREL16_HI:
4799 case R_PPC64_DTPREL16_HA:
4800 case R_PPC64_DTPREL16_DS:
4801 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4802 case R_PPC64_DTPREL16_HIGH:
4803 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4804 case R_PPC64_DTPREL16_HIGHER:
4805 case R_PPC64_DTPREL16_HIGHERA:
4806 case R_PPC64_DTPREL16_HIGHEST:
4807 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4808 break;
4809
ad8e1ba5 4810 /* Nor do these. */
25f23106
AM
4811 case R_PPC64_REL16:
4812 case R_PPC64_REL16_LO:
4813 case R_PPC64_REL16_HI:
4814 case R_PPC64_REL16_HA:
4a969973
AM
4815 case R_PPC64_REL16_HIGH:
4816 case R_PPC64_REL16_HIGHA:
4817 case R_PPC64_REL16_HIGHER:
4818 case R_PPC64_REL16_HIGHERA:
4819 case R_PPC64_REL16_HIGHEST:
4820 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4821 case R_PPC64_REL16_HIGHER34:
4822 case R_PPC64_REL16_HIGHERA34:
4823 case R_PPC64_REL16_HIGHEST34:
4824 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4825 case R_PPC64_REL16DX_HA:
25f23106
AM
4826 break;
4827
45965137
AM
4828 /* Not supported as a dynamic relocation. */
4829 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4830 if (bfd_link_pic (info))
45965137
AM
4831 {
4832 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4833 ppc_howto_init ();
695344c0 4834 /* xgettext:c-format */
174d0a74 4835 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4836 "in shared libraries and PIEs\n"),
45965137
AM
4837 abfd, sec, rel->r_offset,
4838 ppc64_elf_howto_table[r_type]->name);
4839 bfd_set_error (bfd_error_bad_value);
4840 return FALSE;
4841 }
4842 break;
4843
ad8e1ba5 4844 case R_PPC64_TOC16:
33c0ec9d
AM
4845 case R_PPC64_TOC16_DS:
4846 htab->do_multi_toc = 1;
d77c8a4b 4847 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4848 /* Fall through. */
ad8e1ba5
AM
4849 case R_PPC64_TOC16_LO:
4850 case R_PPC64_TOC16_HI:
4851 case R_PPC64_TOC16_HA:
ad8e1ba5 4852 case R_PPC64_TOC16_LO_DS:
4c52953f 4853 sec->has_toc_reloc = 1;
ec73ddcd 4854 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4855 {
4856 /* We may need a copy reloc. */
4857 h->non_got_ref = 1;
4858 /* Strongly prefer a copy reloc over a dynamic reloc.
4859 glibc ld.so as of 2019-08 will error out if one of
4860 these relocations is emitted. */
4861 h->needs_copy = 1;
4862 goto dodyn;
4863 }
ad8e1ba5
AM
4864 break;
4865
006589cf
AM
4866 /* Marker reloc. */
4867 case R_PPC64_ENTRY:
4868 break;
4869
5bd4f169
AM
4870 /* This relocation describes the C++ object vtable hierarchy.
4871 Reconstruct it for later use during GC. */
4872 case R_PPC64_GNU_VTINHERIT:
c152c796 4873 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4874 return FALSE;
5bd4f169
AM
4875 break;
4876
4877 /* This relocation describes which C++ vtable entries are actually
4878 used. Record for later use during GC. */
4879 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4880 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4881 return FALSE;
5bd4f169
AM
4882 break;
4883
721956f4
AM
4884 case R_PPC64_REL14:
4885 case R_PPC64_REL14_BRTAKEN:
4886 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4887 {
4888 asection *dest = NULL;
4889
4890 /* Heuristic: If jumping outside our section, chances are
4891 we are going to need a stub. */
4892 if (h != NULL)
4893 {
4894 /* If the sym is weak it may be overridden later, so
4895 don't assume we know where a weak sym lives. */
4896 if (h->root.type == bfd_link_hash_defined)
4897 dest = h->root.u.def.section;
4898 }
4899 else
87d72d41
AM
4900 {
4901 Elf_Internal_Sym *isym;
4902
4903 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4904 abfd, r_symndx);
4905 if (isym == NULL)
4906 return FALSE;
4907
4908 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4909 }
4910
220c76dd 4911 if (dest != sec)
7c8fe5c4 4912 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4913 }
3e04d765
AM
4914 goto rel24;
4915
4916 case R_PPC64_PLTCALL:
5663e321 4917 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4918 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4919 /* Fall through. */
4920
5d1634d7 4921 case R_PPC64_REL24:
05d0e962 4922 case R_PPC64_REL24_NOTOC:
3e04d765 4923 rel24:
cbf95972
AM
4924 plt_list = ifunc;
4925 if (h != NULL)
5d1634d7 4926 {
e054468f
AM
4927 h->needs_plt = 1;
4928 if (h->root.root.string[0] == '.'
4929 && h->root.root.string[1] != '\0')
4930 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4931
3a71aa26 4932 if (h == tga || h == dottga)
cbf95972
AM
4933 {
4934 sec->has_tls_reloc = 1;
4935 if (rel != relocs
4936 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4937 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4938 /* We have a new-style __tls_get_addr call with
4939 a marker reloc. */
4940 ;
4941 else
4942 /* Mark this section as having an old-style call. */
9737e8af 4943 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4944 }
4945 plt_list = &h->plt.plist;
411e1bfb 4946 }
cbf95972
AM
4947
4948 /* We may need a .plt entry if the function this reloc
4949 refers to is in a shared lib. */
4950 if (plt_list
133a1f60 4951 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4952 return FALSE;
411e1bfb
AM
4953 break;
4954
cbf95972
AM
4955 case R_PPC64_ADDR14:
4956 case R_PPC64_ADDR14_BRNTAKEN:
4957 case R_PPC64_ADDR14_BRTAKEN:
4958 case R_PPC64_ADDR24:
4959 goto dodyn;
4960
411e1bfb
AM
4961 case R_PPC64_TPREL64:
4962 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4963 if (bfd_link_dll (info))
411e1bfb
AM
4964 info->flags |= DF_STATIC_TLS;
4965 goto dotlstoc;
4966
4967 case R_PPC64_DTPMOD64:
4968 if (rel + 1 < rel_end
4969 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4970 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4971 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4972 else
951fd09b 4973 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4974 goto dotlstoc;
4975
4976 case R_PPC64_DTPREL64:
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4978 if (rel != relocs
4979 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4980 && rel[-1].r_offset == rel->r_offset - 8)
4981 /* This is the second reloc of a dtpmod, dtprel pair.
4982 Don't mark with TLS_DTPREL. */
4983 goto dodyn;
4984
4985 dotlstoc:
4986 sec->has_tls_reloc = 1;
4987 if (h != NULL)
4988 {
4989 struct ppc_link_hash_entry *eh;
4990 eh = (struct ppc_link_hash_entry *) h;
46e9995a 4991 eh->tls_mask |= tls_type & 0xff;
411e1bfb
AM
4992 }
4993 else
4994 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4995 rel->r_addend, tls_type))
411e1bfb
AM
4996 return FALSE;
4997
7c8fe5c4
AM
4998 ppc64_sec = ppc64_elf_section_data (sec);
4999 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5000 {
3a71aa26
AM
5001 bfd_size_type amt;
5002
e7b938ca 5003 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5004 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5005 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5006 if (ppc64_sec->u.toc.symndx == NULL)
5007 return FALSE;
5008 amt = sec->size * sizeof (bfd_vma) / 8;
5009 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5010 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5011 return FALSE;
7c8fe5c4
AM
5012 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5013 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5014 }
5015 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5016 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5017 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5018
5019 /* Mark the second slot of a GD or LD entry.
5020 -1 to indicate GD and -2 to indicate LD. */
5021 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5022 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5023 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5024 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5025 goto dodyn;
5026
5027 case R_PPC64_TPREL16:
5028 case R_PPC64_TPREL16_LO:
5029 case R_PPC64_TPREL16_HI:
5030 case R_PPC64_TPREL16_HA:
5031 case R_PPC64_TPREL16_DS:
5032 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5033 case R_PPC64_TPREL16_HIGH:
5034 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5035 case R_PPC64_TPREL16_HIGHER:
5036 case R_PPC64_TPREL16_HIGHERA:
5037 case R_PPC64_TPREL16_HIGHEST:
5038 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5039 case R_PPC64_TPREL34:
7c8bbca5
AM
5040 if (bfd_link_dll (info))
5041 info->flags |= DF_STATIC_TLS;
5042 goto dodyn;
5d1634d7 5043
e86ce104 5044 case R_PPC64_ADDR64:
b9399fcf 5045 if (is_opd
1e2f5b6e 5046 && rel + 1 < rel_end
4ce794b7 5047 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5048 {
8387904d 5049 if (h != NULL)
8c5b4e52 5050 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 5051 }
e86ce104
AM
5052 /* Fall through. */
5053
65f38f15
AM
5054 case R_PPC64_ADDR16:
5055 case R_PPC64_ADDR16_DS:
5056 case R_PPC64_ADDR16_HA:
5057 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5058 case R_PPC64_ADDR16_HIGH:
5059 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5060 case R_PPC64_ADDR16_HIGHER:
5061 case R_PPC64_ADDR16_HIGHERA:
5062 case R_PPC64_ADDR16_HIGHEST:
5063 case R_PPC64_ADDR16_HIGHESTA:
5064 case R_PPC64_ADDR16_LO:
5065 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5066 case R_PPC64_D34:
5067 case R_PPC64_D34_LO:
5068 case R_PPC64_D34_HI30:
5069 case R_PPC64_D34_HA30:
5070 case R_PPC64_ADDR16_HIGHER34:
5071 case R_PPC64_ADDR16_HIGHERA34:
5072 case R_PPC64_ADDR16_HIGHEST34:
5073 case R_PPC64_ADDR16_HIGHESTA34:
5074 case R_PPC64_D28:
0e1862bb 5075 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5076 && rel->r_addend == 0)
5077 {
5078 /* We may need a .plt entry if this reloc refers to a
5079 function in a shared lib. */
5663e321 5080 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5081 return FALSE;
5082 h->pointer_equality_needed = 1;
5083 }
5084 /* Fall through. */
5085
5086 case R_PPC64_REL30:
5087 case R_PPC64_REL32:
5088 case R_PPC64_REL64:
65f38f15 5089 case R_PPC64_ADDR32:
65f38f15
AM
5090 case R_PPC64_UADDR16:
5091 case R_PPC64_UADDR32:
5092 case R_PPC64_UADDR64:
5bd4f169 5093 case R_PPC64_TOC:
ec73ddcd 5094 if (h != NULL && bfd_link_executable (info))
81848ca0 5095 /* We may need a copy reloc. */
f5385ebf 5096 h->non_got_ref = 1;
81848ca0 5097
41bd81ab 5098 /* Don't propagate .opd relocs. */
b9399fcf 5099 if (NO_OPD_RELOCS && is_opd)
e86ce104 5100 break;
e86ce104 5101
65f38f15
AM
5102 /* If we are creating a shared library, and this is a reloc
5103 against a global symbol, or a non PC relative reloc
5104 against a local symbol, then we need to copy the reloc
5105 into the shared library. However, if we are linking with
5106 -Bsymbolic, we do not need to copy a reloc against a
5107 global symbol which is defined in an object we are
5108 including in the link (i.e., DEF_REGULAR is set). At
5109 this point we have not seen all the input files, so it is
5110 possible that DEF_REGULAR is not set now but will be set
5111 later (it is never cleared). In case of a weak definition,
5112 DEF_REGULAR may be cleared later by a strong definition in
5113 a shared library. We account for that possibility below by
f4656909 5114 storing information in the dyn_relocs field of the hash
65f38f15
AM
5115 table entry. A similar situation occurs when creating
5116 shared libraries and symbol visibility changes render the
5117 symbol local.
5118
5119 If on the other hand, we are creating an executable, we
5120 may need to keep relocations for symbols satisfied by a
5121 dynamic library if we manage to avoid copy relocs for the
5122 symbol. */
411e1bfb 5123 dodyn:
ec73ddcd
AM
5124 if ((h != NULL
5125 && (h->root.type == bfd_link_hash_defweak
5126 || !h->def_regular))
5127 || (h != NULL
5128 && !bfd_link_executable (info)
5129 && !SYMBOLIC_BIND (info, h))
5130 || (bfd_link_pic (info)
5131 && must_be_dyn_reloc (info, r_type))
0e1862bb 5132 || (!bfd_link_pic (info)
25f23106 5133 && ifunc != NULL))
5bd4f169 5134 {
65f38f15
AM
5135 /* We must copy these reloc types into the output file.
5136 Create a reloc section in dynobj and make room for
5137 this reloc. */
5bd4f169
AM
5138 if (sreloc == NULL)
5139 {
83bac4b0
NC
5140 sreloc = _bfd_elf_make_dynamic_reloc_section
5141 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5142
5bd4f169 5143 if (sreloc == NULL)
83bac4b0 5144 return FALSE;
5bd4f169
AM
5145 }
5146
65f38f15
AM
5147 /* If this is a global symbol, we count the number of
5148 relocations we need for this symbol. */
5149 if (h != NULL)
5150 {
19e08130
AM
5151 struct elf_dyn_relocs *p;
5152 struct elf_dyn_relocs **head;
5153
ec338859 5154 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5155 p = *head;
5156 if (p == NULL || p->sec != sec)
5157 {
5158 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5159 if (p == NULL)
5160 return FALSE;
5161 p->next = *head;
5162 *head = p;
5163 p->sec = sec;
5164 p->count = 0;
5165 p->pc_count = 0;
5166 }
5167 p->count += 1;
5168 if (!must_be_dyn_reloc (info, r_type))
5169 p->pc_count += 1;
65f38f15
AM
5170 }
5171 else
5172 {
ec338859
AM
5173 /* Track dynamic relocs needed for local syms too.
5174 We really need local syms available to do this
5175 easily. Oh well. */
19e08130
AM
5176 struct ppc_dyn_relocs *p;
5177 struct ppc_dyn_relocs **head;
5178 bfd_boolean is_ifunc;
ec338859 5179 asection *s;
6edfbbad 5180 void *vpp;
87d72d41 5181 Elf_Internal_Sym *isym;
6edfbbad 5182
87d72d41
AM
5183 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5184 abfd, r_symndx);
5185 if (isym == NULL)
b34976b6 5186 return FALSE;
ec338859 5187
87d72d41
AM
5188 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5189 if (s == NULL)
5190 s = sec;
5191
6edfbbad 5192 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5193 head = (struct ppc_dyn_relocs **) vpp;
5194 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5195 p = *head;
5196 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5197 p = p->next;
5198 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5199 {
5200 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5201 if (p == NULL)
5202 return FALSE;
5203 p->next = *head;
5204 *head = p;
5205 p->sec = sec;
5206 p->ifunc = is_ifunc;
5207 p->count = 0;
5208 }
5209 p->count += 1;
ec338859 5210 }
65f38f15 5211 }
5bd4f169 5212 break;
65f38f15
AM
5213
5214 default:
96e0dda4 5215 break;
5bd4f169
AM
5216 }
5217 }
5218
b34976b6 5219 return TRUE;
5bd4f169
AM
5220}
5221
ee67d69a
AM
5222/* Merge backend specific data from an object file to the output
5223 object file when linking. */
5224
5225static bfd_boolean
50e03d47 5226ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5227{
50e03d47 5228 bfd *obfd = info->output_bfd;
ee67d69a
AM
5229 unsigned long iflags, oflags;
5230
5231 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5232 return TRUE;
5233
5234 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5235 return TRUE;
5236
50e03d47 5237 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5238 return FALSE;
5239
5240 iflags = elf_elfheader (ibfd)->e_flags;
5241 oflags = elf_elfheader (obfd)->e_flags;
5242
f6c7c3e8 5243 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5244 {
4eca0228 5245 _bfd_error_handler
695344c0 5246 /* xgettext:c-format */
871b3ab2 5247 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5248 bfd_set_error (bfd_error_bad_value);
5249 return FALSE;
5250 }
f6c7c3e8 5251 else if (iflags != oflags && iflags != 0)
ee67d69a 5252 {
4eca0228 5253 _bfd_error_handler
695344c0 5254 /* xgettext:c-format */
871b3ab2 5255 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5256 ibfd, iflags, oflags);
5257 bfd_set_error (bfd_error_bad_value);
5258 return FALSE;
5259 }
5260
4a91d0ba
AM
5261 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5262 return FALSE;
005d79fd 5263
ee67d69a 5264 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5265 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5266}
5267
5268static bfd_boolean
5269ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5270{
5271 /* Print normal ELF private data. */
5272 _bfd_elf_print_private_bfd_data (abfd, ptr);
5273
5274 if (elf_elfheader (abfd)->e_flags != 0)
5275 {
5276 FILE *file = ptr;
5277
ee67d69a
AM
5278 fprintf (file, _("private flags = 0x%lx:"),
5279 elf_elfheader (abfd)->e_flags);
5280
5281 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5282 fprintf (file, _(" [abiv%ld]"),
5283 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5284 fputc ('\n', file);
5285 }
5286
5287 return TRUE;
5288}
5289
8387904d 5290/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5291 of the code entry point, and its section, which must be in the same
5292 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5293
5294static bfd_vma
5295opd_entry_value (asection *opd_sec,
5296 bfd_vma offset,
5297 asection **code_sec,
aef36ac1
AM
5298 bfd_vma *code_off,
5299 bfd_boolean in_code_sec)
8387904d
AM
5300{
5301 bfd *opd_bfd = opd_sec->owner;
8860955f 5302 Elf_Internal_Rela *relocs;
8387904d 5303 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5304 bfd_vma val;
8387904d 5305
9f296da3
AM
5306 /* No relocs implies we are linking a --just-symbols object, or looking
5307 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5308 if (opd_sec->reloc_count == 0)
5309 {
729eabd5 5310 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5311
729eabd5
AM
5312 if (contents == NULL)
5313 {
5314 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5315 return (bfd_vma) -1;
5316 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5317 }
ee1e4ede 5318
dbb3fbbb 5319 /* PR 17512: file: 64b9dfbb. */
451dfd38 5320 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5321 return (bfd_vma) -1;
5322
729eabd5 5323 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5324 if (code_sec != NULL)
5325 {
5326 asection *sec, *likely = NULL;
ee1e4ede 5327
aef36ac1 5328 if (in_code_sec)
4b85d634 5329 {
aef36ac1
AM
5330 sec = *code_sec;
5331 if (sec->vma <= val
5332 && val < sec->vma + sec->size)
5333 likely = sec;
5334 else
5335 val = -1;
5336 }
5337 else
5338 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5339 if (sec->vma <= val
5340 && (sec->flags & SEC_LOAD) != 0
5341 && (sec->flags & SEC_ALLOC) != 0)
5342 likely = sec;
5343 if (likely != NULL)
5344 {
5345 *code_sec = likely;
5346 if (code_off != NULL)
5347 *code_off = val - likely->vma;
4b85d634
AM
5348 }
5349 }
aef36ac1 5350 return val;
4b85d634
AM
5351 }
5352
0c8d6e5c 5353 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5354
729eabd5 5355 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5356 if (relocs == NULL)
5357 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5358 /* PR 17512: file: df8e1fd6. */
5359 if (relocs == NULL)
5360 return (bfd_vma) -1;
645ea6a9 5361
8387904d 5362 /* Go find the opd reloc at the sym address. */
8860955f 5363 lo = relocs;
8387904d 5364 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5365 val = (bfd_vma) -1;
8387904d
AM
5366 while (lo < hi)
5367 {
5368 look = lo + (hi - lo) / 2;
5369 if (look->r_offset < offset)
5370 lo = look + 1;
5371 else if (look->r_offset > offset)
5372 hi = look;
5373 else
5374 {
0ffa91dd
NC
5375 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5376
8387904d
AM
5377 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5378 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5379 {
5380 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5381 asection *sec = NULL;
8387904d 5382
b53dfeb2
AM
5383 if (symndx >= symtab_hdr->sh_info
5384 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5385 {
5386 struct elf_link_hash_entry **sym_hashes;
5387 struct elf_link_hash_entry *rh;
5388
5389 sym_hashes = elf_sym_hashes (opd_bfd);
5390 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5391 if (rh != NULL)
5392 {
5393 rh = elf_follow_link (rh);
bb854a36
AM
5394 if (rh->root.type != bfd_link_hash_defined
5395 && rh->root.type != bfd_link_hash_defweak)
5396 break;
5397 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5398 {
bb854a36
AM
5399 val = rh->root.u.def.value;
5400 sec = rh->root.u.def.section;
b53dfeb2
AM
5401 }
5402 }
5403 }
5404
5405 if (sec == NULL)
5406 {
5407 Elf_Internal_Sym *sym;
5408
5409 if (symndx < symtab_hdr->sh_info)
5410 {
5411 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5412 if (sym == NULL)
5413 {
5414 size_t symcnt = symtab_hdr->sh_info;
5415 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5416 symcnt, 0,
5417 NULL, NULL, NULL);
5418 if (sym == NULL)
5419 break;
5420 symtab_hdr->contents = (bfd_byte *) sym;
5421 }
5422 sym += symndx;
128205bb
AM
5423 }
5424 else
5425 {
b53dfeb2
AM
5426 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5427 1, symndx,
5428 NULL, NULL, NULL);
128205bb
AM
5429 if (sym == NULL)
5430 break;
128205bb 5431 }
b53dfeb2
AM
5432 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5433 if (sec == NULL)
5434 break;
5435 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5436 val = sym->st_value;
8387904d 5437 }
b53dfeb2 5438
8387904d
AM
5439 val += look->r_addend;
5440 if (code_off != NULL)
5441 *code_off = val;
5442 if (code_sec != NULL)
aef36ac1
AM
5443 {
5444 if (in_code_sec && *code_sec != sec)
5445 return -1;
5446 else
5447 *code_sec = sec;
5448 }
b53dfeb2 5449 if (sec->output_section != NULL)
8387904d 5450 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5451 }
5452 break;
5453 }
5454 }
645ea6a9 5455
645ea6a9 5456 return val;
8387904d
AM
5457}
5458
aef36ac1
AM
5459/* If the ELF symbol SYM might be a function in SEC, return the
5460 function size and set *CODE_OFF to the function's entry point,
5461 otherwise return zero. */
9f296da3 5462
aef36ac1
AM
5463static bfd_size_type
5464ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5465 bfd_vma *code_off)
9f296da3 5466{
aef36ac1
AM
5467 bfd_size_type size;
5468
5469 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5470 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5471 return 0;
5472
5473 size = 0;
5474 if (!(sym->flags & BSF_SYNTHETIC))
5475 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5476
5477 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5478 {
b07bca4e
AM
5479 struct _opd_sec_data *opd = get_opd_info (sym->section);
5480 bfd_vma symval = sym->value;
5481
5482 if (opd != NULL
5483 && opd->adjust != NULL
5484 && elf_section_data (sym->section)->relocs != NULL)
5485 {
5486 /* opd_entry_value will use cached relocs that have been
5487 adjusted, but with raw symbols. That means both local
5488 and global symbols need adjusting. */
5489 long adjust = opd->adjust[OPD_NDX (symval)];
5490 if (adjust == -1)
5491 return 0;
5492 symval += adjust;
5493 }
5494
5495 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5496 &sec, code_off, TRUE) == (bfd_vma) -1)
5497 return 0;
5498 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5499 symbol. This size has nothing to do with the code size of the
5500 function, which is what we're supposed to return, but the
5501 code size isn't available without looking up the dot-sym.
5502 However, doing that would be a waste of time particularly
5503 since elf_find_function will look at the dot-sym anyway.
5504 Now, elf_find_function will keep the largest size of any
5505 function sym found at the code address of interest, so return
5506 1 here to avoid it incorrectly caching a larger function size
5507 for a small function. This does mean we return the wrong
5508 size for a new-ABI function of size 24, but all that does is
5509 disable caching for such functions. */
5510 if (size == 24)
5511 size = 1;
9f296da3 5512 }
aef36ac1
AM
5513 else
5514 {
5515 if (sym->section != sec)
5516 return 0;
5517 *code_off = sym->value;
5518 }
5519 if (size == 0)
5520 size = 1;
5521 return size;
9f296da3
AM
5522}
5523
f378ab09
AM
5524/* Return true if symbol is a strong function defined in an ELFv2
5525 object with st_other localentry bits of zero, ie. its local entry
5526 point coincides with its global entry point. */
5527
5528static bfd_boolean
5529is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5530{
5531 return (h != NULL
5532 && h->type == STT_FUNC
5533 && h->root.type == bfd_link_hash_defined
5534 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5535 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5536 && is_ppc64_elf (h->root.u.def.section->owner)
5537 && abiversion (h->root.u.def.section->owner) >= 2);
5538}
5539
854b41e7
AM
5540/* Return true if symbol is defined in a regular object file. */
5541
5542static bfd_boolean
5543is_static_defined (struct elf_link_hash_entry *h)
5544{
5545 return ((h->root.type == bfd_link_hash_defined
5546 || h->root.type == bfd_link_hash_defweak)
5547 && h->root.u.def.section != NULL
5548 && h->root.u.def.section->output_section != NULL);
5549}
5550
b31867b6
AM
5551/* If FDH is a function descriptor symbol, return the associated code
5552 entry symbol if it is defined. Return NULL otherwise. */
5553
5554static struct ppc_link_hash_entry *
5555defined_code_entry (struct ppc_link_hash_entry *fdh)
5556{
5557 if (fdh->is_func_descriptor)
5558 {
5559 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5560 if (fh->elf.root.type == bfd_link_hash_defined
5561 || fh->elf.root.type == bfd_link_hash_defweak)
5562 return fh;
5563 }
5564 return NULL;
5565}
5566
5567/* If FH is a function code entry symbol, return the associated
5568 function descriptor symbol if it is defined. Return NULL otherwise. */
5569
5570static struct ppc_link_hash_entry *
5571defined_func_desc (struct ppc_link_hash_entry *fh)
5572{
5573 if (fh->oh != NULL
5574 && fh->oh->is_func_descriptor)
5575 {
5576 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5577 if (fdh->elf.root.type == bfd_link_hash_defined
5578 || fdh->elf.root.type == bfd_link_hash_defweak)
5579 return fdh;
5580 }
5581 return NULL;
5582}
5583
8c5b4e52
AM
5584static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5585
5586/* Garbage collect sections, after first dealing with dot-symbols. */
5587
5588static bfd_boolean
5589ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5590{
5591 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5592
5593 if (htab != NULL && htab->need_func_desc_adj)
5594 {
5595 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5596 htab->need_func_desc_adj = 0;
5597 }
5598 return bfd_elf_gc_sections (abfd, info);
5599}
5600
74f0fb50
AM
5601/* Mark all our entry sym sections, both opd and code section. */
5602
5603static void
5604ppc64_elf_gc_keep (struct bfd_link_info *info)
5605{
5606 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5607 struct bfd_sym_chain *sym;
5608
4dfe6ac6
NC
5609 if (htab == NULL)
5610 return;
5611
74f0fb50
AM
5612 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5613 {
b31867b6 5614 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5615 asection *sec;
5616
5617 eh = (struct ppc_link_hash_entry *)
b31867b6 5618 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5619 if (eh == NULL)
5620 continue;
5621 if (eh->elf.root.type != bfd_link_hash_defined
5622 && eh->elf.root.type != bfd_link_hash_defweak)
5623 continue;
5624
b31867b6
AM
5625 fh = defined_code_entry (eh);
5626 if (fh != NULL)
74f0fb50 5627 {
b31867b6 5628 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5629 sec->flags |= SEC_KEEP;
5630 }
5631 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5632 && opd_entry_value (eh->elf.root.u.def.section,
5633 eh->elf.root.u.def.value,
aef36ac1 5634 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5635 sec->flags |= SEC_KEEP;
5636
5637 sec = eh->elf.root.u.def.section;
5638 sec->flags |= SEC_KEEP;
5639 }
5640}
5641
64d03ab5
AM
5642/* Mark sections containing dynamically referenced symbols. When
5643 building shared libraries, we must assume that any visible symbol is
5644 referenced. */
5645
5646static bfd_boolean
5647ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5648{
5649 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5650 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5651 struct ppc_link_hash_entry *fdh;
b407645f 5652 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5653
64d03ab5 5654 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5655 fdh = defined_func_desc (eh);
5656 if (fdh != NULL)
5657 eh = fdh;
64d03ab5
AM
5658
5659 if ((eh->elf.root.type == bfd_link_hash_defined
5660 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5661 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5662 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5663 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5664 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5665 && (!bfd_link_executable (info)
e278ae05 5666 || info->gc_keep_exported
b407645f
AM
5667 || info->export_dynamic
5668 || (eh->elf.dynamic
5669 && d != NULL
2cdcc330
AM
5670 && (*d->match) (&d->head, NULL,
5671 eh->elf.root.root.string)))
e278ae05 5672 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5673 || !bfd_hide_sym_by_version (info->version_info,
5674 eh->elf.root.root.string)))))
64d03ab5
AM
5675 {
5676 asection *code_sec;
b31867b6 5677 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5678
5679 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5680
5681 /* Function descriptor syms cause the associated
5682 function code sym section to be marked. */
b31867b6
AM
5683 fh = defined_code_entry (eh);
5684 if (fh != NULL)
5685 {
5686 code_sec = fh->elf.root.u.def.section;
5687 code_sec->flags |= SEC_KEEP;
5688 }
64d03ab5
AM
5689 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5690 && opd_entry_value (eh->elf.root.u.def.section,
5691 eh->elf.root.u.def.value,
aef36ac1 5692 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5693 code_sec->flags |= SEC_KEEP;
5694 }
5695
5696 return TRUE;
5697}
5698
5bd4f169
AM
5699/* Return the section that should be marked against GC for a given
5700 relocation. */
5701
5702static asection *
4ce794b7 5703ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5704 struct bfd_link_info *info,
4ce794b7
AM
5705 Elf_Internal_Rela *rel,
5706 struct elf_link_hash_entry *h,
5707 Elf_Internal_Sym *sym)
5bd4f169 5708{
ccfa59ea
AM
5709 asection *rsec;
5710
ccfa59ea
AM
5711 /* Syms return NULL if we're marking .opd, so we avoid marking all
5712 function sections, as all functions are referenced in .opd. */
5713 rsec = NULL;
5714 if (get_opd_info (sec) != NULL)
5715 return rsec;
1e2f5b6e 5716
5bd4f169
AM
5717 if (h != NULL)
5718 {
04c9666a 5719 enum elf_ppc64_reloc_type r_type;
b31867b6 5720 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5721
4ce794b7 5722 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5723 switch (r_type)
5bd4f169
AM
5724 {
5725 case R_PPC64_GNU_VTINHERIT:
5726 case R_PPC64_GNU_VTENTRY:
5727 break;
5728
5729 default:
5730 switch (h->root.type)
5731 {
5732 case bfd_link_hash_defined:
5733 case bfd_link_hash_defweak:
ccfa59ea 5734 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5735 fdh = defined_func_desc (eh);
5736 if (fdh != NULL)
8c5b4e52
AM
5737 {
5738 /* -mcall-aixdesc code references the dot-symbol on
5739 a call reloc. Mark the function descriptor too
5740 against garbage collection. */
5741 fdh->elf.mark = 1;
60d67dc8
AM
5742 if (fdh->elf.is_weakalias)
5743 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5744 eh = fdh;
5745 }
1e2f5b6e
AM
5746
5747 /* Function descriptor syms cause the associated
5748 function code sym section to be marked. */
b31867b6
AM
5749 fh = defined_code_entry (eh);
5750 if (fh != NULL)
ccfa59ea
AM
5751 {
5752 /* They also mark their opd section. */
74f0fb50 5753 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5754
b31867b6 5755 rsec = fh->elf.root.u.def.section;
ccfa59ea 5756 }
8387904d
AM
5757 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5758 && opd_entry_value (eh->elf.root.u.def.section,
5759 eh->elf.root.u.def.value,
aef36ac1 5760 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5761 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5762 else
1e2f5b6e
AM
5763 rsec = h->root.u.def.section;
5764 break;
5bd4f169
AM
5765
5766 case bfd_link_hash_common:
1e2f5b6e
AM
5767 rsec = h->root.u.c.p->section;
5768 break;
5bd4f169
AM
5769
5770 default:
fb34365b 5771 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5772 }
5773 }
5774 }
5775 else
5776 {
74f0fb50 5777 struct _opd_sec_data *opd;
1e2f5b6e
AM
5778
5779 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5780 opd = get_opd_info (rsec);
5781 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5782 {
74f0fb50 5783 rsec->gc_mark = 1;
ccfa59ea 5784
51aecdc5 5785 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5786 }
5bd4f169
AM
5787 }
5788
1e2f5b6e 5789 return rsec;
5bd4f169
AM
5790}
5791
deb0e272
AM
5792/* The maximum size of .sfpr. */
5793#define SFPR_MAX (218*4)
5794
5795struct sfpr_def_parms
5796{
699733f6
AM
5797 const char name[12];
5798 unsigned char lo, hi;
2cdcc330
AM
5799 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5800 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5801};
5802
a4b6fadd
AM
5803/* Auto-generate _save*, _rest* functions in .sfpr.
5804 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5805 instead. */
deb0e272 5806
4dfe6ac6 5807static bfd_boolean
a4b6fadd
AM
5808sfpr_define (struct bfd_link_info *info,
5809 const struct sfpr_def_parms *parm,
5810 asection *stub_sec)
deb0e272
AM
5811{
5812 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5813 unsigned int i;
5814 size_t len = strlen (parm->name);
5815 bfd_boolean writing = FALSE;
699733f6 5816 char sym[16];
deb0e272 5817
4dfe6ac6
NC
5818 if (htab == NULL)
5819 return FALSE;
5820
deb0e272
AM
5821 memcpy (sym, parm->name, len);
5822 sym[len + 2] = 0;
5823
5824 for (i = parm->lo; i <= parm->hi; i++)
5825 {
a4b6fadd 5826 struct ppc_link_hash_entry *h;
deb0e272
AM
5827
5828 sym[len + 0] = i / 10 + '0';
5829 sym[len + 1] = i % 10 + '0';
a4b6fadd 5830 h = (struct ppc_link_hash_entry *)
b32547cd 5831 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5832 if (stub_sec != NULL)
deb0e272 5833 {
a4b6fadd
AM
5834 if (h != NULL
5835 && h->elf.root.type == bfd_link_hash_defined
5836 && h->elf.root.u.def.section == htab->sfpr)
5837 {
5838 struct elf_link_hash_entry *s;
5839 char buf[32];
5840 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5841 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5842 if (s == NULL)
5843 return FALSE;
779f2ae7 5844 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5845 {
5846 s->root.type = bfd_link_hash_defined;
5847 s->root.u.def.section = stub_sec;
7dda8d3c 5848 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5849 + h->elf.root.u.def.value);
5850 s->ref_regular = 1;
5851 s->def_regular = 1;
5852 s->ref_regular_nonweak = 1;
5853 s->forced_local = 1;
5854 s->non_elf = 0;
5855 s->root.linker_def = 1;
5856 }
5857 }
5858 continue;
5859 }
5860 if (h != NULL)
5861 {
5862 h->save_res = 1;
5863 if (!h->elf.def_regular)
deb0e272 5864 {
a4b6fadd
AM
5865 h->elf.root.type = bfd_link_hash_defined;
5866 h->elf.root.u.def.section = htab->sfpr;
5867 h->elf.root.u.def.value = htab->sfpr->size;
5868 h->elf.type = STT_FUNC;
5869 h->elf.def_regular = 1;
b32547cd 5870 h->elf.non_elf = 0;
a4b6fadd
AM
5871 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5872 writing = TRUE;
deb0e272 5873 if (htab->sfpr->contents == NULL)
a4b6fadd 5874 {
2cdcc330
AM
5875 htab->sfpr->contents
5876 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5877 if (htab->sfpr->contents == NULL)
5878 return FALSE;
5879 }
deb0e272
AM
5880 }
5881 }
5882 if (writing)
5883 {
5884 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5885 if (i != parm->hi)
5886 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5887 else
5888 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5889 htab->sfpr->size = p - htab->sfpr->contents;
5890 }
5891 }
5892
5893 return TRUE;
5894}
5895
5896static bfd_byte *
5897savegpr0 (bfd *abfd, bfd_byte *p, int r)
5898{
5899 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5900 return p + 4;
5901}
5902
5903static bfd_byte *
5904savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5905{
5906 p = savegpr0 (abfd, p, r);
a078d95a 5907 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5908 p = p + 4;
5909 bfd_put_32 (abfd, BLR, p);
5910 return p + 4;
5911}
5912
5913static bfd_byte *
5914restgpr0 (bfd *abfd, bfd_byte *p, int r)
5915{
5916 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5917 return p + 4;
5918}
5919
5920static bfd_byte *
5921restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5922{
a078d95a 5923 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5924 p = p + 4;
5925 p = restgpr0 (abfd, p, r);
5926 bfd_put_32 (abfd, MTLR_R0, p);
5927 p = p + 4;
5928 if (r == 29)
5929 {
5930 p = restgpr0 (abfd, p, 30);
5931 p = restgpr0 (abfd, p, 31);
5932 }
5933 bfd_put_32 (abfd, BLR, p);
5934 return p + 4;
5935}
5936
5937static bfd_byte *
5938savegpr1 (bfd *abfd, bfd_byte *p, int r)
5939{
5940 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5941 return p + 4;
5942}
5943
5944static bfd_byte *
5945savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5946{
5947 p = savegpr1 (abfd, p, r);
5948 bfd_put_32 (abfd, BLR, p);
5949 return p + 4;
5950}
5951
5952static bfd_byte *
5953restgpr1 (bfd *abfd, bfd_byte *p, int r)
5954{
5955 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5956 return p + 4;
5957}
5958
5959static bfd_byte *
5960restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5961{
5962 p = restgpr1 (abfd, p, r);
5963 bfd_put_32 (abfd, BLR, p);
5964 return p + 4;
5965}
5966
5967static bfd_byte *
5968savefpr (bfd *abfd, bfd_byte *p, int r)
5969{
5970 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5971 return p + 4;
5972}
5973
5974static bfd_byte *
5975savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5976{
5977 p = savefpr (abfd, p, r);
a078d95a 5978 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5979 p = p + 4;
5980 bfd_put_32 (abfd, BLR, p);
5981 return p + 4;
5982}
5983
5984static bfd_byte *
5985restfpr (bfd *abfd, bfd_byte *p, int r)
5986{
5987 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5988 return p + 4;
5989}
5990
5991static bfd_byte *
5992restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5993{
a078d95a 5994 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5995 p = p + 4;
5996 p = restfpr (abfd, p, r);
5997 bfd_put_32 (abfd, MTLR_R0, p);
5998 p = p + 4;
5999 if (r == 29)
6000 {
6001 p = restfpr (abfd, p, 30);
6002 p = restfpr (abfd, p, 31);
6003 }
6004 bfd_put_32 (abfd, BLR, p);
6005 return p + 4;
6006}
6007
6008static bfd_byte *
6009savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6010{
6011 p = savefpr (abfd, p, r);
6012 bfd_put_32 (abfd, BLR, p);
6013 return p + 4;
6014}
6015
6016static bfd_byte *
6017restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6018{
6019 p = restfpr (abfd, p, r);
6020 bfd_put_32 (abfd, BLR, p);
6021 return p + 4;
6022}
6023
6024static bfd_byte *
6025savevr (bfd *abfd, bfd_byte *p, int r)
6026{
6027 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6028 p = p + 4;
6029 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6030 return p + 4;
6031}
6032
6033static bfd_byte *
6034savevr_tail (bfd *abfd, bfd_byte *p, int r)
6035{
6036 p = savevr (abfd, p, r);
6037 bfd_put_32 (abfd, BLR, p);
6038 return p + 4;
6039}
6040
6041static bfd_byte *
6042restvr (bfd *abfd, bfd_byte *p, int r)
6043{
6044 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6045 p = p + 4;
6046 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6047 return p + 4;
6048}
6049
6050static bfd_byte *
6051restvr_tail (bfd *abfd, bfd_byte *p, int r)
6052{
6053 p = restvr (abfd, p, r);
6054 bfd_put_32 (abfd, BLR, p);
6055 return p + 4;
6056}
6057
e86ce104
AM
6058/* Called via elf_link_hash_traverse to transfer dynamic linking
6059 information on function code symbol entries to their corresponding
6060 function descriptor symbol entries. */
deb0e272 6061
b34976b6 6062static bfd_boolean
4ce794b7 6063func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6064{
e86ce104 6065 struct bfd_link_info *info;
65f38f15 6066 struct ppc_link_hash_table *htab;
50bc7936
AM
6067 struct ppc_link_hash_entry *fh;
6068 struct ppc_link_hash_entry *fdh;
6069 bfd_boolean force_local;
5bd4f169 6070
50bc7936
AM
6071 fh = (struct ppc_link_hash_entry *) h;
6072 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6073 return TRUE;
e86ce104 6074
8c5b4e52
AM
6075 if (!fh->is_func)
6076 return TRUE;
6077
6078 if (fh->elf.root.root.string[0] != '.'
6079 || fh->elf.root.root.string[1] == '\0')
6080 return TRUE;
6081
4ce794b7 6082 info = inf;
65f38f15 6083 htab = ppc_hash_table (info);
4dfe6ac6
NC
6084 if (htab == NULL)
6085 return FALSE;
5bd4f169 6086
8c5b4e52
AM
6087 /* Find the corresponding function descriptor symbol. */
6088 fdh = lookup_fdh (fh, htab);
6089
c09bdfe5
AM
6090 /* Resolve undefined references to dot-symbols as the value
6091 in the function descriptor, if we have one in a regular object.
6092 This is to satisfy cases like ".quad .foo". Calls to functions
6093 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6094 if ((fh->elf.root.type == bfd_link_hash_undefined
6095 || fh->elf.root.type == bfd_link_hash_undefweak)
6096 && (fdh->elf.root.type == bfd_link_hash_defined
6097 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6098 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6099 && opd_entry_value (fdh->elf.root.u.def.section,
6100 fdh->elf.root.u.def.value,
c09bdfe5 6101 &fh->elf.root.u.def.section,
aef36ac1 6102 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6103 {
b31867b6 6104 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6105 fh->elf.forced_local = 1;
b31867b6
AM
6106 fh->elf.def_regular = fdh->elf.def_regular;
6107 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6108 }
6109
8c5b4e52
AM
6110 if (!fh->elf.dynamic)
6111 {
6112 struct plt_entry *ent;
5bd4f169 6113
8c5b4e52
AM
6114 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6115 if (ent->plt.refcount > 0)
6116 break;
6117 if (ent == NULL)
6118 return TRUE;
6119 }
5bd4f169 6120
8c5b4e52 6121 /* Create a descriptor as undefined if necessary. */
50bc7936 6122 if (fdh == NULL
0e1862bb 6123 && !bfd_link_executable (info)
50bc7936
AM
6124 && (fh->elf.root.type == bfd_link_hash_undefined
6125 || fh->elf.root.type == bfd_link_hash_undefweak))
6126 {
908b32fc 6127 fdh = make_fdh (info, fh);
bb700d78
AM
6128 if (fdh == NULL)
6129 return FALSE;
50bc7936 6130 }
648cca2c 6131
8c5b4e52 6132 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6133 if (fdh != NULL
6134 && fdh->fake
8c5b4e52
AM
6135 && (fh->elf.root.type == bfd_link_hash_defined
6136 || fh->elf.root.type == bfd_link_hash_defweak))
6137 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6138
8c5b4e52
AM
6139 /* Transfer dynamic linking information to the function descriptor. */
6140 if (fdh != NULL)
6141 {
f5385ebf
AM
6142 fdh->elf.ref_regular |= fh->elf.ref_regular;
6143 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6144 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6145 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6146 fdh->elf.dynamic |= fh->elf.dynamic;
6147 fdh->elf.needs_plt |= (fh->elf.needs_plt
6148 || fh->elf.type == STT_FUNC
6149 || fh->elf.type == STT_GNU_IFUNC);
6150 move_plt_plist (fh, fdh);
6151
6152 if (!fdh->elf.forced_local
6153 && fh->elf.dynindx != -1)
6154 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6155 return FALSE;
e86ce104
AM
6156 }
6157
50bc7936
AM
6158 /* Now that the info is on the function descriptor, clear the
6159 function code sym info. Any function code syms for which we
6160 don't have a definition in a regular file, we force local.
6161 This prevents a shared library from exporting syms that have
6162 been imported from another library. Function code syms that
6163 are really in the library we must leave global to prevent the
6164 linker dragging in a definition from a static library. */
93f3fa99
AM
6165 force_local = (!fh->elf.def_regular
6166 || fdh == NULL
6167 || !fdh->elf.def_regular
6168 || fdh->elf.forced_local);
50bc7936
AM
6169 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6170
b34976b6 6171 return TRUE;
e86ce104 6172}
40b8271b 6173
a4b6fadd
AM
6174static const struct sfpr_def_parms save_res_funcs[] =
6175 {
6176 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6177 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6178 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6179 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6180 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6181 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6182 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6183 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6184 { "._savef", 14, 31, savefpr, savefpr1_tail },
6185 { "._restf", 14, 31, restfpr, restfpr1_tail },
6186 { "_savevr_", 20, 31, savevr, savevr_tail },
6187 { "_restvr_", 20, 31, restvr, restvr_tail }
6188 };
6189
e86ce104 6190/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6191 this hook to a) provide some gcc support functions, and b) transfer
6192 dynamic linking information gathered so far on function code symbol
6193 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6194
b34976b6 6195static bfd_boolean
4ce794b7
AM
6196ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6197 struct bfd_link_info *info)
e86ce104
AM
6198{
6199 struct ppc_link_hash_table *htab;
6200
6201 htab = ppc_hash_table (info);
4dfe6ac6
NC
6202 if (htab == NULL)
6203 return FALSE;
6204
b32547cd
AM
6205 /* Provide any missing _save* and _rest* functions. */
6206 if (htab->sfpr != NULL)
6207 {
6208 unsigned int i;
6209
6210 htab->sfpr->size = 0;
6211 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6212 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6213 return FALSE;
6214 if (htab->sfpr->size == 0)
6215 htab->sfpr->flags |= SEC_EXCLUDE;
6216 }
6217
6218 if (bfd_link_relocatable (info))
6219 return TRUE;
6220
6221 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6222 {
6223 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6224 /* Make .TOC. defined so as to prevent it being made dynamic.
6225 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6226 if (!htab->elf.hgot->def_regular
6227 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6228 {
6229 htab->elf.hgot->root.type = bfd_link_hash_defined;
6230 htab->elf.hgot->root.u.def.value = 0;
6231 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6232 htab->elf.hgot->def_regular = 1;
6233 htab->elf.hgot->root.linker_def = 1;
6234 }
dba6fa9b 6235 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6236 htab->elf.hgot->other
6237 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6238 }
c66bb0ee 6239
8c5b4e52
AM
6240 if (htab->need_func_desc_adj)
6241 {
6242 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6243 htab->need_func_desc_adj = 0;
6244 }
805fc799 6245
b34976b6 6246 return TRUE;
e86ce104
AM
6247}
6248
98bbb1b8 6249/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6250
98bbb1b8 6251static asection *
a345bc8d
AM
6252readonly_dynrelocs (struct elf_link_hash_entry *h)
6253{
6254 struct ppc_link_hash_entry *eh;
6255 struct elf_dyn_relocs *p;
6256
6257 eh = (struct ppc_link_hash_entry *) h;
6258 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6259 {
6260 asection *s = p->sec->output_section;
6261
6262 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6263 return p->sec;
a345bc8d 6264 }
98bbb1b8 6265 return NULL;
a345bc8d
AM
6266}
6267
d311bc8b 6268/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6269 aliases, that apply to read-only sections. Cannot be used after
6270 size_dynamic_sections. */
d311bc8b
AM
6271
6272static bfd_boolean
6273alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6274{
6275 struct ppc_link_hash_entry *eh;
6276
6277 eh = (struct ppc_link_hash_entry *) h;
6278 do
6279 {
6280 if (readonly_dynrelocs (&eh->elf))
6281 return TRUE;
ab2477e1 6282 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
6283 }
6284 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6285
6286 return FALSE;
6287}
8a2058b5 6288
8a9e8e72
AM
6289/* Return whether EH has pc-relative dynamic relocs. */
6290
6291static bfd_boolean
6292pc_dynrelocs (struct ppc_link_hash_entry *eh)
6293{
6294 struct elf_dyn_relocs *p;
6295
6296 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6297 if (p->pc_count != 0)
6298 return TRUE;
6299 return FALSE;
6300}
6301
8a2058b5
AM
6302/* Return true if a global entry stub will be created for H. Valid
6303 for ELFv2 before plt entries have been allocated. */
6304
6305static bfd_boolean
6306global_entry_stub (struct elf_link_hash_entry *h)
6307{
6308 struct plt_entry *pent;
6309
6310 if (!h->pointer_equality_needed
6311 || h->def_regular)
6312 return FALSE;
6313
6314 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6315 if (pent->plt.refcount > 0
6316 && pent->addend == 0)
6317 return TRUE;
6318
6319 return FALSE;
6320}
6321
e86ce104
AM
6322/* Adjust a symbol defined by a dynamic object and referenced by a
6323 regular object. The current definition is in some section of the
6324 dynamic object, but we're not including those sections. We have to
6325 change the definition to something the rest of the link can
6326 understand. */
6327
b34976b6 6328static bfd_boolean
4ce794b7
AM
6329ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6330 struct elf_link_hash_entry *h)
e86ce104
AM
6331{
6332 struct ppc_link_hash_table *htab;
5474d94f 6333 asection *s, *srel;
e86ce104
AM
6334
6335 htab = ppc_hash_table (info);
4dfe6ac6
NC
6336 if (htab == NULL)
6337 return FALSE;
e86ce104
AM
6338
6339 /* Deal with function syms. */
6340 if (h->type == STT_FUNC
e054468f 6341 || h->type == STT_GNU_IFUNC
f5385ebf 6342 || h->needs_plt)
e86ce104 6343 {
529fe20e
AM
6344 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6345 || SYMBOL_CALLS_LOCAL (info, h)
6346 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6347 /* Discard dyn_relocs when non-pic if we've decided that a
6348 function symbol is local and not an ifunc. We keep dynamic
6349 relocs for ifuncs when local rather than always emitting a
6350 plt call stub for them and defining the symbol on the call
6351 stub. We can't do that for ELFv1 anyway (a function symbol
6352 is defined on a descriptor, not code) and it can be faster at
6353 run-time due to not needing to bounce through a stub. The
6354 dyn_relocs for ifuncs will be applied even in a static
6355 executable. */
6356 if (!bfd_link_pic (info)
6357 && h->type != STT_GNU_IFUNC
6358 && local)
6359 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6360
e86ce104
AM
6361 /* Clear procedure linkage table information for any symbol that
6362 won't need a .plt entry. */
411e1bfb
AM
6363 struct plt_entry *ent;
6364 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6365 if (ent->plt.refcount > 0)
6366 break;
8387904d 6367 if (ent == NULL
2d7ad24e
AM
6368 || (h->type != STT_GNU_IFUNC
6369 && local
3e04d765
AM
6370 && (htab->can_convert_all_inline_plt
6371 || (((struct ppc_link_hash_entry *) h)->tls_mask
6372 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6373 {
411e1bfb 6374 h->plt.plist = NULL;
f5385ebf 6375 h->needs_plt = 0;
d1eca1e4 6376 h->pointer_equality_needed = 0;
40b8271b 6377 }
8a2058b5 6378 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6379 {
d1eca1e4
AM
6380 /* Taking a function's address in a read/write section
6381 doesn't require us to define the function symbol in the
6382 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6383 be used instead. The reason we prefer a few more dynamic
6384 relocs is that calling via a global entry stub costs a
6385 few more instructions, and pointer_equality_needed causes
6386 extra work in ld.so when resolving these symbols. */
529fe20e 6387 if (global_entry_stub (h))
d1eca1e4 6388 {
ab2477e1 6389 if (!readonly_dynrelocs (h))
529fe20e
AM
6390 {
6391 h->pointer_equality_needed = 0;
04383fd1
AM
6392 /* If we haven't seen a branch reloc and the symbol
6393 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6394 if (!h->needs_plt)
6395 h->plt.plist = NULL;
6396 }
6397 else if (!bfd_link_pic (info))
6398 /* We are going to be defining the function symbol on the
6399 plt stub, so no dyn_relocs needed when non-pic. */
6400 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6401 }
6402
3988aed5
AM
6403 /* ELFv2 function symbols can't have copy relocs. */
6404 return TRUE;
6405 }
6406 else if (!h->needs_plt
ab2477e1 6407 && !readonly_dynrelocs (h))
3988aed5 6408 {
04383fd1
AM
6409 /* If we haven't seen a branch reloc and the symbol isn't an
6410 ifunc then we don't need a plt entry. */
3988aed5
AM
6411 h->plt.plist = NULL;
6412 h->pointer_equality_needed = 0;
a345bc8d
AM
6413 return TRUE;
6414 }
5bd4f169 6415 }
bbd7ec4a 6416 else
411e1bfb 6417 h->plt.plist = NULL;
5bd4f169
AM
6418
6419 /* If this is a weak symbol, and there is a real definition, the
6420 processor independent code will have arranged for us to see the
6421 real definition first, and we can just use the same value. */
60d67dc8 6422 if (h->is_weakalias)
5bd4f169 6423 {
60d67dc8
AM
6424 struct elf_link_hash_entry *def = weakdef (h);
6425 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6426 h->root.u.def.section = def->root.u.def.section;
6427 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6428 if (def->root.u.def.section == htab->elf.sdynbss
6429 || def->root.u.def.section == htab->elf.sdynrelro)
6430 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6431 return TRUE;
5bd4f169
AM
6432 }
6433
5bd4f169
AM
6434 /* If we are creating a shared library, we must presume that the
6435 only references to the symbol are via the global offset table.
6436 For such cases we need not do anything here; the relocations will
6437 be handled correctly by relocate_section. */
ec73ddcd 6438 if (!bfd_link_executable (info))
b34976b6 6439 return TRUE;
5bd4f169 6440
65f38f15
AM
6441 /* If there are no references to this symbol that do not use the
6442 GOT, we don't need to generate a copy reloc. */
f5385ebf 6443 if (!h->non_got_ref)
b34976b6 6444 return TRUE;
65f38f15 6445
b186458a 6446 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6447 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6448
d93d1c80
AM
6449 /* If -z nocopyreloc was given, don't generate them either. */
6450 || info->nocopyreloc
a127494f 6451
dce2246a 6452 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6453 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6454 || (ELIMINATE_COPY_RELOCS
6455 && !h->needs_copy
6456 && !alias_readonly_dynrelocs (h))
65f38f15 6457
d93d1c80
AM
6458 /* Protected variables do not work with .dynbss. The copy in
6459 .dynbss won't be used by the shared library with the protected
6460 definition for the variable. Text relocations are preferable
6461 to an incorrect program. */
6462 || h->protected_def)
529fe20e 6463 return TRUE;
a127494f 6464
5d35169e 6465 if (h->plt.plist != NULL)
97b639ba
AM
6466 {
6467 /* We should never get here, but unfortunately there are versions
6468 of gcc out there that improperly (for this ABI) put initialized
6469 function pointers, vtable refs and suchlike in read-only
6470 sections. Allow them to proceed, but warn that this might
6471 break at runtime. */
25f53a85 6472 info->callbacks->einfo
c1c8c1ef 6473 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6474 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6475 h->root.root.string);
6476 }
5d35169e
AM
6477
6478 /* This is a reference to a symbol defined by a dynamic object which
6479 is not a function. */
6480
5bd4f169
AM
6481 /* We must allocate the symbol in our .dynbss section, which will
6482 become part of the .bss section of the executable. There will be
6483 an entry for this symbol in the .dynsym section. The dynamic
6484 object will contain position independent code, so all references
6485 from the dynamic object to this symbol will go through the global
6486 offset table. The dynamic linker will use the .dynsym entry to
6487 determine the address it must put in the global offset table, so
6488 both the dynamic object and the regular object will refer to the
6489 same memory location for the variable. */
5474d94f
AM
6490 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6491 {
6492 s = htab->elf.sdynrelro;
6493 srel = htab->elf.sreldynrelro;
6494 }
6495 else
6496 {
6497 s = htab->elf.sdynbss;
6498 srel = htab->elf.srelbss;
6499 }
1d7e9d18 6500 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6501 {
4a7e5234
AM
6502 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6503 linker to copy the initial value out of the dynamic object
6504 and into the runtime process image. */
5474d94f 6505 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6506 h->needs_copy = 1;
5bd4f169
AM
6507 }
6508
529fe20e
AM
6509 /* We no longer want dyn_relocs. */
6510 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6511 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6512}
6513
e86ce104
AM
6514/* If given a function descriptor symbol, hide both the function code
6515 sym and the descriptor. */
6516static void
4ce794b7
AM
6517ppc64_elf_hide_symbol (struct bfd_link_info *info,
6518 struct elf_link_hash_entry *h,
6519 bfd_boolean force_local)
e86ce104 6520{
34814b9f 6521 struct ppc_link_hash_entry *eh;
e86ce104
AM
6522 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6523
87469ba2
AM
6524 if (ppc_hash_table (info) == NULL)
6525 return;
6526
34814b9f
AM
6527 eh = (struct ppc_link_hash_entry *) h;
6528 if (eh->is_func_descriptor)
e86ce104 6529 {
34814b9f 6530 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6531
721956f4 6532 if (fh == NULL)
d1329ca3
AM
6533 {
6534 const char *p, *q;
b8ac2841 6535 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6536 char save;
6537
6538 /* We aren't supposed to use alloca in BFD because on
6539 systems which do not have alloca the version in libiberty
6540 calls xmalloc, which might cause the program to crash
6541 when it runs out of memory. This function doesn't have a
6542 return status, so there's no way to gracefully return an
6543 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6544 accessed; It's either a string in an ELF string table,
6545 or allocated in an objalloc structure. */
d1329ca3 6546
34814b9f 6547 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6548 save = *p;
6549 *(char *) p = '.';
34814b9f 6550 fh = (struct ppc_link_hash_entry *)
b8ac2841 6551 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6552 *(char *) p = save;
6553
6554 /* Unfortunately, if it so happens that the string we were
6555 looking for was allocated immediately before this string,
6556 then we overwrote the string terminator. That's the only
6557 reason the lookup should fail. */
6558 if (fh == NULL)
6559 {
34814b9f
AM
6560 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6561 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6562 --q, --p;
34814b9f
AM
6563 if (q < eh->elf.root.root.string && *p == '.')
6564 fh = (struct ppc_link_hash_entry *)
b8ac2841 6565 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6566 }
6567 if (fh != NULL)
6568 {
34814b9f
AM
6569 eh->oh = fh;
6570 fh->oh = eh;
d1329ca3
AM
6571 }
6572 }
e86ce104 6573 if (fh != NULL)
34814b9f 6574 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6575 }
6576}
6577
411e1bfb 6578static bfd_boolean
8843416a
AM
6579get_sym_h (struct elf_link_hash_entry **hp,
6580 Elf_Internal_Sym **symp,
6581 asection **symsecp,
f961d9dd 6582 unsigned char **tls_maskp,
8843416a
AM
6583 Elf_Internal_Sym **locsymsp,
6584 unsigned long r_symndx,
6585 bfd *ibfd)
411e1bfb 6586{
0ffa91dd 6587 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6588
6589 if (r_symndx >= symtab_hdr->sh_info)
6590 {
6591 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6592 struct elf_link_hash_entry *h;
6593
6594 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6595 h = elf_follow_link (h);
411e1bfb
AM
6596
6597 if (hp != NULL)
6598 *hp = h;
6599
6600 if (symp != NULL)
6601 *symp = NULL;
6602
6603 if (symsecp != NULL)
6604 {
6605 asection *symsec = NULL;
6606 if (h->root.type == bfd_link_hash_defined
6607 || h->root.type == bfd_link_hash_defweak)
6608 symsec = h->root.u.def.section;
6609 *symsecp = symsec;
6610 }
6611
e7b938ca 6612 if (tls_maskp != NULL)
411e1bfb
AM
6613 {
6614 struct ppc_link_hash_entry *eh;
6615
6616 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6617 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6618 }
6619 }
6620 else
6621 {
6622 Elf_Internal_Sym *sym;
6623 Elf_Internal_Sym *locsyms = *locsymsp;
6624
6625 if (locsyms == NULL)
6626 {
6627 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6628 if (locsyms == NULL)
6629 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6630 symtab_hdr->sh_info,
6631 0, NULL, NULL, NULL);
6632 if (locsyms == NULL)
6633 return FALSE;
6634 *locsymsp = locsyms;
6635 }
6636 sym = locsyms + r_symndx;
6637
6638 if (hp != NULL)
6639 *hp = NULL;
6640
6641 if (symp != NULL)
6642 *symp = sym;
6643
6644 if (symsecp != NULL)
cb33740c 6645 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6646
e7b938ca 6647 if (tls_maskp != NULL)
411e1bfb
AM
6648 {
6649 struct got_entry **lgot_ents;
f961d9dd 6650 unsigned char *tls_mask;
411e1bfb 6651
e7b938ca 6652 tls_mask = NULL;
411e1bfb
AM
6653 lgot_ents = elf_local_got_ents (ibfd);
6654 if (lgot_ents != NULL)
6655 {
e054468f
AM
6656 struct plt_entry **local_plt = (struct plt_entry **)
6657 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6658 unsigned char *lgot_masks = (unsigned char *)
e054468f 6659 (local_plt + symtab_hdr->sh_info);
e7b938ca 6660 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6661 }
e7b938ca 6662 *tls_maskp = tls_mask;
411e1bfb
AM
6663 }
6664 }
6665 return TRUE;
6666}
6667
e7b938ca 6668/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6669 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6670 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6671
6672static int
f961d9dd 6673get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6674 unsigned long *toc_symndx,
6675 bfd_vma *toc_addend,
0d4792f7 6676 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6677 const Elf_Internal_Rela *rel,
6678 bfd *ibfd)
411e1bfb
AM
6679{
6680 unsigned long r_symndx;
0d4792f7 6681 int next_r;
411e1bfb
AM
6682 struct elf_link_hash_entry *h;
6683 Elf_Internal_Sym *sym;
6684 asection *sec;
6685 bfd_vma off;
6686
6687 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6688 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6689 return 0;
411e1bfb 6690
37da22e5
AM
6691 if ((*tls_maskp != NULL
6692 && (**tls_maskp & TLS_TLS) != 0
6693 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6694 || sec == NULL
6bee8834 6695 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6696 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6697 return 1;
411e1bfb
AM
6698
6699 /* Look inside a TOC section too. */
6700 if (h != NULL)
6701 {
6702 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6703 off = h->root.u.def.value;
6704 }
6705 else
6706 off = sym->st_value;
6707 off += rel->r_addend;
6708 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6709 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6710 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6711 if (toc_symndx != NULL)
6712 *toc_symndx = r_symndx;
3a71aa26
AM
6713 if (toc_addend != NULL)
6714 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6715 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6716 return 0;
854b41e7 6717 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6718 && (next_r == -1 || next_r == -2))
6719 return 1 - next_r;
951fd09b 6720 return 1;
411e1bfb
AM
6721}
6722
3b421ab3
AM
6723/* Find (or create) an entry in the tocsave hash table. */
6724
6725static struct tocsave_entry *
6726tocsave_find (struct ppc_link_hash_table *htab,
6727 enum insert_option insert,
6728 Elf_Internal_Sym **local_syms,
6729 const Elf_Internal_Rela *irela,
6730 bfd *ibfd)
6731{
6732 unsigned long r_indx;
6733 struct elf_link_hash_entry *h;
6734 Elf_Internal_Sym *sym;
6735 struct tocsave_entry ent, *p;
6736 hashval_t hash;
6737 struct tocsave_entry **slot;
6738
6739 r_indx = ELF64_R_SYM (irela->r_info);
6740 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6741 return NULL;
6742 if (ent.sec == NULL || ent.sec->output_section == NULL)
6743 {
4eca0228 6744 _bfd_error_handler
871b3ab2 6745 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6746 return NULL;
6747 }
6748
6749 if (h != NULL)
6750 ent.offset = h->root.u.def.value;
6751 else
6752 ent.offset = sym->st_value;
6753 ent.offset += irela->r_addend;
6754
6755 hash = tocsave_htab_hash (&ent);
6756 slot = ((struct tocsave_entry **)
6757 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6758 if (slot == NULL)
6759 return NULL;
6760
6761 if (*slot == NULL)
6762 {
6763 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6764 if (p == NULL)
6765 return NULL;
6766 *p = ent;
6767 *slot = p;
6768 }
6769 return *slot;
6770}
6771
754021d0 6772/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6773 code for the old ABI, these will already have been done. */
754021d0
AM
6774
6775static bfd_boolean
6776adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6777{
6778 struct ppc_link_hash_entry *eh;
6779 asection *sym_sec;
74f0fb50 6780 struct _opd_sec_data *opd;
754021d0
AM
6781
6782 if (h->root.type == bfd_link_hash_indirect)
6783 return TRUE;
6784
754021d0
AM
6785 if (h->root.type != bfd_link_hash_defined
6786 && h->root.type != bfd_link_hash_defweak)
6787 return TRUE;
6788
6789 eh = (struct ppc_link_hash_entry *) h;
6790 if (eh->adjust_done)
6791 return TRUE;
6792
6793 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6794 opd = get_opd_info (sym_sec);
6795 if (opd != NULL && opd->adjust != NULL)
754021d0 6796 {
51aecdc5 6797 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6798 if (adjust == -1)
6799 {
6800 /* This entry has been deleted. */
b3fac117 6801 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6802 if (dsec == NULL)
6803 {
6804 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6805 if (discarded_section (dsec))
81688140 6806 {
b3fac117 6807 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6808 break;
6809 }
6810 }
4025353c 6811 eh->elf.root.u.def.value = 0;
81688140 6812 eh->elf.root.u.def.section = dsec;
4025353c
AM
6813 }
6814 else
6815 eh->elf.root.u.def.value += adjust;
754021d0
AM
6816 eh->adjust_done = 1;
6817 }
6818 return TRUE;
6819}
6820
8c1d1bb8 6821/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6822 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6823 have already been determined. */
6824
6825static bfd_boolean
6826dec_dynrel_count (bfd_vma r_info,
6827 asection *sec,
6828 struct bfd_link_info *info,
6829 Elf_Internal_Sym **local_syms,
6830 struct elf_link_hash_entry *h,
19e08130 6831 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6832{
6833 enum elf_ppc64_reloc_type r_type;
19e08130 6834 asection *sym_sec = NULL;
8c1d1bb8
AM
6835
6836 /* Can this reloc be dynamic? This switch, and later tests here
6837 should be kept in sync with the code in check_relocs. */
6838 r_type = ELF64_R_TYPE (r_info);
6839 switch (r_type)
6840 {
6841 default:
6842 return TRUE;
6843
1bdd8fac
AM
6844 case R_PPC64_TOC16:
6845 case R_PPC64_TOC16_DS:
6846 case R_PPC64_TOC16_LO:
6847 case R_PPC64_TOC16_HI:
6848 case R_PPC64_TOC16_HA:
6849 case R_PPC64_TOC16_LO_DS:
6850 if (h == NULL)
6851 return TRUE;
6852 break;
6853
8c1d1bb8
AM
6854 case R_PPC64_TPREL16:
6855 case R_PPC64_TPREL16_LO:
6856 case R_PPC64_TPREL16_HI:
6857 case R_PPC64_TPREL16_HA:
6858 case R_PPC64_TPREL16_DS:
6859 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6860 case R_PPC64_TPREL16_HIGH:
6861 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6862 case R_PPC64_TPREL16_HIGHER:
6863 case R_PPC64_TPREL16_HIGHERA:
6864 case R_PPC64_TPREL16_HIGHEST:
6865 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6866 case R_PPC64_TPREL64:
c213164a 6867 case R_PPC64_TPREL34:
8c1d1bb8
AM
6868 case R_PPC64_DTPMOD64:
6869 case R_PPC64_DTPREL64:
6870 case R_PPC64_ADDR64:
6871 case R_PPC64_REL30:
6872 case R_PPC64_REL32:
6873 case R_PPC64_REL64:
6874 case R_PPC64_ADDR14:
6875 case R_PPC64_ADDR14_BRNTAKEN:
6876 case R_PPC64_ADDR14_BRTAKEN:
6877 case R_PPC64_ADDR16:
6878 case R_PPC64_ADDR16_DS:
6879 case R_PPC64_ADDR16_HA:
6880 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6881 case R_PPC64_ADDR16_HIGH:
6882 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6883 case R_PPC64_ADDR16_HIGHER:
6884 case R_PPC64_ADDR16_HIGHERA:
6885 case R_PPC64_ADDR16_HIGHEST:
6886 case R_PPC64_ADDR16_HIGHESTA:
6887 case R_PPC64_ADDR16_LO:
6888 case R_PPC64_ADDR16_LO_DS:
6889 case R_PPC64_ADDR24:
6890 case R_PPC64_ADDR32:
6891 case R_PPC64_UADDR16:
6892 case R_PPC64_UADDR32:
6893 case R_PPC64_UADDR64:
6894 case R_PPC64_TOC:
5663e321
AM
6895 case R_PPC64_D34:
6896 case R_PPC64_D34_LO:
6897 case R_PPC64_D34_HI30:
6898 case R_PPC64_D34_HA30:
6899 case R_PPC64_ADDR16_HIGHER34:
6900 case R_PPC64_ADDR16_HIGHERA34:
6901 case R_PPC64_ADDR16_HIGHEST34:
6902 case R_PPC64_ADDR16_HIGHESTA34:
6903 case R_PPC64_D28:
8c1d1bb8
AM
6904 break;
6905 }
6906
6907 if (local_syms != NULL)
6908 {
6909 unsigned long r_symndx;
8c1d1bb8
AM
6910 bfd *ibfd = sec->owner;
6911
6912 r_symndx = ELF64_R_SYM (r_info);
6913 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6914 return FALSE;
6915 }
6916
ec73ddcd
AM
6917 if ((h != NULL
6918 && (h->root.type == bfd_link_hash_defweak
6919 || !h->def_regular))
6920 || (h != NULL
6921 && !bfd_link_executable (info)
6922 && !SYMBOLIC_BIND (info, h))
6923 || (bfd_link_pic (info)
6924 && must_be_dyn_reloc (info, r_type))
6925 || (!bfd_link_pic (info)
6926 && (h != NULL
6927 ? h->type == STT_GNU_IFUNC
6928 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
6929 ;
6930 else
6931 return TRUE;
6932
6933 if (h != NULL)
6edfbbad 6934 {
19e08130
AM
6935 struct elf_dyn_relocs *p;
6936 struct elf_dyn_relocs **pp;
6937 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6938
6939 /* elf_gc_sweep may have already removed all dyn relocs associated
6940 with local syms for a given section. Also, symbol flags are
6941 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6942 report a dynreloc miscount. */
6943 if (*pp == NULL && info->gc_sections)
6944 return TRUE;
6945
6946 while ((p = *pp) != NULL)
60124e18 6947 {
19e08130
AM
6948 if (p->sec == sec)
6949 {
6950 if (!must_be_dyn_reloc (info, r_type))
6951 p->pc_count -= 1;
6952 p->count -= 1;
6953 if (p->count == 0)
6954 *pp = p->next;
6955 return TRUE;
6956 }
6957 pp = &p->next;
60124e18 6958 }
6edfbbad 6959 }
19e08130
AM
6960 else
6961 {
6962 struct ppc_dyn_relocs *p;
6963 struct ppc_dyn_relocs **pp;
6964 void *vpp;
6965 bfd_boolean is_ifunc;
8c1d1bb8 6966
19e08130
AM
6967 if (local_syms == NULL)
6968 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6969 if (sym_sec == NULL)
6970 sym_sec = sec;
c57da1a7 6971
19e08130
AM
6972 vpp = &elf_section_data (sym_sec)->local_dynrel;
6973 pp = (struct ppc_dyn_relocs **) vpp;
6974
6975 if (*pp == NULL && info->gc_sections)
6976 return TRUE;
6977
6978 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6979 while ((p = *pp) != NULL)
8c1d1bb8 6980 {
19e08130
AM
6981 if (p->sec == sec && p->ifunc == is_ifunc)
6982 {
6983 p->count -= 1;
6984 if (p->count == 0)
6985 *pp = p->next;
6986 return TRUE;
6987 }
6988 pp = &p->next;
8c1d1bb8 6989 }
8c1d1bb8
AM
6990 }
6991
695344c0 6992 /* xgettext:c-format */
cf97bcb0
AM
6993 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6994 sec->owner, sec);
8c1d1bb8
AM
6995 bfd_set_error (bfd_error_bad_value);
6996 return FALSE;
6997}
6998
754021d0
AM
6999/* Remove unused Official Procedure Descriptor entries. Currently we
7000 only remove those associated with functions in discarded link-once
7001 sections, or weakly defined functions that have been overridden. It
7002 would be possible to remove many more entries for statically linked
7003 applications. */
7004
b34976b6 7005bfd_boolean
e7d1c40c 7006ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7007{
7008 bfd *ibfd;
754021d0 7009 bfd_boolean some_edited = FALSE;
3f764659 7010 asection *need_pad = NULL;
e7d1c40c
AM
7011 struct ppc_link_hash_table *htab;
7012
7013 htab = ppc_hash_table (info);
7014 if (htab == NULL)
7015 return FALSE;
1e2f5b6e 7016
c72f2fb2 7017 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7018 {
7019 asection *sec;
7020 Elf_Internal_Rela *relstart, *rel, *relend;
7021 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7022 Elf_Internal_Sym *local_syms;
74f0fb50 7023 struct _opd_sec_data *opd;
51aecdc5 7024 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7025 bfd_size_type cnt_16b = 0;
1e2f5b6e 7026
854b41e7
AM
7027 if (!is_ppc64_elf (ibfd))
7028 continue;
7029
1e2f5b6e 7030 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7031 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7032 continue;
7033
dbaa2011 7034 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7035 continue;
7036
1e2f5b6e
AM
7037 if (sec->output_section == bfd_abs_section_ptr)
7038 continue;
7039
7040 /* Look through the section relocs. */
7041 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7042 continue;
7043
6cdc0ccc 7044 local_syms = NULL;
0ffa91dd 7045 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7046
7047 /* Read the relocations. */
4ce794b7 7048 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7049 info->keep_memory);
1e2f5b6e 7050 if (relstart == NULL)
b34976b6 7051 return FALSE;
1e2f5b6e
AM
7052
7053 /* First run through the relocs to check they are sane, and to
7054 determine whether we need to edit this opd section. */
b34976b6 7055 need_edit = FALSE;
51aecdc5 7056 broken = FALSE;
3f764659 7057 need_pad = sec;
1e2f5b6e 7058 relend = relstart + sec->reloc_count;
50bc7936 7059 for (rel = relstart; rel < relend; )
1e2f5b6e 7060 {
04c9666a 7061 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7062 unsigned long r_symndx;
7063 asection *sym_sec;
7064 struct elf_link_hash_entry *h;
7065 Elf_Internal_Sym *sym;
51aecdc5 7066 bfd_vma offset;
1e2f5b6e 7067
51aecdc5 7068 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7069 only interested in the reloc pointing to a function entry
7070 point. */
51aecdc5
AM
7071 offset = rel->r_offset;
7072 if (rel + 1 == relend
7073 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7074 {
7075 /* If someone messes with .opd alignment then after a
7076 "ld -r" we might have padding in the middle of .opd.
7077 Also, there's nothing to prevent someone putting
7078 something silly in .opd with the assembler. No .opd
b34976b6 7079 optimization for them! */
3f764659 7080 broken_opd:
4eca0228 7081 _bfd_error_handler
871b3ab2 7082 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7083 broken = TRUE;
1e2f5b6e
AM
7084 break;
7085 }
7086
50bc7936
AM
7087 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7088 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7089 {
4eca0228 7090 _bfd_error_handler
695344c0 7091 /* xgettext:c-format */
871b3ab2 7092 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7093 ibfd, r_type);
51aecdc5 7094 broken = TRUE;
50bc7936
AM
7095 break;
7096 }
7097
1e2f5b6e 7098 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7099 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7100 r_symndx, ibfd))
50bc7936 7101 goto error_ret;
1e2f5b6e
AM
7102
7103 if (sym_sec == NULL || sym_sec->owner == NULL)
7104 {
411e1bfb
AM
7105 const char *sym_name;
7106 if (h != NULL)
7107 sym_name = h->root.root.string;
7108 else
26c61ae5
L
7109 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7110 sym_sec);
411e1bfb 7111
4eca0228 7112 _bfd_error_handler
695344c0 7113 /* xgettext:c-format */
871b3ab2 7114 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7115 ibfd, sym_name);
51aecdc5 7116 broken = TRUE;
1e2f5b6e
AM
7117 break;
7118 }
7119
51020317
AM
7120 /* opd entries are always for functions defined in the
7121 current input bfd. If the symbol isn't defined in the
7122 input bfd, then we won't be using the function in this
7123 bfd; It must be defined in a linkonce section in another
7124 bfd, or is weak. It's also possible that we are
7125 discarding the function due to a linker script /DISCARD/,
7126 which we test for via the output_section. */
7127 if (sym_sec->owner != ibfd
7128 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7129 need_edit = TRUE;
1e2f5b6e 7130
50bc7936 7131 rel += 2;
51aecdc5
AM
7132 if (rel + 1 == relend
7133 || (rel + 2 < relend
7134 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7135 ++rel;
7136
7137 if (rel == relend)
3f764659
JJ
7138 {
7139 if (sec->size == offset + 24)
7140 {
7141 need_pad = NULL;
7142 break;
7143 }
51aecdc5 7144 if (sec->size == offset + 16)
3f764659
JJ
7145 {
7146 cnt_16b++;
7147 break;
7148 }
7149 goto broken_opd;
7150 }
3f764659
JJ
7151 else if (rel + 1 < relend
7152 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7153 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7154 {
51aecdc5
AM
7155 if (rel[0].r_offset == offset + 16)
7156 cnt_16b++;
7157 else if (rel[0].r_offset != offset + 24)
7158 goto broken_opd;
3f764659
JJ
7159 }
7160 else
7161 goto broken_opd;
1e2f5b6e
AM
7162 }
7163
e7d1c40c 7164 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7165
51aecdc5 7166 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7167 {
7168 Elf_Internal_Rela *write_rel;
d4730f92 7169 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7170 bfd_byte *rptr, *wptr;
983bddc8 7171 bfd_byte *new_contents;
74f0fb50
AM
7172 bfd_size_type amt;
7173
983bddc8 7174 new_contents = NULL;
51aecdc5 7175 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7176 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7177 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7178 if (opd->adjust == NULL)
7179 return FALSE;
1e2f5b6e
AM
7180
7181 /* This seems a waste of time as input .opd sections are all
7182 zeros as generated by gcc, but I suppose there's no reason
7183 this will always be so. We might start putting something in
7184 the third word of .opd entries. */
7185 if ((sec->flags & SEC_IN_MEMORY) == 0)
7186 {
eea6121a
AM
7187 bfd_byte *loc;
7188 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7189 {
eea6121a
AM
7190 if (loc != NULL)
7191 free (loc);
50bc7936 7192 error_ret:
6cdc0ccc
AM
7193 if (local_syms != NULL
7194 && symtab_hdr->contents != (unsigned char *) local_syms)
7195 free (local_syms);
6cdc0ccc
AM
7196 if (elf_section_data (sec)->relocs != relstart)
7197 free (relstart);
b34976b6 7198 return FALSE;
6cdc0ccc 7199 }
1e2f5b6e
AM
7200 sec->contents = loc;
7201 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7202 }
7203
7204 elf_section_data (sec)->relocs = relstart;
7205
3f764659 7206 new_contents = sec->contents;
3f764659
JJ
7207 if (add_aux_fields)
7208 {
7209 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7210 if (new_contents == NULL)
7211 return FALSE;
51aecdc5 7212 need_pad = NULL;
3f764659 7213 }
b4f4e59f
AM
7214 wptr = new_contents;
7215 rptr = sec->contents;
1e2f5b6e 7216 write_rel = relstart;
51aecdc5 7217 for (rel = relstart; rel < relend; )
1e2f5b6e 7218 {
50bc7936
AM
7219 unsigned long r_symndx;
7220 asection *sym_sec;
7221 struct elf_link_hash_entry *h;
51aecdc5 7222 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7223 Elf_Internal_Sym *sym;
51aecdc5
AM
7224 long opd_ent_size;
7225 Elf_Internal_Rela *next_rel;
7226 bfd_boolean skip;
50bc7936
AM
7227
7228 r_symndx = ELF64_R_SYM (rel->r_info);
7229 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7230 r_symndx, ibfd))
50bc7936
AM
7231 goto error_ret;
7232
51aecdc5
AM
7233 next_rel = rel + 2;
7234 if (next_rel + 1 == relend
7235 || (next_rel + 2 < relend
7236 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7237 ++next_rel;
7238
7239 /* See if the .opd entry is full 24 byte or
7240 16 byte (with fd_aux entry overlapped with next
7241 fd_func). */
7242 opd_ent_size = 24;
7243 if (next_rel == relend)
1e2f5b6e 7244 {
51aecdc5 7245 if (sec->size == rel->r_offset + 16)
3f764659 7246 opd_ent_size = 16;
51aecdc5
AM
7247 }
7248 else if (next_rel->r_offset == rel->r_offset + 16)
7249 opd_ent_size = 16;
3f764659 7250
51aecdc5
AM
7251 if (h != NULL
7252 && h->root.root.string[0] == '.')
7253 {
8c5b4e52
AM
7254 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7255 if (fdh != NULL)
7256 {
7257 fdh = ppc_follow_link (fdh);
7258 if (fdh->elf.root.type != bfd_link_hash_defined
7259 && fdh->elf.root.type != bfd_link_hash_defweak)
7260 fdh = NULL;
7261 }
51aecdc5 7262 }
1e2f5b6e 7263
51aecdc5
AM
7264 skip = (sym_sec->owner != ibfd
7265 || sym_sec->output_section == bfd_abs_section_ptr);
7266 if (skip)
7267 {
7268 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7269 {
51aecdc5
AM
7270 /* Arrange for the function descriptor sym
7271 to be dropped. */
7272 fdh->elf.root.u.def.value = 0;
7273 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7274 }
51aecdc5 7275 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7276
0e1862bb 7277 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7278 rel = next_rel;
7279 else
7280 while (1)
7281 {
7282 if (!dec_dynrel_count (rel->r_info, sec, info,
7283 NULL, h, sym))
7284 goto error_ret;
754021d0 7285
51aecdc5
AM
7286 if (++rel == next_rel)
7287 break;
1e2f5b6e 7288
51aecdc5
AM
7289 r_symndx = ELF64_R_SYM (rel->r_info);
7290 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7291 r_symndx, ibfd))
7292 goto error_ret;
7293 }
50bc7936
AM
7294 }
7295 else
1e2f5b6e 7296 {
51aecdc5
AM
7297 /* We'll be keeping this opd entry. */
7298 long adjust;
7299
7300 if (fdh != NULL)
7301 {
7302 /* Redefine the function descriptor symbol to
7303 this location in the opd section. It is
7304 necessary to update the value here rather
7305 than using an array of adjustments as we do
7306 for local symbols, because various places
7307 in the generic ELF code use the value
7308 stored in u.def.value. */
7309 fdh->elf.root.u.def.value = wptr - new_contents;
7310 fdh->adjust_done = 1;
7311 }
7312
7313 /* Local syms are a bit tricky. We could
7314 tweak them as they can be cached, but
7315 we'd need to look through the local syms
7316 for the function descriptor sym which we
7317 don't have at the moment. So keep an
7318 array of adjustments. */
7319 adjust = (wptr - new_contents) - (rptr - sec->contents);
7320 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7321
7322 if (wptr != rptr)
7323 memcpy (wptr, rptr, opd_ent_size);
7324 wptr += opd_ent_size;
7325 if (add_aux_fields && opd_ent_size == 16)
7326 {
7327 memset (wptr, '\0', 8);
7328 wptr += 8;
7329 }
7330
50bc7936 7331 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7332 new opd entries. */
7333 for ( ; rel != next_rel; ++rel)
7334 {
7335 rel->r_offset += adjust;
7336 if (write_rel != rel)
7337 memcpy (write_rel, rel, sizeof (*rel));
7338 ++write_rel;
7339 }
1e2f5b6e 7340 }
51aecdc5
AM
7341
7342 rptr += opd_ent_size;
1e2f5b6e
AM
7343 }
7344
3f764659 7345 sec->size = wptr - new_contents;
1e2f5b6e 7346 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7347 if (add_aux_fields)
7348 {
7349 free (sec->contents);
7350 sec->contents = new_contents;
7351 }
7352
05bf9422 7353 /* Fudge the header size too, as this is used later in
cdcf6e38 7354 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7355 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7356 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7357 some_edited = TRUE;
1e2f5b6e 7358 }
6cdc0ccc 7359 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7360 free (relstart);
6cdc0ccc 7361
411e1bfb
AM
7362 if (local_syms != NULL
7363 && symtab_hdr->contents != (unsigned char *) local_syms)
7364 {
7365 if (!info->keep_memory)
7366 free (local_syms);
7367 else
7368 symtab_hdr->contents = (unsigned char *) local_syms;
7369 }
7370 }
7371
754021d0
AM
7372 if (some_edited)
7373 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7374
3f764659
JJ
7375 /* If we are doing a final link and the last .opd entry is just 16 byte
7376 long, add a 8 byte padding after it. */
0e1862bb 7377 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7378 {
7379 bfd_byte *p;
7380
7381 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7382 {
7383 BFD_ASSERT (need_pad->size > 0);
7384
7385 p = bfd_malloc (need_pad->size + 8);
7386 if (p == NULL)
7387 return FALSE;
699733f6 7388
2cdcc330
AM
7389 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7390 p, 0, need_pad->size))
3f764659
JJ
7391 return FALSE;
7392
7393 need_pad->contents = p;
7394 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7395 }
7396 else
7397 {
7398 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7399 if (p == NULL)
7400 return FALSE;
7401
7402 need_pad->contents = p;
7403 }
7404
7405 memset (need_pad->contents + need_pad->size, 0, 8);
7406 need_pad->size += 8;
7407 }
7408
411e1bfb
AM
7409 return TRUE;
7410}
7411
3e04d765
AM
7412/* Analyze inline PLT call relocations to see whether calls to locally
7413 defined functions can be converted to direct calls. */
7414
7415bfd_boolean
7416ppc64_elf_inline_plt (struct bfd_link_info *info)
7417{
7418 struct ppc_link_hash_table *htab;
7419 bfd *ibfd;
7420 asection *sec;
7421 bfd_vma low_vma, high_vma, limit;
7422
7423 htab = ppc_hash_table (info);
7424 if (htab == NULL)
7425 return FALSE;
7426
7427 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7428 reduced somewhat to cater for possible stubs that might be added
7429 between the call and its destination. */
7430 if (htab->params->group_size < 0)
7431 {
7432 limit = -htab->params->group_size;
7433 if (limit == 1)
7434 limit = 0x1e00000;
7435 }
7436 else
7437 {
7438 limit = htab->params->group_size;
7439 if (limit == 1)
7440 limit = 0x1c00000;
7441 }
7442
7443 low_vma = -1;
7444 high_vma = 0;
7445 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7446 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7447 {
7448 if (low_vma > sec->vma)
7449 low_vma = sec->vma;
7450 if (high_vma < sec->vma + sec->size)
7451 high_vma = sec->vma + sec->size;
7452 }
7453
7454 /* If a "bl" can reach anywhere in local code sections, then we can
7455 convert all inline PLT sequences to direct calls when the symbol
7456 is local. */
7457 if (high_vma - low_vma < limit)
7458 {
7459 htab->can_convert_all_inline_plt = 1;
7460 return TRUE;
7461 }
7462
7463 /* Otherwise, go looking through relocs for cases where a direct
7464 call won't reach. Mark the symbol on any such reloc to disable
7465 the optimization and keep the PLT entry as it seems likely that
7466 this will be better than creating trampolines. Note that this
7467 will disable the optimization for all inline PLT calls to a
7468 particular symbol, not just those that won't reach. The
7469 difficulty in doing a more precise optimization is that the
7470 linker needs to make a decision depending on whether a
7471 particular R_PPC64_PLTCALL insn can be turned into a direct
7472 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7473 the sequence, and there is nothing that ties those relocs
7474 together except their symbol. */
7475
7476 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7477 {
7478 Elf_Internal_Shdr *symtab_hdr;
7479 Elf_Internal_Sym *local_syms;
7480
7481 if (!is_ppc64_elf (ibfd))
7482 continue;
7483
7484 local_syms = NULL;
7485 symtab_hdr = &elf_symtab_hdr (ibfd);
7486
7487 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7488 if (ppc64_elf_section_data (sec)->has_pltcall
7489 && !bfd_is_abs_section (sec->output_section))
7490 {
7491 Elf_Internal_Rela *relstart, *rel, *relend;
7492
7493 /* Read the relocations. */
7494 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7495 info->keep_memory);
7496 if (relstart == NULL)
7497 return FALSE;
7498
7499 relend = relstart + sec->reloc_count;
7500 for (rel = relstart; rel < relend; )
7501 {
7502 enum elf_ppc64_reloc_type r_type;
7503 unsigned long r_symndx;
7504 asection *sym_sec;
7505 struct elf_link_hash_entry *h;
7506 Elf_Internal_Sym *sym;
7507 unsigned char *tls_maskp;
7508
7509 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7510 if (r_type != R_PPC64_PLTCALL
7511 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7512 continue;
7513
7514 r_symndx = ELF64_R_SYM (rel->r_info);
7515 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7516 r_symndx, ibfd))
7517 {
7518 if (elf_section_data (sec)->relocs != relstart)
7519 free (relstart);
7520 if (local_syms != NULL
2cdcc330 7521 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7522 free (local_syms);
7523 return FALSE;
7524 }
7525
7526 if (sym_sec != NULL && sym_sec->output_section != NULL)
7527 {
7528 bfd_vma from, to;
7529 if (h != NULL)
7530 to = h->root.u.def.value;
7531 else
7532 to = sym->st_value;
7533 to += (rel->r_addend
7534 + sym_sec->output_offset
7535 + sym_sec->output_section->vma);
7536 from = (rel->r_offset
7537 + sec->output_offset
7538 + sec->output_section->vma);
5663e321
AM
7539 if (to - from + limit < 2 * limit
7540 && !(r_type == R_PPC64_PLTCALL_NOTOC
7541 && (((h ? h->other : sym->st_other)
7542 & STO_PPC64_LOCAL_MASK)
4a4e7361 7543 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7544 *tls_maskp &= ~PLT_KEEP;
7545 }
7546 }
7547 if (elf_section_data (sec)->relocs != relstart)
7548 free (relstart);
7549 }
7550
7551 if (local_syms != NULL
7552 && symtab_hdr->contents != (unsigned char *) local_syms)
7553 {
7554 if (!info->keep_memory)
7555 free (local_syms);
7556 else
7557 symtab_hdr->contents = (unsigned char *) local_syms;
7558 }
7559 }
7560
7561 return TRUE;
7562}
7563
e1918d23 7564/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7565
e1918d23 7566asection *
e7d1c40c 7567ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7568{
411e1bfb
AM
7569 struct ppc_link_hash_table *htab;
7570
411e1bfb 7571 htab = ppc_hash_table (info);
4dfe6ac6
NC
7572 if (htab == NULL)
7573 return NULL;
7574
ee67d69a
AM
7575 if (abiversion (info->output_bfd) == 1)
7576 htab->opd_abi = 1;
7577
e7d1c40c 7578 if (htab->params->no_multi_toc)
33c0ec9d
AM
7579 htab->do_multi_toc = 0;
7580 else if (!htab->do_multi_toc)
e7d1c40c 7581 htab->params->no_multi_toc = 1;
33c0ec9d 7582
8b5f1ed8
AM
7583 /* Default to --no-plt-localentry, as this option can cause problems
7584 with symbol interposition. For example, glibc libpthread.so and
7585 libc.so duplicate many pthread symbols, with a fallback
7586 implementation in libc.so. In some cases the fallback does more
7587 work than the pthread implementation. __pthread_condattr_destroy
7588 is one such symbol: the libpthread.so implementation is
7589 localentry:0 while the libc.so implementation is localentry:8.
7590 An app that "cleverly" uses dlopen to only load necessary
7591 libraries at runtime may omit loading libpthread.so when not
7592 running multi-threaded, which then results in the libc.so
7593 fallback symbols being used and ld.so complaining. Now there
7594 are workarounds in ld (see non_zero_localentry) to detect the
7595 pthread situation, but that may not be the only case where
7596 --plt-localentry can cause trouble. */
f378ab09 7597 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7598 htab->params->plt_localentry0 = 0;
d44c746a
AM
7599 if (htab->params->plt_localentry0
7600 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7601 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7602 _bfd_error_handler
7603 (_("warning: --plt-localentry is especially dangerous without "
7604 "ld.so support to detect ABI violations"));
f378ab09 7605
3a71aa26
AM
7606 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7607 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7608 FALSE, FALSE, TRUE));
a7f2871e
AM
7609 /* Move dynamic linking info to the function descriptor sym. */
7610 if (htab->tls_get_addr != NULL)
7611 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7612 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7613 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7614 FALSE, FALSE, TRUE));
7c9cf415 7615 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7616 {
7617 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7618
7619 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7620 FALSE, FALSE, TRUE);
7621 if (opt != NULL)
7622 func_desc_adjust (opt, info);
7623 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7624 FALSE, FALSE, TRUE);
7625 if (opt_fd != NULL
7626 && (opt_fd->root.type == bfd_link_hash_defined
7627 || opt_fd->root.type == bfd_link_hash_defweak))
7628 {
7629 /* If glibc supports an optimized __tls_get_addr call stub,
7630 signalled by the presence of __tls_get_addr_opt, and we'll
7631 be calling __tls_get_addr via a plt call stub, then
7632 make __tls_get_addr point to __tls_get_addr_opt. */
7633 tga_fd = &htab->tls_get_addr_fd->elf;
7634 if (htab->elf.dynamic_sections_created
7635 && tga_fd != NULL
7636 && (tga_fd->type == STT_FUNC
7637 || tga_fd->needs_plt)
7638 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7639 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7640 {
7641 struct plt_entry *ent;
7642
7643 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7644 if (ent->plt.refcount > 0)
7645 break;
7646 if (ent != NULL)
7647 {
7648 tga_fd->root.type = bfd_link_hash_indirect;
7649 tga_fd->root.u.i.link = &opt_fd->root;
7650 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7651 opt_fd->mark = 1;
a7f2871e
AM
7652 if (opt_fd->dynindx != -1)
7653 {
7654 /* Use __tls_get_addr_opt in dynamic relocations. */
7655 opt_fd->dynindx = -1;
7656 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7657 opt_fd->dynstr_index);
7658 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7659 return NULL;
a7f2871e 7660 }
2cdcc330
AM
7661 htab->tls_get_addr_fd
7662 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7663 tga = &htab->tls_get_addr->elf;
7664 if (opt != NULL && tga != NULL)
7665 {
7666 tga->root.type = bfd_link_hash_indirect;
7667 tga->root.u.i.link = &opt->root;
7668 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7669 opt->mark = 1;
a7f2871e
AM
7670 _bfd_elf_link_hash_hide_symbol (info, opt,
7671 tga->forced_local);
7672 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7673 }
7674 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7675 htab->tls_get_addr_fd->is_func_descriptor = 1;
7676 if (htab->tls_get_addr != NULL)
7677 {
7678 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7679 htab->tls_get_addr->is_func = 1;
7680 }
7681 }
7682 }
7683 }
7c9cf415
AM
7684 else if (htab->params->tls_get_addr_opt < 0)
7685 htab->params->tls_get_addr_opt = 0;
a7f2871e 7686 }
33c0ec9d 7687 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7688}
8387904d 7689
3a71aa26
AM
7690/* Return TRUE iff REL is a branch reloc with a global symbol matching
7691 HASH1 or HASH2. */
8387904d 7692
3a71aa26
AM
7693static bfd_boolean
7694branch_reloc_hash_match (const bfd *ibfd,
7695 const Elf_Internal_Rela *rel,
7696 const struct ppc_link_hash_entry *hash1,
7697 const struct ppc_link_hash_entry *hash2)
7698{
7699 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7700 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7701 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7702
e054468f 7703 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7704 {
3a71aa26
AM
7705 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7706 struct elf_link_hash_entry *h;
8387904d 7707
3a71aa26 7708 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7709 h = elf_follow_link (h);
3a71aa26
AM
7710 if (h == &hash1->elf || h == &hash2->elf)
7711 return TRUE;
a48ebf4d 7712 }
3a71aa26 7713 return FALSE;
951fd09b 7714}
411e1bfb 7715
951fd09b
AM
7716/* Run through all the TLS relocs looking for optimization
7717 opportunities. The linker has been hacked (see ppc64elf.em) to do
7718 a preliminary section layout so that we know the TLS segment
7719 offsets. We can't optimize earlier because some optimizations need
7720 to know the tp offset, and we need to optimize before allocating
7721 dynamic relocations. */
7722
7723bfd_boolean
33c0ec9d 7724ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7725{
7726 bfd *ibfd;
7727 asection *sec;
7728 struct ppc_link_hash_table *htab;
663a1470 7729 unsigned char *toc_ref;
102890f0 7730 int pass;
951fd09b 7731
3cbc1e5e 7732 if (!bfd_link_executable (info))
411e1bfb
AM
7733 return TRUE;
7734
951fd09b 7735 htab = ppc_hash_table (info);
4dfe6ac6
NC
7736 if (htab == NULL)
7737 return FALSE;
7738
663a1470
AM
7739 /* Make two passes over the relocs. On the first pass, mark toc
7740 entries involved with tls relocs, and check that tls relocs
7741 involved in setting up a tls_get_addr call are indeed followed by
7742 such a call. If they are not, we can't do any tls optimization.
7743 On the second pass twiddle tls_mask flags to notify
7744 relocate_section that optimization can be done, and adjust got
7745 and plt refcounts. */
7746 toc_ref = NULL;
7747 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7748 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7749 {
7750 Elf_Internal_Sym *locsyms = NULL;
7751 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7752
102890f0
AM
7753 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7754 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7755 {
7756 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7757 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7758
102890f0
AM
7759 /* Read the relocations. */
7760 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7761 info->keep_memory);
7762 if (relstart == NULL)
2915c55b
JK
7763 {
7764 free (toc_ref);
7765 return FALSE;
7766 }
411e1bfb 7767
102890f0
AM
7768 relend = relstart + sec->reloc_count;
7769 for (rel = relstart; rel < relend; rel++)
7770 {
7771 enum elf_ppc64_reloc_type r_type;
7772 unsigned long r_symndx;
7773 struct elf_link_hash_entry *h;
7774 Elf_Internal_Sym *sym;
7775 asection *sym_sec;
f961d9dd 7776 unsigned char *tls_mask;
46e9995a 7777 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7778 bfd_vma value;
7779 bfd_boolean ok_tprel, is_local;
7780 long toc_ref_index = 0;
7781 int expecting_tls_get_addr = 0;
663a1470 7782 bfd_boolean ret = FALSE;
411e1bfb 7783
102890f0
AM
7784 r_symndx = ELF64_R_SYM (rel->r_info);
7785 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7786 r_symndx, ibfd))
7787 {
7788 err_free_rel:
7789 if (elf_section_data (sec)->relocs != relstart)
7790 free (relstart);
7791 if (toc_ref != NULL)
7792 free (toc_ref);
7793 if (locsyms != NULL
0ffa91dd 7794 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7795 != (unsigned char *) locsyms))
7796 free (locsyms);
663a1470 7797 return ret;
102890f0 7798 }
411e1bfb 7799
102890f0
AM
7800 if (h != NULL)
7801 {
766bc656
AM
7802 if (h->root.type == bfd_link_hash_defined
7803 || h->root.type == bfd_link_hash_defweak)
7804 value = h->root.u.def.value;
7805 else if (h->root.type == bfd_link_hash_undefweak)
7806 value = 0;
7807 else
663a1470
AM
7808 {
7809 found_tls_get_addr_arg = 0;
7810 continue;
7811 }
102890f0
AM
7812 }
7813 else
7814 /* Symbols referenced by TLS relocs must be of type
7815 STT_TLS. So no need for .opd local sym adjust. */
7816 value = sym->st_value;
7817
7818 ok_tprel = FALSE;
f749f26e
AM
7819 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7820 if (is_local)
102890f0 7821 {
766bc656
AM
7822 if (h != NULL
7823 && h->root.type == bfd_link_hash_undefweak)
7824 ok_tprel = TRUE;
c27b8c2a
AM
7825 else if (sym_sec != NULL
7826 && sym_sec->output_section != NULL)
766bc656
AM
7827 {
7828 value += sym_sec->output_offset;
7829 value += sym_sec->output_section->vma;
0b147428 7830 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
7831 /* Note that even though the prefix insns
7832 allow a 1<<33 offset we use the same test
7833 as for addis;addi. There may be a mix of
7834 pcrel and non-pcrel code and the decision
7835 to optimise is per symbol, not per TLS
7836 sequence. */
0b147428 7837 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 7838 }
102890f0 7839 }
951fd09b 7840
102890f0 7841 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7842 /* If this section has old-style __tls_get_addr calls
7843 without marker relocs, then check that each
7844 __tls_get_addr call reloc is preceded by a reloc
7845 that conceivably belongs to the __tls_get_addr arg
7846 setup insn. If we don't find matching arg setup
7847 relocs, don't do any tls optimization. */
7848 if (pass == 0
9737e8af 7849 && sec->nomark_tls_get_addr
663a1470
AM
7850 && h != NULL
7851 && (h == &htab->tls_get_addr->elf
7852 || h == &htab->tls_get_addr_fd->elf)
7853 && !found_tls_get_addr_arg
7854 && is_branch_reloc (r_type))
7855 {
25f53a85 7856 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7857 "TLS optimization disabled\n"),
7858 ibfd, sec, rel->r_offset);
7859 ret = TRUE;
7860 goto err_free_rel;
7861 }
7862
7863 found_tls_get_addr_arg = 0;
102890f0
AM
7864 switch (r_type)
7865 {
7866 case R_PPC64_GOT_TLSLD16:
7867 case R_PPC64_GOT_TLSLD16_LO:
c213164a 7868 case R_PPC64_GOT_TLSLD34:
102890f0 7869 expecting_tls_get_addr = 1;
663a1470 7870 found_tls_get_addr_arg = 1;
1a0670f3 7871 /* Fall through. */
102890f0
AM
7872
7873 case R_PPC64_GOT_TLSLD16_HI:
7874 case R_PPC64_GOT_TLSLD16_HA:
7875 /* These relocs should never be against a symbol
7876 defined in a shared lib. Leave them alone if
7877 that turns out to be the case. */
7878 if (!is_local)
7879 continue;
411e1bfb 7880
102890f0 7881 /* LD -> LE */
411e1bfb 7882 tls_set = 0;
102890f0
AM
7883 tls_clear = TLS_LD;
7884 tls_type = TLS_TLS | TLS_LD;
7885 break;
411e1bfb 7886
102890f0
AM
7887 case R_PPC64_GOT_TLSGD16:
7888 case R_PPC64_GOT_TLSGD16_LO:
c213164a 7889 case R_PPC64_GOT_TLSGD34:
102890f0 7890 expecting_tls_get_addr = 1;
663a1470 7891 found_tls_get_addr_arg = 1;
1a0670f3 7892 /* Fall through. */
102890f0
AM
7893
7894 case R_PPC64_GOT_TLSGD16_HI:
7895 case R_PPC64_GOT_TLSGD16_HA:
7896 if (ok_tprel)
7897 /* GD -> LE */
411e1bfb 7898 tls_set = 0;
102890f0
AM
7899 else
7900 /* GD -> IE */
b00a0a86 7901 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
7902 tls_clear = TLS_GD;
7903 tls_type = TLS_TLS | TLS_GD;
7904 break;
7905
c213164a 7906 case R_PPC64_GOT_TPREL34:
102890f0
AM
7907 case R_PPC64_GOT_TPREL16_DS:
7908 case R_PPC64_GOT_TPREL16_LO_DS:
7909 case R_PPC64_GOT_TPREL16_HI:
7910 case R_PPC64_GOT_TPREL16_HA:
7911 if (ok_tprel)
7912 {
7913 /* IE -> LE */
7914 tls_set = 0;
7915 tls_clear = TLS_TPREL;
7916 tls_type = TLS_TLS | TLS_TPREL;
7917 break;
7918 }
411e1bfb
AM
7919 continue;
7920
727fc41e 7921 case R_PPC64_TLSLD:
7d04a20a
AM
7922 if (!is_local)
7923 continue;
7924 /* Fall through. */
7925 case R_PPC64_TLSGD:
23cedd1d
AM
7926 if (rel + 1 < relend
7927 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7928 {
7929 if (pass != 0
2cdcc330 7930 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
7931 != R_PPC64_PLTSEQ)
7932 && (ELF64_R_TYPE (rel[1].r_info)
7933 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
7934 {
7935 r_symndx = ELF64_R_SYM (rel[1].r_info);
7936 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7937 r_symndx, ibfd))
23cedd1d
AM
7938 goto err_free_rel;
7939 if (h != NULL)
7940 {
7941 struct plt_entry *ent = NULL;
7942
7943 for (ent = h->plt.plist;
7944 ent != NULL;
7945 ent = ent->next)
7946 if (ent->addend == rel[1].r_addend)
7947 break;
7948
7949 if (ent != NULL
7950 && ent->plt.refcount > 0)
7951 ent->plt.refcount -= 1;
7952 }
7953 }
7954 continue;
7955 }
663a1470 7956 found_tls_get_addr_arg = 1;
1a0670f3 7957 /* Fall through. */
663a1470
AM
7958
7959 case R_PPC64_TLS:
7960 case R_PPC64_TOC16:
7961 case R_PPC64_TOC16_LO:
102890f0
AM
7962 if (sym_sec == NULL || sym_sec != toc)
7963 continue;
7964
7965 /* Mark this toc entry as referenced by a TLS
7966 code sequence. We can do that now in the
7967 case of R_PPC64_TLS, and after checking for
7968 tls_get_addr for the TOC16 relocs. */
7969 if (toc_ref == NULL)
2cdcc330
AM
7970 toc_ref
7971 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7972 if (toc_ref == NULL)
7973 goto err_free_rel;
7974
102890f0
AM
7975 if (h != NULL)
7976 value = h->root.u.def.value;
7977 else
7978 value = sym->st_value;
7979 value += rel->r_addend;
73242275
AM
7980 if (value % 8 != 0)
7981 continue;
7982 BFD_ASSERT (value < toc->size
7983 && toc->output_offset % 8 == 0);
663a1470 7984 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7985 if (r_type == R_PPC64_TLS
7986 || r_type == R_PPC64_TLSGD
7987 || r_type == R_PPC64_TLSLD)
102890f0
AM
7988 {
7989 toc_ref[toc_ref_index] = 1;
7990 continue;
7991 }
7992
7993 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7994 continue;
7995
7996 tls_set = 0;
7997 tls_clear = 0;
7998 expecting_tls_get_addr = 2;
7999 break;
8000
8001 case R_PPC64_TPREL64:
8002 if (pass == 0
8003 || sec != toc
8004 || toc_ref == NULL
663a1470 8005 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8006 continue;
8007 if (ok_tprel)
8008 {
8009 /* IE -> LE */
8010 tls_set = TLS_EXPLICIT;
8011 tls_clear = TLS_TPREL;
8012 break;
8013 }
8014 continue;
8015
8016 case R_PPC64_DTPMOD64:
8017 if (pass == 0
8018 || sec != toc
8019 || toc_ref == NULL
663a1470 8020 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8021 continue;
8022 if (rel + 1 < relend
8023 && (rel[1].r_info
8024 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8025 && rel[1].r_offset == rel->r_offset + 8)
8026 {
8027 if (ok_tprel)
8028 /* GD -> LE */
8029 tls_set = TLS_EXPLICIT | TLS_GD;
8030 else
8031 /* GD -> IE */
b00a0a86 8032 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8033 tls_clear = TLS_GD;
8034 }
8035 else
8036 {
8037 if (!is_local)
8038 continue;
8039
8040 /* LD -> LE */
8041 tls_set = TLS_EXPLICIT;
8042 tls_clear = TLS_LD;
8043 }
8044 break;
8045
8046 default:
8047 continue;
8048 }
8049
8050 if (pass == 0)
8051 {
727fc41e 8052 if (!expecting_tls_get_addr
9737e8af 8053 || !sec->nomark_tls_get_addr)
102890f0
AM
8054 continue;
8055
3a71aa26
AM
8056 if (rel + 1 < relend
8057 && branch_reloc_hash_match (ibfd, rel + 1,
8058 htab->tls_get_addr,
8059 htab->tls_get_addr_fd))
102890f0 8060 {
3a71aa26 8061 if (expecting_tls_get_addr == 2)
102890f0 8062 {
3a71aa26 8063 /* Check for toc tls entries. */
f961d9dd 8064 unsigned char *toc_tls;
3a71aa26
AM
8065 int retval;
8066
8067 retval = get_tls_mask (&toc_tls, NULL, NULL,
8068 &locsyms,
8069 rel, ibfd);
8070 if (retval == 0)
8071 goto err_free_rel;
663a1470
AM
8072 if (toc_tls != NULL)
8073 {
37da22e5
AM
8074 if ((*toc_tls & TLS_TLS) != 0
8075 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8076 found_tls_get_addr_arg = 1;
8077 if (retval > 1)
8078 toc_ref[toc_ref_index] = 1;
8079 }
102890f0 8080 }
3a71aa26 8081 continue;
102890f0
AM
8082 }
8083
102890f0
AM
8084 /* Uh oh, we didn't find the expected call. We
8085 could just mark this symbol to exclude it
8086 from tls optimization but it's safer to skip
663a1470 8087 the entire optimization. */
695344c0 8088 /* xgettext:c-format */
25f53a85 8089 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8090 "TLS optimization disabled\n"),
8091 ibfd, sec, rel->r_offset);
8092 ret = TRUE;
8093 goto err_free_rel;
102890f0
AM
8094 }
8095
37da22e5
AM
8096 /* If we don't have old-style __tls_get_addr calls
8097 without TLSGD/TLSLD marker relocs, and we haven't
8098 found a new-style __tls_get_addr call with a
8099 marker for this symbol, then we either have a
8100 broken object file or an -mlongcall style
8101 indirect call to __tls_get_addr without a marker.
8102 Disable optimization in this case. */
8103 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8104 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8105 && !sec->nomark_tls_get_addr
37da22e5
AM
8106 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8107 != (TLS_TLS | TLS_MARK)))
8108 continue;
8109
7d04a20a 8110 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8111 {
23cedd1d
AM
8112 struct plt_entry *ent = NULL;
8113
8114 if (htab->tls_get_addr != NULL)
8115 for (ent = htab->tls_get_addr->elf.plt.plist;
8116 ent != NULL;
8117 ent = ent->next)
8118 if (ent->addend == 0)
102890f0 8119 break;
411e1bfb 8120
23cedd1d
AM
8121 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8122 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8123 ent != NULL;
8124 ent = ent->next)
8125 if (ent->addend == 0)
102890f0 8126 break;
23cedd1d
AM
8127
8128 if (ent != NULL
8129 && ent->plt.refcount > 0)
8130 ent->plt.refcount -= 1;
102890f0 8131 }
411e1bfb 8132
102890f0 8133 if (tls_clear == 0)
30038c59
AM
8134 continue;
8135
102890f0
AM
8136 if ((tls_set & TLS_EXPLICIT) == 0)
8137 {
8138 struct got_entry *ent;
411e1bfb 8139
102890f0
AM
8140 /* Adjust got entry for this reloc. */
8141 if (h != NULL)
8142 ent = h->got.glist;
8143 else
8144 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8145
102890f0
AM
8146 for (; ent != NULL; ent = ent->next)
8147 if (ent->addend == rel->r_addend
8148 && ent->owner == ibfd
8149 && ent->tls_type == tls_type)
8150 break;
8151 if (ent == NULL)
8152 abort ();
411e1bfb 8153
102890f0
AM
8154 if (tls_set == 0)
8155 {
8156 /* We managed to get rid of a got entry. */
8157 if (ent->got.refcount > 0)
8158 ent->got.refcount -= 1;
8159 }
8160 }
8161 else
8162 {
8163 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8164 we'll lose one or two dyn relocs. */
8165 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8166 NULL, h, sym))
102890f0 8167 return FALSE;
411e1bfb 8168
102890f0
AM
8169 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8170 {
8171 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8172 NULL, h, sym))
102890f0
AM
8173 return FALSE;
8174 }
8175 }
411e1bfb 8176
46e9995a 8177 *tls_mask |= tls_set & 0xff;
102890f0
AM
8178 *tls_mask &= ~tls_clear;
8179 }
8c1d1bb8 8180
102890f0
AM
8181 if (elf_section_data (sec)->relocs != relstart)
8182 free (relstart);
8183 }
411e1bfb 8184
663a1470
AM
8185 if (locsyms != NULL
8186 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8187 {
8188 if (!info->keep_memory)
8189 free (locsyms);
8190 else
8191 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8192 }
8193 }
411e1bfb 8194
663a1470
AM
8195 if (toc_ref != NULL)
8196 free (toc_ref);
9a23f96e 8197 htab->do_tls_opt = 1;
b34976b6 8198 return TRUE;
1e2f5b6e 8199}
b34976b6 8200
c5614fa4
AM
8201/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8202 the values of any global symbols in a toc section that has been
8203 edited. Globals in toc sections should be a rarity, so this function
8204 sets a flag if any are found in toc sections other than the one just
de194d85 8205 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8206
8207struct adjust_toc_info
8208{
8209 asection *toc;
8210 unsigned long *skip;
8211 bfd_boolean global_toc_syms;
8212};
8213
ba761f19
AM
8214enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8215
c5614fa4
AM
8216static bfd_boolean
8217adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8218{
8219 struct ppc_link_hash_entry *eh;
8220 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8221 unsigned long i;
c5614fa4 8222
c5614fa4
AM
8223 if (h->root.type != bfd_link_hash_defined
8224 && h->root.type != bfd_link_hash_defweak)
8225 return TRUE;
8226
8227 eh = (struct ppc_link_hash_entry *) h;
8228 if (eh->adjust_done)
8229 return TRUE;
8230
8231 if (eh->elf.root.u.def.section == toc_inf->toc)
8232 {
854b41e7
AM
8233 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8234 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8235 else
854b41e7
AM
8236 i = eh->elf.root.u.def.value >> 3;
8237
ba761f19 8238 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8239 {
4eca0228 8240 _bfd_error_handler
854b41e7
AM
8241 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8242 do
8243 ++i;
ba761f19 8244 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8245 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8246 }
854b41e7
AM
8247
8248 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8249 eh->adjust_done = 1;
8250 }
8251 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8252 toc_inf->global_toc_syms = TRUE;
8253
8254 return TRUE;
8255}
8256
39eeab25
AM
8257/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8258 on a _LO variety toc/got reloc. */
560c8763
AM
8259
8260static bfd_boolean
39eeab25 8261ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8262{
2365f8d7
AM
8263 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8264 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8265 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8266 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8267 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8268 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8269 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8270 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8271 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8272 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8273 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8274 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8275 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8276 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8277 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8278 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8279 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8280 /* Exclude lfqu by testing reloc. If relocs are ever
8281 defined for the reduced D field in psq_lu then those
8282 will need testing too. */
8283 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8284 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8285 && (insn & 1) == 0)
2365f8d7
AM
8286 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8287 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8288 /* Exclude stfqu. psq_stu as above for psq_lu. */
8289 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8290 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8291 && (insn & 1) == 0));
560c8763
AM
8292}
8293
4a421c53
AM
8294/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8295 pld ra,symbol@got@pcrel
dd9b12c2 8296 load/store rt,off(ra)
4a421c53 8297 or
d4b87b1e 8298 pla ra,symbol@pcrel
dd9b12c2 8299 load/store rt,off(ra)
4a421c53 8300 may be translated to
dd9b12c2 8301 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8302 nop.
8303 This function returns true if the optimization is possible, placing
dd9b12c2 8304 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8305
8306 On entry to this function, the linker has already determined that
d4b87b1e 8307 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8308 while *PINSN2 is the second instruction. */
8309
8310static bfd_boolean
dd9b12c2 8311xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8312{
77486630
AM
8313 uint64_t insn1 = *pinsn1;
8314 uint64_t insn2 = *pinsn2;
dd9b12c2 8315 bfd_signed_vma off;
4a421c53 8316
77486630
AM
8317 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8318 {
8319 /* Check that regs match. */
8320 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8321 return FALSE;
8322
8323 /* P8LS or PMLS form, non-pcrel. */
8324 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8325 return FALSE;
8326
8327 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8328 *pinsn2 = PNOP;
8329 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8330 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8331 return TRUE;
8332 }
8333
8334 insn2 >>= 32;
8335
4a421c53 8336 /* Check that regs match. */
77486630 8337 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8338 return FALSE;
8339
8340 switch ((insn2 >> 26) & 63)
8341 {
8342 default:
8343 return FALSE;
8344
8345 case 32: /* lwz */
8346 case 34: /* lbz */
8347 case 36: /* stw */
8348 case 38: /* stb */
8349 case 40: /* lhz */
8350 case 42: /* lha */
8351 case 44: /* sth */
8352 case 48: /* lfs */
8353 case 50: /* lfd */
8354 case 52: /* stfs */
8355 case 54: /* stfd */
8356 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8357 on the insn. */
77486630 8358 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8359 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8360 off = insn2 & 0xffff;
4a421c53
AM
8361 break;
8362
8363 case 58: /* lwa, ld */
dd9b12c2 8364 if ((insn2 & 1) != 0)
4a421c53 8365 return FALSE;
77486630 8366 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8367 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8368 | (insn2 & (31ULL << 21)));
dd9b12c2 8369 off = insn2 & 0xfffc;
4a421c53
AM
8370 break;
8371
8372 case 57: /* lxsd, lxssp */
dd9b12c2 8373 if ((insn2 & 3) < 2)
4a421c53 8374 return FALSE;
77486630 8375 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8376 | ((40ULL | (insn2 & 3)) << 26)
8377 | (insn2 & (31ULL << 21)));
dd9b12c2 8378 off = insn2 & 0xfffc;
4a421c53
AM
8379 break;
8380
8381 case 61: /* stxsd, stxssp, lxv, stxv */
8382 if ((insn2 & 3) == 0)
8383 return FALSE;
8384 else if ((insn2 & 3) >= 2)
8385 {
77486630 8386 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8387 | ((44ULL | (insn2 & 3)) << 26)
8388 | (insn2 & (31ULL << 21)));
dd9b12c2 8389 off = insn2 & 0xfffc;
4a421c53
AM
8390 }
8391 else
8392 {
77486630 8393 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8394 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8395 | (insn2 & (31ULL << 21)));
dd9b12c2 8396 off = insn2 & 0xfff0;
4a421c53
AM
8397 }
8398 break;
8399
8400 case 56: /* lq */
77486630 8401 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8402 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8403 off = insn2 & 0xffff;
4a421c53
AM
8404 break;
8405
8406 case 62: /* std, stq */
dd9b12c2 8407 if ((insn2 & 1) != 0)
4a421c53 8408 return FALSE;
77486630 8409 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8410 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8411 | (insn2 & (31ULL << 21)));
dd9b12c2 8412 off = insn2 & 0xfffc;
4a421c53
AM
8413 break;
8414 }
8415
77486630 8416 *pinsn1 = insn1;
4a421c53 8417 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8418 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8419 return TRUE;
8420}
8421
c5614fa4
AM
8422/* Examine all relocs referencing .toc sections in order to remove
8423 unused .toc entries. */
8424
8425bfd_boolean
33c0ec9d 8426ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8427{
8428 bfd *ibfd;
8429 struct adjust_toc_info toc_inf;
67f0cbdb 8430 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8431
67f0cbdb 8432 htab->do_toc_opt = 1;
c5614fa4 8433 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8434 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8435 {
8436 asection *toc, *sec;
8437 Elf_Internal_Shdr *symtab_hdr;
8438 Elf_Internal_Sym *local_syms;
425b145b 8439 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8440 unsigned long *skip, *drop;
8441 unsigned char *used;
8442 unsigned char *keep, last, some_unused;
8443
854b41e7
AM
8444 if (!is_ppc64_elf (ibfd))
8445 continue;
8446
c5614fa4
AM
8447 toc = bfd_get_section_by_name (ibfd, ".toc");
8448 if (toc == NULL
92b7a70f 8449 || toc->size == 0
dbaa2011
AM
8450 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8451 || discarded_section (toc))
c5614fa4
AM
8452 continue;
8453
425b145b 8454 toc_relocs = NULL;
c5614fa4 8455 local_syms = NULL;
0ffa91dd 8456 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8457
8458 /* Look at sections dropped from the final link. */
8459 skip = NULL;
8460 relstart = NULL;
8461 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8462 {
8463 if (sec->reloc_count == 0
dbaa2011 8464 || !discarded_section (sec)
c5614fa4
AM
8465 || get_opd_info (sec)
8466 || (sec->flags & SEC_ALLOC) == 0
8467 || (sec->flags & SEC_DEBUGGING) != 0)
8468 continue;
8469
8470 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8471 if (relstart == NULL)
8472 goto error_ret;
8473
8474 /* Run through the relocs to see which toc entries might be
8475 unused. */
8476 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8477 {
8478 enum elf_ppc64_reloc_type r_type;
8479 unsigned long r_symndx;
8480 asection *sym_sec;
8481 struct elf_link_hash_entry *h;
8482 Elf_Internal_Sym *sym;
8483 bfd_vma val;
8484
8485 r_type = ELF64_R_TYPE (rel->r_info);
8486 switch (r_type)
8487 {
8488 default:
8489 continue;
8490
8491 case R_PPC64_TOC16:
8492 case R_PPC64_TOC16_LO:
8493 case R_PPC64_TOC16_HI:
8494 case R_PPC64_TOC16_HA:
8495 case R_PPC64_TOC16_DS:
8496 case R_PPC64_TOC16_LO_DS:
8497 break;
8498 }
8499
8500 r_symndx = ELF64_R_SYM (rel->r_info);
8501 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8502 r_symndx, ibfd))
8503 goto error_ret;
8504
8505 if (sym_sec != toc)
8506 continue;
8507
8508 if (h != NULL)
8509 val = h->root.u.def.value;
8510 else
8511 val = sym->st_value;
8512 val += rel->r_addend;
8513
8514 if (val >= toc->size)
8515 continue;
8516
8517 /* Anything in the toc ought to be aligned to 8 bytes.
8518 If not, don't mark as unused. */
8519 if (val & 7)
8520 continue;
8521
8522 if (skip == NULL)
8523 {
854b41e7 8524 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8525 if (skip == NULL)
8526 goto error_ret;
8527 }
8528
ba761f19 8529 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8530 }
8531
8532 if (elf_section_data (sec)->relocs != relstart)
8533 free (relstart);
8534 }
8535
ba761f19
AM
8536 /* For largetoc loads of address constants, we can convert
8537 . addis rx,2,addr@got@ha
8538 . ld ry,addr@got@l(rx)
8539 to
8540 . addis rx,2,addr@toc@ha
8541 . addi ry,rx,addr@toc@l
8542 when addr is within 2G of the toc pointer. This then means
8543 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8544
ba761f19
AM
8545 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8546 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8547 && toc->reloc_count != 0)
8548 {
8549 /* Read toc relocs. */
425b145b
AM
8550 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8551 info->keep_memory);
8552 if (toc_relocs == NULL)
ba761f19
AM
8553 goto error_ret;
8554
425b145b 8555 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8556 {
8557 enum elf_ppc64_reloc_type r_type;
8558 unsigned long r_symndx;
8559 asection *sym_sec;
8560 struct elf_link_hash_entry *h;
8561 Elf_Internal_Sym *sym;
8562 bfd_vma val, addr;
8563
8564 r_type = ELF64_R_TYPE (rel->r_info);
8565 if (r_type != R_PPC64_ADDR64)
8566 continue;
8567
8568 r_symndx = ELF64_R_SYM (rel->r_info);
8569 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8570 r_symndx, ibfd))
8571 goto error_ret;
8572
425b145b 8573 if (sym_sec == NULL
c27b8c2a 8574 || sym_sec->output_section == NULL
dbaa2011 8575 || discarded_section (sym_sec))
425b145b
AM
8576 continue;
8577
afe397ea 8578 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8579 continue;
8580
8581 if (h != NULL)
bddc25c9
AM
8582 {
8583 if (h->type == STT_GNU_IFUNC)
8584 continue;
8585 val = h->root.u.def.value;
8586 }
ba761f19 8587 else
bddc25c9
AM
8588 {
8589 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8590 continue;
8591 val = sym->st_value;
8592 }
ba761f19
AM
8593 val += rel->r_addend;
8594 val += sym_sec->output_section->vma + sym_sec->output_offset;
8595
8596 /* We don't yet know the exact toc pointer value, but we
8597 know it will be somewhere in the toc section. Don't
8598 optimize if the difference from any possible toc
8599 pointer is outside [ff..f80008000, 7fff7fff]. */
8600 addr = toc->output_section->vma + TOC_BASE_OFF;
8601 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8602 continue;
8603
8604 addr = toc->output_section->vma + toc->output_section->rawsize;
8605 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8606 continue;
8607
8608 if (skip == NULL)
8609 {
8610 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8611 if (skip == NULL)
8612 goto error_ret;
8613 }
8614
8615 skip[rel->r_offset >> 3]
425b145b 8616 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8617 }
ba761f19
AM
8618 }
8619
c5614fa4
AM
8620 if (skip == NULL)
8621 continue;
8622
8623 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8624 if (used == NULL)
8625 {
8626 error_ret:
8627 if (local_syms != NULL
8628 && symtab_hdr->contents != (unsigned char *) local_syms)
8629 free (local_syms);
8630 if (sec != NULL
8631 && relstart != NULL
8632 && elf_section_data (sec)->relocs != relstart)
8633 free (relstart);
425b145b
AM
8634 if (toc_relocs != NULL
8635 && elf_section_data (toc)->relocs != toc_relocs)
8636 free (toc_relocs);
c5614fa4
AM
8637 if (skip != NULL)
8638 free (skip);
8639 return FALSE;
8640 }
8641
30038c59
AM
8642 /* Now check all kept sections that might reference the toc.
8643 Check the toc itself last. */
8644 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8645 : ibfd->sections);
c5614fa4 8646 sec != NULL;
c5614fa4 8647 sec = (sec == toc ? NULL
c5614fa4 8648 : sec->next == NULL ? toc
30038c59 8649 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8650 : sec->next))
8651 {
8652 int repeat;
8653
8654 if (sec->reloc_count == 0
dbaa2011 8655 || discarded_section (sec)
c5614fa4
AM
8656 || get_opd_info (sec)
8657 || (sec->flags & SEC_ALLOC) == 0
8658 || (sec->flags & SEC_DEBUGGING) != 0)
8659 continue;
8660
854b41e7
AM
8661 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8662 info->keep_memory);
c5614fa4 8663 if (relstart == NULL)
2915c55b
JK
8664 {
8665 free (used);
8666 goto error_ret;
8667 }
c5614fa4
AM
8668
8669 /* Mark toc entries referenced as used. */
c5614fa4 8670 do
d4f1ee75
AM
8671 {
8672 repeat = 0;
8673 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8674 {
8675 enum elf_ppc64_reloc_type r_type;
8676 unsigned long r_symndx;
8677 asection *sym_sec;
8678 struct elf_link_hash_entry *h;
8679 Elf_Internal_Sym *sym;
8680 bfd_vma val;
98528052 8681
d4f1ee75 8682 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8683 switch (r_type)
8684 {
8685 case R_PPC64_TOC16:
8686 case R_PPC64_TOC16_LO:
8687 case R_PPC64_TOC16_HI:
8688 case R_PPC64_TOC16_HA:
8689 case R_PPC64_TOC16_DS:
8690 case R_PPC64_TOC16_LO_DS:
8691 /* In case we're taking addresses of toc entries. */
8692 case R_PPC64_ADDR64:
8693 break;
c5614fa4 8694
d4f1ee75
AM
8695 default:
8696 continue;
8697 }
c5614fa4 8698
d4f1ee75
AM
8699 r_symndx = ELF64_R_SYM (rel->r_info);
8700 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8701 r_symndx, ibfd))
8702 {
8703 free (used);
8704 goto error_ret;
8705 }
c5614fa4 8706
d4f1ee75
AM
8707 if (sym_sec != toc)
8708 continue;
c5614fa4 8709
d4f1ee75
AM
8710 if (h != NULL)
8711 val = h->root.u.def.value;
8712 else
8713 val = sym->st_value;
8714 val += rel->r_addend;
ba761f19 8715
d4f1ee75
AM
8716 if (val >= toc->size)
8717 continue;
ba761f19 8718
d4f1ee75
AM
8719 if ((skip[val >> 3] & can_optimize) != 0)
8720 {
8721 bfd_vma off;
8722 unsigned char opc;
8723
8724 switch (r_type)
8725 {
8726 case R_PPC64_TOC16_HA:
ba761f19 8727 break;
ba761f19 8728
d4f1ee75
AM
8729 case R_PPC64_TOC16_LO_DS:
8730 off = rel->r_offset;
8731 off += (bfd_big_endian (ibfd) ? -2 : 3);
8732 if (!bfd_get_section_contents (ibfd, sec, &opc,
8733 off, 1))
8734 {
8735 free (used);
8736 goto error_ret;
8737 }
8738 if ((opc & (0x3f << 2)) == (58u << 2))
8739 break;
1a0670f3 8740 /* Fall through. */
ba761f19 8741
d4f1ee75
AM
8742 default:
8743 /* Wrong sort of reloc, or not a ld. We may
8744 as well clear ref_from_discarded too. */
8745 skip[val >> 3] = 0;
8746 }
8747 }
8748
8749 if (sec != toc)
8750 used[val >> 3] = 1;
8751 /* For the toc section, we only mark as used if this
8752 entry itself isn't unused. */
8753 else if ((used[rel->r_offset >> 3]
8754 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8755 && !used[val >> 3])
8756 {
8757 /* Do all the relocs again, to catch reference
8758 chains. */
8759 repeat = 1;
8760 used[val >> 3] = 1;
8761 }
8762 }
8763 }
c5614fa4 8764 while (repeat);
854b41e7
AM
8765
8766 if (elf_section_data (sec)->relocs != relstart)
8767 free (relstart);
c5614fa4
AM
8768 }
8769
8770 /* Merge the used and skip arrays. Assume that TOC
8771 doublewords not appearing as either used or unused belong
de194d85 8772 to an entry more than one doubleword in size. */
c5614fa4
AM
8773 for (drop = skip, keep = used, last = 0, some_unused = 0;
8774 drop < skip + (toc->size + 7) / 8;
8775 ++drop, ++keep)
8776 {
8777 if (*keep)
8778 {
ba761f19
AM
8779 *drop &= ~ref_from_discarded;
8780 if ((*drop & can_optimize) != 0)
8781 some_unused = 1;
c5614fa4
AM
8782 last = 0;
8783 }
b140b010 8784 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8785 {
8786 some_unused = 1;
ba761f19 8787 last = ref_from_discarded;
c5614fa4
AM
8788 }
8789 else
8790 *drop = last;
8791 }
8792
8793 free (used);
8794
8795 if (some_unused)
8796 {
8797 bfd_byte *contents, *src;
8798 unsigned long off;
d62b3684 8799 Elf_Internal_Sym *sym;
ba761f19 8800 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8801
8802 /* Shuffle the toc contents, and at the same time convert the
8803 skip array from booleans into offsets. */
8804 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8805 goto error_ret;
8806
8807 elf_section_data (toc)->this_hdr.contents = contents;
8808
8809 for (src = contents, off = 0, drop = skip;
8810 src < contents + toc->size;
8811 src += 8, ++drop)
8812 {
ba761f19
AM
8813 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8814 off += 8;
c5614fa4
AM
8815 else if (off != 0)
8816 {
8817 *drop = off;
8818 memcpy (src - off, src, 8);
8819 }
8820 }
854b41e7 8821 *drop = off;
c5614fa4
AM
8822 toc->rawsize = toc->size;
8823 toc->size = src - contents - off;
8824
ba761f19
AM
8825 /* Adjust addends for relocs against the toc section sym,
8826 and optimize any accesses we can. */
c5614fa4
AM
8827 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8828 {
8829 if (sec->reloc_count == 0
dbaa2011 8830 || discarded_section (sec))
c5614fa4
AM
8831 continue;
8832
8833 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8834 info->keep_memory);
c5614fa4
AM
8835 if (relstart == NULL)
8836 goto error_ret;
8837
8838 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8839 {
8840 enum elf_ppc64_reloc_type r_type;
8841 unsigned long r_symndx;
8842 asection *sym_sec;
8843 struct elf_link_hash_entry *h;
854b41e7 8844 bfd_vma val;
c5614fa4
AM
8845
8846 r_type = ELF64_R_TYPE (rel->r_info);
8847 switch (r_type)
8848 {
8849 default:
8850 continue;
8851
8852 case R_PPC64_TOC16:
8853 case R_PPC64_TOC16_LO:
8854 case R_PPC64_TOC16_HI:
8855 case R_PPC64_TOC16_HA:
8856 case R_PPC64_TOC16_DS:
8857 case R_PPC64_TOC16_LO_DS:
8858 case R_PPC64_ADDR64:
8859 break;
8860 }
8861
8862 r_symndx = ELF64_R_SYM (rel->r_info);
8863 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8864 r_symndx, ibfd))
8865 goto error_ret;
8866
ba761f19 8867 if (sym_sec != toc)
c5614fa4
AM
8868 continue;
8869
ba761f19
AM
8870 if (h != NULL)
8871 val = h->root.u.def.value;
8872 else
8873 {
8874 val = sym->st_value;
8875 if (val != 0)
8876 local_toc_syms = TRUE;
8877 }
8878
8879 val += rel->r_addend;
854b41e7
AM
8880
8881 if (val > toc->rawsize)
8882 val = toc->rawsize;
ba761f19
AM
8883 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8884 continue;
8885 else if ((skip[val >> 3] & can_optimize) != 0)
8886 {
8887 Elf_Internal_Rela *tocrel
425b145b 8888 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8889 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8890
8891 switch (r_type)
8892 {
8893 case R_PPC64_TOC16_HA:
8894 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8895 break;
8896
8897 case R_PPC64_TOC16_LO_DS:
8898 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8899 break;
8900
8901 default:
28942f62
AM
8902 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8903 ppc_howto_init ();
b140b010 8904 info->callbacks->einfo
695344c0 8905 /* xgettext:c-format */
174d0a74 8906 (_("%H: %s references "
b140b010
AM
8907 "optimized away TOC entry\n"),
8908 ibfd, sec, rel->r_offset,
8909 ppc64_elf_howto_table[r_type]->name);
8910 bfd_set_error (bfd_error_bad_value);
8911 goto error_ret;
ba761f19
AM
8912 }
8913 rel->r_addend = tocrel->r_addend;
8914 elf_section_data (sec)->relocs = relstart;
8915 continue;
8916 }
8917
8918 if (h != NULL || sym->st_value != 0)
8919 continue;
854b41e7
AM
8920
8921 rel->r_addend -= skip[val >> 3];
8922 elf_section_data (sec)->relocs = relstart;
c5614fa4 8923 }
854b41e7
AM
8924
8925 if (elf_section_data (sec)->relocs != relstart)
8926 free (relstart);
c5614fa4
AM
8927 }
8928
8929 /* We shouldn't have local or global symbols defined in the TOC,
8930 but handle them anyway. */
df22d223
AM
8931 if (local_syms != NULL)
8932 for (sym = local_syms;
8933 sym < local_syms + symtab_hdr->sh_info;
8934 ++sym)
8935 if (sym->st_value != 0
8936 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8937 {
8938 unsigned long i;
854b41e7 8939
df22d223
AM
8940 if (sym->st_value > toc->rawsize)
8941 i = toc->rawsize >> 3;
8942 else
8943 i = sym->st_value >> 3;
854b41e7 8944
df22d223
AM
8945 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8946 {
8947 if (local_toc_syms)
4eca0228 8948 _bfd_error_handler
df22d223
AM
8949 (_("%s defined on removed toc entry"),
8950 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8951 do
8952 ++i;
8953 while ((skip[i] & (ref_from_discarded | can_optimize)));
8954 sym->st_value = (bfd_vma) i << 3;
8955 }
d62b3684 8956
df22d223
AM
8957 sym->st_value -= skip[i];
8958 symtab_hdr->contents = (unsigned char *) local_syms;
8959 }
c5614fa4 8960
854b41e7 8961 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8962 if (toc_inf.global_toc_syms)
8963 {
8964 toc_inf.toc = toc;
8965 toc_inf.skip = skip;
8966 toc_inf.global_toc_syms = FALSE;
8967 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8968 &toc_inf);
8969 }
854b41e7
AM
8970
8971 if (toc->reloc_count != 0)
8972 {
d4730f92 8973 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8974 Elf_Internal_Rela *wrel;
8975 bfd_size_type sz;
8976
854b41e7 8977 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8978 if (toc_relocs == NULL)
8979 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8980 info->keep_memory);
8981 if (toc_relocs == NULL)
8982 goto error_ret;
8983
425b145b
AM
8984 wrel = toc_relocs;
8985 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8986 if ((skip[rel->r_offset >> 3]
8987 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8988 {
8989 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8990 wrel->r_info = rel->r_info;
8991 wrel->r_addend = rel->r_addend;
8992 ++wrel;
8993 }
8994 else if (!dec_dynrel_count (rel->r_info, toc, info,
8995 &local_syms, NULL, NULL))
8996 goto error_ret;
8997
425b145b
AM
8998 elf_section_data (toc)->relocs = toc_relocs;
8999 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9000 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9001 sz = rel_hdr->sh_entsize;
9002 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9003 }
c5614fa4 9004 }
28be611c
AM
9005 else if (toc_relocs != NULL
9006 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9007 free (toc_relocs);
c5614fa4
AM
9008
9009 if (local_syms != NULL
9010 && symtab_hdr->contents != (unsigned char *) local_syms)
9011 {
9012 if (!info->keep_memory)
9013 free (local_syms);
9014 else
9015 symtab_hdr->contents = (unsigned char *) local_syms;
9016 }
9017 free (skip);
9018 }
9019
066f4018 9020 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9021 a GOT relative or PC relative access, possibly reducing the
9022 number of GOT entries. */
066f4018
AM
9023 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9024 {
9025 asection *sec;
9026 Elf_Internal_Shdr *symtab_hdr;
9027 Elf_Internal_Sym *local_syms;
9028 Elf_Internal_Rela *relstart, *rel;
9029 bfd_vma got;
9030
9031 if (!is_ppc64_elf (ibfd))
9032 continue;
9033
903b777d 9034 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9035 continue;
9036
9037 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9038 got = 0;
9039 if (sec != NULL)
9040 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9041
9042 local_syms = NULL;
9043 symtab_hdr = &elf_symtab_hdr (ibfd);
9044
9045 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9046 {
9047 if (sec->reloc_count == 0
903b777d 9048 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9049 || discarded_section (sec))
9050 continue;
9051
9052 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9053 info->keep_memory);
9054 if (relstart == NULL)
9055 {
9056 got_error_ret:
9057 if (local_syms != NULL
9058 && symtab_hdr->contents != (unsigned char *) local_syms)
9059 free (local_syms);
9060 if (sec != NULL
9061 && relstart != NULL
9062 && elf_section_data (sec)->relocs != relstart)
9063 free (relstart);
9064 return FALSE;
9065 }
9066
9067 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9068 {
9069 enum elf_ppc64_reloc_type r_type;
9070 unsigned long r_symndx;
9071 Elf_Internal_Sym *sym;
9072 asection *sym_sec;
9073 struct elf_link_hash_entry *h;
9074 struct got_entry *ent;
133a1f60 9075 bfd_vma val, pc;
4a421c53 9076 unsigned char buf[8];
066f4018 9077 unsigned int insn;
903b777d 9078 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9079
9080 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9081 switch (r_type)
9082 {
9083 default:
9084 insn_check = no_check;
9085 break;
9086
9087 case R_PPC64_PLT16_HA:
9088 case R_PPC64_GOT_TLSLD16_HA:
9089 case R_PPC64_GOT_TLSGD16_HA:
9090 case R_PPC64_GOT_TPREL16_HA:
9091 case R_PPC64_GOT_DTPREL16_HA:
9092 case R_PPC64_GOT16_HA:
9093 case R_PPC64_TOC16_HA:
9094 insn_check = check_ha;
9095 break;
9096
9097 case R_PPC64_PLT16_LO:
9098 case R_PPC64_PLT16_LO_DS:
9099 case R_PPC64_GOT_TLSLD16_LO:
9100 case R_PPC64_GOT_TLSGD16_LO:
9101 case R_PPC64_GOT_TPREL16_LO_DS:
9102 case R_PPC64_GOT_DTPREL16_LO_DS:
9103 case R_PPC64_GOT16_LO:
9104 case R_PPC64_GOT16_LO_DS:
9105 case R_PPC64_TOC16_LO:
9106 case R_PPC64_TOC16_LO_DS:
9107 insn_check = check_lo;
9108 break;
9109 }
9110
9111 if (insn_check != no_check)
9112 {
9113 bfd_vma off = rel->r_offset & ~3;
9114
9115 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9116 goto got_error_ret;
9117
9118 insn = bfd_get_32 (ibfd, buf);
9119 if (insn_check == check_lo
9120 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9121 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9122 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9123 {
9124 char str[12];
9125
9126 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9127 sprintf (str, "%#08x", insn);
9128 info->callbacks->einfo
9129 /* xgettext:c-format */
9130 (_("%H: got/toc optimization is not supported for"
9131 " %s instruction\n"),
9132 ibfd, sec, rel->r_offset & ~3, str);
9133 continue;
9134 }
9135 }
9136
066f4018
AM
9137 switch (r_type)
9138 {
bb22a418
AM
9139 /* Note that we don't delete GOT entries for
9140 R_PPC64_GOT16_DS since we'd need a lot more
9141 analysis. For starters, the preliminary layout is
9142 before the GOT, PLT, dynamic sections and stubs are
9143 laid out. Then we'd need to allow for changes in
9144 distance between sections caused by alignment. */
066f4018
AM
9145 default:
9146 continue;
9147
066f4018
AM
9148 case R_PPC64_GOT16_HA:
9149 case R_PPC64_GOT16_LO_DS:
4a421c53 9150 case R_PPC64_GOT_PCREL34:
066f4018
AM
9151 break;
9152 }
9153
9154 r_symndx = ELF64_R_SYM (rel->r_info);
9155 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9156 r_symndx, ibfd))
9157 goto got_error_ret;
9158
6d5554a6
AM
9159 if (sym_sec == NULL
9160 || sym_sec->output_section == NULL
9161 || discarded_section (sym_sec))
9162 continue;
9163
066f4018
AM
9164 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9165 continue;
9166
9167 if (h != NULL)
9168 val = h->root.u.def.value;
9169 else
9170 val = sym->st_value;
133a1f60 9171 val += rel->r_addend;
066f4018
AM
9172 val += sym_sec->output_section->vma + sym_sec->output_offset;
9173
bb22a418
AM
9174/* Fudge factor to allow for the fact that the preliminary layout
9175 isn't exact. Reduce limits by this factor. */
9176#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9177
066f4018
AM
9178 switch (r_type)
9179 {
9180 default:
9181 continue;
9182
066f4018 9183 case R_PPC64_GOT16_HA:
bb22a418
AM
9184 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9185 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9186 continue;
9187
9188 if (!bfd_get_section_contents (ibfd, sec, buf,
9189 rel->r_offset & ~3, 4))
9190 goto got_error_ret;
9191 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9192 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9193 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9194 continue;
9195 break;
9196
9197 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9198 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9199 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9200 continue;
9201 if (!bfd_get_section_contents (ibfd, sec, buf,
9202 rel->r_offset & ~3, 4))
9203 goto got_error_ret;
9204 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9205 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9206 continue;
9207 break;
4a421c53
AM
9208
9209 case R_PPC64_GOT_PCREL34:
9210 pc = rel->r_offset;
9211 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9212 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9213 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9214 continue;
9215 if (!bfd_get_section_contents (ibfd, sec, buf,
9216 rel->r_offset & ~3, 8))
9217 goto got_error_ret;
9218 insn = bfd_get_32 (ibfd, buf);
9219 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9220 continue;
9221 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9222 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9223 continue;
9224 break;
066f4018 9225 }
bb22a418 9226#undef LIMIT_ADJUST
066f4018
AM
9227
9228 if (h != NULL)
9229 ent = h->got.glist;
9230 else
9231 {
9232 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9233 ent = local_got_ents[r_symndx];
9234 }
9235 for (; ent != NULL; ent = ent->next)
133a1f60 9236 if (ent->addend == rel->r_addend
066f4018
AM
9237 && ent->owner == ibfd
9238 && ent->tls_type == 0)
9239 break;
9240 BFD_ASSERT (ent && ent->got.refcount > 0);
9241 ent->got.refcount -= 1;
9242 }
9243
9244 if (elf_section_data (sec)->relocs != relstart)
9245 free (relstart);
9246 }
9247
9248 if (local_syms != NULL
9249 && symtab_hdr->contents != (unsigned char *) local_syms)
9250 {
9251 if (!info->keep_memory)
9252 free (local_syms);
9253 else
9254 symtab_hdr->contents = (unsigned char *) local_syms;
9255 }
9256 }
9257
c5614fa4
AM
9258 return TRUE;
9259}
9260
1bbe0902
AM
9261/* Return true iff input section I references the TOC using
9262 instructions limited to +/-32k offsets. */
9263
9264bfd_boolean
9265ppc64_elf_has_small_toc_reloc (asection *i)
9266{
9267 return (is_ppc64_elf (i->owner)
9268 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9269}
9270
927be08e
AM
9271/* Allocate space for one GOT entry. */
9272
9273static void
9274allocate_got (struct elf_link_hash_entry *h,
9275 struct bfd_link_info *info,
9276 struct got_entry *gent)
9277{
9278 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9279 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9280 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9281 ? 16 : 8);
9282 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9283 ? 2 : 1) * sizeof (Elf64_External_Rela);
9284 asection *got = ppc64_elf_tdata (gent->owner)->got;
9285
9286 gent->got.offset = got->size;
9287 got->size += entsize;
9288
19e08130 9289 if (h->type == STT_GNU_IFUNC)
927be08e 9290 {
33e44f2e 9291 htab->elf.irelplt->size += rentsize;
19e08130 9292 htab->got_reli_size += rentsize;
927be08e 9293 }
f15d0b54 9294 else if (((bfd_link_pic (info)
f749f26e 9295 && !(gent->tls_type != 0
f15d0b54
AM
9296 && bfd_link_executable (info)
9297 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9298 || (htab->elf.dynamic_sections_created
9299 && h->dynindx != -1
9300 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9301 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9302 {
19e08130 9303 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9304 relgot->size += rentsize;
927be08e
AM
9305 }
9306}
9307
7865406b
AM
9308/* This function merges got entries in the same toc group. */
9309
9310static void
9311merge_got_entries (struct got_entry **pent)
9312{
9313 struct got_entry *ent, *ent2;
9314
9315 for (ent = *pent; ent != NULL; ent = ent->next)
9316 if (!ent->is_indirect)
9317 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9318 if (!ent2->is_indirect
9319 && ent2->addend == ent->addend
9320 && ent2->tls_type == ent->tls_type
9321 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9322 {
9323 ent2->is_indirect = TRUE;
9324 ent2->got.ent = ent;
9325 }
9326}
9327
46434633 9328/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9329
9330static bfd_boolean
46434633
AM
9331ensure_undef_dynamic (struct bfd_link_info *info,
9332 struct elf_link_hash_entry *h)
f0158f44
AM
9333{
9334 struct elf_link_hash_table *htab = elf_hash_table (info);
9335
9336 if (htab->dynamic_sections_created
46434633
AM
9337 && ((info->dynamic_undefined_weak != 0
9338 && h->root.type == bfd_link_hash_undefweak)
9339 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9340 && h->dynindx == -1
9341 && !h->forced_local
9342 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9343 return bfd_elf_link_record_dynamic_symbol (info, h);
9344 return TRUE;
9345}
9346
65f38f15
AM
9347/* Allocate space in .plt, .got and associated reloc sections for
9348 dynamic relocs. */
5bd4f169 9349
b34976b6 9350static bfd_boolean
4ce794b7 9351allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9352{
65f38f15
AM
9353 struct bfd_link_info *info;
9354 struct ppc_link_hash_table *htab;
5bd4f169 9355 asection *s;
65f38f15 9356 struct ppc_link_hash_entry *eh;
0b8bcf0d 9357 struct got_entry **pgent, *gent;
5bd4f169 9358
e92d460e 9359 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9360 return TRUE;
5bd4f169 9361
65f38f15
AM
9362 info = (struct bfd_link_info *) inf;
9363 htab = ppc_hash_table (info);
4dfe6ac6
NC
9364 if (htab == NULL)
9365 return FALSE;
5bd4f169 9366
951fd09b
AM
9367 eh = (struct ppc_link_hash_entry *) h;
9368 /* Run through the TLS GD got entries first if we're changing them
9369 to TPREL. */
b00a0a86 9370 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9371 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9372 if (gent->got.refcount > 0
9373 && (gent->tls_type & TLS_GD) != 0)
9374 {
9375 /* This was a GD entry that has been converted to TPREL. If
9376 there happens to be a TPREL entry we can use that one. */
9377 struct got_entry *ent;
9378 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9379 if (ent->got.refcount > 0
9380 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9381 && ent->addend == gent->addend
9382 && ent->owner == gent->owner)
951fd09b
AM
9383 {
9384 gent->got.refcount = 0;
9385 break;
9386 }
9387
9388 /* If not, then we'll be using our own TPREL entry. */
9389 if (gent->got.refcount != 0)
9390 gent->tls_type = TLS_TLS | TLS_TPREL;
9391 }
9392
7865406b
AM
9393 /* Remove any list entry that won't generate a word in the GOT before
9394 we call merge_got_entries. Otherwise we risk merging to empty
9395 entries. */
0b8bcf0d
AM
9396 pgent = &h->got.glist;
9397 while ((gent = *pgent) != NULL)
411e1bfb 9398 if (gent->got.refcount > 0)
7865406b
AM
9399 {
9400 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9401 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9402 {
9403 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9404 *pgent = gent->next;
9405 }
9406 else
9407 pgent = &gent->next;
9408 }
9409 else
9410 *pgent = gent->next;
9411
9412 if (!htab->do_multi_toc)
9413 merge_got_entries (&h->got.glist);
9414
9415 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9416 if (!gent->is_indirect)
411e1bfb 9417 {
ec73ddcd
AM
9418 /* Ensure we catch all the cases where this symbol should
9419 be made dynamic. */
46434633 9420 if (!ensure_undef_dynamic (info, h))
f0158f44 9421 return FALSE;
65f38f15 9422
0c8d6e5c 9423 if (!is_ppc64_elf (gent->owner))
927be08e 9424 abort ();
0ffa91dd 9425
927be08e 9426 allocate_got (h, info, gent);
411e1bfb 9427 }
65f38f15 9428
954b63d4
AM
9429 /* If no dynamic sections we can't have dynamic relocs, except for
9430 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9431 if (!htab->elf.dynamic_sections_created
9432 && h->type != STT_GNU_IFUNC)
9433 eh->dyn_relocs = NULL;
9434
529fe20e
AM
9435 /* Discard relocs on undefined symbols that must be local. */
9436 else if (h->root.type == bfd_link_hash_undefined
9437 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9438 eh->dyn_relocs = NULL;
9439
954b63d4
AM
9440 /* Also discard relocs on undefined weak syms with non-default
9441 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9442 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9443 eh->dyn_relocs = NULL;
9444
8a2058b5 9445 if (eh->dyn_relocs != NULL)
65f38f15 9446 {
8a2058b5
AM
9447 struct elf_dyn_relocs *p, **pp;
9448
57e7d118
AM
9449 /* In the shared -Bsymbolic case, discard space allocated for
9450 dynamic pc-relative relocs against symbols which turn out to
9451 be defined in regular objects. For the normal shared case,
9452 discard space for relocs that have become local due to symbol
9453 visibility changes. */
57e7d118 9454 if (bfd_link_pic (info))
65f38f15 9455 {
57e7d118
AM
9456 /* Relocs that use pc_count are those that appear on a call
9457 insn, or certain REL relocs (see must_be_dyn_reloc) that
9458 can be generated via assembly. We want calls to
9459 protected symbols to resolve directly to the function
9460 rather than going via the plt. If people want function
9461 pointer comparisons to work as expected then they should
9462 avoid writing weird assembly. */
9463 if (SYMBOL_CALLS_LOCAL (info, h))
9464 {
57e7d118
AM
9465 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9466 {
9467 p->count -= p->pc_count;
9468 p->pc_count = 0;
9469 if (p->count == 0)
9470 *pp = p->next;
9471 else
9472 pp = &p->next;
9473 }
9474 }
65f38f15 9475
954b63d4 9476 if (eh->dyn_relocs != NULL)
5bd4f169 9477 {
ec73ddcd
AM
9478 /* Ensure we catch all the cases where this symbol
9479 should be made dynamic. */
46434633 9480 if (!ensure_undef_dynamic (info, h))
f0158f44 9481 return FALSE;
5bd4f169 9482 }
65f38f15 9483 }
ec73ddcd
AM
9484
9485 /* For a fixed position executable, discard space for
9486 relocs against symbols which are not dynamic. */
9487 else if (h->type != STT_GNU_IFUNC)
57e7d118 9488 {
529fe20e
AM
9489 if (h->dynamic_adjusted
9490 && !h->def_regular
9491 && !ELF_COMMON_DEF_P (h))
f0158f44 9492 {
ec73ddcd
AM
9493 /* Ensure we catch all the cases where this symbol
9494 should be made dynamic. */
46434633 9495 if (!ensure_undef_dynamic (info, h))
f0158f44 9496 return FALSE;
dfbb6ac9 9497
ec73ddcd 9498 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9499 if (h->dynindx == -1)
9500 eh->dyn_relocs = NULL;
9501 }
9502 else
8a2058b5 9503 eh->dyn_relocs = NULL;
57e7d118
AM
9504 }
9505
9506 /* Finally, allocate space. */
9507 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9508 {
9509 asection *sreloc = elf_section_data (p->sec)->sreloc;
9510 if (eh->elf.type == STT_GNU_IFUNC)
9511 sreloc = htab->elf.irelplt;
9512 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9513 }
65f38f15 9514 }
57e7d118 9515
2d7ad24e
AM
9516 /* We might need a PLT entry when the symbol
9517 a) is dynamic, or
9518 b) is an ifunc, or
9519 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9520 d) has plt16 relocs and we are linking statically. */
9521 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9522 || h->type == STT_GNU_IFUNC
9523 || (h->needs_plt && h->dynamic_adjusted)
9524 || (h->needs_plt
9525 && h->def_regular
9526 && !htab->elf.dynamic_sections_created
3e04d765 9527 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
9528 && (((struct ppc_link_hash_entry *) h)->tls_mask
9529 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9530 {
57e7d118
AM
9531 struct plt_entry *pent;
9532 bfd_boolean doneone = FALSE;
9533 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9534 if (pent->plt.refcount > 0)
9535 {
9536 if (!htab->elf.dynamic_sections_created
9537 || h->dynindx == -1)
9538 {
2d7ad24e
AM
9539 if (h->type == STT_GNU_IFUNC)
9540 {
9541 s = htab->elf.iplt;
9542 pent->plt.offset = s->size;
9543 s->size += PLT_ENTRY_SIZE (htab);
9544 s = htab->elf.irelplt;
9545 }
9546 else
9547 {
9548 s = htab->pltlocal;
9549 pent->plt.offset = s->size;
9550 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9551 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9552 }
57e7d118
AM
9553 }
9554 else
9555 {
9556 /* If this is the first .plt entry, make room for the special
9557 first entry. */
9558 s = htab->elf.splt;
9559 if (s->size == 0)
9560 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9561
57e7d118 9562 pent->plt.offset = s->size;
65f38f15 9563
57e7d118
AM
9564 /* Make room for this entry. */
9565 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9566
57e7d118
AM
9567 /* Make room for the .glink code. */
9568 s = htab->glink;
9569 if (s->size == 0)
9e390558 9570 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9571 if (htab->opd_abi)
9572 {
9573 /* We need bigger stubs past index 32767. */
9e390558 9574 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9575 s->size += 4;
9576 s->size += 2*4;
9577 }
9578 else
9579 s->size += 4;
65f38f15 9580
57e7d118
AM
9581 /* We also need to make an entry in the .rela.plt section. */
9582 s = htab->elf.srelplt;
9583 }
2d7ad24e
AM
9584 if (s != NULL)
9585 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9586 doneone = TRUE;
9587 }
9588 else
9589 pent->plt.offset = (bfd_vma) -1;
9590 if (!doneone)
9591 {
9592 h->plt.plist = NULL;
9593 h->needs_plt = 0;
9594 }
65f38f15 9595 }
57e7d118 9596 else
65f38f15 9597 {
57e7d118
AM
9598 h->plt.plist = NULL;
9599 h->needs_plt = 0;
65f38f15
AM
9600 }
9601
b34976b6 9602 return TRUE;
65f38f15
AM
9603}
9604
9e390558
AM
9605#define PPC_LO(v) ((v) & 0xffff)
9606#define PPC_HI(v) (((v) >> 16) & 0xffff)
9607#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9608#define D34(v) \
9609 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9610#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9611
a345bc8d
AM
9612/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9613 to set up space for global entry stubs. These are put in glink,
9614 after the branch table. */
65f38f15 9615
b34976b6 9616static bfd_boolean
a345bc8d 9617size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9618{
a345bc8d
AM
9619 struct bfd_link_info *info;
9620 struct ppc_link_hash_table *htab;
9621 struct plt_entry *pent;
9e390558 9622 asection *s, *plt;
65f38f15 9623
a345bc8d
AM
9624 if (h->root.type == bfd_link_hash_indirect)
9625 return TRUE;
65f38f15 9626
a345bc8d
AM
9627 if (!h->pointer_equality_needed)
9628 return TRUE;
65f38f15 9629
a345bc8d
AM
9630 if (h->def_regular)
9631 return TRUE;
65f38f15 9632
a345bc8d
AM
9633 info = inf;
9634 htab = ppc_hash_table (info);
9635 if (htab == NULL)
9636 return FALSE;
9637
9e390558
AM
9638 s = htab->global_entry;
9639 plt = htab->elf.splt;
a345bc8d
AM
9640 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9641 if (pent->plt.offset != (bfd_vma) -1
9642 && pent->addend == 0)
9643 {
afe397ea
AM
9644 /* For ELFv2, if this symbol is not defined in a regular file
9645 and we are not generating a shared library or pie, then we
9646 need to define the symbol in the executable on a call stub.
9647 This is to avoid text relocations. */
9e390558
AM
9648 bfd_vma off, stub_align, stub_off, stub_size;
9649 unsigned int align_power;
9650
9651 stub_size = 16;
9652 stub_off = s->size;
9653 if (htab->params->plt_stub_align >= 0)
9654 align_power = htab->params->plt_stub_align;
9655 else
9656 align_power = -htab->params->plt_stub_align;
9657 /* Setting section alignment is delayed until we know it is
9658 non-empty. Otherwise the .text output section will be
9659 aligned at least to plt_stub_align even when no global
9660 entry stubs are needed. */
9661 if (s->alignment_power < align_power)
9662 s->alignment_power = align_power;
9663 stub_align = (bfd_vma) 1 << align_power;
9664 if (htab->params->plt_stub_align >= 0
9665 || ((((stub_off + stub_size - 1) & -stub_align)
9666 - (stub_off & -stub_align))
9667 > ((stub_size - 1) & -stub_align)))
9668 stub_off = (stub_off + stub_align - 1) & -stub_align;
9669 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9670 off -= stub_off + s->output_offset + s->output_section->vma;
9671 /* Note that for --plt-stub-align negative we have a possible
9672 dependency between stub offset and size. Break that
9673 dependency by assuming the max stub size when calculating
9674 the stub offset. */
9675 if (PPC_HA (off) == 0)
9676 stub_size -= 4;
8a2058b5 9677 h->root.type = bfd_link_hash_defined;
afe397ea 9678 h->root.u.def.section = s;
9e390558
AM
9679 h->root.u.def.value = stub_off;
9680 s->size = stub_off + stub_size;
a345bc8d
AM
9681 break;
9682 }
9683 return TRUE;
9684}
9685
9686/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9687 read-only sections. */
9688
9689static bfd_boolean
98bbb1b8 9690maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9691{
98bbb1b8
AM
9692 asection *sec;
9693
a345bc8d
AM
9694 if (h->root.type == bfd_link_hash_indirect)
9695 return TRUE;
9696
98bbb1b8
AM
9697 sec = readonly_dynrelocs (h);
9698 if (sec != NULL)
a345bc8d 9699 {
98bbb1b8
AM
9700 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9701
9702 info->flags |= DF_TEXTREL;
2cdcc330
AM
9703 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9704 " in read-only section `%pA'\n"),
9705 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9706
9707 /* Not an error, just cut short the traversal. */
9708 return FALSE;
65f38f15 9709 }
b34976b6 9710 return TRUE;
65f38f15
AM
9711}
9712
9713/* Set the sizes of the dynamic sections. */
9714
b34976b6 9715static bfd_boolean
ee67d69a 9716ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9717 struct bfd_link_info *info)
65f38f15
AM
9718{
9719 struct ppc_link_hash_table *htab;
9720 bfd *dynobj;
9721 asection *s;
b34976b6 9722 bfd_boolean relocs;
65f38f15 9723 bfd *ibfd;
7865406b 9724 struct got_entry *first_tlsld;
65f38f15
AM
9725
9726 htab = ppc_hash_table (info);
4dfe6ac6
NC
9727 if (htab == NULL)
9728 return FALSE;
9729
65f38f15
AM
9730 dynobj = htab->elf.dynobj;
9731 if (dynobj == NULL)
9732 abort ();
9733
9734 if (htab->elf.dynamic_sections_created)
9735 {
9736 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9737 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9738 {
3d4d4302 9739 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9740 if (s == NULL)
9741 abort ();
eea6121a 9742 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9743 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9744 }
9745 }
9746
9747 /* Set up .got offsets for local syms, and space for local dynamic
9748 relocs. */
c72f2fb2 9749 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9750 {
411e1bfb
AM
9751 struct got_entry **lgot_ents;
9752 struct got_entry **end_lgot_ents;
e054468f
AM
9753 struct plt_entry **local_plt;
9754 struct plt_entry **end_local_plt;
f961d9dd 9755 unsigned char *lgot_masks;
65f38f15
AM
9756 bfd_size_type locsymcount;
9757 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9758
0c8d6e5c 9759 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9760 continue;
9761
9762 for (s = ibfd->sections; s != NULL; s = s->next)
9763 {
19e08130 9764 struct ppc_dyn_relocs *p;
65f38f15 9765
6edfbbad 9766 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9767 {
ec338859
AM
9768 if (!bfd_is_abs_section (p->sec)
9769 && bfd_is_abs_section (p->sec->output_section))
9770 {
9771 /* Input section has been discarded, either because
9772 it is a copy of a linkonce section or due to
9773 linker script /DISCARD/, so we'll be discarding
9774 the relocs too. */
9775 }
248866a8 9776 else if (p->count != 0)
ec338859 9777 {
19e08130
AM
9778 asection *srel = elf_section_data (p->sec)->sreloc;
9779 if (p->ifunc)
33e44f2e 9780 srel = htab->elf.irelplt;
eea6121a 9781 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9782 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9783 info->flags |= DF_TEXTREL;
ec338859 9784 }
65f38f15
AM
9785 }
9786 }
9787
411e1bfb
AM
9788 lgot_ents = elf_local_got_ents (ibfd);
9789 if (!lgot_ents)
65f38f15
AM
9790 continue;
9791
0ffa91dd 9792 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9793 locsymcount = symtab_hdr->sh_info;
411e1bfb 9794 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9795 local_plt = (struct plt_entry **) end_lgot_ents;
9796 end_local_plt = local_plt + locsymcount;
f961d9dd 9797 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9798 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9799 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9800 {
0b8bcf0d 9801 struct got_entry **pent, *ent;
411e1bfb 9802
0b8bcf0d
AM
9803 pent = lgot_ents;
9804 while ((ent = *pent) != NULL)
411e1bfb
AM
9805 if (ent->got.refcount > 0)
9806 {
e7b938ca 9807 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9808 {
927be08e 9809 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9810 *pent = ent->next;
411e1bfb
AM
9811 }
9812 else
9813 {
19e08130
AM
9814 unsigned int ent_size = 8;
9815 unsigned int rel_size = sizeof (Elf64_External_Rela);
9816
eea6121a 9817 ent->got.offset = s->size;
e7b938ca 9818 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9819 {
19e08130
AM
9820 ent_size *= 2;
9821 rel_size *= 2;
9822 }
9823 s->size += ent_size;
37da22e5 9824 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9825 {
33e44f2e 9826 htab->elf.irelplt->size += rel_size;
19e08130
AM
9827 htab->got_reli_size += rel_size;
9828 }
93370e8e
AM
9829 else if (bfd_link_pic (info)
9830 && !(ent->tls_type != 0
9831 && bfd_link_executable (info)))
19e08130
AM
9832 {
9833 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9834 srel->size += rel_size;
927be08e 9835 }
0b8bcf0d 9836 pent = &ent->next;
411e1bfb
AM
9837 }
9838 }
9839 else
0b8bcf0d 9840 *pent = ent->next;
65f38f15 9841 }
e054468f 9842
2d7ad24e
AM
9843 /* Allocate space for plt calls to local syms. */
9844 lgot_masks = (unsigned char *) end_local_plt;
9845 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9846 {
9847 struct plt_entry *ent;
9848
9849 for (ent = *local_plt; ent != NULL; ent = ent->next)
9850 if (ent->plt.refcount > 0)
9851 {
2d7ad24e
AM
9852 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9853 {
9854 s = htab->elf.iplt;
9855 ent->plt.offset = s->size;
9856 s->size += PLT_ENTRY_SIZE (htab);
9857 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9858 }
3e04d765
AM
9859 else if (htab->can_convert_all_inline_plt
9860 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9861 ent->plt.offset = (bfd_vma) -1;
9862 else
9863 {
9864 s = htab->pltlocal;
9865 ent->plt.offset = s->size;
9866 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9867 if (bfd_link_pic (info))
9868 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9869 }
e054468f
AM
9870 }
9871 else
9872 ent->plt.offset = (bfd_vma) -1;
9873 }
65f38f15
AM
9874 }
9875
9876 /* Allocate global sym .plt and .got entries, and space for global
9877 sym dynamic relocs. */
4ce794b7 9878 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9879
0e1862bb 9880 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9881 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9882
7865406b 9883 first_tlsld = NULL;
c72f2fb2 9884 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9885 {
7865406b
AM
9886 struct got_entry *ent;
9887
0c8d6e5c 9888 if (!is_ppc64_elf (ibfd))
102890f0
AM
9889 continue;
9890
7865406b
AM
9891 ent = ppc64_tlsld_got (ibfd);
9892 if (ent->got.refcount > 0)
102890f0 9893 {
7865406b 9894 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9895 {
7865406b
AM
9896 ent->is_indirect = TRUE;
9897 ent->got.ent = first_tlsld;
9898 }
9899 else
9900 {
9901 if (first_tlsld == NULL)
9902 first_tlsld = ent;
9903 s = ppc64_elf_tdata (ibfd)->got;
9904 ent->got.offset = s->size;
9905 ent->owner = ibfd;
9906 s->size += 16;
f749f26e 9907 if (bfd_link_dll (info))
7865406b
AM
9908 {
9909 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9910 srel->size += sizeof (Elf64_External_Rela);
9911 }
102890f0
AM
9912 }
9913 }
9914 else
7865406b 9915 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9916 }
9917
65f38f15
AM
9918 /* We now have determined the sizes of the various dynamic sections.
9919 Allocate memory for them. */
b34976b6 9920 relocs = FALSE;
65f38f15
AM
9921 for (s = dynobj->sections; s != NULL; s = s->next)
9922 {
9923 if ((s->flags & SEC_LINKER_CREATED) == 0)
9924 continue;
9925
4ce794b7 9926 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9927 /* These haven't been allocated yet; don't strip. */
9928 continue;
33e44f2e
AM
9929 else if (s == htab->elf.sgot
9930 || s == htab->elf.splt
9931 || s == htab->elf.iplt
2d7ad24e 9932 || s == htab->pltlocal
c456f082 9933 || s == htab->glink
9e390558 9934 || s == htab->global_entry
5474d94f
AM
9935 || s == htab->elf.sdynbss
9936 || s == htab->elf.sdynrelro)
65f38f15
AM
9937 {
9938 /* Strip this section if we don't need it; see the
9939 comment below. */
5bd4f169 9940 }
58d180e8
AM
9941 else if (s == htab->glink_eh_frame)
9942 {
9943 if (!bfd_is_abs_section (s->output_section))
9944 /* Not sized yet. */
9945 continue;
9946 }
70cc837d 9947 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9948 {
c456f082 9949 if (s->size != 0)
5bd4f169 9950 {
33e44f2e 9951 if (s != htab->elf.srelplt)
b34976b6 9952 relocs = TRUE;
5bd4f169
AM
9953
9954 /* We use the reloc_count field as a counter if we need
9955 to copy relocs into the output file. */
9956 s->reloc_count = 0;
9957 }
9958 }
65f38f15 9959 else
5bd4f169
AM
9960 {
9961 /* It's not one of our sections, so don't allocate space. */
9962 continue;
9963 }
9964
eea6121a 9965 if (s->size == 0)
5bd4f169 9966 {
c456f082
AM
9967 /* If we don't need this section, strip it from the
9968 output file. This is mostly to handle .rela.bss and
9969 .rela.plt. We must create both sections in
9970 create_dynamic_sections, because they must be created
9971 before the linker maps input sections to output
9972 sections. The linker does that before
9973 adjust_dynamic_symbol is called, and it is that
9974 function which decides whether anything needs to go
9975 into these sections. */
8423293d 9976 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9977 continue;
9978 }
9979
06bcf541
AM
9980 if (bfd_is_abs_section (s->output_section))
9981 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9982 s->name);
9983
c456f082 9984 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9985 continue;
9986
65f38f15
AM
9987 /* Allocate memory for the section contents. We use bfd_zalloc
9988 here in case unused entries are not reclaimed before the
9989 section's contents are written out. This should not happen,
411e1bfb
AM
9990 but this way if it does we get a R_PPC64_NONE reloc in .rela
9991 sections instead of garbage.
9992 We also rely on the section contents being zero when writing
5474d94f 9993 the GOT and .dynrelro. */
eea6121a 9994 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9995 if (s->contents == NULL)
b34976b6 9996 return FALSE;
5bd4f169
AM
9997 }
9998
c72f2fb2 9999 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10000 {
0c8d6e5c 10001 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10002 continue;
10003
e717da7e 10004 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10005 if (s != NULL && s != htab->elf.sgot)
e717da7e 10006 {
eea6121a 10007 if (s->size == 0)
8423293d 10008 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10009 else
10010 {
eea6121a 10011 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10012 if (s->contents == NULL)
10013 return FALSE;
10014 }
10015 }
10016 s = ppc64_elf_tdata (ibfd)->relgot;
10017 if (s != NULL)
10018 {
eea6121a 10019 if (s->size == 0)
8423293d 10020 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10021 else
10022 {
eea6121a 10023 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10024 if (s->contents == NULL)
10025 return FALSE;
10026 relocs = TRUE;
10027 s->reloc_count = 0;
10028 }
10029 }
10030 }
10031
e86ce104 10032 if (htab->elf.dynamic_sections_created)
5bd4f169 10033 {
e8910a83
AM
10034 bfd_boolean tls_opt;
10035
5bd4f169
AM
10036 /* Add some entries to the .dynamic section. We fill in the
10037 values later, in ppc64_elf_finish_dynamic_sections, but we
10038 must add the entries now so that we get the correct size for
10039 the .dynamic section. The DT_DEBUG entry is filled in by the
10040 dynamic linker and used by the debugger. */
dc810e39 10041#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10042 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10043
0e1862bb 10044 if (bfd_link_executable (info))
5bd4f169 10045 {
dc810e39 10046 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10047 return FALSE;
5bd4f169
AM
10048 }
10049
33e44f2e 10050 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10051 {
dc810e39
AM
10052 if (!add_dynamic_entry (DT_PLTGOT, 0)
10053 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10054 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10055 || !add_dynamic_entry (DT_JMPREL, 0)
10056 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10057 return FALSE;
5bd4f169
AM
10058 }
10059
ee67d69a 10060 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10061 {
10062 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10063 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10064 return FALSE;
19397422
AM
10065 }
10066
7c9cf415 10067 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10068 && htab->tls_get_addr_fd != NULL
10069 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10070 if (tls_opt || !htab->opd_abi)
10071 {
10072 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10073 return FALSE;
10074 }
a7f2871e 10075
5bd4f169
AM
10076 if (relocs)
10077 {
dc810e39
AM
10078 if (!add_dynamic_entry (DT_RELA, 0)
10079 || !add_dynamic_entry (DT_RELASZ, 0)
10080 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10081 return FALSE;
5bd4f169 10082
65f38f15
AM
10083 /* If any dynamic relocs apply to a read-only section,
10084 then we need a DT_TEXTREL entry. */
248866a8 10085 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10086 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10087
65f38f15 10088 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10089 {
65f38f15 10090 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10091 return FALSE;
5bd4f169 10092 }
5bd4f169 10093 }
5bd4f169 10094 }
65f38f15 10095#undef add_dynamic_entry
5bd4f169 10096
b34976b6 10097 return TRUE;
5bd4f169
AM
10098}
10099
a345bc8d
AM
10100/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10101
10102static bfd_boolean
10103ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10104{
10105 if (h->plt.plist != NULL
10106 && !h->def_regular
10107 && !h->pointer_equality_needed)
10108 return FALSE;
10109
10110 return _bfd_elf_hash_symbol (h);
10111}
10112
721956f4 10113/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10114
4ce794b7
AM
10115static inline enum ppc_stub_type
10116ppc_type_of_stub (asection *input_sec,
10117 const Elf_Internal_Rela *rel,
10118 struct ppc_link_hash_entry **hash,
e054468f 10119 struct plt_entry **plt_ent,
6911b7dc
AM
10120 bfd_vma destination,
10121 unsigned long local_off)
5bd4f169 10122{
721956f4
AM
10123 struct ppc_link_hash_entry *h = *hash;
10124 bfd_vma location;
10125 bfd_vma branch_offset;
10126 bfd_vma max_branch_offset;
4ce794b7 10127 enum elf_ppc64_reloc_type r_type;
5bd4f169 10128
721956f4
AM
10129 if (h != NULL)
10130 {
e054468f 10131 struct plt_entry *ent;
7fe2b9a6 10132 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10133 if (h->oh != NULL
10134 && h->oh->is_func_descriptor)
7b8f6675
AM
10135 {
10136 fdh = ppc_follow_link (h->oh);
10137 *hash = fdh;
10138 }
8387904d 10139
e054468f
AM
10140 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10141 if (ent->addend == rel->r_addend
10142 && ent->plt.offset != (bfd_vma) -1)
10143 {
e054468f
AM
10144 *plt_ent = ent;
10145 return ppc_stub_plt_call;
10146 }
5bd4f169 10147
7fe2b9a6
AM
10148 /* Here, we know we don't have a plt entry. If we don't have a
10149 either a defined function descriptor or a defined entry symbol
10150 in a regular object file, then it is pointless trying to make
10151 any other type of stub. */
854b41e7
AM
10152 if (!is_static_defined (&fdh->elf)
10153 && !is_static_defined (&h->elf))
721956f4 10154 return ppc_stub_none;
5d1634d7 10155 }
e054468f
AM
10156 else if (elf_local_got_ents (input_sec->owner) != NULL)
10157 {
10158 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10159 struct plt_entry **local_plt = (struct plt_entry **)
10160 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10161 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10162
10163 if (local_plt[r_symndx] != NULL)
10164 {
10165 struct plt_entry *ent;
10166
10167 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10168 if (ent->addend == rel->r_addend
10169 && ent->plt.offset != (bfd_vma) -1)
10170 {
10171 *plt_ent = ent;
10172 return ppc_stub_plt_call;
10173 }
10174 }
10175 }
5d1634d7 10176
721956f4
AM
10177 /* Determine where the call point is. */
10178 location = (input_sec->output_offset
10179 + input_sec->output_section->vma
10180 + rel->r_offset);
5d1634d7 10181
721956f4
AM
10182 branch_offset = destination - location;
10183 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10184
721956f4
AM
10185 /* Determine if a long branch stub is needed. */
10186 max_branch_offset = 1 << 25;
23cedd1d
AM
10187 if (r_type == R_PPC64_REL14
10188 || r_type == R_PPC64_REL14_BRTAKEN
10189 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10190 max_branch_offset = 1 << 15;
5d1634d7 10191
6911b7dc 10192 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10193 /* We need a stub. Figure out whether a long_branch or plt_branch
10194 is needed later. */
10195 return ppc_stub_long_branch;
5d1634d7 10196
721956f4 10197 return ppc_stub_none;
5d1634d7
AM
10198}
10199
f891966f
AM
10200/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10201 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10202 . mflr %r12
10203 . bcl 20,31,1f
10204 .1: mflr %r11
10205 . mtlr %r12
05d0e962 10206 . lis %r12,xxx-1b@highest
f891966f 10207 . ori %r12,%r12,xxx-1b@higher
05d0e962 10208 . sldi %r12,%r12,32
f891966f 10209 . oris %r12,%r12,xxx-1b@high
05d0e962 10210 . ori %r12,%r12,xxx-1b@l
f891966f 10211 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10212
10213static bfd_byte *
10214build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10215{
f891966f
AM
10216 bfd_put_32 (abfd, MFLR_R12, p);
10217 p += 4;
10218 bfd_put_32 (abfd, BCL_20_31, p);
10219 p += 4;
10220 bfd_put_32 (abfd, MFLR_R11, p);
10221 p += 4;
10222 bfd_put_32 (abfd, MTLR_R12, p);
10223 p += 4;
05d0e962
AM
10224 if (off + 0x8000 < 0x10000)
10225 {
10226 if (load)
10227 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10228 else
10229 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10230 p += 4;
10231 }
10232 else if (off + 0x80008000ULL < 0x100000000ULL)
10233 {
10234 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10235 p += 4;
10236 if (load)
10237 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10238 else
10239 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10240 p += 4;
10241 }
10242 else
10243 {
10244 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10245 {
10246 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10247 p += 4;
10248 }
10249 else
10250 {
10251 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10252 p += 4;
10253 if (((off >> 32) & 0xffff) != 0)
10254 {
10255 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10256 p += 4;
10257 }
10258 }
10259 if (((off >> 32) & 0xffffffffULL) != 0)
10260 {
10261 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10262 p += 4;
10263 }
10264 if (PPC_HI (off) != 0)
10265 {
10266 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10267 p += 4;
10268 }
10269 if (PPC_LO (off) != 0)
10270 {
10271 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10272 p += 4;
10273 }
10274 if (load)
10275 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10276 else
10277 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10278 p += 4;
10279 }
10280 return p;
10281}
10282
10283static unsigned int
10284size_offset (bfd_vma off)
10285{
10286 unsigned int size;
10287 if (off + 0x8000 < 0x10000)
10288 size = 4;
10289 else if (off + 0x80008000ULL < 0x100000000ULL)
10290 size = 8;
10291 else
10292 {
10293 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10294 size = 4;
10295 else
10296 {
10297 size = 4;
10298 if (((off >> 32) & 0xffff) != 0)
10299 size += 4;
10300 }
10301 if (((off >> 32) & 0xffffffffULL) != 0)
10302 size += 4;
10303 if (PPC_HI (off) != 0)
10304 size += 4;
10305 if (PPC_LO (off) != 0)
10306 size += 4;
10307 size += 4;
10308 }
f891966f 10309 return size + 16;
05d0e962
AM
10310}
10311
3d58e1fc
AM
10312static unsigned int
10313num_relocs_for_offset (bfd_vma off)
10314{
10315 unsigned int num_rel;
10316 if (off + 0x8000 < 0x10000)
10317 num_rel = 1;
10318 else if (off + 0x80008000ULL < 0x100000000ULL)
10319 num_rel = 2;
10320 else
10321 {
10322 num_rel = 1;
10323 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10324 && ((off >> 32) & 0xffff) != 0)
10325 num_rel += 1;
10326 if (PPC_HI (off) != 0)
10327 num_rel += 1;
10328 if (PPC_LO (off) != 0)
10329 num_rel += 1;
10330 }
10331 return num_rel;
10332}
10333
10334static Elf_Internal_Rela *
10335emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10336 bfd_vma roff, bfd_vma targ, bfd_vma off)
10337{
10338 bfd_vma relative_targ = targ - (roff - 8);
10339 if (bfd_big_endian (info->output_bfd))
10340 roff += 2;
10341 r->r_offset = roff;
10342 r->r_addend = relative_targ + roff;
10343 if (off + 0x8000 < 0x10000)
10344 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10345 else if (off + 0x80008000ULL < 0x100000000ULL)
10346 {
10347 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10348 ++r;
10349 roff += 4;
10350 r->r_offset = roff;
10351 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10352 r->r_addend = relative_targ + roff;
10353 }
10354 else
10355 {
10356 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10357 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10358 else
10359 {
10360 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10361 if (((off >> 32) & 0xffff) != 0)
10362 {
10363 ++r;
10364 roff += 4;
10365 r->r_offset = roff;
10366 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10367 r->r_addend = relative_targ + roff;
10368 }
10369 }
10370 if (((off >> 32) & 0xffffffffULL) != 0)
10371 roff += 4;
10372 if (PPC_HI (off) != 0)
10373 {
10374 ++r;
10375 roff += 4;
10376 r->r_offset = roff;
10377 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10378 r->r_addend = relative_targ + roff;
10379 }
10380 if (PPC_LO (off) != 0)
10381 {
10382 ++r;
10383 roff += 4;
10384 r->r_offset = roff;
10385 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10386 r->r_addend = relative_targ + roff;
10387 }
10388 }
10389 return r;
10390}
10391
04bdff6a
AM
10392static bfd_byte *
10393build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10394 bfd_boolean load)
10395{
10396 uint64_t insn;
10397 if (off - odd + (1ULL << 33) < 1ULL << 34)
10398 {
10399 off -= odd;
10400 if (odd)
10401 {
10402 bfd_put_32 (abfd, NOP, p);
10403 p += 4;
10404 }
10405 if (load)
10406 insn = PLD_R12_PC;
10407 else
10408 insn = PADDI_R12_PC;
10409 insn |= D34 (off);
10410 bfd_put_32 (abfd, insn >> 32, p);
10411 p += 4;
10412 bfd_put_32 (abfd, insn, p);
10413 }
10414 /* The minimum value for paddi is -0x200000000. The minimum value
10415 for li is -0x8000, which when shifted by 34 and added gives a
10416 minimum value of -0x2000200000000. The maximum value is
10417 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10418 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10419 {
10420 off -= 8 - odd;
10421 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10422 p += 4;
10423 if (!odd)
10424 {
10425 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10426 p += 4;
10427 }
10428 insn = PADDI_R12_PC | D34 (off);
10429 bfd_put_32 (abfd, insn >> 32, p);
10430 p += 4;
10431 bfd_put_32 (abfd, insn, p);
10432 p += 4;
10433 if (odd)
10434 {
10435 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10436 p += 4;
10437 }
10438 if (load)
10439 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10440 else
10441 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10442 }
10443 else
10444 {
10445 off -= odd + 8;
10446 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10447 p += 4;
10448 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10449 p += 4;
10450 if (odd)
10451 {
10452 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10453 p += 4;
10454 }
10455 insn = PADDI_R12_PC | D34 (off);
10456 bfd_put_32 (abfd, insn >> 32, p);
10457 p += 4;
10458 bfd_put_32 (abfd, insn, p);
10459 p += 4;
10460 if (!odd)
10461 {
10462 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10463 p += 4;
10464 }
10465 if (load)
10466 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10467 else
10468 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10469 }
10470 p += 4;
10471 return p;
10472}
10473
10474static unsigned int
10475size_powerxx_offset (bfd_vma off, int odd)
10476{
10477 if (off - odd + (1ULL << 33) < 1ULL << 34)
10478 return odd + 8;
10479 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10480 return 20;
10481 else
10482 return 24;
10483}
10484
10485static unsigned int
10486num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10487{
10488 if (off - odd + (1ULL << 33) < 1ULL << 34)
10489 return 1;
10490 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10491 return 2;
10492 else
10493 return 3;
10494}
10495
10496static Elf_Internal_Rela *
10497emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10498 Elf_Internal_Rela *r, bfd_vma roff,
10499 bfd_vma targ, bfd_vma off, int odd)
10500{
10501 if (off - odd + (1ULL << 33) < 1ULL << 34)
10502 roff += odd;
10503 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10504 {
10505 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10506 r->r_offset = roff + d_offset;
10507 r->r_addend = targ + 8 - odd - d_offset;
10508 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10509 ++r;
10510 roff += 8 - odd;
10511 }
10512 else
10513 {
10514 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10515 r->r_offset = roff + d_offset;
10516 r->r_addend = targ + 8 + odd - d_offset;
10517 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10518 ++r;
10519 roff += 4;
10520 r->r_offset = roff + d_offset;
10521 r->r_addend = targ + 4 + odd - d_offset;
10522 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10523 ++r;
10524 roff += 4 + odd;
10525 }
10526 r->r_offset = roff;
10527 r->r_addend = targ;
10528 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10529 return r;
10530}
10531
df136d64
AM
10532/* Emit .eh_frame opcode to advance pc by DELTA. */
10533
10534static bfd_byte *
10535eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10536{
10537 delta /= 4;
10538 if (delta < 64)
10539 *eh++ = DW_CFA_advance_loc + delta;
10540 else if (delta < 256)
10541 {
10542 *eh++ = DW_CFA_advance_loc1;
10543 *eh++ = delta;
10544 }
10545 else if (delta < 65536)
10546 {
10547 *eh++ = DW_CFA_advance_loc2;
10548 bfd_put_16 (abfd, delta, eh);
10549 eh += 2;
10550 }
10551 else
10552 {
10553 *eh++ = DW_CFA_advance_loc4;
10554 bfd_put_32 (abfd, delta, eh);
10555 eh += 4;
10556 }
10557 return eh;
10558}
10559
10560/* Size of required .eh_frame opcode to advance pc by DELTA. */
10561
10562static unsigned int
10563eh_advance_size (unsigned int delta)
10564{
10565 if (delta < 64 * 4)
10566 /* DW_CFA_advance_loc+[1..63]. */
10567 return 1;
10568 if (delta < 256 * 4)
10569 /* DW_CFA_advance_loc1, byte. */
10570 return 2;
10571 if (delta < 65536 * 4)
10572 /* DW_CFA_advance_loc2, 2 bytes. */
10573 return 3;
10574 /* DW_CFA_advance_loc4, 4 bytes. */
10575 return 5;
10576}
10577
794e51c0
AM
10578/* With power7 weakly ordered memory model, it is possible for ld.so
10579 to update a plt entry in one thread and have another thread see a
10580 stale zero toc entry. To avoid this we need some sort of acquire
10581 barrier in the call stub. One solution is to make the load of the
10582 toc word seem to appear to depend on the load of the function entry
10583 word. Another solution is to test for r2 being zero, and branch to
10584 the appropriate glink entry if so.
10585
10586 . fake dep barrier compare
71a39c98
AM
10587 . ld 12,xxx(2) ld 12,xxx(2)
10588 . mtctr 12 mtctr 12
10589 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10590 . add 2,2,11 cmpldi 2,0
10591 . ld 2,xxx+8(2) bnectr+
10592 . bctr b <glink_entry>
10593
10594 The solution involving the compare turns out to be faster, so
10595 that's what we use unless the branch won't reach. */
10596
10597#define ALWAYS_USE_FAKE_DEP 0
10598#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10599
794e51c0
AM
10600static inline unsigned int
10601plt_stub_size (struct ppc_link_hash_table *htab,
10602 struct ppc_stub_hash_entry *stub_entry,
10603 bfd_vma off)
10604{
05d0e962 10605 unsigned size;
b9e5796b 10606
05d0e962
AM
10607 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10608 {
04bdff6a
AM
10609 if (htab->powerxx_stubs)
10610 {
10611 bfd_vma start = (stub_entry->stub_offset
10612 + stub_entry->group->stub_sec->output_offset
10613 + stub_entry->group->stub_sec->output_section->vma);
10614 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10615 start += 4;
10616 size = 8 + size_powerxx_offset (off, start & 4);
10617 }
10618 else
10619 size = 8 + size_offset (off - 8);
05d0e962
AM
10620 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10621 size += 4;
10622 return size;
10623 }
10624
10625 size = 12;
b9e5796b
AM
10626 if (ALWAYS_EMIT_R2SAVE
10627 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10628 size += 4;
10629 if (PPC_HA (off) != 0)
794e51c0 10630 size += 4;
b9e5796b
AM
10631 if (htab->opd_abi)
10632 {
10633 size += 4;
e7d1c40c 10634 if (htab->params->plt_static_chain)
b9e5796b 10635 size += 4;
bd4d2eaa
AM
10636 if (htab->params->plt_thread_safe
10637 && htab->elf.dynamic_sections_created
10638 && stub_entry->h != NULL
10639 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10640 size += 8;
e7d1c40c 10641 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10642 size += 4;
10643 }
794e51c0
AM
10644 if (stub_entry->h != NULL
10645 && (stub_entry->h == htab->tls_get_addr_fd
10646 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10647 && htab->params->tls_get_addr_opt)
f378ab09
AM
10648 {
10649 size += 7 * 4;
e81b4c93 10650 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10651 size += 6 * 4;
f378ab09 10652 }
794e51c0
AM
10653 return size;
10654}
10655
2420fff6
AM
10656/* Depending on the sign of plt_stub_align:
10657 If positive, return the padding to align to a 2**plt_stub_align
10658 boundary.
10659 If negative, if this stub would cross fewer 2**plt_stub_align
10660 boundaries if we align, then return the padding needed to do so. */
10661
794e51c0
AM
10662static inline unsigned int
10663plt_stub_pad (struct ppc_link_hash_table *htab,
10664 struct ppc_stub_hash_entry *stub_entry,
10665 bfd_vma plt_off)
10666{
2420fff6 10667 int stub_align;
1aa42141 10668 unsigned stub_size;
6f20ed8a 10669 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10670
2420fff6
AM
10671 if (htab->params->plt_stub_align >= 0)
10672 {
10673 stub_align = 1 << htab->params->plt_stub_align;
10674 if ((stub_off & (stub_align - 1)) != 0)
10675 return stub_align - (stub_off & (stub_align - 1));
10676 return 0;
10677 }
10678
10679 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10680 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10681 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10682 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10683 return stub_align - (stub_off & (stub_align - 1));
10684 return 0;
10685}
10686
10687/* Build a .plt call stub. */
10688
10689static inline bfd_byte *
10690build_plt_stub (struct ppc_link_hash_table *htab,
10691 struct ppc_stub_hash_entry *stub_entry,
10692 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10693{
e7d1c40c 10694 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10695 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10696 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10697 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10698 && htab->elf.dynamic_sections_created
10699 && stub_entry->h != NULL
10700 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10701 bfd_boolean use_fake_dep = plt_thread_safe;
10702 bfd_vma cmp_branch_off = 0;
10703
10704 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10705 && plt_load_toc
794e51c0 10706 && plt_thread_safe
bd4d2eaa
AM
10707 && !((stub_entry->h == htab->tls_get_addr_fd
10708 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10709 && htab->params->tls_get_addr_opt))
794e51c0
AM
10710 {
10711 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10712 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10713 / PLT_ENTRY_SIZE (htab));
9e390558 10714 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10715 bfd_vma to, from;
10716
68d62958
AM
10717 if (pltindex > 32768)
10718 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10719 to = (glinkoff
10720 + htab->glink->output_offset
10721 + htab->glink->output_section->vma);
6f20ed8a 10722 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10723 + 4 * (ALWAYS_EMIT_R2SAVE
10724 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10725 + 4 * (PPC_HA (offset) != 0)
10726 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10727 != PPC_HA (offset))
10728 + 4 * (plt_static_chain != 0)
10729 + 20
6f20ed8a
AM
10730 + stub_entry->group->stub_sec->output_offset
10731 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10732 cmp_branch_off = to - from;
10733 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10734 }
10735
ac2df442
AM
10736 if (PPC_HA (offset) != 0)
10737 {
176a0d42
AM
10738 if (r != NULL)
10739 {
794e51c0
AM
10740 if (ALWAYS_EMIT_R2SAVE
10741 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10742 r[0].r_offset += 4;
176a0d42 10743 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10744 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10745 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10746 r[1].r_addend = r[0].r_addend;
b9e5796b 10747 if (plt_load_toc)
176a0d42 10748 {
b9e5796b 10749 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10750 {
b9e5796b
AM
10751 r[2].r_offset = r[1].r_offset + 4;
10752 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10753 r[2].r_addend = r[0].r_addend;
10754 }
10755 else
10756 {
10757 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10758 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10759 r[2].r_addend = r[0].r_addend + 8;
10760 if (plt_static_chain)
10761 {
10762 r[3].r_offset = r[2].r_offset + 4;
10763 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10764 r[3].r_addend = r[0].r_addend + 16;
10765 }
c7131b65 10766 }
176a0d42
AM
10767 }
10768 }
794e51c0
AM
10769 if (ALWAYS_EMIT_R2SAVE
10770 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10771 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10772 if (plt_load_toc)
10773 {
10774 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10775 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10776 }
10777 else
10778 {
10779 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10780 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10781 }
b9e5796b
AM
10782 if (plt_load_toc
10783 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10784 {
71a39c98 10785 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10786 offset = 0;
10787 }
71a39c98 10788 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10789 if (plt_load_toc)
794e51c0 10790 {
b9e5796b
AM
10791 if (use_fake_dep)
10792 {
10793 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10794 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10795 }
10796 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10797 if (plt_static_chain)
10798 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10799 }
ac2df442
AM
10800 }
10801 else
10802 {
176a0d42
AM
10803 if (r != NULL)
10804 {
794e51c0
AM
10805 if (ALWAYS_EMIT_R2SAVE
10806 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10807 r[0].r_offset += 4;
176a0d42 10808 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10809 if (plt_load_toc)
176a0d42 10810 {
b9e5796b 10811 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10812 {
b9e5796b
AM
10813 r[1].r_offset = r[0].r_offset + 4;
10814 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10815 r[1].r_addend = r[0].r_addend;
10816 }
10817 else
10818 {
10819 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10820 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10821 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10822 if (plt_static_chain)
10823 {
10824 r[2].r_offset = r[1].r_offset + 4;
10825 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10826 r[2].r_addend = r[0].r_addend + 8;
10827 }
c7131b65 10828 }
176a0d42
AM
10829 }
10830 }
794e51c0
AM
10831 if (ALWAYS_EMIT_R2SAVE
10832 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10833 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10834 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10835 if (plt_load_toc
10836 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10837 {
10838 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10839 offset = 0;
10840 }
71a39c98 10841 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10842 if (plt_load_toc)
794e51c0 10843 {
b9e5796b
AM
10844 if (use_fake_dep)
10845 {
10846 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10847 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10848 }
10849 if (plt_static_chain)
10850 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10851 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10852 }
ac2df442 10853 }
b9e5796b 10854 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10855 {
10856 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10857 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10858 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10859 }
10860 else
407aa07c 10861 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10862 return p;
10863}
10864
a7f2871e
AM
10865/* Build a special .plt call stub for __tls_get_addr. */
10866
10867#define LD_R11_0R3 0xe9630000
10868#define LD_R12_0R3 0xe9830000
10869#define MR_R0_R3 0x7c601b78
10870#define CMPDI_R11_0 0x2c2b0000
10871#define ADD_R3_R12_R13 0x7c6c6a14
10872#define BEQLR 0x4d820020
10873#define MR_R3_R0 0x7c030378
a7f2871e
AM
10874#define STD_R11_0R1 0xf9610000
10875#define BCTRL 0x4e800421
10876#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10877#define MTLR_R11 0x7d6803a6
10878
10879static inline bfd_byte *
794e51c0
AM
10880build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10881 struct ppc_stub_hash_entry *stub_entry,
10882 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10883{
e7d1c40c 10884 bfd *obfd = htab->params->stub_bfd;
df136d64 10885 bfd_byte *loc = p;
794e51c0 10886
a7f2871e
AM
10887 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10888 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10889 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10890 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10891 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10892 bfd_put_32 (obfd, BEQLR, p), p += 4;
10893 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10894 if (r != NULL)
10895 r[0].r_offset += 7 * 4;
e81b4c93 10896 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10897 return build_plt_stub (htab, stub_entry, p, offset, r);
10898
a7f2871e 10899 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10900 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10901
10902 if (r != NULL)
f378ab09 10903 r[0].r_offset += 2 * 4;
794e51c0 10904 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10905 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10906
a078d95a 10907 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10908 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10909 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10910 bfd_put_32 (obfd, BLR, p), p += 4;
10911
df136d64
AM
10912 if (htab->glink_eh_frame != NULL
10913 && htab->glink_eh_frame->size != 0)
10914 {
10915 bfd_byte *base, *eh;
10916 unsigned int lr_used, delta;
10917
10918 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10919 eh = base + stub_entry->group->eh_size;
10920 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10921 delta = lr_used - stub_entry->group->lr_restore;
10922 stub_entry->group->lr_restore = lr_used + 16;
10923 eh = eh_advance (htab->elf.dynobj, eh, delta);
10924 *eh++ = DW_CFA_offset_extended_sf;
10925 *eh++ = 65;
10926 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10927 *eh++ = DW_CFA_advance_loc + 4;
10928 *eh++ = DW_CFA_restore_extended;
10929 *eh++ = 65;
10930 stub_entry->group->eh_size = eh - base;
10931 }
a7f2871e
AM
10932 return p;
10933}
10934
176a0d42
AM
10935static Elf_Internal_Rela *
10936get_relocs (asection *sec, int count)
10937{
10938 Elf_Internal_Rela *relocs;
10939 struct bfd_elf_section_data *elfsec_data;
10940
10941 elfsec_data = elf_section_data (sec);
10942 relocs = elfsec_data->relocs;
10943 if (relocs == NULL)
10944 {
10945 bfd_size_type relsize;
10946 relsize = sec->reloc_count * sizeof (*relocs);
10947 relocs = bfd_alloc (sec->owner, relsize);
10948 if (relocs == NULL)
10949 return NULL;
10950 elfsec_data->relocs = relocs;
d4730f92
BS
10951 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10952 sizeof (Elf_Internal_Shdr));
10953 if (elfsec_data->rela.hdr == NULL)
10954 return NULL;
10955 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10956 * sizeof (Elf64_External_Rela));
10957 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10958 sec->reloc_count = 0;
10959 }
10960 relocs += sec->reloc_count;
10961 sec->reloc_count += count;
10962 return relocs;
10963}
10964
3d58e1fc
AM
10965/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10966 forms, to the equivalent relocs against the global symbol given by
10967 STUB_ENTRY->H. */
10968
10969static bfd_boolean
10970use_global_in_relocs (struct ppc_link_hash_table *htab,
10971 struct ppc_stub_hash_entry *stub_entry,
10972 Elf_Internal_Rela *r, unsigned int num_rel)
10973{
10974 struct elf_link_hash_entry **hashes;
10975 unsigned long symndx;
10976 struct ppc_link_hash_entry *h;
10977 bfd_vma symval;
10978
10979 /* Relocs are always against symbols in their own object file. Fake
10980 up global sym hashes for the stub bfd (which has no symbols). */
10981 hashes = elf_sym_hashes (htab->params->stub_bfd);
10982 if (hashes == NULL)
10983 {
10984 bfd_size_type hsize;
10985
10986 /* When called the first time, stub_globals will contain the
10987 total number of symbols seen during stub sizing. After
10988 allocating, stub_globals is used as an index to fill the
10989 hashes array. */
10990 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10991 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10992 if (hashes == NULL)
10993 return FALSE;
10994 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10995 htab->stub_globals = 1;
10996 }
10997 symndx = htab->stub_globals++;
10998 h = stub_entry->h;
10999 hashes[symndx] = &h->elf;
11000 if (h->oh != NULL && h->oh->is_func)
11001 h = ppc_follow_link (h->oh);
11002 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11003 || h->elf.root.type == bfd_link_hash_defweak);
11004 symval = (h->elf.root.u.def.value
11005 + h->elf.root.u.def.section->output_offset
11006 + h->elf.root.u.def.section->output_section->vma);
11007 while (num_rel-- != 0)
11008 {
11009 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11010 if (h->elf.root.u.def.section != stub_entry->target_section)
11011 {
11012 /* H is an opd symbol. The addend must be zero, and the
11013 branch reloc is the only one we can convert. */
11014 r->r_addend = 0;
11015 break;
11016 }
11017 else
11018 r->r_addend -= symval;
11019 --r;
11020 }
11021 return TRUE;
11022}
11023
aa374f67 11024static bfd_vma
25f53a85 11025get_r2off (struct bfd_link_info *info,
aa374f67
AM
11026 struct ppc_stub_hash_entry *stub_entry)
11027{
25f53a85 11028 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11029 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11030
11031 if (r2off == 0)
11032 {
11033 /* Support linking -R objects. Get the toc pointer from the
11034 opd entry. */
11035 char buf[8];
b9e5796b
AM
11036 if (!htab->opd_abi)
11037 return r2off;
aa374f67
AM
11038 asection *opd = stub_entry->h->elf.root.u.def.section;
11039 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11040
11041 if (strcmp (opd->name, ".opd") != 0
11042 || opd->reloc_count != 0)
11043 {
2cdcc330
AM
11044 info->callbacks->einfo
11045 (_("%P: cannot find opd entry toc for `%pT'\n"),
11046 stub_entry->h->elf.root.root.string);
aa374f67 11047 bfd_set_error (bfd_error_bad_value);
a7c49797 11048 return (bfd_vma) -1;
aa374f67
AM
11049 }
11050 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11051 return (bfd_vma) -1;
aa374f67 11052 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11053 r2off -= elf_gp (info->output_bfd);
aa374f67 11054 }
6f20ed8a 11055 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11056 return r2off;
11057}
11058
b34976b6 11059static bfd_boolean
4ce794b7 11060ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11061{
721956f4
AM
11062 struct ppc_stub_hash_entry *stub_entry;
11063 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11064 struct bfd_link_info *info;
11065 struct ppc_link_hash_table *htab;
721956f4 11066 bfd_byte *loc;
3d58e1fc 11067 bfd_byte *p, *relp;
1aa42141 11068 bfd_vma targ, off;
176a0d42 11069 Elf_Internal_Rela *r;
e054468f 11070 asection *plt;
3d58e1fc 11071 int num_rel;
04bdff6a 11072 int odd;
5d1634d7 11073
721956f4
AM
11074 /* Massage our args to the form they really have. */
11075 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11076 info = in_arg;
5d1634d7 11077
5d1634d7 11078 htab = ppc_hash_table (info);
4dfe6ac6
NC
11079 if (htab == NULL)
11080 return FALSE;
5d1634d7 11081
1aa42141 11082 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11083 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11084
4ce794b7 11085 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11086 switch (stub_entry->stub_type)
5d1634d7 11087 {
721956f4 11088 case ppc_stub_long_branch:
ad8e1ba5 11089 case ppc_stub_long_branch_r2off:
721956f4 11090 /* Branches are relative. This is where we are going to. */
1aa42141 11091 targ = (stub_entry->target_value
6911b7dc
AM
11092 + stub_entry->target_section->output_offset
11093 + stub_entry->target_section->output_section->vma);
1aa42141 11094 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11095
721956f4 11096 /* And this is where we are coming from. */
1aa42141
AM
11097 off = (stub_entry->stub_offset
11098 + stub_entry->group->stub_sec->output_offset
11099 + stub_entry->group->stub_sec->output_section->vma);
11100 off = targ - off;
e86ce104 11101
9e390558 11102 p = loc;
ac2df442 11103 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11104 {
25f53a85 11105 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11106
a7c49797 11107 if (r2off == (bfd_vma) -1)
aa374f67
AM
11108 {
11109 htab->stub_error = TRUE;
11110 return FALSE;
11111 }
9e390558
AM
11112 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11113 p += 4;
ac2df442
AM
11114 if (PPC_HA (r2off) != 0)
11115 {
e7d1c40c 11116 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11117 ADDIS_R2_R2 | PPC_HA (r2off), p);
11118 p += 4;
a7c49797
AM
11119 }
11120 if (PPC_LO (r2off) != 0)
11121 {
11122 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11123 ADDI_R2_R2 | PPC_LO (r2off), p);
11124 p += 4;
ac2df442 11125 }
9e390558 11126 off -= p - loc;
ad8e1ba5 11127 }
9e390558
AM
11128 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11129 p += 4;
ad8e1ba5 11130
5c3dead3
AM
11131 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11132 {
cf97bcb0
AM
11133 _bfd_error_handler
11134 (_("long branch stub `%s' offset overflow"),
bc30df16 11135 stub_entry->root.string);
5c3dead3
AM
11136 htab->stub_error = TRUE;
11137 return FALSE;
11138 }
ee75fd95
AM
11139
11140 if (info->emitrelocations)
11141 {
6f20ed8a 11142 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11143 if (r == NULL)
11144 return FALSE;
9e390558 11145 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11146 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11147 r->r_addend = targ;
3d58e1fc
AM
11148 if (stub_entry->h != NULL
11149 && !use_global_in_relocs (htab, stub_entry, r, 1))
11150 return FALSE;
ee75fd95 11151 }
721956f4 11152 break;
e86ce104 11153
721956f4 11154 case ppc_stub_plt_branch:
ad8e1ba5 11155 case ppc_stub_plt_branch_r2off:
721956f4
AM
11156 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11157 stub_entry->root.string + 9,
b34976b6 11158 FALSE, FALSE);
721956f4
AM
11159 if (br_entry == NULL)
11160 {
cf97bcb0
AM
11161 _bfd_error_handler (_("can't find branch stub `%s'"),
11162 stub_entry->root.string);
b34976b6
AM
11163 htab->stub_error = TRUE;
11164 return FALSE;
721956f4
AM
11165 }
11166
1aa42141 11167 targ = (stub_entry->target_value
176a0d42
AM
11168 + stub_entry->target_section->output_offset
11169 + stub_entry->target_section->output_section->vma);
6911b7dc 11170 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11171 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11172
1aa42141 11173 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11174 htab->brlt->contents + br_entry->offset);
721956f4 11175
f94498ff 11176 if (br_entry->iter == htab->stub_iteration)
721956f4 11177 {
f94498ff 11178 br_entry->iter = 0;
84f5d08e 11179
f94498ff 11180 if (htab->relbrlt != NULL)
84f5d08e 11181 {
f94498ff
AM
11182 /* Create a reloc for the branch lookup table entry. */
11183 Elf_Internal_Rela rela;
11184 bfd_byte *rl;
11185
11186 rela.r_offset = (br_entry->offset
11187 + htab->brlt->output_offset
11188 + htab->brlt->output_section->vma);
11189 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11190 rela.r_addend = targ;
f94498ff
AM
11191
11192 rl = htab->relbrlt->contents;
11193 rl += (htab->relbrlt->reloc_count++
11194 * sizeof (Elf64_External_Rela));
11195 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11196 }
11197 else if (info->emitrelocations)
11198 {
176a0d42
AM
11199 r = get_relocs (htab->brlt, 1);
11200 if (r == NULL)
11201 return FALSE;
11202 /* brlt, being SEC_LINKER_CREATED does not go through the
11203 normal reloc processing. Symbols and offsets are not
11204 translated from input file to output file form, so
11205 set up the offset per the output file. */
f94498ff
AM
11206 r->r_offset = (br_entry->offset
11207 + htab->brlt->output_offset
11208 + htab->brlt->output_section->vma);
11209 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11210 r->r_addend = targ;
84f5d08e 11211 }
84f5d08e 11212 }
721956f4 11213
1aa42141 11214 targ = (br_entry->offset
176a0d42
AM
11215 + htab->brlt->output_offset
11216 + htab->brlt->output_section->vma);
11217
1aa42141
AM
11218 off = (elf_gp (info->output_bfd)
11219 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11220 off = targ - off;
721956f4 11221
ad8e1ba5 11222 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11223 {
25f53a85 11224 info->callbacks->einfo
c1c8c1ef 11225 (_("%P: linkage table error against `%pT'\n"),
721956f4 11226 stub_entry->root.string);
5d1634d7 11227 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11228 htab->stub_error = TRUE;
11229 return FALSE;
5d1634d7 11230 }
41bd81ab 11231
176a0d42
AM
11232 if (info->emitrelocations)
11233 {
6f20ed8a 11234 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11235 if (r == NULL)
11236 return FALSE;
6f20ed8a 11237 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11238 if (bfd_big_endian (info->output_bfd))
11239 r[0].r_offset += 2;
00f412ee 11240 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11241 r[0].r_offset += 4;
11242 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11243 r[0].r_addend = targ;
176a0d42
AM
11244 if (PPC_HA (off) != 0)
11245 {
11246 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11247 r[1].r_offset = r[0].r_offset + 4;
11248 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11249 r[1].r_addend = r[0].r_addend;
11250 }
11251 }
11252
9e390558 11253 p = loc;
00f412ee 11254 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11255 {
176a0d42 11256 if (PPC_HA (off) != 0)
ac2df442 11257 {
e7d1c40c 11258 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11259 ADDIS_R12_R2 | PPC_HA (off), p);
11260 p += 4;
e7d1c40c 11261 bfd_put_32 (htab->params->stub_bfd,
9e390558 11262 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11263 }
11264 else
9e390558
AM
11265 bfd_put_32 (htab->params->stub_bfd,
11266 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11267 }
11268 else
11269 {
25f53a85 11270 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11271
a7c49797 11272 if (r2off == (bfd_vma) -1)
aa374f67
AM
11273 {
11274 htab->stub_error = TRUE;
11275 return FALSE;
11276 }
ad8e1ba5 11277
9e390558
AM
11278 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11279 p += 4;
176a0d42 11280 if (PPC_HA (off) != 0)
ac2df442 11281 {
e7d1c40c 11282 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11283 ADDIS_R12_R2 | PPC_HA (off), p);
11284 p += 4;
e7d1c40c 11285 bfd_put_32 (htab->params->stub_bfd,
9e390558 11286 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11287 }
11288 else
9e390558 11289 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11290
11291 if (PPC_HA (r2off) != 0)
11292 {
9e390558 11293 p += 4;
e7d1c40c 11294 bfd_put_32 (htab->params->stub_bfd,
9e390558 11295 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11296 }
11297 if (PPC_LO (r2off) != 0)
11298 {
9e390558 11299 p += 4;
e7d1c40c 11300 bfd_put_32 (htab->params->stub_bfd,
9e390558 11301 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11302 }
ad8e1ba5 11303 }
9e390558
AM
11304 p += 4;
11305 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11306 p += 4;
407aa07c
AM
11307 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11308 p += 4;
721956f4 11309 break;
5d1634d7 11310
05d0e962
AM
11311 case ppc_stub_long_branch_notoc:
11312 case ppc_stub_long_branch_both:
11313 case ppc_stub_plt_branch_notoc:
11314 case ppc_stub_plt_branch_both:
11315 case ppc_stub_plt_call_notoc:
11316 case ppc_stub_plt_call_both:
11317 p = loc;
f891966f 11318 off = (stub_entry->stub_offset
05d0e962
AM
11319 + stub_entry->group->stub_sec->output_offset
11320 + stub_entry->group->stub_sec->output_section->vma);
11321 if (stub_entry->stub_type == ppc_stub_long_branch_both
11322 || stub_entry->stub_type == ppc_stub_plt_branch_both
11323 || stub_entry->stub_type == ppc_stub_plt_call_both)
11324 {
11325 off += 4;
11326 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11327 p += 4;
11328 }
11329 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11330 {
11331 targ = stub_entry->plt_ent->plt.offset & ~1;
11332 if (targ >= (bfd_vma) -2)
11333 abort ();
11334
11335 plt = htab->elf.splt;
11336 if (!htab->elf.dynamic_sections_created
11337 || stub_entry->h == NULL
11338 || stub_entry->h->elf.dynindx == -1)
11339 {
11340 if (stub_entry->symtype == STT_GNU_IFUNC)
11341 plt = htab->elf.iplt;
11342 else
11343 plt = htab->pltlocal;
11344 }
11345 targ += plt->output_offset + plt->output_section->vma;
11346 }
11347 else
11348 targ = (stub_entry->target_value
11349 + stub_entry->target_section->output_offset
11350 + stub_entry->target_section->output_section->vma);
04bdff6a 11351 odd = off & 4;
05d0e962 11352 off = targ - off;
f891966f 11353
3d58e1fc
AM
11354 relp = p;
11355 num_rel = 0;
04bdff6a
AM
11356 if (htab->powerxx_stubs)
11357 {
11358 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11359 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11360 }
11361 else
11362 {
11363 /* The notoc stubs calculate their target (either a PLT entry or
11364 the global entry point of a function) relative to the PC
11365 returned by the "bcl" two instructions past the start of the
11366 sequence emitted by build_offset. The offset is therefore 8
11367 less than calculated from the start of the sequence. */
11368 off -= 8;
11369 p = build_offset (htab->params->stub_bfd, p, off,
11370 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11371 }
11372
f891966f 11373 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11374 {
f891966f 11375 bfd_vma from;
3d58e1fc 11376 num_rel = 1;
f891966f
AM
11377 from = (stub_entry->stub_offset
11378 + stub_entry->group->stub_sec->output_offset
11379 + stub_entry->group->stub_sec->output_section->vma
11380 + (p - loc));
05d0e962 11381 bfd_put_32 (htab->params->stub_bfd,
f891966f 11382 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11383 }
11384 else
11385 {
11386 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11387 p += 4;
11388 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11389 }
11390 p += 4;
df136d64 11391
3d58e1fc
AM
11392 if (info->emitrelocations)
11393 {
04bdff6a
AM
11394 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11395 if (htab->powerxx_stubs)
11396 num_rel += num_relocs_for_powerxx_offset (off, odd);
11397 else
11398 {
11399 num_rel += num_relocs_for_offset (off);
11400 roff += 16;
11401 }
3d58e1fc
AM
11402 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11403 if (r == NULL)
11404 return FALSE;
04bdff6a
AM
11405 if (htab->powerxx_stubs)
11406 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11407 else
11408 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11409 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11410 || stub_entry->stub_type == ppc_stub_long_branch_both)
11411 {
11412 ++r;
11413 roff = p - 4 - stub_entry->group->stub_sec->contents;
11414 r->r_offset = roff;
11415 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11416 r->r_addend = targ;
11417 if (stub_entry->h != NULL
11418 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11419 return FALSE;
11420 }
11421 }
11422
04bdff6a
AM
11423 if (!htab->powerxx_stubs
11424 && htab->glink_eh_frame != NULL
11425 && htab->glink_eh_frame->size != 0)
df136d64
AM
11426 {
11427 bfd_byte *base, *eh;
11428 unsigned int lr_used, delta;
11429
11430 base = (htab->glink_eh_frame->contents
11431 + stub_entry->group->eh_base + 17);
11432 eh = base + stub_entry->group->eh_size;
11433 lr_used = stub_entry->stub_offset + 8;
11434 if (stub_entry->stub_type == ppc_stub_long_branch_both
11435 || stub_entry->stub_type == ppc_stub_plt_branch_both
11436 || stub_entry->stub_type == ppc_stub_plt_call_both)
11437 lr_used += 4;
11438 delta = lr_used - stub_entry->group->lr_restore;
11439 stub_entry->group->lr_restore = lr_used + 8;
11440 eh = eh_advance (htab->elf.dynobj, eh, delta);
11441 *eh++ = DW_CFA_register;
11442 *eh++ = 65;
11443 *eh++ = 12;
11444 *eh++ = DW_CFA_advance_loc + 2;
11445 *eh++ = DW_CFA_restore_extended;
11446 *eh++ = 65;
11447 stub_entry->group->eh_size = eh - base;
11448 }
05d0e962
AM
11449 break;
11450
721956f4 11451 case ppc_stub_plt_call:
794e51c0 11452 case ppc_stub_plt_call_r2save:
e054468f 11453 if (stub_entry->h != NULL
b31867b6
AM
11454 && stub_entry->h->is_func_descriptor
11455 && stub_entry->h->oh != NULL)
c862ae31 11456 {
b31867b6
AM
11457 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11458
11459 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11460 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11461 if (fh->elf.root.type == bfd_link_hash_undefined
11462 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11463 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11464 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11465 }
11466
721956f4 11467 /* Now build the stub. */
1aa42141
AM
11468 targ = stub_entry->plt_ent->plt.offset & ~1;
11469 if (targ >= (bfd_vma) -2)
721956f4
AM
11470 abort ();
11471
33e44f2e 11472 plt = htab->elf.splt;
25f23106
AM
11473 if (!htab->elf.dynamic_sections_created
11474 || stub_entry->h == NULL
11475 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11476 {
11477 if (stub_entry->symtype == STT_GNU_IFUNC)
11478 plt = htab->elf.iplt;
11479 else
11480 plt = htab->pltlocal;
11481 }
1aa42141 11482 targ += plt->output_offset + plt->output_section->vma;
e054468f 11483
1aa42141
AM
11484 off = (elf_gp (info->output_bfd)
11485 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11486 off = targ - off;
721956f4 11487
ad8e1ba5 11488 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11489 {
25f53a85 11490 info->callbacks->einfo
695344c0 11491 /* xgettext:c-format */
c1c8c1ef 11492 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11493 stub_entry->h != NULL
11494 ? stub_entry->h->elf.root.root.string
11495 : "<local sym>");
721956f4 11496 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11497 htab->stub_error = TRUE;
11498 return FALSE;
721956f4
AM
11499 }
11500
176a0d42
AM
11501 r = NULL;
11502 if (info->emitrelocations)
11503 {
6f20ed8a 11504 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11505 ((PPC_HA (off) != 0)
11506 + (htab->opd_abi
e7d1c40c 11507 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11508 && PPC_HA (off + 16) == PPC_HA (off))
11509 : 1)));
176a0d42
AM
11510 if (r == NULL)
11511 return FALSE;
6f20ed8a 11512 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11513 if (bfd_big_endian (info->output_bfd))
11514 r[0].r_offset += 2;
1aa42141 11515 r[0].r_addend = targ;
176a0d42 11516 }
a7f2871e
AM
11517 if (stub_entry->h != NULL
11518 && (stub_entry->h == htab->tls_get_addr_fd
11519 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11520 && htab->params->tls_get_addr_opt)
794e51c0 11521 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11522 else
794e51c0 11523 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11524 break;
11525
a4b6fadd
AM
11526 case ppc_stub_save_res:
11527 return TRUE;
11528
721956f4
AM
11529 default:
11530 BFD_FAIL ();
b34976b6 11531 return FALSE;
721956f4
AM
11532 }
11533
1aa42141 11534 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11535
e7d1c40c 11536 if (htab->params->emit_stub_syms)
97b639ba
AM
11537 {
11538 struct elf_link_hash_entry *h;
ee75fd95
AM
11539 size_t len1, len2;
11540 char *name;
11541 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11542 "long_branch",
11543 "long_branch",
3f6ff479
AM
11544 "long_branch",
11545 "plt_branch",
ee75fd95 11546 "plt_branch",
05d0e962
AM
11547 "plt_branch",
11548 "plt_branch",
11549 "plt_call",
11550 "plt_call",
794e51c0 11551 "plt_call",
ee75fd95
AM
11552 "plt_call" };
11553
11554 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11555 len2 = strlen (stub_entry->root.string);
11556 name = bfd_malloc (len1 + len2 + 2);
11557 if (name == NULL)
11558 return FALSE;
11559 memcpy (name, stub_entry->root.string, 9);
11560 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11561 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11562 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11563 if (h == NULL)
11564 return FALSE;
11565 if (h->root.type == bfd_link_hash_new)
11566 {
11567 h->root.type = bfd_link_hash_defined;
6f20ed8a 11568 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11569 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11570 h->ref_regular = 1;
11571 h->def_regular = 1;
11572 h->ref_regular_nonweak = 1;
11573 h->forced_local = 1;
11574 h->non_elf = 0;
2ec55de3 11575 h->root.linker_def = 1;
97b639ba
AM
11576 }
11577 }
11578
b34976b6 11579 return TRUE;
721956f4
AM
11580}
11581
11582/* As above, but don't actually build the stub. Just bump offset so
11583 we know stub section sizes, and select plt_branch stubs where
11584 long_branch stubs won't do. */
11585
b34976b6 11586static bfd_boolean
4ce794b7 11587ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11588{
11589 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11590 struct bfd_link_info *info;
721956f4 11591 struct ppc_link_hash_table *htab;
f891966f
AM
11592 asection *plt;
11593 bfd_vma targ, off, r2off;
04bdff6a 11594 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11595
11596 /* Massage our args to the form they really have. */
11597 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11598 info = in_arg;
11599
11600 htab = ppc_hash_table (info);
4dfe6ac6
NC
11601 if (htab == NULL)
11602 return FALSE;
721956f4 11603
1aa42141
AM
11604 /* Make a note of the offset within the stubs for this entry. */
11605 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11606
a4b6fadd
AM
11607 if (stub_entry->h != NULL
11608 && stub_entry->h->save_res
11609 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11610 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11611 {
11612 /* Don't make stubs to out-of-line register save/restore
11613 functions. Instead, emit copies of the functions. */
11614 stub_entry->group->needs_save_res = 1;
11615 stub_entry->stub_type = ppc_stub_save_res;
11616 return TRUE;
11617 }
11618
f891966f 11619 switch (stub_entry->stub_type)
721956f4 11620 {
f891966f
AM
11621 case ppc_stub_plt_branch:
11622 case ppc_stub_plt_branch_r2off:
11623 /* Reset the stub type from the plt branch variant in case we now
11624 can reach with a shorter stub. */
11625 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11626 /* Fall through. */
11627 case ppc_stub_long_branch:
11628 case ppc_stub_long_branch_r2off:
1aa42141
AM
11629 targ = (stub_entry->target_value
11630 + stub_entry->target_section->output_offset
11631 + stub_entry->target_section->output_section->vma);
f891966f 11632 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11633 off = (stub_entry->stub_offset
11634 + stub_entry->group->stub_sec->output_offset
11635 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11636
ad8e1ba5 11637 size = 4;
f891966f 11638 r2off = 0;
ad8e1ba5
AM
11639 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11640 {
25f53a85 11641 r2off = get_r2off (info, stub_entry);
a7c49797 11642 if (r2off == (bfd_vma) -1)
aa374f67
AM
11643 {
11644 htab->stub_error = TRUE;
11645 return FALSE;
11646 }
a7c49797 11647 size = 8;
ac2df442 11648 if (PPC_HA (r2off) != 0)
a7c49797
AM
11649 size += 4;
11650 if (PPC_LO (r2off) != 0)
11651 size += 4;
1aa42141 11652 off += size - 4;
ad8e1ba5 11653 }
1aa42141 11654 off = targ - off;
ad8e1ba5 11655
f891966f
AM
11656 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11657 Do the same for -R objects without function descriptors. */
11658 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11659 && r2off == 0
11660 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11661 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11662 {
f891966f 11663 struct ppc_branch_hash_entry *br_entry;
df136d64 11664
f891966f
AM
11665 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11666 stub_entry->root.string + 9,
11667 TRUE, FALSE);
11668 if (br_entry == NULL)
721956f4 11669 {
f891966f
AM
11670 _bfd_error_handler (_("can't build branch stub `%s'"),
11671 stub_entry->root.string);
11672 htab->stub_error = TRUE;
11673 return FALSE;
721956f4
AM
11674 }
11675
f891966f 11676 if (br_entry->iter != htab->stub_iteration)
721956f4 11677 {
f891966f
AM
11678 br_entry->iter = htab->stub_iteration;
11679 br_entry->offset = htab->brlt->size;
11680 htab->brlt->size += 8;
63bc6f6c 11681
f891966f
AM
11682 if (htab->relbrlt != NULL)
11683 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11684 else if (info->emitrelocations)
84f5d08e 11685 {
f891966f
AM
11686 htab->brlt->reloc_count += 1;
11687 htab->brlt->flags |= SEC_RELOC;
05d0e962 11688 }
f891966f 11689 }
ac2df442 11690
f891966f
AM
11691 targ = (br_entry->offset
11692 + htab->brlt->output_offset
11693 + htab->brlt->output_section->vma);
11694 off = (elf_gp (info->output_bfd)
11695 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11696 off = targ - off;
176a0d42 11697
f891966f
AM
11698 if (info->emitrelocations)
11699 {
11700 stub_entry->group->stub_sec->reloc_count
11701 += 1 + (PPC_HA (off) != 0);
11702 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11703 }
05d0e962 11704
f891966f
AM
11705 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11706 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11707 {
11708 size = 12;
11709 if (PPC_HA (off) != 0)
11710 size = 16;
ac2df442 11711 }
f891966f 11712 else
ac2df442 11713 {
f891966f
AM
11714 size = 16;
11715 if (PPC_HA (off) != 0)
11716 size += 4;
11717
11718 if (PPC_HA (r2off) != 0)
11719 size += 4;
11720 if (PPC_LO (r2off) != 0)
11721 size += 4;
ac2df442 11722 }
721956f4 11723 }
f891966f
AM
11724 else if (info->emitrelocations)
11725 {
11726 stub_entry->group->stub_sec->reloc_count += 1;
11727 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11728 }
11729 break;
11730
11731 case ppc_stub_plt_branch_notoc:
11732 case ppc_stub_plt_branch_both:
11733 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11734 /* Fall through. */
11735 case ppc_stub_long_branch_notoc:
11736 case ppc_stub_long_branch_both:
11737 off = (stub_entry->stub_offset
11738 + stub_entry->group->stub_sec->output_offset
11739 + stub_entry->group->stub_sec->output_section->vma);
11740 size = 0;
11741 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11742 size = 4;
11743 off += size;
11744 targ = (stub_entry->target_value
11745 + stub_entry->target_section->output_offset
11746 + stub_entry->target_section->output_section->vma);
04bdff6a 11747 odd = off & 4;
f891966f
AM
11748 off = targ - off;
11749
3d58e1fc
AM
11750 if (info->emitrelocations)
11751 {
04bdff6a
AM
11752 unsigned int num_rel;
11753 if (htab->powerxx_stubs)
11754 num_rel = num_relocs_for_powerxx_offset (off, odd);
11755 else
11756 num_rel = num_relocs_for_offset (off - 8);
11757 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11758 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11759 }
11760
04bdff6a
AM
11761 if (htab->powerxx_stubs)
11762 extra = size_powerxx_offset (off, odd);
11763 else
11764 extra = size_offset (off - 8);
f891966f
AM
11765 /* Include branch insn plus those in the offset sequence. */
11766 size += 4 + extra;
11767 /* The branch insn is at the end, or "extra" bytes along. So
11768 its offset will be "extra" bytes less that that already
11769 calculated. */
11770 off -= extra;
11771
04bdff6a
AM
11772 if (!htab->powerxx_stubs)
11773 {
11774 /* After the bcl, lr has been modified so we need to emit
11775 .eh_frame info saying the return address is in r12. */
11776 lr_used = stub_entry->stub_offset + 8;
11777 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11778 lr_used += 4;
11779 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11780 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11781 DW_CFA_restore_extended 65. */
11782 delta = lr_used - stub_entry->group->lr_restore;
11783 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11784 stub_entry->group->lr_restore = lr_used + 8;
11785 }
f891966f
AM
11786
11787 /* If the branch can't reach, use a plt_branch. */
11788 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11789 {
11790 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11791 - ppc_stub_long_branch_notoc);
11792 size += 4;
11793 }
3d58e1fc
AM
11794 else if (info->emitrelocations)
11795 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
11796 break;
11797
11798 case ppc_stub_plt_call_notoc:
11799 case ppc_stub_plt_call_both:
11800 off = (stub_entry->stub_offset
11801 + stub_entry->group->stub_sec->output_offset
11802 + stub_entry->group->stub_sec->output_section->vma);
11803 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11804 off += 4;
11805 targ = stub_entry->plt_ent->plt.offset & ~1;
11806 if (targ >= (bfd_vma) -2)
11807 abort ();
11808
11809 plt = htab->elf.splt;
11810 if (!htab->elf.dynamic_sections_created
11811 || stub_entry->h == NULL
11812 || stub_entry->h->elf.dynindx == -1)
11813 {
11814 if (stub_entry->symtype == STT_GNU_IFUNC)
11815 plt = htab->elf.iplt;
11816 else
11817 plt = htab->pltlocal;
11818 }
11819 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 11820 odd = off & 4;
f891966f
AM
11821 off = targ - off;
11822
11823 if (htab->params->plt_stub_align != 0)
11824 {
11825 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11826
11827 stub_entry->group->stub_sec->size += pad;
11828 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11829 off -= pad;
11830 }
11831
3d58e1fc
AM
11832 if (info->emitrelocations)
11833 {
04bdff6a
AM
11834 unsigned int num_rel;
11835 if (htab->powerxx_stubs)
11836 num_rel = num_relocs_for_powerxx_offset (off, odd);
11837 else
11838 num_rel = num_relocs_for_offset (off - 8);
11839 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11840 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11841 }
11842
f891966f
AM
11843 size = plt_stub_size (htab, stub_entry, off);
11844
04bdff6a
AM
11845 if (!htab->powerxx_stubs)
11846 {
11847 /* After the bcl, lr has been modified so we need to emit
11848 .eh_frame info saying the return address is in r12. */
11849 lr_used = stub_entry->stub_offset + 8;
11850 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11851 lr_used += 4;
11852 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11853 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11854 DW_CFA_restore_extended 65. */
11855 delta = lr_used - stub_entry->group->lr_restore;
11856 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11857 stub_entry->group->lr_restore = lr_used + 8;
11858 }
f891966f
AM
11859 break;
11860
11861 case ppc_stub_plt_call:
11862 case ppc_stub_plt_call_r2save:
11863 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11864 if (targ >= (bfd_vma) -2)
11865 abort ();
11866 plt = htab->elf.splt;
11867 if (!htab->elf.dynamic_sections_created
11868 || stub_entry->h == NULL
11869 || stub_entry->h->elf.dynindx == -1)
11870 {
11871 if (stub_entry->symtype == STT_GNU_IFUNC)
11872 plt = htab->elf.iplt;
11873 else
11874 plt = htab->pltlocal;
11875 }
11876 targ += plt->output_offset + plt->output_section->vma;
11877
11878 off = (elf_gp (info->output_bfd)
11879 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11880 off = targ - off;
11881
11882 if (htab->params->plt_stub_align != 0)
11883 {
11884 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11885
11886 stub_entry->group->stub_sec->size += pad;
11887 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11888 }
11889
11890 if (info->emitrelocations)
11891 {
11892 stub_entry->group->stub_sec->reloc_count
11893 += ((PPC_HA (off) != 0)
11894 + (htab->opd_abi
11895 ? 2 + (htab->params->plt_static_chain
11896 && PPC_HA (off + 16) == PPC_HA (off))
11897 : 1));
11898 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11899 }
11900
11901 size = plt_stub_size (htab, stub_entry, off);
11902
11903 if (stub_entry->h != NULL
11904 && (stub_entry->h == htab->tls_get_addr_fd
11905 || stub_entry->h == htab->tls_get_addr)
11906 && htab->params->tls_get_addr_opt
11907 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11908 {
11909 /* After the bctrl, lr has been modified so we need to
11910 emit .eh_frame info saying the return address is
11911 on the stack. In fact we put the EH info specifying
11912 that the return address is on the stack *at* the
11913 call rather than after it, because the EH info for a
11914 call needs to be specified by that point.
11915 See libgcc/unwind-dw2.c execute_cfa_program. */
11916 lr_used = stub_entry->stub_offset + size - 20;
11917 /* The eh_frame info will consist of a DW_CFA_advance_loc
11918 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11919 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11920 delta = lr_used - stub_entry->group->lr_restore;
11921 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11922 stub_entry->group->lr_restore = size - 4;
11923 }
11924 break;
11925
11926 default:
11927 BFD_FAIL ();
11928 return FALSE;
721956f4
AM
11929 }
11930
6f20ed8a 11931 stub_entry->group->stub_sec->size += size;
b34976b6 11932 return TRUE;
721956f4
AM
11933}
11934
11935/* Set up various things so that we can make a list of input sections
11936 for each output section included in the link. Returns -1 on error,
cedb70c5 11937 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11938
11939int
e7d1c40c 11940ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11941{
6f20ed8a 11942 unsigned int id;
721956f4
AM
11943 bfd_size_type amt;
11944 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11945
4dfe6ac6
NC
11946 if (htab == NULL)
11947 return -1;
4c52953f 11948
7cf7fcc8 11949 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11950 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11951 htab->sec_info = bfd_zmalloc (amt);
11952 if (htab->sec_info == NULL)
721956f4
AM
11953 return -1;
11954
3d6f9012
AM
11955 /* Set toc_off for com, und, abs and ind sections. */
11956 for (id = 0; id < 3; id++)
6f20ed8a 11957 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11958
721956f4
AM
11959 return 1;
11960}
11961
927be08e
AM
11962/* Set up for first pass at multitoc partitioning. */
11963
11964void
11965ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11966{
11967 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11968
1c865ab2 11969 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11970 htab->toc_bfd = NULL;
11971 htab->toc_first_sec = NULL;
11972}
11973
e717da7e
AM
11974/* The linker repeatedly calls this function for each TOC input section
11975 and linker generated GOT section. Group input bfds such that the toc
927be08e 11976 within a group is less than 64k in size. */
ad8e1ba5 11977
927be08e 11978bfd_boolean
4ce794b7 11979ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11980{
11981 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11982 bfd_vma addr, off, limit;
ad8e1ba5 11983
4dfe6ac6
NC
11984 if (htab == NULL)
11985 return FALSE;
11986
927be08e 11987 if (!htab->second_toc_pass)
4c52953f 11988 {
927be08e 11989 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11990 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11991
11992 if (new_bfd)
bf102f86
AM
11993 {
11994 htab->toc_bfd = isec->owner;
11995 htab->toc_first_sec = isec;
11996 }
927be08e 11997
bf102f86
AM
11998 addr = isec->output_offset + isec->output_section->vma;
11999 off = addr - htab->toc_curr;
d77c8a4b
AM
12000 limit = 0x80008000;
12001 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12002 limit = 0x10000;
12003 if (off + isec->size > limit)
bf102f86
AM
12004 {
12005 addr = (htab->toc_first_sec->output_offset
12006 + htab->toc_first_sec->output_section->vma);
12007 htab->toc_curr = addr;
a27e685f 12008 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12009 }
99877b66 12010
927be08e
AM
12011 /* toc_curr is the base address of this toc group. Set elf_gp
12012 for the input section to be the offset relative to the
12013 output toc base plus 0x8000. Making the input elf_gp an
12014 offset allows us to move the toc as a whole without
12015 recalculating input elf_gp. */
06bcf541 12016 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12017 off += TOC_BASE_OFF;
12018
12019 /* Die if someone uses a linker script that doesn't keep input
12020 file .toc and .got together. */
a4fd3de5
AM
12021 if (new_bfd
12022 && elf_gp (isec->owner) != 0
927be08e
AM
12023 && elf_gp (isec->owner) != off)
12024 return FALSE;
12025
12026 elf_gp (isec->owner) = off;
12027 return TRUE;
4c52953f 12028 }
927be08e
AM
12029
12030 /* During the second pass toc_first_sec points to the start of
12031 a toc group, and toc_curr is used to track the old elf_gp.
12032 We use toc_bfd to ensure we only look at each bfd once. */
12033 if (htab->toc_bfd == isec->owner)
12034 return TRUE;
12035 htab->toc_bfd = isec->owner;
12036
12037 if (htab->toc_first_sec == NULL
12038 || htab->toc_curr != elf_gp (isec->owner))
12039 {
12040 htab->toc_curr = elf_gp (isec->owner);
12041 htab->toc_first_sec = isec;
12042 }
12043 addr = (htab->toc_first_sec->output_offset
12044 + htab->toc_first_sec->output_section->vma);
06bcf541 12045 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12046 elf_gp (isec->owner) = off;
12047
12048 return TRUE;
ad8e1ba5
AM
12049}
12050
927be08e
AM
12051/* Called via elf_link_hash_traverse to merge GOT entries for global
12052 symbol H. */
12053
12054static bfd_boolean
12055merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12056{
12057 if (h->root.type == bfd_link_hash_indirect)
12058 return TRUE;
12059
927be08e
AM
12060 merge_got_entries (&h->got.glist);
12061
12062 return TRUE;
12063}
12064
12065/* Called via elf_link_hash_traverse to allocate GOT entries for global
12066 symbol H. */
12067
12068static bfd_boolean
12069reallocate_got (struct elf_link_hash_entry *h, void *inf)
12070{
12071 struct got_entry *gent;
12072
12073 if (h->root.type == bfd_link_hash_indirect)
12074 return TRUE;
12075
927be08e
AM
12076 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12077 if (!gent->is_indirect)
12078 allocate_got (h, (struct bfd_link_info *) inf, gent);
12079 return TRUE;
12080}
12081
12082/* Called on the first multitoc pass after the last call to
12083 ppc64_elf_next_toc_section. This function removes duplicate GOT
12084 entries. */
12085
12086bfd_boolean
12087ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12088{
12089 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12090 struct bfd *ibfd, *ibfd2;
12091 bfd_boolean done_something;
12092
12093 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12094
7865406b
AM
12095 if (!htab->do_multi_toc)
12096 return FALSE;
12097
d0fae19d 12098 /* Merge global sym got entries within a toc group. */
927be08e
AM
12099 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12100
12101 /* And tlsld_got. */
c72f2fb2 12102 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12103 {
12104 struct got_entry *ent, *ent2;
12105
12106 if (!is_ppc64_elf (ibfd))
12107 continue;
12108
12109 ent = ppc64_tlsld_got (ibfd);
12110 if (!ent->is_indirect
12111 && ent->got.offset != (bfd_vma) -1)
12112 {
c72f2fb2 12113 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12114 {
12115 if (!is_ppc64_elf (ibfd2))
12116 continue;
12117
12118 ent2 = ppc64_tlsld_got (ibfd2);
12119 if (!ent2->is_indirect
12120 && ent2->got.offset != (bfd_vma) -1
12121 && elf_gp (ibfd2) == elf_gp (ibfd))
12122 {
12123 ent2->is_indirect = TRUE;
12124 ent2->got.ent = ent;
12125 }
12126 }
12127 }
12128 }
12129
12130 /* Zap sizes of got sections. */
33e44f2e
AM
12131 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12132 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12133 htab->got_reli_size = 0;
12134
c72f2fb2 12135 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12136 {
12137 asection *got, *relgot;
12138
12139 if (!is_ppc64_elf (ibfd))
12140 continue;
12141
12142 got = ppc64_elf_tdata (ibfd)->got;
12143 if (got != NULL)
12144 {
12145 got->rawsize = got->size;
12146 got->size = 0;
12147 relgot = ppc64_elf_tdata (ibfd)->relgot;
12148 relgot->rawsize = relgot->size;
12149 relgot->size = 0;
12150 }
12151 }
12152
12153 /* Now reallocate the got, local syms first. We don't need to
12154 allocate section contents again since we never increase size. */
c72f2fb2 12155 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12156 {
12157 struct got_entry **lgot_ents;
12158 struct got_entry **end_lgot_ents;
12159 struct plt_entry **local_plt;
12160 struct plt_entry **end_local_plt;
f961d9dd 12161 unsigned char *lgot_masks;
927be08e
AM
12162 bfd_size_type locsymcount;
12163 Elf_Internal_Shdr *symtab_hdr;
19e08130 12164 asection *s;
927be08e
AM
12165
12166 if (!is_ppc64_elf (ibfd))
12167 continue;
12168
12169 lgot_ents = elf_local_got_ents (ibfd);
12170 if (!lgot_ents)
12171 continue;
12172
12173 symtab_hdr = &elf_symtab_hdr (ibfd);
12174 locsymcount = symtab_hdr->sh_info;
12175 end_lgot_ents = lgot_ents + locsymcount;
12176 local_plt = (struct plt_entry **) end_lgot_ents;
12177 end_local_plt = local_plt + locsymcount;
f961d9dd 12178 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12179 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12180 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12181 {
12182 struct got_entry *ent;
12183
12184 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12185 {
19e08130
AM
12186 unsigned int ent_size = 8;
12187 unsigned int rel_size = sizeof (Elf64_External_Rela);
12188
d0fae19d
AM
12189 ent->got.offset = s->size;
12190 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12191 {
19e08130
AM
12192 ent_size *= 2;
12193 rel_size *= 2;
12194 }
12195 s->size += ent_size;
37da22e5 12196 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12197 {
33e44f2e 12198 htab->elf.irelplt->size += rel_size;
19e08130
AM
12199 htab->got_reli_size += rel_size;
12200 }
6a3858a6 12201 else if (bfd_link_pic (info)
f749f26e 12202 && !(ent->tls_type != 0
6a3858a6 12203 && bfd_link_executable (info)))
19e08130
AM
12204 {
12205 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12206 srel->size += rel_size;
d0fae19d
AM
12207 }
12208 }
927be08e
AM
12209 }
12210 }
12211
12212 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12213
c72f2fb2 12214 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12215 {
12216 struct got_entry *ent;
12217
12218 if (!is_ppc64_elf (ibfd))
12219 continue;
12220
12221 ent = ppc64_tlsld_got (ibfd);
12222 if (!ent->is_indirect
12223 && ent->got.offset != (bfd_vma) -1)
12224 {
12225 asection *s = ppc64_elf_tdata (ibfd)->got;
12226 ent->got.offset = s->size;
12227 s->size += 16;
f749f26e 12228 if (bfd_link_dll (info))
927be08e
AM
12229 {
12230 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12231 srel->size += sizeof (Elf64_External_Rela);
12232 }
12233 }
12234 }
12235
33e44f2e 12236 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12237 if (!done_something)
c72f2fb2 12238 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12239 {
12240 asection *got;
12241
12242 if (!is_ppc64_elf (ibfd))
12243 continue;
12244
12245 got = ppc64_elf_tdata (ibfd)->got;
12246 if (got != NULL)
12247 {
12248 done_something = got->rawsize != got->size;
12249 if (done_something)
12250 break;
12251 }
12252 }
12253
12254 if (done_something)
e7d1c40c 12255 (*htab->params->layout_sections_again) ();
927be08e
AM
12256
12257 /* Set up for second pass over toc sections to recalculate elf_gp
12258 on input sections. */
12259 htab->toc_bfd = NULL;
12260 htab->toc_first_sec = NULL;
12261 htab->second_toc_pass = TRUE;
12262 return done_something;
12263}
12264
12265/* Called after second pass of multitoc partitioning. */
12266
12267void
12268ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12269{
12270 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12271
12272 /* After the second pass, toc_curr tracks the TOC offset used
12273 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12274 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12275}
12276
9b5ecbd0
AM
12277/* No toc references were found in ISEC. If the code in ISEC makes no
12278 calls, then there's no need to use toc adjusting stubs when branching
12279 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12280 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12281 needed, and 2 if a cyclical call-graph was found but no other reason
12282 for a stub was detected. If called from the top level, a return of
12283 2 means the same as a return of 0. */
9b5ecbd0
AM
12284
12285static int
4ce794b7 12286toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12287{
9b5ecbd0 12288 int ret;
70cc837d
AM
12289
12290 /* Mark this section as checked. */
12291 isec->call_check_done = 1;
9b5ecbd0 12292
772119ce
AM
12293 /* We know none of our code bearing sections will need toc stubs. */
12294 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12295 return 0;
12296
eea6121a 12297 if (isec->size == 0)
082c50f8
AM
12298 return 0;
12299
4c52953f
AM
12300 if (isec->output_section == NULL)
12301 return 0;
12302
4c52953f 12303 ret = 0;
70cc837d 12304 if (isec->reloc_count != 0)
9b5ecbd0 12305 {
70cc837d
AM
12306 Elf_Internal_Rela *relstart, *rel;
12307 Elf_Internal_Sym *local_syms;
12308 struct ppc_link_hash_table *htab;
2917689a 12309
70cc837d
AM
12310 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12311 info->keep_memory);
12312 if (relstart == NULL)
12313 return -1;
90aecf7a 12314
70cc837d
AM
12315 /* Look for branches to outside of this section. */
12316 local_syms = NULL;
12317 htab = ppc_hash_table (info);
12318 if (htab == NULL)
12319 return -1;
4c52953f 12320
70cc837d 12321 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12322 {
70cc837d
AM
12323 enum elf_ppc64_reloc_type r_type;
12324 unsigned long r_symndx;
12325 struct elf_link_hash_entry *h;
12326 struct ppc_link_hash_entry *eh;
12327 Elf_Internal_Sym *sym;
12328 asection *sym_sec;
12329 struct _opd_sec_data *opd;
12330 bfd_vma sym_value;
12331 bfd_vma dest;
12332
12333 r_type = ELF64_R_TYPE (rel->r_info);
12334 if (r_type != R_PPC64_REL24
05d0e962 12335 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12336 && r_type != R_PPC64_REL14
12337 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12338 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12339 && r_type != R_PPC64_PLTCALL
12340 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12341 continue;
4c52953f 12342
70cc837d
AM
12343 r_symndx = ELF64_R_SYM (rel->r_info);
12344 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12345 isec->owner))
4c52953f 12346 {
70cc837d
AM
12347 ret = -1;
12348 break;
12349 }
4c52953f 12350
70cc837d
AM
12351 /* Calls to dynamic lib functions go through a plt call stub
12352 that uses r2. */
12353 eh = (struct ppc_link_hash_entry *) h;
12354 if (eh != NULL
12355 && (eh->elf.plt.plist != NULL
12356 || (eh->oh != NULL
12357 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12358 {
12359 ret = 1;
12360 break;
4c52953f
AM
12361 }
12362
70cc837d
AM
12363 if (sym_sec == NULL)
12364 /* Ignore other undefined symbols. */
4c52953f 12365 continue;
4c52953f 12366
70cc837d
AM
12367 /* Assume branches to other sections not included in the
12368 link need stubs too, to cover -R and absolute syms. */
12369 if (sym_sec->output_section == NULL)
12370 {
12371 ret = 1;
12372 break;
12373 }
4c52953f 12374
70cc837d
AM
12375 if (h == NULL)
12376 sym_value = sym->st_value;
12377 else
12378 {
12379 if (h->root.type != bfd_link_hash_defined
12380 && h->root.type != bfd_link_hash_defweak)
12381 abort ();
12382 sym_value = h->root.u.def.value;
12383 }
12384 sym_value += rel->r_addend;
4c52953f 12385
70cc837d
AM
12386 /* If this branch reloc uses an opd sym, find the code section. */
12387 opd = get_opd_info (sym_sec);
12388 if (opd != NULL)
12389 {
12390 if (h == NULL && opd->adjust != NULL)
12391 {
12392 long adjust;
4c52953f 12393
92a9c616 12394 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12395 if (adjust == -1)
12396 /* Assume deleted functions won't ever be called. */
12397 continue;
12398 sym_value += adjust;
12399 }
4c52953f 12400
aef36ac1
AM
12401 dest = opd_entry_value (sym_sec, sym_value,
12402 &sym_sec, NULL, FALSE);
70cc837d
AM
12403 if (dest == (bfd_vma) -1)
12404 continue;
12405 }
12406 else
12407 dest = (sym_value
12408 + sym_sec->output_offset
12409 + sym_sec->output_section->vma);
4c52953f 12410
70cc837d
AM
12411 /* Ignore branch to self. */
12412 if (sym_sec == isec)
12413 continue;
4c52953f 12414
70cc837d
AM
12415 /* If the called function uses the toc, we need a stub. */
12416 if (sym_sec->has_toc_reloc
12417 || sym_sec->makes_toc_func_call)
4c52953f 12418 {
70cc837d 12419 ret = 1;
4c52953f
AM
12420 break;
12421 }
70cc837d
AM
12422
12423 /* Assume any branch that needs a long branch stub might in fact
12424 need a plt_branch stub. A plt_branch stub uses r2. */
12425 else if (dest - (isec->output_offset
12426 + isec->output_section->vma
6911b7dc
AM
12427 + rel->r_offset) + (1 << 25)
12428 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12429 ? h->other
12430 : sym->st_other))
4c52953f 12431 {
70cc837d
AM
12432 ret = 1;
12433 break;
12434 }
12435
12436 /* If calling back to a section in the process of being
12437 tested, we can't say for sure that no toc adjusting stubs
12438 are needed, so don't return zero. */
12439 else if (sym_sec->call_check_in_progress)
12440 ret = 2;
12441
12442 /* Branches to another section that itself doesn't have any TOC
12443 references are OK. Recursively call ourselves to check. */
12444 else if (!sym_sec->call_check_done)
12445 {
12446 int recur;
12447
12448 /* Mark current section as indeterminate, so that other
12449 sections that call back to current won't be marked as
12450 known. */
12451 isec->call_check_in_progress = 1;
12452 recur = toc_adjusting_stub_needed (info, sym_sec);
12453 isec->call_check_in_progress = 0;
12454
4c52953f
AM
12455 if (recur != 0)
12456 {
70cc837d
AM
12457 ret = recur;
12458 if (recur != 2)
12459 break;
4c52953f
AM
12460 }
12461 }
4c52953f 12462 }
70cc837d
AM
12463
12464 if (local_syms != NULL
12465 && (elf_symtab_hdr (isec->owner).contents
12466 != (unsigned char *) local_syms))
12467 free (local_syms);
12468 if (elf_section_data (isec)->relocs != relstart)
12469 free (relstart);
9b5ecbd0
AM
12470 }
12471
70cc837d
AM
12472 if ((ret & 1) == 0
12473 && isec->map_head.s != NULL
12474 && (strcmp (isec->output_section->name, ".init") == 0
12475 || strcmp (isec->output_section->name, ".fini") == 0))
12476 {
12477 if (isec->map_head.s->has_toc_reloc
12478 || isec->map_head.s->makes_toc_func_call)
12479 ret = 1;
12480 else if (!isec->map_head.s->call_check_done)
12481 {
12482 int recur;
12483 isec->call_check_in_progress = 1;
12484 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12485 isec->call_check_in_progress = 0;
12486 if (recur != 0)
12487 ret = recur;
12488 }
12489 }
12490
12491 if (ret == 1)
12492 isec->makes_toc_func_call = 1;
4c52953f 12493
9b5ecbd0
AM
12494 return ret;
12495}
12496
721956f4
AM
12497/* The linker repeatedly calls this function for each input section,
12498 in the order that input sections are linked into output sections.
12499 Build lists of input sections to determine groupings between which
12500 we may insert linker stubs. */
12501
9b5ecbd0 12502bfd_boolean
4ce794b7 12503ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12504{
12505 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12506
4dfe6ac6
NC
12507 if (htab == NULL)
12508 return FALSE;
12509
734b6cf9 12510 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12511 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12512 {
3d6f9012
AM
12513 /* This happens to make the list in reverse order,
12514 which is what we want. */
6f20ed8a
AM
12515 htab->sec_info[isec->id].u.list
12516 = htab->sec_info[isec->output_section->id].u.list;
12517 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12518 }
ad8e1ba5 12519
4c52953f 12520 if (htab->multi_toc_needed)
9b5ecbd0 12521 {
8b974ba3
AM
12522 /* Analyse sections that aren't already flagged as needing a
12523 valid toc pointer. Exclude .fixup for the linux kernel.
12524 .fixup contains branches, but only back to the function that
12525 hit an exception. */
12526 if (!(isec->has_toc_reloc
12527 || (isec->flags & SEC_CODE) == 0
12528 || strcmp (isec->name, ".fixup") == 0
12529 || isec->call_check_done))
12530 {
12531 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12532 return FALSE;
8b974ba3
AM
12533 }
12534 /* Make all sections use the TOC assigned for this object file.
12535 This will be wrong for pasted sections; We fix that in
12536 check_pasted_section(). */
12537 if (elf_gp (isec->owner) != 0)
12538 htab->toc_curr = elf_gp (isec->owner);
12539 }
12540
6f20ed8a 12541 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12542 return TRUE;
721956f4
AM
12543}
12544
70cc837d
AM
12545/* Check that all .init and .fini sections use the same toc, if they
12546 have toc relocs. */
12547
12548static bfd_boolean
12549check_pasted_section (struct bfd_link_info *info, const char *name)
12550{
12551 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12552
12553 if (o != NULL)
12554 {
12555 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12556 bfd_vma toc_off = 0;
12557 asection *i;
12558
12559 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12560 if (i->has_toc_reloc)
12561 {
12562 if (toc_off == 0)
6f20ed8a
AM
12563 toc_off = htab->sec_info[i->id].toc_off;
12564 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12565 return FALSE;
12566 }
6683a28d
AM
12567
12568 if (toc_off == 0)
12569 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12570 if (i->makes_toc_func_call)
12571 {
6f20ed8a 12572 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12573 break;
12574 }
12575
70cc837d
AM
12576 /* Make sure the whole pasted function uses the same toc offset. */
12577 if (toc_off != 0)
12578 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12579 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12580 }
12581 return TRUE;
12582}
12583
12584bfd_boolean
12585ppc64_elf_check_init_fini (struct bfd_link_info *info)
12586{
12587 return (check_pasted_section (info, ".init")
12588 & check_pasted_section (info, ".fini"));
12589}
12590
721956f4
AM
12591/* See whether we can group stub sections together. Grouping stub
12592 sections may result in fewer stubs. More importantly, we need to
12593 put all .init* and .fini* stubs at the beginning of the .init or
12594 .fini output sections respectively, because glibc splits the
12595 _init and _fini functions into multiple parts. Putting a stub in
12596 the middle of a function is not a good idea. */
12597
6f20ed8a
AM
12598static bfd_boolean
12599group_sections (struct bfd_link_info *info,
4ce794b7
AM
12600 bfd_size_type stub_group_size,
12601 bfd_boolean stubs_always_before_branch)
721956f4 12602{
6f20ed8a
AM
12603 struct ppc_link_hash_table *htab;
12604 asection *osec;
7c8fe5c4
AM
12605 bfd_boolean suppress_size_errors;
12606
6f20ed8a
AM
12607 htab = ppc_hash_table (info);
12608 if (htab == NULL)
12609 return FALSE;
12610
7c8fe5c4 12611 suppress_size_errors = FALSE;
7c8fe5c4
AM
12612 if (stub_group_size == 1)
12613 {
12614 /* Default values. */
12615 if (stubs_always_before_branch)
09f92717 12616 stub_group_size = 0x1e00000;
7c8fe5c4 12617 else
09f92717 12618 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12619 suppress_size_errors = TRUE;
12620 }
12621
6f20ed8a 12622 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12623 {
6f20ed8a
AM
12624 asection *tail;
12625
12626 if (osec->id >= htab->sec_info_arr_size)
12627 continue;
12628
12629 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12630 while (tail != NULL)
721956f4 12631 {
734b6cf9
AM
12632 asection *curr;
12633 asection *prev;
12634 bfd_size_type total;
12635 bfd_boolean big_sec;
12636 bfd_vma curr_toc;
6f20ed8a 12637 struct map_stub *group;
09f92717 12638 bfd_size_type group_size;
734b6cf9
AM
12639
12640 curr = tail;
eea6121a 12641 total = tail->size;
09f92717
AM
12642 group_size = (ppc64_elf_section_data (tail) != NULL
12643 && ppc64_elf_section_data (tail)->has_14bit_branch
12644 ? stub_group_size >> 10 : stub_group_size);
12645
12646 big_sec = total > group_size;
7c8fe5c4 12647 if (big_sec && !suppress_size_errors)
695344c0 12648 /* xgettext:c-format */
871b3ab2 12649 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12650 tail->owner, tail);
6f20ed8a 12651 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12652
6f20ed8a 12653 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12654 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12655 < (ppc64_elf_section_data (prev) != NULL
12656 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12657 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12658 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12659 curr = prev;
12660
12661 /* OK, the size from the start of CURR to the end is less
09f92717 12662 than group_size and thus can be handled by one stub
734b6cf9 12663 section. (or the tail section is itself larger than
09f92717
AM
12664 group_size, in which case we may be toast.) We should
12665 really be keeping track of the total size of stubs added
12666 here, as stubs contribute to the final output section
12667 size. That's a little tricky, and this way will only
12668 break if stubs added make the total size more than 2^25,
12669 ie. for the default stub_group_size, if stubs total more
12670 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12671 group = bfd_alloc (curr->owner, sizeof (*group));
12672 if (group == NULL)
12673 return FALSE;
12674 group->link_sec = curr;
12675 group->stub_sec = NULL;
a4b6fadd 12676 group->needs_save_res = 0;
df136d64
AM
12677 group->lr_restore = 0;
12678 group->eh_size = 0;
12679 group->eh_base = 0;
a4b6fadd
AM
12680 group->next = htab->group;
12681 htab->group = group;
734b6cf9 12682 do
721956f4 12683 {
6f20ed8a 12684 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12685 /* Set up this stub group. */
6f20ed8a 12686 htab->sec_info[tail->id].u.group = group;
721956f4 12687 }
734b6cf9
AM
12688 while (tail != curr && (tail = prev) != NULL);
12689
09f92717 12690 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12691 bytes before the stub section can be handled by it too.
12692 Don't do this if we have a really large section after the
12693 stubs, as adding more stubs increases the chance that
12694 branches may not reach into the stub section. */
12695 if (!stubs_always_before_branch && !big_sec)
12696 {
12697 total = 0;
12698 while (prev != NULL
12699 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12700 < (ppc64_elf_section_data (prev) != NULL
12701 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12702 ? (group_size = stub_group_size >> 10)
12703 : group_size))
6f20ed8a 12704 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12705 {
12706 tail = prev;
6f20ed8a
AM
12707 prev = htab->sec_info[tail->id].u.list;
12708 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12709 }
12710 }
12711 tail = prev;
721956f4
AM
12712 }
12713 }
6f20ed8a 12714 return TRUE;
721956f4
AM
12715}
12716
58d180e8
AM
12717static const unsigned char glink_eh_frame_cie[] =
12718{
12719 0, 0, 0, 16, /* length. */
12720 0, 0, 0, 0, /* id. */
12721 1, /* CIE version. */
12722 'z', 'R', 0, /* Augmentation string. */
12723 4, /* Code alignment. */
12724 0x78, /* Data alignment. */
12725 65, /* RA reg. */
12726 1, /* Augmentation size. */
12727 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12728 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12729};
12730
d969d15f
AM
12731/* Stripping output sections is normally done before dynamic section
12732 symbols have been allocated. This function is called later, and
12733 handles cases like htab->brlt which is mapped to its own output
12734 section. */
12735
12736static void
12737maybe_strip_output (struct bfd_link_info *info, asection *isec)
12738{
12739 if (isec->size == 0
12740 && isec->output_section->size == 0
53d8967a 12741 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12742 && !bfd_section_removed_from_list (info->output_bfd,
12743 isec->output_section)
12744 && elf_section_data (isec->output_section)->dynindx == 0)
12745 {
12746 isec->output_section->flags |= SEC_EXCLUDE;
12747 bfd_section_list_remove (info->output_bfd, isec->output_section);
12748 info->output_bfd->section_count--;
12749 }
12750}
12751
721956f4
AM
12752/* Determine and set the size of the stub section for a final link.
12753
12754 The basic idea here is to examine all the relocations looking for
12755 PC-relative calls to a target that is unreachable with a "bl"
12756 instruction. */
12757
b34976b6 12758bfd_boolean
e7d1c40c 12759ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12760{
12761 bfd_size_type stub_group_size;
b34976b6 12762 bfd_boolean stubs_always_before_branch;
721956f4
AM
12763 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12764
4dfe6ac6
NC
12765 if (htab == NULL)
12766 return FALSE;
12767
0e1862bb 12768 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12769 htab->params->plt_thread_safe = 1;
b9e5796b 12770 if (!htab->opd_abi)
e7d1c40c
AM
12771 htab->params->plt_thread_safe = 0;
12772 else if (htab->params->plt_thread_safe == -1)
794e51c0 12773 {
e2458743 12774 static const char *const thread_starter[] =
794e51c0
AM
12775 {
12776 "pthread_create",
12777 /* libstdc++ */
12778 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12779 /* librt */
12780 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12781 "mq_notify", "create_timer",
12782 /* libanl */
12783 "getaddrinfo_a",
12784 /* libgomp */
2300b5a1 12785 "GOMP_parallel",
794e51c0 12786 "GOMP_parallel_start",
2300b5a1 12787 "GOMP_parallel_loop_static",
794e51c0 12788 "GOMP_parallel_loop_static_start",
2300b5a1 12789 "GOMP_parallel_loop_dynamic",
794e51c0 12790 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12791 "GOMP_parallel_loop_guided",
794e51c0 12792 "GOMP_parallel_loop_guided_start",
2300b5a1 12793 "GOMP_parallel_loop_runtime",
794e51c0 12794 "GOMP_parallel_loop_runtime_start",
2300b5a1 12795 "GOMP_parallel_sections",
68ffbac6 12796 "GOMP_parallel_sections_start",
f9dffbf0
AM
12797 /* libgo */
12798 "__go_go",
794e51c0
AM
12799 };
12800 unsigned i;
12801
a4b6fadd 12802 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12803 {
12804 struct elf_link_hash_entry *h;
12805 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12806 FALSE, FALSE, TRUE);
e7d1c40c
AM
12807 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12808 if (htab->params->plt_thread_safe)
794e51c0
AM
12809 break;
12810 }
12811 }
e7d1c40c
AM
12812 stubs_always_before_branch = htab->params->group_size < 0;
12813 if (htab->params->group_size < 0)
12814 stub_group_size = -htab->params->group_size;
721956f4 12815 else
e7d1c40c 12816 stub_group_size = htab->params->group_size;
721956f4 12817
6f20ed8a
AM
12818 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12819 return FALSE;
721956f4 12820
c9301e31
AM
12821#define STUB_SHRINK_ITER 20
12822 /* Loop until no stubs added. After iteration 20 of this loop we may
12823 exit on a stub section shrinking. This is to break out of a
12824 pathological case where adding stubs on one iteration decreases
12825 section gaps (perhaps due to alignment), which then requires
12826 fewer or smaller stubs on the next iteration. */
12827
721956f4
AM
12828 while (1)
12829 {
12830 bfd *input_bfd;
12831 unsigned int bfd_indx;
a4b6fadd 12832 struct map_stub *group;
721956f4
AM
12833
12834 htab->stub_iteration += 1;
721956f4
AM
12835
12836 for (input_bfd = info->input_bfds, bfd_indx = 0;
12837 input_bfd != NULL;
c72f2fb2 12838 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12839 {
12840 Elf_Internal_Shdr *symtab_hdr;
12841 asection *section;
6cdc0ccc 12842 Elf_Internal_Sym *local_syms = NULL;
721956f4 12843
0c8d6e5c 12844 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12845 continue;
12846
721956f4 12847 /* We'll need the symbol table in a second. */
0ffa91dd 12848 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12849 if (symtab_hdr->sh_info == 0)
12850 continue;
12851
721956f4
AM
12852 /* Walk over each section attached to the input bfd. */
12853 for (section = input_bfd->sections;
12854 section != NULL;
12855 section = section->next)
12856 {
721956f4 12857 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12858
12859 /* If there aren't any relocs, then there's nothing more
12860 to do. */
12861 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12862 || (section->flags & SEC_ALLOC) == 0
12863 || (section->flags & SEC_LOAD) == 0
12864 || (section->flags & SEC_CODE) == 0
721956f4
AM
12865 || section->reloc_count == 0)
12866 continue;
12867
12868 /* If this section is a link-once section that will be
12869 discarded, then don't create any stubs. */
12870 if (section->output_section == NULL
927be08e 12871 || section->output_section->owner != info->output_bfd)
721956f4
AM
12872 continue;
12873
1e2f5b6e
AM
12874 /* Get the relocs. */
12875 internal_relocs
4ce794b7 12876 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12877 info->keep_memory);
721956f4 12878 if (internal_relocs == NULL)
1e2f5b6e 12879 goto error_ret_free_local;
721956f4
AM
12880
12881 /* Now examine each relocation. */
12882 irela = internal_relocs;
12883 irelaend = irela + section->reloc_count;
12884 for (; irela < irelaend; irela++)
12885 {
4ce794b7
AM
12886 enum elf_ppc64_reloc_type r_type;
12887 unsigned int r_indx;
721956f4
AM
12888 enum ppc_stub_type stub_type;
12889 struct ppc_stub_hash_entry *stub_entry;
8387904d 12890 asection *sym_sec, *code_sec;
e054468f 12891 bfd_vma sym_value, code_value;
721956f4 12892 bfd_vma destination;
6911b7dc 12893 unsigned long local_off;
8843416a 12894 bfd_boolean ok_dest;
721956f4 12895 struct ppc_link_hash_entry *hash;
8387904d 12896 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12897 struct elf_link_hash_entry *h;
12898 Elf_Internal_Sym *sym;
721956f4
AM
12899 char *stub_name;
12900 const asection *id_sec;
74f0fb50 12901 struct _opd_sec_data *opd;
e054468f 12902 struct plt_entry *plt_ent;
721956f4
AM
12903
12904 r_type = ELF64_R_TYPE (irela->r_info);
12905 r_indx = ELF64_R_SYM (irela->r_info);
12906
4ce794b7 12907 if (r_type >= R_PPC64_max)
721956f4
AM
12908 {
12909 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12910 goto error_ret_free_internal;
721956f4
AM
12911 }
12912
12913 /* Only look for stubs on branch instructions. */
4ce794b7 12914 if (r_type != R_PPC64_REL24
05d0e962 12915 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12916 && r_type != R_PPC64_REL14
12917 && r_type != R_PPC64_REL14_BRTAKEN
12918 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12919 continue;
12920
12921 /* Now determine the call target, its name, value,
12922 section. */
411e1bfb
AM
12923 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12924 r_indx, input_bfd))
12925 goto error_ret_free_internal;
12926 hash = (struct ppc_link_hash_entry *) h;
12927
8843416a 12928 ok_dest = FALSE;
8387904d 12929 fdh = NULL;
7fe2b9a6 12930 sym_value = 0;
411e1bfb 12931 if (hash == NULL)
721956f4 12932 {
411e1bfb 12933 sym_value = sym->st_value;
c27b8c2a
AM
12934 if (sym_sec != NULL
12935 && sym_sec->output_section != NULL)
12936 ok_dest = TRUE;
721956f4 12937 }
7fe2b9a6
AM
12938 else if (hash->elf.root.type == bfd_link_hash_defined
12939 || hash->elf.root.type == bfd_link_hash_defweak)
12940 {
12941 sym_value = hash->elf.root.u.def.value;
12942 if (sym_sec->output_section != NULL)
12943 ok_dest = TRUE;
12944 }
12945 else if (hash->elf.root.type == bfd_link_hash_undefweak
12946 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12947 {
99877b66 12948 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12949 use the func descriptor sym instead if it is
12950 defined. */
ceb1f1ef 12951 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12952 && hash->oh != NULL)
8387904d 12953 {
8c5b4e52 12954 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12955 if (fdh->elf.root.type == bfd_link_hash_defined
12956 || fdh->elf.root.type == bfd_link_hash_defweak)
12957 {
12958 sym_sec = fdh->elf.root.u.def.section;
12959 sym_value = fdh->elf.root.u.def.value;
12960 if (sym_sec->output_section != NULL)
12961 ok_dest = TRUE;
12962 }
99877b66
AM
12963 else
12964 fdh = NULL;
8387904d 12965 }
7fe2b9a6
AM
12966 }
12967 else
12968 {
12969 bfd_set_error (bfd_error_bad_value);
12970 goto error_ret_free_internal;
721956f4
AM
12971 }
12972
8843416a 12973 destination = 0;
6911b7dc 12974 local_off = 0;
8843416a
AM
12975 if (ok_dest)
12976 {
12977 sym_value += irela->r_addend;
12978 destination = (sym_value
12979 + sym_sec->output_offset
12980 + sym_sec->output_section->vma);
6911b7dc
AM
12981 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12982 ? hash->elf.other
12983 : sym->st_other);
8843416a
AM
12984 }
12985
8387904d 12986 code_sec = sym_sec;
e054468f 12987 code_value = sym_value;
74f0fb50
AM
12988 opd = get_opd_info (sym_sec);
12989 if (opd != NULL)
8387904d
AM
12990 {
12991 bfd_vma dest;
12992
74f0fb50 12993 if (hash == NULL && opd->adjust != NULL)
8387904d 12994 {
51aecdc5 12995 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12996 if (adjust == -1)
12997 continue;
e054468f 12998 code_value += adjust;
8387904d
AM
12999 sym_value += adjust;
13000 }
13001 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13002 &code_sec, &code_value, FALSE);
8387904d
AM
13003 if (dest != (bfd_vma) -1)
13004 {
13005 destination = dest;
13006 if (fdh != NULL)
13007 {
13008 /* Fixup old ABI sym to point at code
13009 entry. */
99877b66 13010 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13011 hash->elf.root.u.def.section = code_sec;
e054468f 13012 hash->elf.root.u.def.value = code_value;
8387904d
AM
13013 }
13014 }
13015 }
13016
721956f4 13017 /* Determine what (if any) linker stub is needed. */
e054468f 13018 plt_ent = NULL;
721956f4 13019 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13020 &plt_ent, destination,
13021 local_off);
ad8e1ba5 13022
05d0e962
AM
13023 if (r_type == R_PPC64_REL24_NOTOC)
13024 {
13025 if (stub_type == ppc_stub_plt_call)
13026 stub_type = ppc_stub_plt_call_notoc;
13027 else if (stub_type == ppc_stub_long_branch
13028 || (code_sec != NULL
13029 && code_sec->output_section != NULL
13030 && (((hash ? hash->elf.other : sym->st_other)
13031 & STO_PPC64_LOCAL_MASK)
4a4e7361 13032 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13033 stub_type = ppc_stub_long_branch_notoc;
13034 }
13035 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13036 {
13037 /* Check whether we need a TOC adjusting stub.
13038 Since the linker pastes together pieces from
13039 different object files when creating the
13040 _init and _fini functions, it may be that a
13041 call to what looks like a local sym is in
13042 fact a call needing a TOC adjustment. */
33cb30a1
AM
13043 if ((code_sec != NULL
13044 && code_sec->output_section != NULL
13045 && (htab->sec_info[code_sec->id].toc_off
13046 != htab->sec_info[section->id].toc_off)
13047 && (code_sec->has_toc_reloc
13048 || code_sec->makes_toc_func_call))
13049 || (((hash ? hash->elf.other : sym->st_other)
13050 & STO_PPC64_LOCAL_MASK)
13051 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13052 stub_type = ppc_stub_long_branch_r2off;
13053 }
13054
721956f4
AM
13055 if (stub_type == ppc_stub_none)
13056 continue;
13057
411e1bfb
AM
13058 /* __tls_get_addr calls might be eliminated. */
13059 if (stub_type != ppc_stub_plt_call
05d0e962 13060 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13061 && hash != NULL
8387904d
AM
13062 && (hash == htab->tls_get_addr
13063 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
13064 && section->has_tls_reloc
13065 && irela != internal_relocs)
13066 {
13067 /* Get tls info. */
f961d9dd 13068 unsigned char *tls_mask;
411e1bfb 13069
3a71aa26 13070 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13071 irela - 1, input_bfd))
13072 goto error_ret_free_internal;
37da22e5 13073 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
13074 continue;
13075 }
13076
f378ab09 13077 if (stub_type == ppc_stub_plt_call)
794e51c0 13078 {
6e1816be
AM
13079 if (!htab->opd_abi
13080 && htab->params->plt_localentry0 != 0
13081 && is_elfv2_localentry0 (&hash->elf))
13082 htab->has_plt_localentry0 = 1;
13083 else if (irela + 1 < irelaend
13084 && irela[1].r_offset == irela->r_offset + 4
13085 && (ELF64_R_TYPE (irela[1].r_info)
13086 == R_PPC64_TOCSAVE))
f378ab09
AM
13087 {
13088 if (!tocsave_find (htab, INSERT,
13089 &local_syms, irela + 1, input_bfd))
13090 goto error_ret_free_internal;
13091 }
f378ab09
AM
13092 else
13093 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13094 }
3b421ab3 13095
721956f4 13096 /* Support for grouping stub sections. */
6f20ed8a 13097 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13098
13099 /* Get the name of this stub. */
13100 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13101 if (!stub_name)
13102 goto error_ret_free_internal;
13103
13104 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13105 stub_name, FALSE, FALSE);
721956f4
AM
13106 if (stub_entry != NULL)
13107 {
05d0e962
AM
13108 enum ppc_stub_type old_type;
13109 /* A stub has already been created, but it may
13110 not be the required type. We shouldn't be
13111 transitioning from plt_call to long_branch
13112 stubs or vice versa, but we might be
13113 upgrading from plt_call to plt_call_r2save or
13114 from long_branch to long_branch_r2off. */
721956f4 13115 free (stub_name);
05d0e962
AM
13116 old_type = stub_entry->stub_type;
13117 switch (old_type)
13118 {
13119 default:
13120 abort ();
13121
13122 case ppc_stub_save_res:
13123 continue;
13124
13125 case ppc_stub_plt_call:
13126 case ppc_stub_plt_call_r2save:
13127 case ppc_stub_plt_call_notoc:
13128 case ppc_stub_plt_call_both:
13129 if (stub_type == ppc_stub_plt_call)
13130 continue;
13131 else if (stub_type == ppc_stub_plt_call_r2save)
13132 {
13133 if (old_type == ppc_stub_plt_call_notoc)
13134 stub_type = ppc_stub_plt_call_both;
13135 }
13136 else if (stub_type == ppc_stub_plt_call_notoc)
13137 {
13138 if (old_type == ppc_stub_plt_call_r2save)
13139 stub_type = ppc_stub_plt_call_both;
13140 }
13141 else
13142 abort ();
13143 break;
13144
13145 case ppc_stub_plt_branch:
13146 case ppc_stub_plt_branch_r2off:
13147 case ppc_stub_plt_branch_notoc:
13148 case ppc_stub_plt_branch_both:
13149 old_type += (ppc_stub_long_branch
13150 - ppc_stub_plt_branch);
13151 /* Fall through. */
13152 case ppc_stub_long_branch:
13153 case ppc_stub_long_branch_r2off:
13154 case ppc_stub_long_branch_notoc:
13155 case ppc_stub_long_branch_both:
13156 if (stub_type == ppc_stub_long_branch)
13157 continue;
13158 else if (stub_type == ppc_stub_long_branch_r2off)
13159 {
13160 if (old_type == ppc_stub_long_branch_notoc)
13161 stub_type = ppc_stub_long_branch_both;
13162 }
13163 else if (stub_type == ppc_stub_long_branch_notoc)
13164 {
13165 if (old_type == ppc_stub_long_branch_r2off)
13166 stub_type = ppc_stub_long_branch_both;
13167 }
13168 else
13169 abort ();
13170 break;
13171 }
13172 if (old_type < stub_type)
794e51c0 13173 stub_entry->stub_type = stub_type;
721956f4
AM
13174 continue;
13175 }
13176
25f53a85 13177 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13178 if (stub_entry == NULL)
13179 {
13180 free (stub_name);
6cdc0ccc
AM
13181 error_ret_free_internal:
13182 if (elf_section_data (section)->relocs == NULL)
13183 free (internal_relocs);
13184 error_ret_free_local:
13185 if (local_syms != NULL
13186 && (symtab_hdr->contents
13187 != (unsigned char *) local_syms))
13188 free (local_syms);
b34976b6 13189 return FALSE;
721956f4
AM
13190 }
13191
ad8e1ba5 13192 stub_entry->stub_type = stub_type;
05d0e962
AM
13193 if (stub_type >= ppc_stub_plt_call
13194 && stub_type <= ppc_stub_plt_call_both)
e054468f 13195 {
05d0e962
AM
13196 stub_entry->target_value = sym_value;
13197 stub_entry->target_section = sym_sec;
e054468f
AM
13198 }
13199 else
13200 {
05d0e962
AM
13201 stub_entry->target_value = code_value;
13202 stub_entry->target_section = code_sec;
e054468f 13203 }
721956f4 13204 stub_entry->h = hash;
e054468f 13205 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13206 stub_entry->symtype
13207 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13208 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13209
3d58e1fc
AM
13210 if (hash != NULL
13211 && (hash->elf.root.type == bfd_link_hash_defined
13212 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13213 htab->stub_globals += 1;
721956f4
AM
13214 }
13215
13216 /* We're done with the internal relocs, free them. */
6cdc0ccc 13217 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13218 free (internal_relocs);
721956f4 13219 }
6cdc0ccc
AM
13220
13221 if (local_syms != NULL
13222 && symtab_hdr->contents != (unsigned char *) local_syms)
13223 {
13224 if (!info->keep_memory)
13225 free (local_syms);
13226 else
13227 symtab_hdr->contents = (unsigned char *) local_syms;
13228 }
721956f4
AM
13229 }
13230
5c3dead3 13231 /* We may have added some stubs. Find out the new size of the
721956f4 13232 stub sections. */
d4aaa2a0 13233 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13234 {
13235 group->lr_restore = 0;
13236 group->eh_size = 0;
13237 if (group->stub_sec != NULL)
13238 {
13239 asection *stub_sec = group->stub_sec;
13240
13241 if (htab->stub_iteration <= STUB_SHRINK_ITER
13242 || stub_sec->rawsize < stub_sec->size)
13243 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13244 stub_sec->rawsize = stub_sec->size;
13245 stub_sec->size = 0;
13246 stub_sec->reloc_count = 0;
13247 stub_sec->flags &= ~SEC_RELOC;
13248 }
13249 }
eea6121a 13250
ba21f564
AM
13251 if (htab->stub_iteration <= STUB_SHRINK_ITER
13252 || htab->brlt->rawsize < htab->brlt->size)
13253 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13254 htab->brlt->size = 0;
84f5d08e
AM
13255 htab->brlt->reloc_count = 0;
13256 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13257 if (htab->relbrlt != NULL)
eea6121a 13258 htab->relbrlt->size = 0;
721956f4 13259
63bc6f6c 13260 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13261
a4b6fadd
AM
13262 for (group = htab->group; group != NULL; group = group->next)
13263 if (group->needs_save_res)
13264 group->stub_sec->size += htab->sfpr->size;
13265
176a0d42
AM
13266 if (info->emitrelocations
13267 && htab->glink != NULL && htab->glink->size != 0)
13268 {
13269 htab->glink->reloc_count = 1;
13270 htab->glink->flags |= SEC_RELOC;
13271 }
13272
58d180e8
AM
13273 if (htab->glink_eh_frame != NULL
13274 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13275 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13276 {
2e0ce1c8 13277 size_t size = 0, align = 4;
58d180e8 13278
d4aaa2a0 13279 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13280 if (group->eh_size != 0)
13281 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13282 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13283 size += (24 + align - 1) & -align;
58d180e8 13284 if (size != 0)
2e0ce1c8
AM
13285 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13286 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13287 size = (size + align - 1) & -align;
58d180e8
AM
13288 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13289 htab->glink_eh_frame->size = size;
13290 }
13291
e7d1c40c 13292 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13293 for (group = htab->group; group != NULL; group = group->next)
13294 if (group->stub_sec != NULL)
691d2e9a
AM
13295 {
13296 int align = abs (htab->params->plt_stub_align);
13297 group->stub_sec->size
13298 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13299 }
d4aaa2a0
AM
13300
13301 for (group = htab->group; group != NULL; group = group->next)
13302 if (group->stub_sec != NULL
13303 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13304 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13305 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13306 break;
13307
d4aaa2a0 13308 if (group == NULL
ba21f564
AM
13309 && (htab->brlt->rawsize == htab->brlt->size
13310 || (htab->stub_iteration > STUB_SHRINK_ITER
13311 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13312 && (htab->glink_eh_frame == NULL
13313 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13314 break;
13315
721956f4 13316 /* Ask the linker to do its stuff. */
e7d1c40c 13317 (*htab->params->layout_sections_again) ();
721956f4
AM
13318 }
13319
da44f4e5
AM
13320 if (htab->glink_eh_frame != NULL
13321 && htab->glink_eh_frame->size != 0)
13322 {
13323 bfd_vma val;
13324 bfd_byte *p, *last_fde;
13325 size_t last_fde_len, size, align, pad;
d4aaa2a0 13326 struct map_stub *group;
da44f4e5 13327
df136d64
AM
13328 /* It is necessary to at least have a rough outline of the
13329 linker generated CIEs and FDEs written before
13330 bfd_elf_discard_info is run, in order for these FDEs to be
13331 indexed in .eh_frame_hdr. */
da44f4e5
AM
13332 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13333 if (p == NULL)
13334 return FALSE;
13335 htab->glink_eh_frame->contents = p;
13336 last_fde = p;
2e0ce1c8 13337 align = 4;
da44f4e5
AM
13338
13339 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13340 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13341 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13342 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13343 p += last_fde_len + 4;
da44f4e5 13344
d4aaa2a0 13345 for (group = htab->group; group != NULL; group = group->next)
df136d64 13346 if (group->eh_size != 0)
da44f4e5 13347 {
df136d64 13348 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13349 last_fde = p;
df136d64 13350 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13351 /* FDE length. */
2e0ce1c8 13352 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13353 p += 4;
13354 /* CIE pointer. */
13355 val = p - htab->glink_eh_frame->contents;
13356 bfd_put_32 (htab->elf.dynobj, val, p);
13357 p += 4;
13358 /* Offset to stub section, written later. */
13359 p += 4;
13360 /* stub section size. */
d4aaa2a0 13361 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13362 p += 4;
13363 /* Augmentation. */
13364 p += 1;
df136d64
AM
13365 /* Make sure we don't have all nops. This is enough for
13366 elf-eh-frame.c to detect the last non-nop opcode. */
13367 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13368 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13369 }
13370 if (htab->glink != NULL && htab->glink->size != 0)
13371 {
13372 last_fde = p;
2e0ce1c8 13373 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13374 /* FDE length. */
2e0ce1c8 13375 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13376 p += 4;
13377 /* CIE pointer. */
13378 val = p - htab->glink_eh_frame->contents;
13379 bfd_put_32 (htab->elf.dynobj, val, p);
13380 p += 4;
13381 /* Offset to .glink, written later. */
13382 p += 4;
13383 /* .glink size. */
13384 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13385 p += 4;
13386 /* Augmentation. */
13387 p += 1;
13388
13389 *p++ = DW_CFA_advance_loc + 1;
13390 *p++ = DW_CFA_register;
13391 *p++ = 65;
9f08fa5c 13392 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13393 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13394 *p++ = DW_CFA_restore_extended;
13395 *p++ = 65;
2e0ce1c8 13396 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13397 }
13398 /* Subsume any padding into the last FDE if user .eh_frame
13399 sections are aligned more than glink_eh_frame. Otherwise any
13400 zero padding will be seen as a terminator. */
2e0ce1c8 13401 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13402 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13403 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13404 htab->glink_eh_frame->size = size + pad;
13405 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13406 }
13407
d969d15f
AM
13408 maybe_strip_output (info, htab->brlt);
13409 if (htab->glink_eh_frame != NULL)
13410 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13411
b34976b6 13412 return TRUE;
721956f4
AM
13413}
13414
13415/* Called after we have determined section placement. If sections
805fc799 13416 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13417
805fc799 13418bfd_vma
1c865ab2 13419ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13420{
805fc799 13421 asection *s;
a27e685f 13422 bfd_vma TOCstart, adjust;
721956f4 13423
43417696
AM
13424 if (info != NULL)
13425 {
13426 struct elf_link_hash_entry *h;
13427 struct elf_link_hash_table *htab = elf_hash_table (info);
13428
13429 if (is_elf_hash_table (htab)
13430 && htab->hgot != NULL)
13431 h = htab->hgot;
13432 else
13433 {
13434 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13435 if (is_elf_hash_table (htab))
13436 htab->hgot = h;
13437 }
13438 if (h != NULL
13439 && h->root.type == bfd_link_hash_defined
13440 && !h->root.linker_def
13441 && (!is_elf_hash_table (htab)
13442 || h->def_regular))
13443 {
13444 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13445 + h->root.u.def.section->output_offset
13446 + h->root.u.def.section->output_section->vma);
13447 _bfd_set_gp_value (obfd, TOCstart);
13448 return TOCstart;
13449 }
13450 }
13451
805fc799
AM
13452 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13453 order. The TOC starts where the first of these sections starts. */
13454 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13455 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13456 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13457 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13458 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13459 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13460 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13461 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13462 {
13463 /* This may happen for
13464 o references to TOC base (SYM@toc / TOC[tc0]) without a
13465 .toc directive
13466 o bad linker script
13467 o --gc-sections and empty TOC sections
13468
13469 FIXME: Warn user? */
13470
13471 /* Look for a likely section. We probably won't even be
13472 using TOCstart. */
13473 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13474 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13475 | SEC_EXCLUDE))
805fc799
AM
13476 == (SEC_ALLOC | SEC_SMALL_DATA))
13477 break;
721956f4 13478 if (s == NULL)
805fc799 13479 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13480 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13481 == (SEC_ALLOC | SEC_SMALL_DATA))
13482 break;
721956f4 13483 if (s == NULL)
805fc799 13484 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13485 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13486 == SEC_ALLOC)
805fc799 13487 break;
721956f4 13488 if (s == NULL)
805fc799 13489 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13490 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13491 break;
13492 }
721956f4 13493
805fc799
AM
13494 TOCstart = 0;
13495 if (s != NULL)
13496 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13497
a27e685f
AM
13498 /* Force alignment. */
13499 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13500 TOCstart -= adjust;
1c865ab2
AM
13501 _bfd_set_gp_value (obfd, TOCstart);
13502
810d4e75 13503 if (info != NULL && s != NULL)
1c865ab2
AM
13504 {
13505 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13506
810d4e75
AM
13507 if (htab != NULL)
13508 {
13509 if (htab->elf.hgot != NULL)
13510 {
a27e685f 13511 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13512 htab->elf.hgot->root.u.def.section = s;
13513 }
13514 }
13515 else
1c865ab2 13516 {
810d4e75
AM
13517 struct bfd_link_hash_entry *bh = NULL;
13518 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13519 s, TOC_BASE_OFF - adjust,
13520 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13521 }
13522 }
805fc799 13523 return TOCstart;
721956f4
AM
13524}
13525
a345bc8d 13526/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13527 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13528
13529static bfd_boolean
49c09209 13530build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13531{
13532 struct bfd_link_info *info;
13533 struct ppc_link_hash_table *htab;
49c09209 13534 struct plt_entry *ent;
a345bc8d
AM
13535 asection *s;
13536
13537 if (h->root.type == bfd_link_hash_indirect)
13538 return TRUE;
13539
49c09209
AM
13540 info = inf;
13541 htab = ppc_hash_table (info);
13542 if (htab == NULL)
13543 return FALSE;
13544
13545 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13546 if (ent->plt.offset != (bfd_vma) -1)
13547 {
13548 /* This symbol has an entry in the procedure linkage
13549 table. Set it up. */
13550 Elf_Internal_Rela rela;
2d7ad24e 13551 asection *plt, *relplt;
49c09209
AM
13552 bfd_byte *loc;
13553
13554 if (!htab->elf.dynamic_sections_created
13555 || h->dynindx == -1)
13556 {
13557 if (!(h->def_regular
13558 && (h->root.type == bfd_link_hash_defined
13559 || h->root.type == bfd_link_hash_defweak)))
13560 continue;
2d7ad24e
AM
13561 if (h->type == STT_GNU_IFUNC)
13562 {
13563 plt = htab->elf.iplt;
13564 relplt = htab->elf.irelplt;
13565 htab->local_ifunc_resolver = 1;
13566 if (htab->opd_abi)
13567 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13568 else
13569 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13570 }
49c09209 13571 else
2d7ad24e
AM
13572 {
13573 plt = htab->pltlocal;
13574 if (bfd_link_pic (info))
13575 {
13576 relplt = htab->relpltlocal;
13577 if (htab->opd_abi)
13578 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13579 else
13580 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13581 }
13582 else
13583 relplt = NULL;
13584 }
49c09209
AM
13585 rela.r_addend = (h->root.u.def.value
13586 + h->root.u.def.section->output_offset
13587 + h->root.u.def.section->output_section->vma
13588 + ent->addend);
2d7ad24e
AM
13589
13590 if (relplt == NULL)
13591 {
13592 loc = plt->contents + ent->plt.offset;
13593 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13594 if (htab->opd_abi)
13595 {
13596 bfd_vma toc = elf_gp (info->output_bfd);
13597 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13598 bfd_put_64 (info->output_bfd, toc, loc + 8);
13599 }
13600 }
13601 else
13602 {
13603 rela.r_offset = (plt->output_section->vma
13604 + plt->output_offset
13605 + ent->plt.offset);
13606 loc = relplt->contents + (relplt->reloc_count++
13607 * sizeof (Elf64_External_Rela));
13608 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13609 }
49c09209
AM
13610 }
13611 else
13612 {
13613 rela.r_offset = (htab->elf.splt->output_section->vma
13614 + htab->elf.splt->output_offset
13615 + ent->plt.offset);
13616 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13617 rela.r_addend = ent->addend;
13618 loc = (htab->elf.srelplt->contents
13619 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13620 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13621 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13622 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13623 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13624 }
49c09209
AM
13625 }
13626
a345bc8d
AM
13627 if (!h->pointer_equality_needed)
13628 return TRUE;
13629
13630 if (h->def_regular)
13631 return TRUE;
13632
9e390558 13633 s = htab->global_entry;
49c09209
AM
13634 if (s == NULL || s->size == 0)
13635 return TRUE;
13636
13637 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13638 if (ent->plt.offset != (bfd_vma) -1
13639 && ent->addend == 0)
a345bc8d
AM
13640 {
13641 bfd_byte *p;
13642 asection *plt;
13643 bfd_vma off;
13644
a345bc8d 13645 p = s->contents + h->root.u.def.value;
33e44f2e 13646 plt = htab->elf.splt;
a345bc8d
AM
13647 if (!htab->elf.dynamic_sections_created
13648 || h->dynindx == -1)
2d7ad24e
AM
13649 {
13650 if (h->type == STT_GNU_IFUNC)
13651 plt = htab->elf.iplt;
13652 else
13653 plt = htab->pltlocal;
13654 }
49c09209 13655 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13656 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13657
13658 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13659 {
13660 info->callbacks->einfo
c1c8c1ef 13661 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13662 h->root.root.string);
13663 bfd_set_error (bfd_error_bad_value);
13664 htab->stub_error = TRUE;
13665 }
13666
7341d5e2
AM
13667 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13668 if (htab->params->emit_stub_syms)
13669 {
13670 size_t len = strlen (h->root.root.string);
13671 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13672
13673 if (name == NULL)
13674 return FALSE;
13675
13676 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13677 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13678 if (h == NULL)
13679 return FALSE;
13680 if (h->root.type == bfd_link_hash_new)
13681 {
13682 h->root.type = bfd_link_hash_defined;
13683 h->root.u.def.section = s;
13684 h->root.u.def.value = p - s->contents;
13685 h->ref_regular = 1;
13686 h->def_regular = 1;
13687 h->ref_regular_nonweak = 1;
13688 h->forced_local = 1;
13689 h->non_elf = 0;
2ec55de3 13690 h->root.linker_def = 1;
7341d5e2
AM
13691 }
13692 }
13693
a345bc8d
AM
13694 if (PPC_HA (off) != 0)
13695 {
13696 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13697 p += 4;
13698 }
13699 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13700 p += 4;
13701 bfd_put_32 (s->owner, MTCTR_R12, p);
13702 p += 4;
407aa07c 13703 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13704 break;
13705 }
13706 return TRUE;
13707}
13708
49c09209
AM
13709/* Write PLT relocs for locals. */
13710
13711static bfd_boolean
13712write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13713{
13714 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13715 bfd *ibfd;
13716
13717 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13718 {
13719 struct got_entry **lgot_ents, **end_lgot_ents;
13720 struct plt_entry **local_plt, **lplt, **end_local_plt;
13721 Elf_Internal_Shdr *symtab_hdr;
13722 bfd_size_type locsymcount;
13723 Elf_Internal_Sym *local_syms = NULL;
13724 struct plt_entry *ent;
13725
13726 if (!is_ppc64_elf (ibfd))
13727 continue;
13728
13729 lgot_ents = elf_local_got_ents (ibfd);
13730 if (!lgot_ents)
13731 continue;
13732
13733 symtab_hdr = &elf_symtab_hdr (ibfd);
13734 locsymcount = symtab_hdr->sh_info;
13735 end_lgot_ents = lgot_ents + locsymcount;
13736 local_plt = (struct plt_entry **) end_lgot_ents;
13737 end_local_plt = local_plt + locsymcount;
13738 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13739 for (ent = *lplt; ent != NULL; ent = ent->next)
13740 if (ent->plt.offset != (bfd_vma) -1)
13741 {
13742 Elf_Internal_Sym *sym;
13743 asection *sym_sec;
13744 asection *plt, *relplt;
13745 bfd_byte *loc;
13746 bfd_vma val;
49c09209
AM
13747
13748 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13749 lplt - local_plt, ibfd))
13750 {
13751 if (local_syms != NULL
13752 && symtab_hdr->contents != (unsigned char *) local_syms)
13753 free (local_syms);
13754 return FALSE;
13755 }
13756
13757 val = sym->st_value + ent->addend;
ba85c15d
AM
13758 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13759 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
13760 if (sym_sec != NULL && sym_sec->output_section != NULL)
13761 val += sym_sec->output_offset + sym_sec->output_section->vma;
13762
2d7ad24e
AM
13763 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13764 {
13765 htab->local_ifunc_resolver = 1;
13766 plt = htab->elf.iplt;
13767 relplt = htab->elf.irelplt;
13768 }
13769 else
13770 {
13771 plt = htab->pltlocal;
13772 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13773 }
49c09209 13774
2d7ad24e
AM
13775 if (relplt == NULL)
13776 {
13777 loc = plt->contents + ent->plt.offset;
13778 bfd_put_64 (info->output_bfd, val, loc);
13779 if (htab->opd_abi)
13780 {
13781 bfd_vma toc = elf_gp (ibfd);
13782 bfd_put_64 (info->output_bfd, toc, loc + 8);
13783 }
13784 }
49c09209 13785 else
2d7ad24e
AM
13786 {
13787 Elf_Internal_Rela rela;
13788 rela.r_offset = (ent->plt.offset
13789 + plt->output_offset
13790 + plt->output_section->vma);
13791 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13792 {
13793 if (htab->opd_abi)
13794 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13795 else
13796 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13797 }
13798 else
13799 {
13800 if (htab->opd_abi)
13801 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13802 else
13803 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13804 }
13805 rela.r_addend = val;
13806 loc = relplt->contents + (relplt->reloc_count++
13807 * sizeof (Elf64_External_Rela));
13808 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13809 }
49c09209
AM
13810 }
13811
13812 if (local_syms != NULL
13813 && symtab_hdr->contents != (unsigned char *) local_syms)
13814 {
13815 if (!info->keep_memory)
13816 free (local_syms);
13817 else
13818 symtab_hdr->contents = (unsigned char *) local_syms;
13819 }
13820 }
13821 return TRUE;
13822}
13823
721956f4
AM
13824/* Build all the stubs associated with the current output file.
13825 The stubs are kept in a hash table attached to the main linker
13826 hash table. This function is called via gldelf64ppc_finish. */
13827
b34976b6 13828bfd_boolean
e7d1c40c 13829ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13830 char **stats)
5d1634d7
AM
13831{
13832 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13833 struct map_stub *group;
721956f4 13834 asection *stub_sec;
5d1634d7 13835 bfd_byte *p;
e717da7e 13836 int stub_sec_count = 0;
5d1634d7 13837
4dfe6ac6
NC
13838 if (htab == NULL)
13839 return FALSE;
13840
eea6121a 13841 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 13842 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13843 {
13844 group->eh_size = 0;
13845 group->lr_restore = 0;
13846 if ((stub_sec = group->stub_sec) != NULL
13847 && stub_sec->size != 0)
13848 {
13849 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13850 stub_sec->size);
13851 if (stub_sec->contents == NULL)
13852 return FALSE;
13853 stub_sec->size = 0;
13854 }
13855 }
5d1634d7 13856
23eb7e01 13857 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13858 {
9f951329 13859 unsigned int indx;
ad8e1ba5 13860 bfd_vma plt0;
9f951329 13861
721956f4 13862 /* Build the .glink plt call stub. */
e7d1c40c 13863 if (htab->params->emit_stub_syms)
97b639ba
AM
13864 {
13865 struct elf_link_hash_entry *h;
468392fb
AM
13866 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13867 TRUE, FALSE, FALSE);
97b639ba
AM
13868 if (h == NULL)
13869 return FALSE;
13870 if (h->root.type == bfd_link_hash_new)
13871 {
13872 h->root.type = bfd_link_hash_defined;
13873 h->root.u.def.section = htab->glink;
ee4bf8d2 13874 h->root.u.def.value = 8;
f5385ebf
AM
13875 h->ref_regular = 1;
13876 h->def_regular = 1;
13877 h->ref_regular_nonweak = 1;
13878 h->forced_local = 1;
13879 h->non_elf = 0;
2ec55de3 13880 h->root.linker_def = 1;
97b639ba
AM
13881 }
13882 }
33e44f2e
AM
13883 plt0 = (htab->elf.splt->output_section->vma
13884 + htab->elf.splt->output_offset
13885 - 16);
176a0d42
AM
13886 if (info->emitrelocations)
13887 {
13888 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13889 if (r == NULL)
13890 return FALSE;
13891 r->r_offset = (htab->glink->output_offset
13892 + htab->glink->output_section->vma);
13893 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13894 r->r_addend = plt0;
13895 }
4ce794b7 13896 p = htab->glink->contents;
176a0d42 13897 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13898 bfd_put_64 (htab->glink->owner, plt0, p);
13899 p += 8;
b9e5796b
AM
13900 if (htab->opd_abi)
13901 {
13902 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13903 p += 4;
13904 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13905 p += 4;
13906 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13907 p += 4;
13908 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13909 p += 4;
13910 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13911 p += 4;
13912 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13913 p += 4;
13914 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13915 p += 4;
13916 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13917 p += 4;
13918 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13919 p += 4;
13920 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13921 p += 4;
13922 }
13923 else
13924 {
13925 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13926 p += 4;
13927 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13928 p += 4;
13929 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13930 p += 4;
f378ab09
AM
13931 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13932 p += 4;
b9e5796b
AM
13933 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13934 p += 4;
13935 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13936 p += 4;
13937 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13938 p += 4;
13939 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13940 p += 4;
13941 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13942 p += 4;
13943 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13944 p += 4;
13945 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13946 p += 4;
13947 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13948 p += 4;
13949 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13950 p += 4;
13951 }
407aa07c
AM
13952 bfd_put_32 (htab->glink->owner, BCTR, p);
13953 p += 4;
c75bc4f7 13954 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13955
9f951329
AM
13956 /* Build the .glink lazy link call stubs. */
13957 indx = 0;
9e390558 13958 while (p < htab->glink->contents + htab->glink->size)
9f951329 13959 {
b9e5796b 13960 if (htab->opd_abi)
9f951329 13961 {
b9e5796b
AM
13962 if (indx < 0x8000)
13963 {
13964 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13965 p += 4;
13966 }
13967 else
13968 {
13969 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13970 p += 4;
13971 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13972 p);
13973 p += 4;
13974 }
9f951329 13975 }
4ce794b7 13976 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13977 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13978 indx++;
9f951329
AM
13979 p += 4;
13980 }
5d1634d7 13981 }
5d1634d7 13982
49c09209
AM
13983 /* Build .glink global entry stubs, and PLT relocs for globals. */
13984 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13985
13986 if (!write_plt_relocs_for_local_syms (info))
13987 return FALSE;
9e390558 13988
7341d5e2 13989 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13990 {
4ce794b7 13991 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13992 htab->brlt->size);
4ce794b7 13993 if (htab->brlt->contents == NULL)
b34976b6 13994 return FALSE;
721956f4 13995 }
ee75fd95 13996 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13997 {
13998 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13999 htab->relbrlt->size);
63bc6f6c
AM
14000 if (htab->relbrlt->contents == NULL)
14001 return FALSE;
14002 }
5d1634d7 14003
721956f4
AM
14004 /* Build the stubs as directed by the stub hash table. */
14005 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14006
a4b6fadd
AM
14007 for (group = htab->group; group != NULL; group = group->next)
14008 if (group->needs_save_res)
7dda8d3c 14009 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14010
aa8a7074
AM
14011 if (htab->relbrlt != NULL)
14012 htab->relbrlt->reloc_count = 0;
14013
e7d1c40c 14014 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14015 for (group = htab->group; group != NULL; group = group->next)
14016 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14017 {
14018 int align = abs (htab->params->plt_stub_align);
14019 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14020 }
794e51c0 14021
7dda8d3c
AM
14022 for (group = htab->group; group != NULL; group = group->next)
14023 if (group->needs_save_res)
14024 {
14025 stub_sec = group->stub_sec;
14026 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14027 htab->sfpr->contents, htab->sfpr->size);
14028 if (htab->params->emit_stub_syms)
14029 {
14030 unsigned int i;
14031
14032 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14033 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14034 return FALSE;
14035 }
14036 }
14037
df136d64
AM
14038 if (htab->glink_eh_frame != NULL
14039 && htab->glink_eh_frame->size != 0)
14040 {
14041 bfd_vma val;
14042 size_t align = 4;
14043
14044 p = htab->glink_eh_frame->contents;
14045 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14046
14047 for (group = htab->group; group != NULL; group = group->next)
14048 if (group->eh_size != 0)
14049 {
14050 /* Offset to stub section. */
14051 val = (group->stub_sec->output_section->vma
14052 + group->stub_sec->output_offset);
14053 val -= (htab->glink_eh_frame->output_section->vma
14054 + htab->glink_eh_frame->output_offset
14055 + (p + 8 - htab->glink_eh_frame->contents));
14056 if (val + 0x80000000 > 0xffffffff)
14057 {
14058 _bfd_error_handler
14059 (_("%s offset too large for .eh_frame sdata4 encoding"),
14060 group->stub_sec->name);
14061 return FALSE;
14062 }
14063 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14064 p += (group->eh_size + 17 + 3) & -4;
14065 }
14066 if (htab->glink != NULL && htab->glink->size != 0)
14067 {
14068 /* Offset to .glink. */
14069 val = (htab->glink->output_section->vma
14070 + htab->glink->output_offset
14071 + 8);
14072 val -= (htab->glink_eh_frame->output_section->vma
14073 + htab->glink_eh_frame->output_offset
14074 + (p + 8 - htab->glink_eh_frame->contents));
14075 if (val + 0x80000000 > 0xffffffff)
14076 {
14077 _bfd_error_handler
14078 (_("%s offset too large for .eh_frame sdata4 encoding"),
14079 htab->glink->name);
14080 return FALSE;
14081 }
14082 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14083 p += (24 + align - 1) & -align;
14084 }
14085 }
14086
d4aaa2a0
AM
14087 for (group = htab->group; group != NULL; group = group->next)
14088 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14089 {
14090 stub_sec_count += 1;
c9301e31
AM
14091 if (stub_sec->rawsize != stub_sec->size
14092 && (htab->stub_iteration <= STUB_SHRINK_ITER
14093 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14094 break;
14095 }
5d1634d7 14096
25516cc5 14097 if (group != NULL)
5d1634d7 14098 {
b34976b6 14099 htab->stub_error = TRUE;
cf97bcb0 14100 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14101 }
721956f4 14102
d2a300cf
AM
14103 if (htab->stub_error)
14104 return FALSE;
14105
14106 if (stats != NULL)
14107 {
db84fff3 14108 size_t len;
d2a300cf
AM
14109 *stats = bfd_malloc (500);
14110 if (*stats == NULL)
14111 return FALSE;
14112
db84fff3
AM
14113 len = sprintf (*stats,
14114 ngettext ("linker stubs in %u group\n",
14115 "linker stubs in %u groups\n",
14116 stub_sec_count),
14117 stub_sec_count);
05d0e962
AM
14118 sprintf (*stats + len, _(" branch %lu\n"
14119 " branch toc adj %lu\n"
14120 " branch notoc %lu\n"
14121 " branch both %lu\n"
14122 " long branch %lu\n"
14123 " long toc adj %lu\n"
14124 " long notoc %lu\n"
14125 " long both %lu\n"
14126 " plt call %lu\n"
14127 " plt call save %lu\n"
14128 " plt call notoc %lu\n"
14129 " plt call both %lu\n"
14130 " global entry %lu"),
4ce794b7
AM
14131 htab->stub_count[ppc_stub_long_branch - 1],
14132 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14133 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14134 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14135 htab->stub_count[ppc_stub_plt_branch - 1],
14136 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14137 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14138 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14139 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14140 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14141 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14142 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14143 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14144 }
14145 return TRUE;
5bd4f169
AM
14146}
14147
60124e18
AM
14148/* What to do when ld finds relocations against symbols defined in
14149 discarded sections. */
14150
14151static unsigned int
14152ppc64_elf_action_discarded (asection *sec)
14153{
14154 if (strcmp (".opd", sec->name) == 0)
14155 return 0;
14156
14157 if (strcmp (".toc", sec->name) == 0)
14158 return 0;
14159
bce50a28
JJ
14160 if (strcmp (".toc1", sec->name) == 0)
14161 return 0;
14162
60124e18
AM
14163 return _bfd_elf_default_action_discarded (sec);
14164}
14165
e59a1001
AM
14166/* These are the dynamic relocations supported by glibc. */
14167
14168static bfd_boolean
14169ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14170{
14171 switch (r_type)
14172 {
14173 case R_PPC64_RELATIVE:
14174 case R_PPC64_NONE:
14175 case R_PPC64_ADDR64:
14176 case R_PPC64_GLOB_DAT:
14177 case R_PPC64_IRELATIVE:
14178 case R_PPC64_JMP_IREL:
14179 case R_PPC64_JMP_SLOT:
14180 case R_PPC64_DTPMOD64:
14181 case R_PPC64_DTPREL64:
14182 case R_PPC64_TPREL64:
14183 case R_PPC64_TPREL16_LO_DS:
14184 case R_PPC64_TPREL16_DS:
14185 case R_PPC64_TPREL16:
14186 case R_PPC64_TPREL16_LO:
14187 case R_PPC64_TPREL16_HI:
14188 case R_PPC64_TPREL16_HIGH:
14189 case R_PPC64_TPREL16_HA:
14190 case R_PPC64_TPREL16_HIGHA:
14191 case R_PPC64_TPREL16_HIGHER:
14192 case R_PPC64_TPREL16_HIGHEST:
14193 case R_PPC64_TPREL16_HIGHERA:
14194 case R_PPC64_TPREL16_HIGHESTA:
14195 case R_PPC64_ADDR16_LO_DS:
14196 case R_PPC64_ADDR16_LO:
14197 case R_PPC64_ADDR16_HI:
14198 case R_PPC64_ADDR16_HIGH:
14199 case R_PPC64_ADDR16_HA:
14200 case R_PPC64_ADDR16_HIGHA:
14201 case R_PPC64_REL30:
14202 case R_PPC64_COPY:
14203 case R_PPC64_UADDR64:
14204 case R_PPC64_UADDR32:
14205 case R_PPC64_ADDR32:
14206 case R_PPC64_ADDR24:
14207 case R_PPC64_ADDR16:
14208 case R_PPC64_UADDR16:
14209 case R_PPC64_ADDR16_DS:
14210 case R_PPC64_ADDR16_HIGHER:
14211 case R_PPC64_ADDR16_HIGHEST:
14212 case R_PPC64_ADDR16_HIGHERA:
14213 case R_PPC64_ADDR16_HIGHESTA:
14214 case R_PPC64_ADDR14:
14215 case R_PPC64_ADDR14_BRTAKEN:
14216 case R_PPC64_ADDR14_BRNTAKEN:
14217 case R_PPC64_REL32:
14218 case R_PPC64_REL64:
14219 return TRUE;
14220
14221 default:
14222 return FALSE;
14223 }
14224}
14225
5bd4f169
AM
14226/* The RELOCATE_SECTION function is called by the ELF backend linker
14227 to handle the relocations for a section.
14228
14229 The relocs are always passed as Rela structures; if the section
14230 actually uses Rel structures, the r_addend field will always be
14231 zero.
14232
14233 This function is responsible for adjust the section contents as
14234 necessary, and (if using Rela relocs and generating a
1049f94e 14235 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14236 necessary.
14237
14238 This function does not have to worry about setting the reloc
14239 address or the reloc symbol index.
14240
14241 LOCAL_SYMS is a pointer to the swapped in local symbols.
14242
14243 LOCAL_SECTIONS is an array giving the section in the input file
14244 corresponding to the st_shndx field of each local symbol.
14245
14246 The global hash table entry for the global symbols can be found
14247 via elf_sym_hashes (input_bfd).
14248
1049f94e 14249 When generating relocatable output, this function must handle
5bd4f169
AM
14250 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14251 going to be the section symbol corresponding to the output
14252 section, which means that the addend must be adjusted
14253 accordingly. */
14254
b34976b6 14255static bfd_boolean
4ce794b7
AM
14256ppc64_elf_relocate_section (bfd *output_bfd,
14257 struct bfd_link_info *info,
14258 bfd *input_bfd,
14259 asection *input_section,
14260 bfd_byte *contents,
14261 Elf_Internal_Rela *relocs,
14262 Elf_Internal_Sym *local_syms,
14263 asection **local_sections)
5bd4f169 14264{
65f38f15 14265 struct ppc_link_hash_table *htab;
5bd4f169
AM
14266 Elf_Internal_Shdr *symtab_hdr;
14267 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14268 Elf_Internal_Rela *rel;
c316a17c 14269 Elf_Internal_Rela *wrel;
5bd4f169 14270 Elf_Internal_Rela *relend;
411e1bfb
AM
14271 Elf_Internal_Rela outrel;
14272 bfd_byte *loc;
411e1bfb 14273 struct got_entry **local_got_ents;
5bd4f169 14274 bfd_vma TOCstart;
b34976b6
AM
14275 bfd_boolean ret = TRUE;
14276 bfd_boolean is_opd;
794e51c0
AM
14277 /* Assume 'at' branch hints. */
14278 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14279 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14280 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14281
65f38f15 14282 /* Initialize howto table if needed. */
5bd4f169 14283 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14284 ppc_howto_init ();
14285
65f38f15 14286 htab = ppc_hash_table (info);
4dfe6ac6
NC
14287 if (htab == NULL)
14288 return FALSE;
ee75fd95
AM
14289
14290 /* Don't relocate stub sections. */
e7d1c40c 14291 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14292 return TRUE;
14293
7af5d5c4
AM
14294 if (!is_ppc64_elf (input_bfd))
14295 {
14296 bfd_set_error (bfd_error_wrong_format);
14297 return FALSE;
14298 }
0ffa91dd 14299
411e1bfb 14300 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14301 TOCstart = elf_gp (output_bfd);
0ffa91dd 14302 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14303 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14304 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14305
c316a17c 14306 rel = wrel = relocs;
5bd4f169 14307 relend = relocs + input_section->reloc_count;
c316a17c 14308 for (; rel < relend; wrel++, rel++)
5bd4f169 14309 {
04c9666a 14310 enum elf_ppc64_reloc_type r_type;
31c76678 14311 bfd_vma addend;
5bd4f169
AM
14312 bfd_reloc_status_type r;
14313 Elf_Internal_Sym *sym;
14314 asection *sec;
039b3fef
AM
14315 struct elf_link_hash_entry *h_elf;
14316 struct ppc_link_hash_entry *h;
14317 struct ppc_link_hash_entry *fdh;
5bd4f169 14318 const char *sym_name;
0d4792f7 14319 unsigned long r_symndx, toc_symndx;
3a71aa26 14320 bfd_vma toc_addend;
f961d9dd
AM
14321 unsigned char tls_mask, tls_gd, tls_type;
14322 unsigned char sym_type;
5bd4f169 14323 bfd_vma relocation;
23cedd1d 14324 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14325 bfd_boolean warned;
bc30df16 14326 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14327 unsigned int insn;
e11840f9 14328 unsigned int mask;
721956f4
AM
14329 struct ppc_stub_hash_entry *stub_entry;
14330 bfd_vma max_br_offset;
14331 bfd_vma from;
c316a17c 14332 Elf_Internal_Rela orig_rel;
b80eed39
AM
14333 reloc_howto_type *howto;
14334 struct reloc_howto_struct alt_howto;
4a421c53
AM
14335 uint64_t pinsn;
14336 bfd_vma offset;
5bd4f169 14337
c316a17c
AM
14338 again:
14339 orig_rel = *rel;
14340
4ce794b7 14341 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14342 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14343
14344 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14345 symbol of the previous ADDR64 reloc. The symbol gives us the
14346 proper TOC base to use. */
14347 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14348 && wrel != relocs
14349 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14350 && is_opd)
c316a17c 14351 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14352
4ce794b7
AM
14353 sym = NULL;
14354 sec = NULL;
039b3fef 14355 h_elf = NULL;
4ce794b7 14356 sym_name = NULL;
b34976b6
AM
14357 unresolved_reloc = FALSE;
14358 warned = FALSE;
65f38f15 14359
0b13192e 14360 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14361 {
14362 /* It's a local symbol. */
74f0fb50 14363 struct _opd_sec_data *opd;
4025353c 14364
5bd4f169
AM
14365 sym = local_syms + r_symndx;
14366 sec = local_sections[r_symndx];
26c61ae5 14367 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14368 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14369 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14370 opd = get_opd_info (sec);
14371 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14372 {
51aecdc5
AM
14373 long adjust = opd->adjust[OPD_NDX (sym->st_value
14374 + rel->r_addend)];
4025353c
AM
14375 if (adjust == -1)
14376 relocation = 0;
14377 else
4cc603a5
AM
14378 {
14379 /* If this is a relocation against the opd section sym
14380 and we have edited .opd, adjust the reloc addend so
14381 that ld -r and ld --emit-relocs output is correct.
14382 If it is a reloc against some other .opd symbol,
14383 then the symbol value will be adjusted later. */
14384 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14385 rel->r_addend += adjust;
14386 else
14387 relocation += adjust;
14388 }
1e2f5b6e 14389 }
5bd4f169
AM
14390 }
14391 else
14392 {
62d887d4
L
14393 bfd_boolean ignored;
14394
b2a8e766
AM
14395 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14396 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14397 h_elf, sec, relocation,
62d887d4 14398 unresolved_reloc, warned, ignored);
039b3fef
AM
14399 sym_name = h_elf->root.root.string;
14400 sym_type = h_elf->type;
b69fdb4e
AM
14401 if (sec != NULL
14402 && sec->owner == output_bfd
14403 && strcmp (sec->name, ".opd") == 0)
14404 {
14405 /* This is a symbol defined in a linker script. All
14406 such are defined in output sections, even those
14407 defined by simple assignment from a symbol defined in
14408 an input section. Transfer the symbol to an
14409 appropriate input .opd section, so that a branch to
14410 this symbol will be mapped to the location specified
14411 by the opd entry. */
14412 struct bfd_link_order *lo;
14413 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14414 if (lo->type == bfd_indirect_link_order)
14415 {
14416 asection *isec = lo->u.indirect.section;
14417 if (h_elf->root.u.def.value >= isec->output_offset
14418 && h_elf->root.u.def.value < (isec->output_offset
14419 + isec->size))
14420 {
14421 h_elf->root.u.def.value -= isec->output_offset;
14422 h_elf->root.u.def.section = isec;
14423 sec = isec;
14424 break;
14425 }
14426 }
14427 }
5bd4f169 14428 }
039b3fef 14429 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14430
dbaa2011 14431 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14432 {
14433 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14434 input_bfd, input_section,
0930cb30 14435 contents, rel->r_offset);
c316a17c
AM
14436 wrel->r_offset = rel->r_offset;
14437 wrel->r_info = 0;
14438 wrel->r_addend = 0;
14439
14440 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14441 symbols defined in discarded sections. Not done for
c316a17c
AM
14442 non-debug to preserve relocs in .eh_frame which the
14443 eh_frame editing code expects to be present. */
14444 if (bfd_link_relocatable (info)
14445 && (input_section->flags & SEC_DEBUGGING))
14446 wrel--;
14447
14448 continue;
14449 }
ab96bf03 14450
0e1862bb 14451 if (bfd_link_relocatable (info))
c316a17c 14452 goto copy_reloc;
ab96bf03 14453
f40da81b
AM
14454 if (h != NULL && &h->elf == htab->elf.hgot)
14455 {
6f20ed8a 14456 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14457 sec = bfd_abs_section_ptr;
14458 unresolved_reloc = FALSE;
14459 }
14460
951fd09b
AM
14461 /* TLS optimizations. Replace instruction sequences and relocs
14462 based on information we collected in tls_optimize. We edit
14463 RELOCS so that --emit-relocs will output something sensible
14464 for the final instruction stream. */
14465 tls_mask = 0;
14466 tls_gd = 0;
0d4792f7 14467 toc_symndx = 0;
727fc41e
AM
14468 if (h != NULL)
14469 tls_mask = h->tls_mask;
14470 else if (local_got_ents != NULL)
411e1bfb 14471 {
e054468f
AM
14472 struct plt_entry **local_plt = (struct plt_entry **)
14473 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14474 unsigned char *lgot_masks = (unsigned char *)
e054468f 14475 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14476 tls_mask = lgot_masks[r_symndx];
14477 }
37da22e5 14478 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14479 && (r_type == R_PPC64_TLS
14480 || r_type == R_PPC64_TLSGD
14481 || r_type == R_PPC64_TLSLD))
14482 {
14483 /* Check for toc tls entries. */
f961d9dd 14484 unsigned char *toc_tls;
0d4792f7 14485
727fc41e
AM
14486 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14487 &local_syms, rel, input_bfd))
14488 return FALSE;
0d4792f7 14489
727fc41e
AM
14490 if (toc_tls)
14491 tls_mask = *toc_tls;
0d4792f7
AM
14492 }
14493
14494 /* Check that tls relocs are used with tls syms, and non-tls
14495 relocs are used with non-tls syms. */
cf35638d 14496 if (r_symndx != STN_UNDEF
0d4792f7
AM
14497 && r_type != R_PPC64_NONE
14498 && (h == NULL
039b3fef
AM
14499 || h->elf.root.type == bfd_link_hash_defined
14500 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14501 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14502 {
37da22e5 14503 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14504 && (r_type == R_PPC64_TLS
14505 || r_type == R_PPC64_TLSGD
14506 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14507 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14508 ;
14509 else
25f53a85 14510 info->callbacks->einfo
1d483afe 14511 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14512 /* xgettext:c-format */
c1c8c1ef 14513 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14514 /* xgettext:c-format */
c1c8c1ef 14515 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14516 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14517 ppc64_elf_howto_table[r_type]->name,
14518 sym_name);
411e1bfb
AM
14519 }
14520
14521 /* Ensure reloc mapping code below stays sane. */
14522 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14523 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14524 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14525 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14526 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14527 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14528 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14529 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14530 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14531 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14532 abort ();
0d4792f7 14533
411e1bfb
AM
14534 switch (r_type)
14535 {
14536 default:
411e1bfb
AM
14537 break;
14538
ba761f19 14539 case R_PPC64_LO_DS_OPT:
95f0d0d2 14540 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 14541 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
14542 abort ();
14543 insn += (14u << 26) - (58u << 26);
95f0d0d2 14544 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14545 r_type = R_PPC64_TOC16_LO;
14546 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14547 break;
14548
411e1bfb
AM
14549 case R_PPC64_TOC16:
14550 case R_PPC64_TOC16_LO:
14551 case R_PPC64_TOC16_DS:
14552 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14553 {
14554 /* Check for toc tls entries. */
f961d9dd 14555 unsigned char *toc_tls;
951fd09b 14556 int retval;
411e1bfb 14557
3a71aa26
AM
14558 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14559 &local_syms, rel, input_bfd);
951fd09b 14560 if (retval == 0)
411e1bfb
AM
14561 return FALSE;
14562
14563 if (toc_tls)
14564 {
951fd09b 14565 tls_mask = *toc_tls;
411e1bfb
AM
14566 if (r_type == R_PPC64_TOC16_DS
14567 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14568 {
37da22e5 14569 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14570 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14571 goto toctprel;
14572 }
411e1bfb 14573 else
951fd09b
AM
14574 {
14575 /* If we found a GD reloc pair, then we might be
14576 doing a GD->IE transition. */
14577 if (retval == 2)
14578 {
b00a0a86 14579 tls_gd = TLS_GDIE;
37da22e5
AM
14580 if ((tls_mask & TLS_TLS) != 0
14581 && (tls_mask & TLS_GD) == 0)
102890f0 14582 goto tls_ldgd_opt;
951fd09b
AM
14583 }
14584 else if (retval == 3)
14585 {
37da22e5
AM
14586 if ((tls_mask & TLS_TLS) != 0
14587 && (tls_mask & TLS_LD) == 0)
102890f0 14588 goto tls_ldgd_opt;
951fd09b
AM
14589 }
14590 }
411e1bfb
AM
14591 }
14592 }
14593 break;
14594
9d6ded02
AM
14595 case R_PPC64_GOT_TPREL16_HI:
14596 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14597 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14598 && (tls_mask & TLS_TPREL) == 0)
14599 {
14600 rel->r_offset -= d_offset;
95f0d0d2 14601 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14602 r_type = R_PPC64_NONE;
14603 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14604 }
14605 break;
14606
411e1bfb
AM
14607 case R_PPC64_GOT_TPREL16_DS:
14608 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14609 if ((tls_mask & TLS_TLS) != 0
951fd09b 14610 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14611 {
81407a69 14612 toctprel:
95f0d0d2 14613 insn = bfd_get_32 (input_bfd,
c316a17c 14614 contents + rel->r_offset - d_offset);
411e1bfb
AM
14615 insn &= 31 << 21;
14616 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14617 bfd_put_32 (input_bfd, insn,
c316a17c 14618 contents + rel->r_offset - d_offset);
411e1bfb 14619 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14620 if (toc_symndx != 0)
14621 {
14622 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14623 rel->r_addend = toc_addend;
0d4792f7
AM
14624 /* We changed the symbol. Start over in order to
14625 get h, sym, sec etc. right. */
c316a17c 14626 goto again;
0d4792f7
AM
14627 }
14628 else
14629 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14630 }
14631 break;
14632
c213164a
AM
14633 case R_PPC64_GOT_TPREL34:
14634 if ((tls_mask & TLS_TLS) != 0
14635 && (tls_mask & TLS_TPREL) == 0)
14636 {
14637 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14638 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14639 pinsn <<= 32;
14640 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14641 pinsn += ((2ULL << 56) + (-1ULL << 52)
14642 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14643 bfd_put_32 (input_bfd, pinsn >> 32,
14644 contents + rel->r_offset);
14645 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14646 contents + rel->r_offset + 4);
14647 r_type = R_PPC64_TPREL34;
14648 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14649 }
14650 break;
14651
411e1bfb 14652 case R_PPC64_TLS:
37da22e5 14653 if ((tls_mask & TLS_TLS) != 0
951fd09b 14654 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14655 {
c213164a 14656 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
14657 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14658 if (insn == 0)
c213164a
AM
14659 break;
14660 if ((rel->r_offset & 3) == 0)
0d4792f7 14661 {
c213164a
AM
14662 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14663 /* Was PPC64_TLS which sits on insn boundary, now
14664 PPC64_TPREL16_LO which is at low-order half-word. */
14665 rel->r_offset += d_offset;
14666 r_type = R_PPC64_TPREL16_LO;
14667 if (toc_symndx != 0)
14668 {
14669 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14670 rel->r_addend = toc_addend;
14671 /* We changed the symbol. Start over in order to
14672 get h, sym, sec etc. right. */
14673 goto again;
14674 }
14675 else
14676 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14677 }
14678 else if ((rel->r_offset & 3) == 1)
14679 {
14680 /* For pcrel IE to LE we already have the full
14681 offset and thus don't need an addi here. A nop
14682 or mr will do. */
2365f8d7 14683 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
14684 {
14685 /* Extract regs from addi rt,ra,si. */
14686 unsigned int rt = (insn >> 21) & 0x1f;
14687 unsigned int ra = (insn >> 16) & 0x1f;
14688 if (rt == ra)
14689 insn = NOP;
14690 else
14691 {
14692 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14693 insn = (rt << 16) | (ra << 21) | (ra << 11);
14694 insn |= (31u << 26) | (444u << 1);
14695 }
14696 }
14697 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 14698 }
411e1bfb
AM
14699 }
14700 break;
14701
411e1bfb
AM
14702 case R_PPC64_GOT_TLSGD16_HI:
14703 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 14704 tls_gd = TLS_GDIE;
37da22e5 14705 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14706 goto tls_gdld_hi;
14707 break;
14708
411e1bfb
AM
14709 case R_PPC64_GOT_TLSLD16_HI:
14710 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14711 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14712 {
951fd09b
AM
14713 tls_gdld_hi:
14714 if ((tls_mask & tls_gd) != 0)
14715 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14716 + R_PPC64_GOT_TPREL16_DS);
14717 else
411e1bfb 14718 {
4fe5ca5b 14719 rel->r_offset -= d_offset;
95f0d0d2 14720 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14721 r_type = R_PPC64_NONE;
411e1bfb 14722 }
951fd09b 14723 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14724 }
14725 break;
14726
951fd09b
AM
14727 case R_PPC64_GOT_TLSGD16:
14728 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 14729 tls_gd = TLS_GDIE;
37da22e5 14730 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14731 goto tls_ldgd_opt;
951fd09b 14732 break;
411e1bfb 14733
951fd09b
AM
14734 case R_PPC64_GOT_TLSLD16:
14735 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14736 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14737 {
b9f04fe0 14738 unsigned int insn1, insn2;
102890f0
AM
14739
14740 tls_ldgd_opt:
727fc41e
AM
14741 offset = (bfd_vma) -1;
14742 /* If not using the newer R_PPC64_TLSGD/LD to mark
14743 __tls_get_addr calls, we must trust that the call
14744 stays with its arg setup insns, ie. that the next
14745 reloc is the __tls_get_addr call associated with
14746 the current reloc. Edit both insns. */
9737e8af 14747 if (input_section->nomark_tls_get_addr
727fc41e
AM
14748 && rel + 1 < relend
14749 && branch_reloc_hash_match (input_bfd, rel + 1,
14750 htab->tls_get_addr,
14751 htab->tls_get_addr_fd))
14752 offset = rel[1].r_offset;
b86ac8e3
AM
14753 /* We read the low GOT_TLS (or TOC16) insn because we
14754 need to keep the destination reg. It may be
14755 something other than the usual r3, and moved to r3
14756 before the call by intervening code. */
95f0d0d2 14757 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14758 contents + rel->r_offset - d_offset);
102890f0 14759 if ((tls_mask & tls_gd) != 0)
411e1bfb 14760 {
102890f0 14761 /* IE */
b86ac8e3 14762 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 14763 insn1 |= 58u << 26; /* ld */
102890f0 14764 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14765 if (offset != (bfd_vma) -1)
f58d5a2d 14766 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
14767 if (r_type == R_PPC64_TOC16
14768 || r_type == R_PPC64_TOC16_LO)
102890f0 14769 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
14770 else
14771 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14772 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
14773 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14774 }
14775 else
14776 {
14777 /* LE */
b86ac8e3
AM
14778 insn1 &= 0x1f << 21;
14779 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14780 insn2 = 0x38630000; /* addi 3,3,0 */
14781 if (tls_gd == 0)
951fd09b 14782 {
102890f0 14783 /* Was an LD reloc. */
71c4e95a 14784 r_symndx = STN_UNDEF;
102890f0 14785 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 14786 }
102890f0 14787 else if (toc_symndx != 0)
3a71aa26
AM
14788 {
14789 r_symndx = toc_symndx;
14790 rel->r_addend = toc_addend;
14791 }
102890f0
AM
14792 r_type = R_PPC64_TPREL16_HA;
14793 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14794 if (offset != (bfd_vma) -1)
14795 {
14796 rel[1].r_info = ELF64_R_INFO (r_symndx,
14797 R_PPC64_TPREL16_LO);
14798 rel[1].r_offset = offset + d_offset;
14799 rel[1].r_addend = rel->r_addend;
14800 }
102890f0 14801 }
95f0d0d2 14802 bfd_put_32 (input_bfd, insn1,
3a71aa26 14803 contents + rel->r_offset - d_offset);
727fc41e 14804 if (offset != (bfd_vma) -1)
c96e0573
AM
14805 {
14806 bfd_put_32 (input_bfd, insn2, contents + offset);
14807 if (offset + 8 <= input_section->size)
14808 {
14809 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14810 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14811 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14812 }
14813 }
727fc41e
AM
14814 if ((tls_mask & tls_gd) == 0
14815 && (tls_gd == 0 || toc_symndx != 0))
14816 {
14817 /* We changed the symbol. Start over in order
14818 to get h, sym, sec etc. right. */
c316a17c 14819 goto again;
727fc41e
AM
14820 }
14821 }
14822 break;
14823
c213164a
AM
14824 case R_PPC64_GOT_TLSGD34:
14825 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14826 {
14827 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14828 pinsn <<= 32;
14829 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14830 if ((tls_mask & TLS_GDIE) != 0)
14831 {
14832 /* IE, pla -> pld */
14833 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14834 r_type = R_PPC64_GOT_TPREL34;
14835 }
14836 else
14837 {
14838 /* LE, pla pcrel -> paddi r13 */
14839 pinsn += (-1ULL << 52) + (13ULL << 16);
14840 r_type = R_PPC64_TPREL34;
14841 }
14842 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14843 bfd_put_32 (input_bfd, pinsn >> 32,
14844 contents + rel->r_offset);
14845 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14846 contents + rel->r_offset + 4);
14847 }
14848 break;
14849
14850 case R_PPC64_GOT_TLSLD34:
14851 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14852 {
14853 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14854 pinsn <<= 32;
14855 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14856 pinsn += (-1ULL << 52) + (13ULL << 16);
14857 bfd_put_32 (input_bfd, pinsn >> 32,
14858 contents + rel->r_offset);
14859 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14860 contents + rel->r_offset + 4);
14861 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14862 r_symndx = STN_UNDEF;
14863 r_type = R_PPC64_TPREL34;
14864 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14865 goto again;
14866 }
14867 break;
14868
727fc41e 14869 case R_PPC64_TLSGD:
37da22e5 14870 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14871 && rel + 1 < relend)
727fc41e 14872 {
b9f04fe0 14873 unsigned int insn2;
5663e321 14874 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14875
4a421c53 14876 offset = rel->r_offset;
5663e321 14877 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14878 {
14879 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14880 if (r_type1 == R_PPC64_PLT_PCREL34
14881 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14882 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14883 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14884 break;
14885 }
14886
14887 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14888 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14889
b00a0a86 14890 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
14891 {
14892 /* IE */
14893 r_type = R_PPC64_NONE;
14894 insn2 = 0x7c636a14; /* add 3,3,13 */
14895 }
14896 else
14897 {
14898 /* LE */
14899 if (toc_symndx != 0)
14900 {
14901 r_symndx = toc_symndx;
14902 rel->r_addend = toc_addend;
14903 }
c213164a
AM
14904 if (r_type1 == R_PPC64_REL24_NOTOC
14905 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14906 {
14907 r_type = R_PPC64_NONE;
14908 insn2 = NOP;
14909 }
14910 else
14911 {
14912 rel->r_offset = offset + d_offset;
14913 r_type = R_PPC64_TPREL16_LO;
14914 insn2 = 0x38630000; /* addi 3,3,0 */
14915 }
727fc41e
AM
14916 }
14917 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14918 /* Zap the reloc on the _tls_get_addr call too. */
14919 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14920 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14921 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14922 if ((tls_mask & TLS_GDIE) == 0
14923 && toc_symndx != 0
14924 && r_type != R_PPC64_NONE)
c316a17c 14925 goto again;
411e1bfb 14926 }
411e1bfb
AM
14927 break;
14928
727fc41e 14929 case R_PPC64_TLSLD:
37da22e5 14930 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14931 && rel + 1 < relend)
727fc41e 14932 {
b9f04fe0 14933 unsigned int insn2;
5663e321 14934 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14935
4a421c53 14936 offset = rel->r_offset;
5663e321 14937 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14938 {
14939 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14940 if (r_type1 == R_PPC64_PLT_PCREL34
14941 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14942 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14943 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14944 break;
14945 }
14946
14947 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14948 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14949
c213164a
AM
14950 if (r_type1 == R_PPC64_REL24_NOTOC
14951 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14952 {
14953 r_type = R_PPC64_NONE;
14954 insn2 = NOP;
14955 }
14956 else
14957 {
14958 rel->r_offset = offset + d_offset;
14959 r_symndx = STN_UNDEF;
14960 r_type = R_PPC64_TPREL16_LO;
14961 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14962 insn2 = 0x38630000; /* addi 3,3,0 */
14963 }
727fc41e 14964 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14965 /* Zap the reloc on the _tls_get_addr call too. */
14966 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14967 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14968 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14969 if (r_type != R_PPC64_NONE)
14970 goto again;
727fc41e
AM
14971 }
14972 break;
14973
411e1bfb 14974 case R_PPC64_DTPMOD64:
951fd09b
AM
14975 if (rel + 1 < relend
14976 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14977 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14978 {
951fd09b
AM
14979 if ((tls_mask & TLS_GD) == 0)
14980 {
14981 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 14982 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
14983 r_type = R_PPC64_TPREL64;
14984 else
14985 {
4ce794b7 14986 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14987 r_type = R_PPC64_NONE;
14988 }
14989 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14990 }
14991 }
14992 else
14993 {
14994 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14995 {
4ce794b7 14996 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14997 r_type = R_PPC64_NONE;
951fd09b 14998 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14999 }
411e1bfb
AM
15000 }
15001 break;
15002
15003 case R_PPC64_TPREL64:
951fd09b 15004 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15005 {
15006 r_type = R_PPC64_NONE;
15007 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15008 }
15009 break;
52a82034 15010
006589cf
AM
15011 case R_PPC64_ENTRY:
15012 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15013 if (!bfd_link_pic (info)
15014 && !info->traditional_format
15015 && relocation + 0x80008000 <= 0xffffffff)
15016 {
15017 unsigned int insn1, insn2;
15018
15019 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15020 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15021 if ((insn1 & ~0xfffc) == LD_R2_0R12
15022 && insn2 == ADD_R2_R2_R12)
15023 {
95f0d0d2 15024 bfd_put_32 (input_bfd,
006589cf
AM
15025 LIS_R2 + PPC_HA (relocation),
15026 contents + rel->r_offset);
95f0d0d2 15027 bfd_put_32 (input_bfd,
006589cf
AM
15028 ADDI_R2_R2 + PPC_LO (relocation),
15029 contents + rel->r_offset + 4);
15030 }
15031 }
15032 else
15033 {
15034 relocation -= (rel->r_offset
15035 + input_section->output_offset
15036 + input_section->output_section->vma);
15037 if (relocation + 0x80008000 <= 0xffffffff)
15038 {
15039 unsigned int insn1, insn2;
15040
15041 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15042 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15043 if ((insn1 & ~0xfffc) == LD_R2_0R12
15044 && insn2 == ADD_R2_R2_R12)
15045 {
95f0d0d2 15046 bfd_put_32 (input_bfd,
006589cf
AM
15047 ADDIS_R2_R12 + PPC_HA (relocation),
15048 contents + rel->r_offset);
95f0d0d2 15049 bfd_put_32 (input_bfd,
006589cf
AM
15050 ADDI_R2_R2 + PPC_LO (relocation),
15051 contents + rel->r_offset + 4);
15052 }
15053 }
15054 }
15055 break;
15056
52a82034
AM
15057 case R_PPC64_REL16_HA:
15058 /* If we are generating a non-PIC executable, edit
15059 . 0: addis 2,12,.TOC.-0b@ha
15060 . addi 2,2,.TOC.-0b@l
15061 used by ELFv2 global entry points to set up r2, to
15062 . lis 2,.TOC.@ha
15063 . addi 2,2,.TOC.@l
15064 if .TOC. is in range. */
0e1862bb 15065 if (!bfd_link_pic (info)
810d4e75 15066 && !info->traditional_format
006589cf 15067 && !htab->opd_abi
4f038ee5 15068 && rel->r_addend == d_offset
52a82034
AM
15069 && h != NULL && &h->elf == htab->elf.hgot
15070 && rel + 1 < relend
15071 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15072 && rel[1].r_offset == rel->r_offset + 4
15073 && rel[1].r_addend == rel->r_addend + 4
15074 && relocation + 0x80008000 <= 0xffffffff)
15075 {
15076 unsigned int insn1, insn2;
4a421c53 15077 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15078 insn1 = bfd_get_32 (input_bfd, contents + offset);
15079 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15080 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15081 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15082 {
15083 r_type = R_PPC64_ADDR16_HA;
15084 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15085 rel->r_addend -= d_offset;
15086 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15087 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15088 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15089 }
15090 }
15091 break;
411e1bfb
AM
15092 }
15093
15094 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15095 insn = 0;
b25116a9
AM
15096 max_br_offset = 1 << 25;
15097 addend = rel->r_addend;
bc30df16 15098 reloc_dest = DEST_NORMAL;
65f38f15 15099 switch (r_type)
5bd4f169
AM
15100 {
15101 default:
65f38f15 15102 break;
5bd4f169 15103
3b421ab3
AM
15104 case R_PPC64_TOCSAVE:
15105 if (relocation + addend == (rel->r_offset
15106 + input_section->output_offset
15107 + input_section->output_section->vma)
15108 && tocsave_find (htab, NO_INSERT,
15109 &local_syms, rel, input_bfd))
15110 {
15111 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15112 if (insn == NOP
15113 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15114 bfd_put_32 (input_bfd,
15115 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15116 contents + rel->r_offset);
15117 }
15118 break;
15119
65f38f15
AM
15120 /* Branch taken prediction relocations. */
15121 case R_PPC64_ADDR14_BRTAKEN:
15122 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15123 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15124 /* Fall through. */
65f38f15 15125
86c76c7b 15126 /* Branch not taken prediction relocations. */
65f38f15
AM
15127 case R_PPC64_ADDR14_BRNTAKEN:
15128 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15129 insn |= bfd_get_32 (input_bfd,
411e1bfb 15130 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15131 /* Fall through. */
86c76c7b 15132
b25116a9
AM
15133 case R_PPC64_REL14:
15134 max_br_offset = 1 << 15;
1a0670f3 15135 /* Fall through. */
5bd4f169 15136
65f38f15 15137 case R_PPC64_REL24:
05d0e962 15138 case R_PPC64_REL24_NOTOC:
23cedd1d 15139 case R_PPC64_PLTCALL:
5663e321 15140 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15141 /* Calls to functions with a different TOC, such as calls to
15142 shared objects, need to alter the TOC pointer. This is
15143 done using a linkage stub. A REL24 branching to these
15144 linkage stubs needs to be followed by a nop, as the nop
15145 will be replaced with an instruction to restore the TOC
15146 base pointer. */
8387904d 15147 fdh = h;
b31867b6
AM
15148 if (h != NULL
15149 && h->oh != NULL
15150 && h->oh->is_func_descriptor)
15151 fdh = ppc_follow_link (h->oh);
31c76678
DK
15152 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15153 htab);
5663e321
AM
15154 if ((r_type == R_PPC64_PLTCALL
15155 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15156 && stub_entry != NULL
05d0e962
AM
15157 && stub_entry->stub_type >= ppc_stub_plt_call
15158 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15159 stub_entry = NULL;
15160
6abec6bc 15161 if (stub_entry != NULL
d0abeec8
AM
15162 && ((stub_entry->stub_type >= ppc_stub_plt_call
15163 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15164 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15165 || stub_entry->stub_type == ppc_stub_plt_branch_both
15166 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15167 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15168 {
b25116a9 15169 bfd_boolean can_plt_call = FALSE;
721956f4 15170
6e1816be
AM
15171 if (stub_entry->stub_type == ppc_stub_plt_call
15172 && !htab->opd_abi
15173 && htab->params->plt_localentry0 != 0
15174 && is_elfv2_localentry0 (&h->elf))
15175 {
15176 /* The function doesn't use or change r2. */
15177 can_plt_call = TRUE;
15178 }
05d0e962
AM
15179 else if (r_type == R_PPC64_REL24_NOTOC)
15180 {
15181 /* NOTOC calls don't need to restore r2. */
15182 can_plt_call = TRUE;
15183 }
6e1816be 15184
f378ab09 15185 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15186 branch and link followed by a nop. The nop is
15187 replaced by an insn to restore r2. */
6e1816be 15188 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15189 {
ba8ca3e7
AM
15190 unsigned long br;
15191
15192 br = bfd_get_32 (input_bfd,
15193 contents + rel->r_offset);
15194 if ((br & 1) != 0)
41bd81ab 15195 {
ba8ca3e7
AM
15196 unsigned long nop;
15197
15198 nop = bfd_get_32 (input_bfd,
15199 contents + rel->r_offset + 4);
23cedd1d
AM
15200 if (nop == LD_R2_0R1 + STK_TOC (htab))
15201 can_plt_call = TRUE;
15202 else if (nop == NOP
15203 || nop == CROR_151515
15204 || nop == CROR_313131)
a7f2871e 15205 {
ba8ca3e7
AM
15206 if (h != NULL
15207 && (h == htab->tls_get_addr_fd
15208 || h == htab->tls_get_addr)
7c9cf415 15209 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15210 {
15211 /* Special stub used, leave nop alone. */
15212 }
15213 else
a078d95a
AM
15214 bfd_put_32 (input_bfd,
15215 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15216 contents + rel->r_offset + 4);
15217 can_plt_call = TRUE;
a7f2871e 15218 }
41bd81ab 15219 }
5bd4f169 15220 }
721956f4 15221
ba8ca3e7 15222 if (!can_plt_call && h != NULL)
721956f4 15223 {
ba8ca3e7
AM
15224 const char *name = h->elf.root.root.string;
15225
15226 if (*name == '.')
15227 ++name;
15228
15229 if (strncmp (name, "__libc_start_main", 17) == 0
15230 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15231 {
ba8ca3e7
AM
15232 /* Allow crt1 branch to go via a toc adjusting
15233 stub. Other calls that never return could do
15234 the same, if we could detect such. */
b25116a9 15235 can_plt_call = TRUE;
6ab189d5 15236 }
ba8ca3e7
AM
15237 }
15238
15239 if (!can_plt_call)
15240 {
15241 /* g++ as of 20130507 emits self-calls without a
15242 following nop. This is arguably wrong since we
15243 have conflicting information. On the one hand a
15244 global symbol and on the other a local call
15245 sequence, but don't error for this special case.
15246 It isn't possible to cheaply verify we have
15247 exactly such a call. Allow all calls to the same
15248 section. */
15249 asection *code_sec = sec;
15250
15251 if (get_opd_info (sec) != NULL)
ad8e1ba5 15252 {
ba8ca3e7
AM
15253 bfd_vma off = (relocation + addend
15254 - sec->output_section->vma
15255 - sec->output_offset);
bc30df16 15256
ba8ca3e7 15257 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15258 }
ba8ca3e7
AM
15259 if (code_sec == input_section)
15260 can_plt_call = TRUE;
15261 }
15262
15263 if (!can_plt_call)
15264 {
05d0e962
AM
15265 if (stub_entry->stub_type >= ppc_stub_plt_call
15266 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15267 info->callbacks->einfo
695344c0 15268 /* xgettext:c-format */
c1c8c1ef 15269 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15270 "(plt call stub)\n"),
4805fc55
AM
15271 input_bfd, input_section, rel->r_offset, sym_name);
15272 else
15273 info->callbacks->einfo
695344c0 15274 /* xgettext:c-format */
c1c8c1ef 15275 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15276 "(toc save/adjust stub)\n"),
4805fc55 15277 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15278
15279 bfd_set_error (bfd_error_bad_value);
15280 ret = FALSE;
721956f4
AM
15281 }
15282
b25116a9 15283 if (can_plt_call
05d0e962
AM
15284 && stub_entry->stub_type >= ppc_stub_plt_call
15285 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15286 unresolved_reloc = FALSE;
15287 }
15288
6abec6bc
AM
15289 if ((stub_entry == NULL
15290 || stub_entry->stub_type == ppc_stub_long_branch
15291 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15292 && get_opd_info (sec) != NULL)
15293 {
15294 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15295 bfd_vma off = (relocation + addend
15296 - sec->output_section->vma
15297 - sec->output_offset);
aef36ac1 15298 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15299 if (dest != (bfd_vma) -1)
15300 {
15301 relocation = dest;
15302 addend = 0;
bc30df16 15303 reloc_dest = DEST_OPD;
8387904d
AM
15304 }
15305 }
15306
b25116a9
AM
15307 /* If the branch is out of reach we ought to have a long
15308 branch stub. */
15309 from = (rel->r_offset
15310 + input_section->output_offset
15311 + input_section->output_section->vma);
15312
6911b7dc
AM
15313 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15314 ? fdh->elf.other
15315 : sym->st_other);
15316
6abec6bc
AM
15317 if (stub_entry != NULL
15318 && (stub_entry->stub_type == ppc_stub_long_branch
15319 || stub_entry->stub_type == ppc_stub_plt_branch)
15320 && (r_type == R_PPC64_ADDR14_BRTAKEN
15321 || r_type == R_PPC64_ADDR14_BRNTAKEN
15322 || (relocation + addend - from + max_br_offset
15323 < 2 * max_br_offset)))
15324 /* Don't use the stub if this branch is in range. */
15325 stub_entry = NULL;
b25116a9 15326
05d0e962
AM
15327 if (stub_entry != NULL
15328 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15329 || stub_entry->stub_type == ppc_stub_long_branch_both
15330 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15331 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15332 && (r_type != R_PPC64_REL24_NOTOC
15333 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15334 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15335 && (relocation + addend - from + max_br_offset
15336 < 2 * max_br_offset))
15337 stub_entry = NULL;
15338
15339 if (stub_entry != NULL
15340 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15341 || stub_entry->stub_type == ppc_stub_long_branch_both
15342 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15343 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15344 && r_type == R_PPC64_REL24_NOTOC
15345 && (relocation + addend - from + max_br_offset
15346 < 2 * max_br_offset))
15347 stub_entry = NULL;
15348
b25116a9
AM
15349 if (stub_entry != NULL)
15350 {
15351 /* Munge up the value and addend so that we call the stub
15352 rather than the procedure directly. */
a4b6fadd
AM
15353 asection *stub_sec = stub_entry->group->stub_sec;
15354
15355 if (stub_entry->stub_type == ppc_stub_save_res)
15356 relocation += (stub_sec->output_offset
15357 + stub_sec->output_section->vma
15358 + stub_sec->size - htab->sfpr->size
15359 - htab->sfpr->output_offset
15360 - htab->sfpr->output_section->vma);
15361 else
15362 relocation = (stub_entry->stub_offset
15363 + stub_sec->output_offset
15364 + stub_sec->output_section->vma);
b25116a9 15365 addend = 0;
bc30df16 15366 reloc_dest = DEST_STUB;
3b421ab3 15367
05d0e962
AM
15368 if (((stub_entry->stub_type == ppc_stub_plt_call
15369 && ALWAYS_EMIT_R2SAVE)
15370 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15371 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
15372 && !(h != NULL
15373 && (h == htab->tls_get_addr_fd
15374 || h == htab->tls_get_addr)
15375 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15376 && rel + 1 < relend
15377 && rel[1].r_offset == rel->r_offset + 4
15378 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15379 relocation += 4;
05d0e962
AM
15380 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15381 || stub_entry->stub_type == ppc_stub_plt_branch_both
15382 || stub_entry->stub_type == ppc_stub_plt_call_both)
15383 && r_type == R_PPC64_REL24_NOTOC)
15384 relocation += 4;
5663e321
AM
15385
15386 if (r_type == R_PPC64_REL24_NOTOC
15387 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15388 || stub_entry->stub_type == ppc_stub_plt_call_both))
15389 htab->notoc_plt = 1;
b25116a9
AM
15390 }
15391
15392 if (insn != 0)
15393 {
794e51c0 15394 if (is_isa_v2)
721956f4 15395 {
b25116a9
AM
15396 /* Set 'a' bit. This is 0b00010 in BO field for branch
15397 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15398 for branch on CTR insns (BO == 1a00t or 1a01t). */
15399 if ((insn & (0x14 << 21)) == (0x04 << 21))
15400 insn |= 0x02 << 21;
15401 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15402 insn |= 0x08 << 21;
15403 else
15404 break;
15405 }
15406 else
15407 {
15408 /* Invert 'y' bit if not the default. */
4cc603a5 15409 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15410 insn ^= 0x01 << 21;
721956f4 15411 }
b25116a9 15412
95f0d0d2 15413 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15414 }
e86ce104 15415
06da1e8e
AM
15416 /* NOP out calls to undefined weak functions.
15417 We can thus call a weak function without first
15418 checking whether the function is defined. */
b25116a9 15419 else if (h != NULL
039b3fef 15420 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15421 && h->elf.dynindx == -1
05d0e962
AM
15422 && (r_type == R_PPC64_REL24
15423 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15424 && relocation == 0
4cc603a5 15425 && addend == 0)
e86ce104 15426 {
95f0d0d2 15427 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15428 goto copy_reloc;
e86ce104 15429 }
65f38f15 15430 break;
066f4018
AM
15431
15432 case R_PPC64_GOT16_DS:
15433 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15434 if (relocation + addend - from + 0x8000 < 0x10000
15435 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15436 {
15437 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15438 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15439 {
15440 insn += (14u << 26) - (58u << 26);
15441 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15442 r_type = R_PPC64_TOC16;
15443 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15444 }
15445 }
15446 break;
15447
15448 case R_PPC64_GOT16_LO_DS:
15449 case R_PPC64_GOT16_HA:
15450 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15451 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15452 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15453 {
15454 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15455 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15456 {
15457 insn += (14u << 26) - (58u << 26);
15458 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15459 r_type = R_PPC64_TOC16_LO;
15460 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15461 }
2365f8d7 15462 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15463 {
15464 r_type = R_PPC64_TOC16_HA;
15465 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15466 }
15467 }
15468 break;
4a421c53
AM
15469
15470 case R_PPC64_GOT_PCREL34:
15471 from = (rel->r_offset
15472 + input_section->output_section->vma
15473 + input_section->output_offset);
15474 if (relocation - from + (1ULL << 33) < 1ULL << 34
15475 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15476 {
15477 offset = rel->r_offset;
15478 pinsn = bfd_get_32 (input_bfd, contents + offset);
15479 pinsn <<= 32;
15480 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15481 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15482 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15483 {
15484 /* Replace with paddi. */
15485 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15486 r_type = R_PPC64_PCREL34;
15487 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15488 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15489 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15490 goto pcrelopt;
15491 }
15492 }
15493 break;
15494
15495 case R_PPC64_PCREL34:
15496 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15497 {
15498 offset = rel->r_offset;
15499 pinsn = bfd_get_32 (input_bfd, contents + offset);
15500 pinsn <<= 32;
15501 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15502 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15503 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15504 | (14ULL << 26) /* paddi */))
15505 {
15506 pcrelopt:
15507 if (rel + 1 < relend
15508 && rel[1].r_offset == offset
15509 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15510 {
15511 bfd_vma off2 = rel[1].r_addend;
15512 if (off2 == 0)
15513 /* zero means next insn. */
15514 off2 = 8;
15515 off2 += offset;
15516 if (off2 + 4 <= input_section->size)
15517 {
15518 uint64_t pinsn2;
dd9b12c2 15519 bfd_signed_vma addend_off;
4a421c53
AM
15520 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15521 pinsn2 <<= 32;
15522 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15523 {
15524 if (off2 + 8 > input_section->size)
15525 break;
15526 pinsn2 |= bfd_get_32 (input_bfd,
15527 contents + off2 + 4);
15528 }
dd9b12c2 15529 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15530 {
dd9b12c2
AM
15531 addend += addend_off;
15532 rel->r_addend = addend;
4a421c53
AM
15533 bfd_put_32 (input_bfd, pinsn >> 32,
15534 contents + offset);
15535 bfd_put_32 (input_bfd, pinsn,
15536 contents + offset + 4);
15537 bfd_put_32 (input_bfd, pinsn2 >> 32,
15538 contents + off2);
77486630
AM
15539 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15540 bfd_put_32 (input_bfd, pinsn2,
15541 contents + off2 + 4);
4a421c53
AM
15542 }
15543 }
15544 }
15545 }
15546 }
15547 break;
65f38f15 15548 }
5bd4f169 15549
411e1bfb 15550 tls_type = 0;
23cedd1d 15551 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15552 switch (r_type)
15553 {
15554 default:
cf97bcb0
AM
15555 /* xgettext:c-format */
15556 _bfd_error_handler (_("%pB: %s unsupported"),
15557 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15558
65f38f15 15559 bfd_set_error (bfd_error_bad_value);
b34976b6 15560 ret = FALSE;
c316a17c 15561 goto copy_reloc;
5bd4f169 15562
65f38f15 15563 case R_PPC64_NONE:
411e1bfb 15564 case R_PPC64_TLS:
727fc41e
AM
15565 case R_PPC64_TLSGD:
15566 case R_PPC64_TLSLD:
3b421ab3 15567 case R_PPC64_TOCSAVE:
04c9666a
AM
15568 case R_PPC64_GNU_VTINHERIT:
15569 case R_PPC64_GNU_VTENTRY:
006589cf 15570 case R_PPC64_ENTRY:
4a421c53 15571 case R_PPC64_PCREL_OPT:
c316a17c 15572 goto copy_reloc;
5bd4f169
AM
15573
15574 /* GOT16 relocations. Like an ADDR16 using the symbol's
15575 address in the GOT as relocation value instead of the
411e1bfb 15576 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15577 symbol and put the symbol value there. */
411e1bfb
AM
15578 case R_PPC64_GOT_TLSGD16:
15579 case R_PPC64_GOT_TLSGD16_LO:
15580 case R_PPC64_GOT_TLSGD16_HI:
15581 case R_PPC64_GOT_TLSGD16_HA:
c213164a 15582 case R_PPC64_GOT_TLSGD34:
951fd09b 15583 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15584 goto dogot;
15585
15586 case R_PPC64_GOT_TLSLD16:
15587 case R_PPC64_GOT_TLSLD16_LO:
15588 case R_PPC64_GOT_TLSLD16_HI:
15589 case R_PPC64_GOT_TLSLD16_HA:
c213164a 15590 case R_PPC64_GOT_TLSLD34:
951fd09b 15591 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15592 goto dogot;
15593
15594 case R_PPC64_GOT_TPREL16_DS:
15595 case R_PPC64_GOT_TPREL16_LO_DS:
15596 case R_PPC64_GOT_TPREL16_HI:
15597 case R_PPC64_GOT_TPREL16_HA:
c213164a 15598 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
15599 tls_type = TLS_TLS | TLS_TPREL;
15600 goto dogot;
15601
15602 case R_PPC64_GOT_DTPREL16_DS:
15603 case R_PPC64_GOT_DTPREL16_LO_DS:
15604 case R_PPC64_GOT_DTPREL16_HI:
15605 case R_PPC64_GOT_DTPREL16_HA:
c213164a 15606 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
15607 tls_type = TLS_TLS | TLS_DTPREL;
15608 goto dogot;
15609
65f38f15
AM
15610 case R_PPC64_GOT16:
15611 case R_PPC64_GOT16_LO:
15612 case R_PPC64_GOT16_HI:
15613 case R_PPC64_GOT16_HA:
15614 case R_PPC64_GOT16_DS:
15615 case R_PPC64_GOT16_LO_DS:
5663e321 15616 case R_PPC64_GOT_PCREL34:
411e1bfb 15617 dogot:
5bd4f169
AM
15618 {
15619 /* Relocation is to the entry for this symbol in the global
15620 offset table. */
e717da7e 15621 asection *got;
d881513a 15622 bfd_vma *offp;
5bd4f169 15623 bfd_vma off;
d881513a 15624 unsigned long indx = 0;
927be08e 15625 struct got_entry *ent;
65f38f15 15626
d881513a 15627 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 15628 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 15629 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15630 else
5bd4f169 15631 {
d881513a
AM
15632 if (h != NULL)
15633 {
f0158f44
AM
15634 if (!htab->elf.dynamic_sections_created
15635 || h->elf.dynindx == -1
15636 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15637 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15638 /* This is actually a static link, or it is a
15639 -Bsymbolic link and the symbol is defined
15640 locally, or the symbol was forced to be local
15641 because of a version file. */
15642 ;
15643 else
15644 {
039b3fef 15645 indx = h->elf.dynindx;
d881513a
AM
15646 unresolved_reloc = FALSE;
15647 }
039b3fef 15648 ent = h->elf.got.glist;
d881513a 15649 }
411e1bfb 15650 else
5bd4f169 15651 {
d881513a
AM
15652 if (local_got_ents == NULL)
15653 abort ();
15654 ent = local_got_ents[r_symndx];
5bd4f169 15655 }
d881513a
AM
15656
15657 for (; ent != NULL; ent = ent->next)
133a1f60 15658 if (ent->addend == orig_rel.r_addend
e717da7e 15659 && ent->owner == input_bfd
d881513a
AM
15660 && ent->tls_type == tls_type)
15661 break;
5bd4f169 15662 }
411e1bfb 15663
927be08e
AM
15664 if (ent == NULL)
15665 abort ();
15666 if (ent->is_indirect)
15667 ent = ent->got.ent;
15668 offp = &ent->got.offset;
15669 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15670 if (got == NULL)
15671 abort ();
15672
411e1bfb
AM
15673 /* The offset must always be a multiple of 8. We use the
15674 least significant bit to record whether we have already
15675 processed this entry. */
d881513a 15676 off = *offp;
411e1bfb
AM
15677 if ((off & 1) != 0)
15678 off &= ~1;
5bd4f169
AM
15679 else
15680 {
411e1bfb
AM
15681 /* Generate relocs for the dynamic linker, except in
15682 the case of TLSLD where we'll use one entry per
15683 module. */
25f23106
AM
15684 asection *relgot;
15685 bfd_boolean ifunc;
e717da7e 15686
d881513a 15687 *offp = off | 1;
25f23106
AM
15688 relgot = NULL;
15689 ifunc = (h != NULL
15690 ? h->elf.type == STT_GNU_IFUNC
15691 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15692 if (ifunc)
82e66161
AM
15693 {
15694 relgot = htab->elf.irelplt;
15695 if (indx == 0)
15696 htab->local_ifunc_resolver = 1;
15697 else if (is_static_defined (&h->elf))
15698 htab->maybe_local_ifunc_resolver = 1;
15699 }
f0158f44
AM
15700 else if (indx != 0
15701 || (bfd_link_pic (info)
15702 && (h == NULL
f749f26e
AM
15703 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15704 && !(tls_type != 0
f15d0b54
AM
15705 && bfd_link_executable (info)
15706 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15707 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15708 if (relgot != NULL)
5bd4f169 15709 {
e717da7e
AM
15710 outrel.r_offset = (got->output_section->vma
15711 + got->output_offset
411e1bfb 15712 + off);
133a1f60 15713 outrel.r_addend = orig_rel.r_addend;
d881513a 15714 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15715 {
411e1bfb 15716 outrel.r_addend = 0;
e515b051 15717 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15718 if (tls_type == (TLS_TLS | TLS_GD))
15719 {
e717da7e
AM
15720 loc = relgot->contents;
15721 loc += (relgot->reloc_count++
d881513a
AM
15722 * sizeof (Elf64_External_Rela));
15723 bfd_elf64_swap_reloca_out (output_bfd,
15724 &outrel, loc);
e515b051 15725 outrel.r_offset += 8;
133a1f60 15726 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
15727 outrel.r_info
15728 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15729 }
411e1bfb 15730 }
951fd09b 15731 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15732 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15733 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15734 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15735 else if (indx != 0)
15736 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15737 else
81407a69 15738 {
25f23106
AM
15739 if (ifunc)
15740 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15741 else
15742 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15743
15744 /* Write the .got section contents for the sake
15745 of prelink. */
e717da7e 15746 loc = got->contents + off;
23fbd6fa
JJ
15747 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15748 loc);
81407a69 15749 }
81407a69
AM
15750
15751 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15752 {
15753 outrel.r_addend += relocation;
15754 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15755 {
15756 if (htab->elf.tls_sec == NULL)
15757 outrel.r_addend = 0;
15758 else
15759 outrel.r_addend -= htab->elf.tls_sec->vma;
15760 }
e515b051 15761 }
e717da7e
AM
15762 loc = relgot->contents;
15763 loc += (relgot->reloc_count++
411e1bfb
AM
15764 * sizeof (Elf64_External_Rela));
15765 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15766 }
15767
ad8e1ba5 15768 /* Init the .got section contents here if we're not
81407a69 15769 emitting a reloc. */
d881513a 15770 else
411e1bfb 15771 {
133a1f60 15772 relocation += orig_rel.r_addend;
f0158f44 15773 if (tls_type != 0)
411e1bfb 15774 {
989f9879
AM
15775 if (htab->elf.tls_sec == NULL)
15776 relocation = 0;
15777 else
15778 {
f0158f44
AM
15779 if (tls_type & TLS_LD)
15780 relocation = 0;
15781 else
15782 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15783 if (tls_type & TLS_TPREL)
989f9879
AM
15784 relocation += DTP_OFFSET - TP_OFFSET;
15785 }
5bd4f169 15786
f0158f44 15787 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15788 {
15789 bfd_put_64 (output_bfd, relocation,
e717da7e 15790 got->contents + off + 8);
676ee2b5 15791 relocation = 1;
7b609f53 15792 }
411e1bfb
AM
15793 }
15794 bfd_put_64 (output_bfd, relocation,
e717da7e 15795 got->contents + off);
5bd4f169
AM
15796 }
15797 }
15798
65f38f15
AM
15799 if (off >= (bfd_vma) -2)
15800 abort ();
15801
bf102f86 15802 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 15803 addend = 0;
c213164a
AM
15804 if (!(r_type == R_PPC64_GOT_PCREL34
15805 || r_type == R_PPC64_GOT_TLSGD34
15806 || r_type == R_PPC64_GOT_TLSLD34
15807 || r_type == R_PPC64_GOT_TPREL34
15808 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 15809 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15810 }
65f38f15
AM
15811 break;
15812
15813 case R_PPC64_PLT16_HA:
15814 case R_PPC64_PLT16_HI:
15815 case R_PPC64_PLT16_LO:
08be3224 15816 case R_PPC64_PLT16_LO_DS:
5663e321
AM
15817 case R_PPC64_PLT_PCREL34:
15818 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
15819 case R_PPC64_PLT32:
15820 case R_PPC64_PLT64:
23cedd1d 15821 case R_PPC64_PLTSEQ:
5663e321 15822 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 15823 case R_PPC64_PLTCALL:
5663e321 15824 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
15825 /* Relocation is to the entry for this symbol in the
15826 procedure linkage table. */
23cedd1d 15827 unresolved_reloc = TRUE;
cbf95972
AM
15828 {
15829 struct plt_entry **plt_list = NULL;
15830 if (h != NULL)
15831 plt_list = &h->elf.plt.plist;
15832 else if (local_got_ents != NULL)
15833 {
15834 struct plt_entry **local_plt = (struct plt_entry **)
15835 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15836 plt_list = local_plt + r_symndx;
cbf95972
AM
15837 }
15838 if (plt_list)
15839 {
15840 struct plt_entry *ent;
65f38f15 15841
cbf95972
AM
15842 for (ent = *plt_list; ent != NULL; ent = ent->next)
15843 if (ent->plt.offset != (bfd_vma) -1
133a1f60 15844 && ent->addend == orig_rel.r_addend)
cbf95972
AM
15845 {
15846 asection *plt;
08be3224 15847 bfd_vma got;
cbf95972
AM
15848
15849 plt = htab->elf.splt;
15850 if (!htab->elf.dynamic_sections_created
15851 || h == NULL
15852 || h->elf.dynindx == -1)
2d7ad24e
AM
15853 {
15854 if (h != NULL
15855 ? h->elf.type == STT_GNU_IFUNC
15856 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15857 plt = htab->elf.iplt;
15858 else
15859 plt = htab->pltlocal;
15860 }
15861 relocation = (plt->output_section->vma
15862 + plt->output_offset
15863 + ent->plt.offset);
08be3224 15864 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
15865 || r_type == R_PPC64_PLT16_HI
15866 || r_type == R_PPC64_PLT16_LO
15867 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
15868 {
15869 got = (elf_gp (output_bfd)
15870 + htab->sec_info[input_section->id].toc_off);
15871 relocation -= got;
15872 }
133a1f60 15873 addend = 0;
cbf95972
AM
15874 unresolved_reloc = FALSE;
15875 break;
15876 }
15877 }
15878 }
65f38f15 15879 break;
5bd4f169 15880
0b13192e
AM
15881 case R_PPC64_TOC:
15882 /* Relocation value is TOC base. */
15883 relocation = TOCstart;
cf35638d 15884 if (r_symndx == STN_UNDEF)
6f20ed8a 15885 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15886 else if (unresolved_reloc)
15887 ;
6f20ed8a
AM
15888 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15889 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15890 else
15891 unresolved_reloc = TRUE;
ab96bf03 15892 goto dodyn;
0b13192e 15893
5bd4f169
AM
15894 /* TOC16 relocs. We want the offset relative to the TOC base,
15895 which is the address of the start of the TOC plus 0x8000.
15896 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15897 in this order. */
65f38f15
AM
15898 case R_PPC64_TOC16:
15899 case R_PPC64_TOC16_LO:
15900 case R_PPC64_TOC16_HI:
15901 case R_PPC64_TOC16_DS:
15902 case R_PPC64_TOC16_LO_DS:
15903 case R_PPC64_TOC16_HA:
6f20ed8a 15904 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
15905 if (h != NULL)
15906 goto dodyn;
5bd4f169
AM
15907 break;
15908
15909 /* Relocate against the beginning of the section. */
65f38f15
AM
15910 case R_PPC64_SECTOFF:
15911 case R_PPC64_SECTOFF_LO:
15912 case R_PPC64_SECTOFF_HI:
15913 case R_PPC64_SECTOFF_DS:
15914 case R_PPC64_SECTOFF_LO_DS:
15915 case R_PPC64_SECTOFF_HA:
4ce794b7 15916 if (sec != NULL)
65f38f15 15917 addend -= sec->output_section->vma;
5bd4f169
AM
15918 break;
15919
25f23106
AM
15920 case R_PPC64_REL16:
15921 case R_PPC64_REL16_LO:
15922 case R_PPC64_REL16_HI:
15923 case R_PPC64_REL16_HA:
4a969973
AM
15924 case R_PPC64_REL16_HIGH:
15925 case R_PPC64_REL16_HIGHA:
15926 case R_PPC64_REL16_HIGHER:
15927 case R_PPC64_REL16_HIGHERA:
15928 case R_PPC64_REL16_HIGHEST:
15929 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
15930 case R_PPC64_REL16_HIGHER34:
15931 case R_PPC64_REL16_HIGHERA34:
15932 case R_PPC64_REL16_HIGHEST34:
15933 case R_PPC64_REL16_HIGHESTA34:
a680de9a 15934 case R_PPC64_REL16DX_HA:
721956f4
AM
15935 case R_PPC64_REL14:
15936 case R_PPC64_REL14_BRNTAKEN:
15937 case R_PPC64_REL14_BRTAKEN:
5d1634d7 15938 case R_PPC64_REL24:
05d0e962 15939 case R_PPC64_REL24_NOTOC:
5663e321
AM
15940 case R_PPC64_PCREL34:
15941 case R_PPC64_PCREL28:
5d1634d7
AM
15942 break;
15943
411e1bfb
AM
15944 case R_PPC64_TPREL16:
15945 case R_PPC64_TPREL16_LO:
15946 case R_PPC64_TPREL16_HI:
15947 case R_PPC64_TPREL16_HA:
15948 case R_PPC64_TPREL16_DS:
15949 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15950 case R_PPC64_TPREL16_HIGH:
15951 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15952 case R_PPC64_TPREL16_HIGHER:
15953 case R_PPC64_TPREL16_HIGHERA:
15954 case R_PPC64_TPREL16_HIGHEST:
15955 case R_PPC64_TPREL16_HIGHESTA:
c213164a 15956 case R_PPC64_TPREL34:
766bc656
AM
15957 if (h != NULL
15958 && h->elf.root.type == bfd_link_hash_undefweak
15959 && h->elf.dynindx == -1)
15960 {
15961 /* Make this relocation against an undefined weak symbol
15962 resolve to zero. This is really just a tweak, since
15963 code using weak externs ought to check that they are
15964 defined before using them. */
15965 bfd_byte *p = contents + rel->r_offset - d_offset;
15966
95f0d0d2 15967 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15968 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15969 if (insn != 0)
95f0d0d2 15970 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15971 break;
15972 }
989f9879
AM
15973 if (htab->elf.tls_sec != NULL)
15974 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15975 /* The TPREL16 relocs shouldn't really be used in shared
15976 libs or with non-local symbols as that will result in
15977 DT_TEXTREL being set, but support them anyway. */
15978 goto dodyn;
411e1bfb
AM
15979
15980 case R_PPC64_DTPREL16:
15981 case R_PPC64_DTPREL16_LO:
15982 case R_PPC64_DTPREL16_HI:
15983 case R_PPC64_DTPREL16_HA:
15984 case R_PPC64_DTPREL16_DS:
15985 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15986 case R_PPC64_DTPREL16_HIGH:
15987 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15988 case R_PPC64_DTPREL16_HIGHER:
15989 case R_PPC64_DTPREL16_HIGHERA:
15990 case R_PPC64_DTPREL16_HIGHEST:
15991 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 15992 case R_PPC64_DTPREL34:
989f9879
AM
15993 if (htab->elf.tls_sec != NULL)
15994 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15995 break;
15996
45965137
AM
15997 case R_PPC64_ADDR64_LOCAL:
15998 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15999 ? h->elf.other
16000 : sym->st_other);
16001 break;
16002
e515b051
AM
16003 case R_PPC64_DTPMOD64:
16004 relocation = 1;
16005 addend = 0;
16006 goto dodyn;
16007
411e1bfb 16008 case R_PPC64_TPREL64:
989f9879
AM
16009 if (htab->elf.tls_sec != NULL)
16010 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16011 goto dodyn;
16012
16013 case R_PPC64_DTPREL64:
989f9879
AM
16014 if (htab->elf.tls_sec != NULL)
16015 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16016 /* Fall through. */
411e1bfb 16017
65f38f15
AM
16018 /* Relocations that may need to be propagated if this is a
16019 dynamic object. */
04c9666a 16020 case R_PPC64_REL30:
65f38f15
AM
16021 case R_PPC64_REL32:
16022 case R_PPC64_REL64:
16023 case R_PPC64_ADDR14:
16024 case R_PPC64_ADDR14_BRNTAKEN:
16025 case R_PPC64_ADDR14_BRTAKEN:
16026 case R_PPC64_ADDR16:
16027 case R_PPC64_ADDR16_DS:
16028 case R_PPC64_ADDR16_HA:
16029 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16030 case R_PPC64_ADDR16_HIGH:
16031 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16032 case R_PPC64_ADDR16_HIGHER:
16033 case R_PPC64_ADDR16_HIGHERA:
16034 case R_PPC64_ADDR16_HIGHEST:
16035 case R_PPC64_ADDR16_HIGHESTA:
16036 case R_PPC64_ADDR16_LO:
16037 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16038 case R_PPC64_ADDR16_HIGHER34:
16039 case R_PPC64_ADDR16_HIGHERA34:
16040 case R_PPC64_ADDR16_HIGHEST34:
16041 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16042 case R_PPC64_ADDR24:
65f38f15
AM
16043 case R_PPC64_ADDR32:
16044 case R_PPC64_ADDR64:
16045 case R_PPC64_UADDR16:
16046 case R_PPC64_UADDR32:
16047 case R_PPC64_UADDR64:
5663e321
AM
16048 case R_PPC64_D34:
16049 case R_PPC64_D34_LO:
16050 case R_PPC64_D34_HI30:
16051 case R_PPC64_D34_HA30:
16052 case R_PPC64_D28:
411e1bfb 16053 dodyn:
5d1634d7 16054 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16055 break;
16056
41bd81ab
AM
16057 if (NO_OPD_RELOCS && is_opd)
16058 break;
16059
8a9e8e72 16060 if (bfd_link_pic (info)
b1b07054
AM
16061 ? ((h == NULL
16062 || h->dyn_relocs != NULL)
16063 && ((h != NULL && pc_dynrelocs (h))
16064 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16065 : (h != NULL
16066 ? h->dyn_relocs != NULL
d311bc8b 16067 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16068 {
b34976b6 16069 bfd_boolean skip, relocate;
65f38f15 16070 asection *sreloc;
1cf1f670 16071 bfd_vma out_off;
82e66161 16072 long indx = 0;
65f38f15
AM
16073
16074 /* When generating a dynamic object, these relocations
16075 are copied into the output file to be resolved at run
16076 time. */
16077
b34976b6
AM
16078 skip = FALSE;
16079 relocate = FALSE;
65f38f15 16080
1cf1f670
AM
16081 out_off = _bfd_elf_section_offset (output_bfd, info,
16082 input_section, rel->r_offset);
16083 if (out_off == (bfd_vma) -1)
b34976b6 16084 skip = TRUE;
1cf1f670 16085 else if (out_off == (bfd_vma) -2)
b34976b6 16086 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16087 out_off += (input_section->output_section->vma
16088 + input_section->output_offset);
16089 outrel.r_offset = out_off;
411e1bfb 16090 outrel.r_addend = rel->r_addend;
65f38f15 16091
1cf1f670
AM
16092 /* Optimize unaligned reloc use. */
16093 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16094 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16095 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16096 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16097 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16098 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16099 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16100 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16101 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16102
65f38f15 16103 if (skip)
0bb2d96a 16104 memset (&outrel, 0, sizeof outrel);
afe397ea 16105 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16106 && !is_opd
16107 && r_type != R_PPC64_TOC)
14acf4dc 16108 {
82e66161
AM
16109 indx = h->elf.dynindx;
16110 BFD_ASSERT (indx != -1);
16111 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16112 }
65f38f15
AM
16113 else
16114 {
41bd81ab
AM
16115 /* This symbol is local, or marked to become local,
16116 or this is an opd section reloc which must point
16117 at a local function. */
65f38f15 16118 outrel.r_addend += relocation;
e86ce104 16119 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16120 {
3fad3c7c 16121 if (is_opd && h != NULL)
afbe61cf
AM
16122 {
16123 /* Lie about opd entries. This case occurs
16124 when building shared libraries and we
16125 reference a function in another shared
3fad3c7c
AM
16126 lib. The same thing happens for a weak
16127 definition in an application that's
16128 overridden by a strong definition in a
16129 shared lib. (I believe this is a generic
16130 bug in binutils handling of weak syms.)
16131 In these cases we won't use the opd
1e2f5b6e 16132 entry in this lib. */
b34976b6 16133 unresolved_reloc = FALSE;
afbe61cf 16134 }
25f23106
AM
16135 if (!is_opd
16136 && r_type == R_PPC64_ADDR64
16137 && (h != NULL
16138 ? h->elf.type == STT_GNU_IFUNC
16139 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16140 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16141 else
16142 {
16143 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16144
25f23106
AM
16145 /* We need to relocate .opd contents for ld.so.
16146 Prelink also wants simple and consistent rules
16147 for relocs. This make all RELATIVE relocs have
16148 *r_offset equal to r_addend. */
16149 relocate = TRUE;
16150 }
65f38f15
AM
16151 }
16152 else
16153 {
25f23106
AM
16154 if (h != NULL
16155 ? h->elf.type == STT_GNU_IFUNC
16156 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16157 {
25f53a85 16158 info->callbacks->einfo
695344c0 16159 /* xgettext:c-format */
174d0a74 16160 (_("%H: %s for indirect "
c1c8c1ef 16161 "function `%pT' unsupported\n"),
25f53a85 16162 input_bfd, input_section, rel->r_offset,
25f23106
AM
16163 ppc64_elf_howto_table[r_type]->name,
16164 sym_name);
16165 ret = FALSE;
16166 }
cf35638d 16167 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16168 ;
16169 else if (sec == NULL || sec->owner == NULL)
16170 {
16171 bfd_set_error (bfd_error_bad_value);
b34976b6 16172 return FALSE;
65f38f15
AM
16173 }
16174 else
16175 {
f26a3287 16176 asection *osec = sec->output_section;
65f38f15 16177
f26a3287
AM
16178 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16179 {
16180 /* TLS symbol values are relative to the
16181 TLS segment. Dynamic relocations for
16182 local TLS symbols therefore can't be
16183 reduced to a relocation against their
16184 section symbol because it holds the
16185 address of the section, not a value
16186 relative to the TLS segment. We could
16187 change the .tdata dynamic section symbol
16188 to be zero value but STN_UNDEF works
16189 and is used elsewhere, eg. for TPREL64
16190 GOT relocs against local TLS symbols. */
16191 osec = htab->elf.tls_sec;
16192 indx = 0;
16193 }
16194 else
74541ad4 16195 {
74541ad4 16196 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16197 if (indx == 0)
16198 {
16199 if ((osec->flags & SEC_READONLY) == 0
16200 && htab->elf.data_index_section != NULL)
16201 osec = htab->elf.data_index_section;
16202 else
16203 osec = htab->elf.text_index_section;
16204 indx = elf_section_data (osec)->dynindx;
16205 }
16206 BFD_ASSERT (indx != 0);
74541ad4 16207 }
74541ad4 16208
65f38f15
AM
16209 /* We are turning this relocation into one
16210 against a section symbol, so subtract out
16211 the output section's address but not the
16212 offset of the input section in the output
16213 section. */
16214 outrel.r_addend -= osec->vma;
16215 }
16216
16217 outrel.r_info = ELF64_R_INFO (indx, r_type);
16218 }
16219 }
16220
16221 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16222 if (h != NULL
16223 ? h->elf.type == STT_GNU_IFUNC
16224 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16225 {
16226 sreloc = htab->elf.irelplt;
16227 if (indx == 0)
16228 htab->local_ifunc_resolver = 1;
16229 else if (is_static_defined (&h->elf))
16230 htab->maybe_local_ifunc_resolver = 1;
16231 }
65f38f15
AM
16232 if (sreloc == NULL)
16233 abort ();
16234
dfbb6ac9
AM
16235 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16236 >= sreloc->size)
16237 abort ();
947216bf
AM
16238 loc = sreloc->contents;
16239 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16240 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16241
e59a1001
AM
16242 if (!warned_dynamic
16243 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16244 {
16245 info->callbacks->einfo
16246 /* xgettext:c-format */
16247 (_("%X%P: %pB: %s against %pT "
16248 "is not supported by glibc as a dynamic relocation\n"),
16249 input_bfd,
16250 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16251 sym_name);
16252 warned_dynamic = TRUE;
16253 }
16254
65f38f15
AM
16255 /* If this reloc is against an external symbol, it will
16256 be computed at runtime, so there's no need to do
81407a69
AM
16257 anything now. However, for the sake of prelink ensure
16258 that the section contents are a known value. */
2cdcc330 16259 if (!relocate)
81407a69
AM
16260 {
16261 unresolved_reloc = FALSE;
16262 /* The value chosen here is quite arbitrary as ld.so
16263 ignores section contents except for the special
16264 case of .opd where the contents might be accessed
16265 before relocation. Choose zero, as that won't
16266 cause reloc overflow. */
16267 relocation = 0;
16268 addend = 0;
16269 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16270 to improve backward compatibility with older
16271 versions of ld. */
16272 if (r_type == R_PPC64_ADDR64)
16273 addend = outrel.r_addend;
16274 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16275 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16276 addend = outrel.r_offset;
81407a69 16277 }
65f38f15 16278 }
5bd4f169
AM
16279 break;
16280
65f38f15
AM
16281 case R_PPC64_COPY:
16282 case R_PPC64_GLOB_DAT:
16283 case R_PPC64_JMP_SLOT:
25f23106 16284 case R_PPC64_JMP_IREL:
65f38f15
AM
16285 case R_PPC64_RELATIVE:
16286 /* We shouldn't ever see these dynamic relocs in relocatable
16287 files. */
ae9a127f 16288 /* Fall through. */
65f38f15
AM
16289
16290 case R_PPC64_PLTGOT16:
16291 case R_PPC64_PLTGOT16_DS:
16292 case R_PPC64_PLTGOT16_HA:
16293 case R_PPC64_PLTGOT16_HI:
16294 case R_PPC64_PLTGOT16_LO:
16295 case R_PPC64_PLTGOT16_LO_DS:
16296 case R_PPC64_PLTREL32:
16297 case R_PPC64_PLTREL64:
16298 /* These ones haven't been implemented yet. */
16299
25f53a85 16300 info->callbacks->einfo
695344c0 16301 /* xgettext:c-format */
c1c8c1ef 16302 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16303 input_bfd,
4ce794b7 16304 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16305
16306 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16307 ret = FALSE;
c316a17c 16308 goto copy_reloc;
65f38f15 16309 }
5bd4f169 16310
67f0cbdb
AM
16311 /* Multi-instruction sequences that access the TOC can be
16312 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16313 to nop; addi rb,r2,x; */
67f0cbdb
AM
16314 switch (r_type)
16315 {
16316 default:
16317 break;
16318
16319 case R_PPC64_GOT_TLSLD16_HI:
16320 case R_PPC64_GOT_TLSGD16_HI:
16321 case R_PPC64_GOT_TPREL16_HI:
16322 case R_PPC64_GOT_DTPREL16_HI:
16323 case R_PPC64_GOT16_HI:
16324 case R_PPC64_TOC16_HI:
16325 /* These relocs would only be useful if building up an
16326 offset to later add to r2, perhaps in an indexed
16327 addressing mode instruction. Don't try to optimize.
16328 Unfortunately, the possibility of someone building up an
16329 offset like this or even with the HA relocs, means that
16330 we need to check the high insn when optimizing the low
16331 insn. */
16332 break;
16333
5663e321
AM
16334 case R_PPC64_PLTCALL_NOTOC:
16335 if (!unresolved_reloc)
16336 htab->notoc_plt = 1;
16337 /* Fall through. */
23cedd1d
AM
16338 case R_PPC64_PLTCALL:
16339 if (unresolved_reloc)
16340 {
16341 /* No plt entry. Make this into a direct call. */
16342 bfd_byte *p = contents + rel->r_offset;
16343 insn = bfd_get_32 (input_bfd, p);
16344 insn &= 1;
16345 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16346 if (r_type == R_PPC64_PLTCALL)
16347 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16348 unresolved_reloc = save_unresolved_reloc;
16349 r_type = R_PPC64_REL24;
16350 }
16351 break;
16352
5663e321 16353 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16354 case R_PPC64_PLTSEQ:
16355 if (unresolved_reloc)
16356 {
16357 unresolved_reloc = FALSE;
16358 goto nop_it;
16359 }
16360 break;
16361
5663e321
AM
16362 case R_PPC64_PLT_PCREL34_NOTOC:
16363 if (!unresolved_reloc)
16364 htab->notoc_plt = 1;
16365 /* Fall through. */
16366 case R_PPC64_PLT_PCREL34:
16367 if (unresolved_reloc)
16368 {
16369 bfd_byte *p = contents + rel->r_offset;
16370 bfd_put_32 (input_bfd, PNOP >> 32, p);
16371 bfd_put_32 (input_bfd, PNOP, p + 4);
16372 unresolved_reloc = FALSE;
16373 goto copy_reloc;
16374 }
16375 break;
16376
23cedd1d
AM
16377 case R_PPC64_PLT16_HA:
16378 if (unresolved_reloc)
16379 {
16380 unresolved_reloc = FALSE;
16381 goto nop_it;
16382 }
16383 /* Fall through. */
67f0cbdb
AM
16384 case R_PPC64_GOT_TLSLD16_HA:
16385 case R_PPC64_GOT_TLSGD16_HA:
16386 case R_PPC64_GOT_TPREL16_HA:
16387 case R_PPC64_GOT_DTPREL16_HA:
16388 case R_PPC64_GOT16_HA:
16389 case R_PPC64_TOC16_HA:
98528052 16390 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16391 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16392 {
23cedd1d
AM
16393 bfd_byte *p;
16394 nop_it:
16395 p = contents + (rel->r_offset & ~3);
98528052 16396 bfd_put_32 (input_bfd, NOP, p);
d830549d 16397 goto copy_reloc;
98528052 16398 }
67f0cbdb
AM
16399 break;
16400
23cedd1d
AM
16401 case R_PPC64_PLT16_LO:
16402 case R_PPC64_PLT16_LO_DS:
16403 if (unresolved_reloc)
16404 {
16405 unresolved_reloc = FALSE;
16406 goto nop_it;
16407 }
16408 /* Fall through. */
67f0cbdb
AM
16409 case R_PPC64_GOT_TLSLD16_LO:
16410 case R_PPC64_GOT_TLSGD16_LO:
16411 case R_PPC64_GOT_TPREL16_LO_DS:
16412 case R_PPC64_GOT_DTPREL16_LO_DS:
16413 case R_PPC64_GOT16_LO:
16414 case R_PPC64_GOT16_LO_DS:
16415 case R_PPC64_TOC16_LO:
16416 case R_PPC64_TOC16_LO_DS:
98528052 16417 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16418 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16419 {
16420 bfd_byte *p = contents + (rel->r_offset & ~3);
16421 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16422 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16423 {
16424 /* Transform addic to addi when we change reg. */
2365f8d7 16425 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16426 insn |= (14u << 26) | (2 << 16);
16427 }
16428 else
67f0cbdb 16429 {
98528052
AM
16430 insn &= ~(0x1f << 16);
16431 insn |= 2 << 16;
67f0cbdb 16432 }
560c8763 16433 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16434 }
16435 break;
9a23f96e
AM
16436
16437 case R_PPC64_TPREL16_HA:
16438 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16439 {
16440 bfd_byte *p = contents + (rel->r_offset & ~3);
16441 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16442 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16443 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16444 /* xgettext:c-format */
16445 info->callbacks->minfo
16446 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16447 input_bfd, input_section, rel->r_offset,
16448 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16449 else
d830549d
AM
16450 {
16451 bfd_put_32 (input_bfd, NOP, p);
16452 goto copy_reloc;
16453 }
9a23f96e
AM
16454 }
16455 break;
16456
16457 case R_PPC64_TPREL16_LO:
16458 case R_PPC64_TPREL16_LO_DS:
16459 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16460 {
16461 bfd_byte *p = contents + (rel->r_offset & ~3);
16462 insn = bfd_get_32 (input_bfd, p);
16463 insn &= ~(0x1f << 16);
16464 insn |= 13 << 16;
16465 bfd_put_32 (input_bfd, insn, p);
16466 }
16467 break;
67f0cbdb
AM
16468 }
16469
65f38f15
AM
16470 /* Do any further special processing. */
16471 switch (r_type)
16472 {
16473 default:
16474 break;
16475
25f23106 16476 case R_PPC64_REL16_HA:
4a969973
AM
16477 case R_PPC64_REL16_HIGHA:
16478 case R_PPC64_REL16_HIGHERA:
16479 case R_PPC64_REL16_HIGHESTA:
a680de9a 16480 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16481 case R_PPC64_ADDR16_HA:
16482 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16483 case R_PPC64_ADDR16_HIGHERA:
16484 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16485 case R_PPC64_TOC16_HA:
16486 case R_PPC64_SECTOFF_HA:
411e1bfb 16487 case R_PPC64_TPREL16_HA:
f9c6b907 16488 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16489 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16490 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16491 case R_PPC64_DTPREL16_HA:
16492 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16493 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16494 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16495 /* It's just possible that this symbol is a weak symbol
16496 that's not actually defined anywhere. In that case,
16497 'sec' would be NULL, and we should leave the symbol
16498 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16499 if (sec == NULL)
16500 break;
1a0670f3 16501 /* Fall through. */
5c5f6e17
AM
16502
16503 case R_PPC64_GOT16_HA:
16504 case R_PPC64_PLTGOT16_HA:
16505 case R_PPC64_PLT16_HA:
16506 case R_PPC64_GOT_TLSGD16_HA:
16507 case R_PPC64_GOT_TLSLD16_HA:
16508 case R_PPC64_GOT_TPREL16_HA:
16509 case R_PPC64_GOT_DTPREL16_HA:
16510 /* Add 0x10000 if sign bit in 0:15 is set.
16511 Bits 0:15 are not used. */
16512 addend += 0x8000;
65f38f15
AM
16513 break;
16514
5663e321
AM
16515 case R_PPC64_D34_HA30:
16516 case R_PPC64_ADDR16_HIGHERA34:
16517 case R_PPC64_ADDR16_HIGHESTA34:
16518 case R_PPC64_REL16_HIGHERA34:
16519 case R_PPC64_REL16_HIGHESTA34:
16520 if (sec != NULL)
16521 addend += 1ULL << 33;
16522 break;
16523
65f38f15
AM
16524 case R_PPC64_ADDR16_DS:
16525 case R_PPC64_ADDR16_LO_DS:
16526 case R_PPC64_GOT16_DS:
16527 case R_PPC64_GOT16_LO_DS:
16528 case R_PPC64_PLT16_LO_DS:
16529 case R_PPC64_SECTOFF_DS:
16530 case R_PPC64_SECTOFF_LO_DS:
16531 case R_PPC64_TOC16_DS:
16532 case R_PPC64_TOC16_LO_DS:
16533 case R_PPC64_PLTGOT16_DS:
16534 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16535 case R_PPC64_GOT_TPREL16_DS:
16536 case R_PPC64_GOT_TPREL16_LO_DS:
16537 case R_PPC64_GOT_DTPREL16_DS:
16538 case R_PPC64_GOT_DTPREL16_LO_DS:
16539 case R_PPC64_TPREL16_DS:
16540 case R_PPC64_TPREL16_LO_DS:
16541 case R_PPC64_DTPREL16_DS:
16542 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16543 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16544 mask = 3;
a680de9a
PB
16545 /* If this reloc is against an lq, lxv, or stxv insn, then
16546 the value must be a multiple of 16. This is somewhat of
16547 a hack, but the "correct" way to do this by defining _DQ
16548 forms of all the _DS relocs bloats all reloc switches in
16549 this file. It doesn't make much sense to use these
16550 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
16551 if ((insn & (0x3fu << 26)) == (56u << 26)
16552 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16553 mask = 15;
a680de9a
PB
16554 relocation += addend;
16555 addend = insn & (mask ^ 3);
16556 if ((relocation & mask) != 0)
65f38f15 16557 {
a680de9a 16558 relocation ^= relocation & mask;
25f53a85 16559 info->callbacks->einfo
695344c0 16560 /* xgettext:c-format */
174d0a74 16561 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16562 input_bfd, input_section, rel->r_offset,
d830549d 16563 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16564 mask + 1);
65f38f15 16565 bfd_set_error (bfd_error_bad_value);
b34976b6 16566 ret = FALSE;
c316a17c 16567 goto copy_reloc;
65f38f15
AM
16568 }
16569 break;
5bd4f169
AM
16570 }
16571
239e1f3a
AM
16572 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16573 because such sections are not SEC_ALLOC and thus ld.so will
16574 not process them. */
d830549d 16575 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16576 if (unresolved_reloc
239e1f3a 16577 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16578 && h->elf.def_dynamic)
16579 && _bfd_elf_section_offset (output_bfd, info, input_section,
16580 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16581 {
25f53a85 16582 info->callbacks->einfo
695344c0 16583 /* xgettext:c-format */
c1c8c1ef 16584 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16585 input_bfd, input_section, rel->r_offset,
b80eed39 16586 howto->name,
039b3fef 16587 h->elf.root.root.string);
b34976b6 16588 ret = FALSE;
9c07fe7c 16589 }
5bd4f169 16590
b80eed39
AM
16591 /* 16-bit fields in insns mostly have signed values, but a
16592 few insns have 16-bit unsigned values. Really, we should
16593 have different reloc types. */
16594 if (howto->complain_on_overflow != complain_overflow_dont
16595 && howto->dst_mask == 0xffff
16596 && (input_section->flags & SEC_CODE) != 0)
16597 {
16598 enum complain_overflow complain = complain_overflow_signed;
16599
16600 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 16601 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
16602 complain = complain_overflow_bitfield;
16603 else if (howto->rightshift == 0
2365f8d7
AM
16604 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
16605 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
16606 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
16607 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
16608 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
16609 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
16610 complain = complain_overflow_unsigned;
16611 if (howto->complain_on_overflow != complain)
16612 {
16613 alt_howto = *howto;
16614 alt_howto.complain_on_overflow = complain;
16615 howto = &alt_howto;
16616 }
16617 }
16618
5663e321 16619 switch (r_type)
a680de9a 16620 {
5663e321
AM
16621 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16622 case R_PPC64_D34:
16623 case R_PPC64_D34_LO:
16624 case R_PPC64_D34_HI30:
16625 case R_PPC64_D34_HA30:
16626 case R_PPC64_PCREL34:
16627 case R_PPC64_GOT_PCREL34:
c213164a
AM
16628 case R_PPC64_TPREL34:
16629 case R_PPC64_DTPREL34:
16630 case R_PPC64_GOT_TLSGD34:
16631 case R_PPC64_GOT_TLSLD34:
16632 case R_PPC64_GOT_TPREL34:
16633 case R_PPC64_GOT_DTPREL34:
5663e321
AM
16634 case R_PPC64_PLT_PCREL34:
16635 case R_PPC64_PLT_PCREL34_NOTOC:
16636 case R_PPC64_D28:
16637 case R_PPC64_PCREL28:
16638 if (rel->r_offset + 8 > input_section->size)
16639 r = bfd_reloc_outofrange;
16640 else
16641 {
5663e321
AM
16642 relocation += addend;
16643 if (howto->pc_relative)
16644 relocation -= (rel->r_offset
16645 + input_section->output_offset
16646 + input_section->output_section->vma);
16647 relocation >>= howto->rightshift;
16648
16649 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16650 pinsn <<= 32;
16651 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16652
16653 pinsn &= ~howto->dst_mask;
16654 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16655 & howto->dst_mask);
16656 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16657 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16658 r = bfd_reloc_ok;
16659 if (howto->complain_on_overflow == complain_overflow_signed
16660 && (relocation + (1ULL << (howto->bitsize - 1))
16661 >= 1ULL << howto->bitsize))
16662 r = bfd_reloc_overflow;
16663 }
16664 break;
16665
16666 case R_PPC64_REL16DX_HA:
a680de9a
PB
16667 if (rel->r_offset + 4 > input_section->size)
16668 r = bfd_reloc_outofrange;
16669 else
16670 {
16671 relocation += addend;
16672 relocation -= (rel->r_offset
16673 + input_section->output_offset
16674 + input_section->output_section->vma);
3de43e7b 16675 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
16676 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16677 insn &= ~0x1fffc1;
3de43e7b 16678 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
16679 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16680 r = bfd_reloc_ok;
3de43e7b 16681 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
16682 r = bfd_reloc_overflow;
16683 }
5663e321
AM
16684 break;
16685
16686 default:
16687 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16688 contents, rel->r_offset,
16689 relocation, addend);
a680de9a 16690 }
5bd4f169 16691
ef60b7ff 16692 if (r != bfd_reloc_ok)
5bd4f169 16693 {
bc30df16 16694 char *more_info = NULL;
b80eed39 16695 const char *reloc_name = howto->name;
bc30df16
AM
16696
16697 if (reloc_dest != DEST_NORMAL)
16698 {
16699 more_info = bfd_malloc (strlen (reloc_name) + 8);
16700 if (more_info != NULL)
16701 {
16702 strcpy (more_info, reloc_name);
16703 strcat (more_info, (reloc_dest == DEST_OPD
16704 ? " (OPD)" : " (stub)"));
16705 reloc_name = more_info;
16706 }
16707 }
16708
cd27b276 16709 if (r == bfd_reloc_overflow)
5bd4f169 16710 {
8131c122
AM
16711 /* On code like "if (foo) foo();" don't report overflow
16712 on a branch to zero when foo is undefined. */
16713 if (!warned
16714 && (reloc_dest == DEST_STUB
16715 || !(h != NULL
16716 && (h->elf.root.type == bfd_link_hash_undefweak
16717 || h->elf.root.type == bfd_link_hash_undefined)
16718 && is_branch_reloc (r_type))))
1a72702b
AM
16719 info->callbacks->reloc_overflow (info, &h->elf.root,
16720 sym_name, reloc_name,
16721 orig_rel.r_addend,
16722 input_bfd, input_section,
16723 rel->r_offset);
ef60b7ff
AM
16724 }
16725 else
16726 {
25f53a85 16727 info->callbacks->einfo
695344c0 16728 /* xgettext:c-format */
c1c8c1ef 16729 (_("%H: %s against `%pT': error %d\n"),
25f53a85 16730 input_bfd, input_section, rel->r_offset,
bc30df16 16731 reloc_name, sym_name, (int) r);
b34976b6 16732 ret = FALSE;
ef60b7ff 16733 }
bc30df16
AM
16734 if (more_info != NULL)
16735 free (more_info);
5bd4f169 16736 }
c316a17c
AM
16737 copy_reloc:
16738 if (wrel != rel)
16739 *wrel = *rel;
16740 }
16741
16742 if (wrel != rel)
16743 {
16744 Elf_Internal_Shdr *rel_hdr;
16745 size_t deleted = rel - wrel;
16746
16747 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16748 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16749 if (rel_hdr->sh_size == 0)
16750 {
16751 /* It is too late to remove an empty reloc section. Leave
16752 one NONE reloc.
16753 ??? What is wrong with an empty section??? */
16754 rel_hdr->sh_size = rel_hdr->sh_entsize;
16755 deleted -= 1;
16756 }
16757 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16758 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16759 input_section->reloc_count -= deleted;
5bd4f169
AM
16760 }
16761
645ea6a9
AM
16762 /* If we're emitting relocations, then shortly after this function
16763 returns, reloc offsets and addends for this section will be
16764 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
16765 file rather than the input. Save a copy of the relocs for
16766 opd_entry_value. */
0e1862bb 16767 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16768 {
16769 bfd_size_type amt;
16770 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16771 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16772 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16773 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16774 if (rel == NULL)
16775 return FALSE;
16776 memcpy (rel, relocs, amt);
16777 }
5bd4f169
AM
16778 return ret;
16779}
16780
754021d0
AM
16781/* Adjust the value of any local symbols in opd sections. */
16782
6e0b88f1 16783static int
754021d0
AM
16784ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16785 const char *name ATTRIBUTE_UNUSED,
16786 Elf_Internal_Sym *elfsym,
16787 asection *input_sec,
16788 struct elf_link_hash_entry *h)
16789{
74f0fb50
AM
16790 struct _opd_sec_data *opd;
16791 long adjust;
754021d0
AM
16792 bfd_vma value;
16793
4025353c 16794 if (h != NULL)
6e0b88f1 16795 return 1;
4025353c 16796
74f0fb50
AM
16797 opd = get_opd_info (input_sec);
16798 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16799 return 1;
754021d0
AM
16800
16801 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16802 if (!bfd_link_relocatable (info))
754021d0
AM
16803 value -= input_sec->output_section->vma;
16804
51aecdc5 16805 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16806 if (adjust == -1)
6e0b88f1
AM
16807 return 2;
16808
16809 elfsym->st_value += adjust;
16810 return 1;
754021d0
AM
16811}
16812
5bd4f169
AM
16813/* Finish up dynamic symbol handling. We set the contents of various
16814 dynamic sections here. */
16815
b34976b6 16816static bfd_boolean
4ce794b7
AM
16817ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16818 struct bfd_link_info *info,
16819 struct elf_link_hash_entry *h,
4aef7643 16820 Elf_Internal_Sym *sym)
5bd4f169 16821{
65f38f15 16822 struct ppc_link_hash_table *htab;
8387904d 16823 struct plt_entry *ent;
5bd4f169 16824
65f38f15 16825 htab = ppc_hash_table (info);
4dfe6ac6
NC
16826 if (htab == NULL)
16827 return FALSE;
5bd4f169 16828
49c09209
AM
16829 if (!htab->opd_abi && !h->def_regular)
16830 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16831 if (ent->plt.offset != (bfd_vma) -1)
16832 {
16833 /* Mark the symbol as undefined, rather than as
16834 defined in glink. Leave the value if there were
16835 any relocations where pointer equality matters
16836 (this is a clue for the dynamic linker, to make
16837 function pointer comparisons work between an
16838 application and shared library), otherwise set it
16839 to zero. */
16840 sym->st_shndx = SHN_UNDEF;
16841 if (!h->pointer_equality_needed)
16842 sym->st_value = 0;
16843 else if (!h->ref_regular_nonweak)
16844 {
16845 /* This breaks function pointer comparisons, but
16846 that is better than breaking tests for a NULL
16847 function pointer. */
16848 sym->st_value = 0;
16849 }
16850 break;
16851 }
5bd4f169 16852
1bdd8fac
AM
16853 if (h->needs_copy
16854 && (h->root.type == bfd_link_hash_defined
16855 || h->root.type == bfd_link_hash_defweak)
16856 && (h->root.u.def.section == htab->elf.sdynbss
16857 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 16858 {
65f38f15 16859 /* This symbol needs a copy reloc. Set it up. */
49c09209 16860 Elf_Internal_Rela rela;
5474d94f 16861 asection *srel;
49c09209 16862 bfd_byte *loc;
5bd4f169 16863
1bdd8fac 16864 if (h->dynindx == -1)
65f38f15 16865 abort ();
5bd4f169
AM
16866
16867 rela.r_offset = (h->root.u.def.value
16868 + h->root.u.def.section->output_section->vma
16869 + h->root.u.def.section->output_offset);
16870 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16871 rela.r_addend = 0;
afbf7e8e 16872 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16873 srel = htab->elf.sreldynrelro;
16874 else
16875 srel = htab->elf.srelbss;
16876 loc = srel->contents;
16877 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16878 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16879 }
16880
b34976b6 16881 return TRUE;
5bd4f169
AM
16882}
16883
65f38f15
AM
16884/* Used to decide how to sort relocs in an optimal manner for the
16885 dynamic linker, before writing them out. */
16886
16887static enum elf_reloc_type_class
7e612e98
AM
16888ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16889 const asection *rel_sec,
16890 const Elf_Internal_Rela *rela)
65f38f15 16891{
04c9666a 16892 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16893 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16894
33e44f2e 16895 if (rel_sec == htab->elf.irelplt)
7e612e98 16896 return reloc_class_ifunc;
a33d1f77 16897
4ce794b7 16898 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16899 switch (r_type)
65f38f15
AM
16900 {
16901 case R_PPC64_RELATIVE:
16902 return reloc_class_relative;
16903 case R_PPC64_JMP_SLOT:
16904 return reloc_class_plt;
16905 case R_PPC64_COPY:
16906 return reloc_class_copy;
16907 default:
16908 return reloc_class_normal;
16909 }
16910}
16911
5bd4f169
AM
16912/* Finish up the dynamic sections. */
16913
b34976b6 16914static bfd_boolean
4ce794b7
AM
16915ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16916 struct bfd_link_info *info)
5bd4f169 16917{
65f38f15
AM
16918 struct ppc_link_hash_table *htab;
16919 bfd *dynobj;
5bd4f169 16920 asection *sdyn;
5bd4f169 16921
65f38f15 16922 htab = ppc_hash_table (info);
4dfe6ac6
NC
16923 if (htab == NULL)
16924 return FALSE;
16925
65f38f15 16926 dynobj = htab->elf.dynobj;
3d4d4302 16927 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16928
65f38f15 16929 if (htab->elf.dynamic_sections_created)
5bd4f169 16930 {
5bd4f169
AM
16931 Elf64_External_Dyn *dyncon, *dynconend;
16932
33e44f2e 16933 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16934 abort ();
5bd4f169
AM
16935
16936 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16937 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16938 for (; dyncon < dynconend; dyncon++)
16939 {
16940 Elf_Internal_Dyn dyn;
19397422 16941 asection *s;
5bd4f169
AM
16942
16943 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16944
16945 switch (dyn.d_tag)
16946 {
65f38f15
AM
16947 default:
16948 continue;
5bd4f169 16949
5d1634d7 16950 case DT_PPC64_GLINK:
4ce794b7 16951 s = htab->glink;
6348e046 16952 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16953 /* We stupidly defined DT_PPC64_GLINK to be the start
16954 of glink rather than the first entry point, which is
16955 what ld.so needs, and now have a bigger stub to
16956 support automatic multiple TOCs. */
9e390558 16957 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16958 break;
16959
19397422
AM
16960 case DT_PPC64_OPD:
16961 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16962 if (s == NULL)
16963 continue;
16964 dyn.d_un.d_ptr = s->vma;
19397422
AM
16965 break;
16966
e8910a83 16967 case DT_PPC64_OPT:
5663e321
AM
16968 if ((htab->do_multi_toc && htab->multi_toc_needed)
16969 || htab->notoc_plt)
e8910a83 16970 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16971 if (htab->has_plt_localentry0)
16972 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16973 break;
16974
19397422
AM
16975 case DT_PPC64_OPDSZ:
16976 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16977 if (s == NULL)
16978 continue;
eea6121a 16979 dyn.d_un.d_val = s->size;
19397422
AM
16980 break;
16981
65f38f15 16982 case DT_PLTGOT:
33e44f2e 16983 s = htab->elf.splt;
6348e046 16984 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16985 break;
16986
16987 case DT_JMPREL:
33e44f2e 16988 s = htab->elf.srelplt;
6348e046 16989 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16990 break;
5bd4f169 16991
65f38f15 16992 case DT_PLTRELSZ:
33e44f2e 16993 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16994 break;
82e66161
AM
16995
16996 case DT_TEXTREL:
16997 if (htab->local_ifunc_resolver)
16998 info->callbacks->einfo
16999 (_("%X%P: text relocations and GNU indirect "
17000 "functions will result in a segfault at runtime\n"));
17001 else if (htab->maybe_local_ifunc_resolver)
17002 info->callbacks->einfo
17003 (_("%P: warning: text relocations and GNU indirect "
17004 "functions may result in a segfault at runtime\n"));
17005 continue;
5bd4f169 17006 }
5bd4f169 17007
65f38f15 17008 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17009 }
5bd4f169
AM
17010 }
17011
6528b6eb
AM
17012 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17013 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17014 {
17015 /* Fill in the first entry in the global offset table.
17016 We use it to hold the link-time TOCbase. */
17017 bfd_put_64 (output_bfd,
60ee0d4a 17018 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17019 htab->elf.sgot->contents);
5d1634d7
AM
17020
17021 /* Set .got entry size. */
2cdcc330
AM
17022 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17023 = 8;
5d1634d7
AM
17024 }
17025
6528b6eb
AM
17026 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17027 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17028 {
17029 /* Set .plt entry size. */
33e44f2e 17030 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17031 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17032 }
17033
84f5d08e
AM
17034 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17035 brlt ourselves if emitrelocations. */
17036 if (htab->brlt != NULL
17037 && htab->brlt->reloc_count != 0
17038 && !_bfd_elf_link_output_relocs (output_bfd,
17039 htab->brlt,
d4730f92 17040 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17041 elf_section_data (htab->brlt)->relocs,
17042 NULL))
17043 return FALSE;
17044
176a0d42
AM
17045 if (htab->glink != NULL
17046 && htab->glink->reloc_count != 0
17047 && !_bfd_elf_link_output_relocs (output_bfd,
17048 htab->glink,
d4730f92 17049 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17050 elf_section_data (htab->glink)->relocs,
17051 NULL))
17052 return FALSE;
17053
da44f4e5 17054
df136d64
AM
17055 if (htab->glink_eh_frame != NULL
17056 && htab->glink_eh_frame->size != 0
17057 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17058 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17059 htab->glink_eh_frame,
17060 htab->glink_eh_frame->contents))
17061 return FALSE;
58d180e8 17062
e717da7e 17063 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17064 since we didn't add them to DYNOBJ. We know dynobj is the first
17065 bfd. */
c72f2fb2 17066 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17067 {
17068 asection *s;
7b53ace3 17069
0c8d6e5c 17070 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17071 continue;
17072
e717da7e
AM
17073 s = ppc64_elf_tdata (dynobj)->got;
17074 if (s != NULL
eea6121a 17075 && s->size != 0
e717da7e
AM
17076 && s->output_section != bfd_abs_section_ptr
17077 && !bfd_set_section_contents (output_bfd, s->output_section,
17078 s->contents, s->output_offset,
eea6121a 17079 s->size))
e717da7e
AM
17080 return FALSE;
17081 s = ppc64_elf_tdata (dynobj)->relgot;
17082 if (s != NULL
eea6121a 17083 && s->size != 0
e717da7e
AM
17084 && s->output_section != bfd_abs_section_ptr
17085 && !bfd_set_section_contents (output_bfd, s->output_section,
17086 s->contents, s->output_offset,
eea6121a 17087 s->size))
e717da7e
AM
17088 return FALSE;
17089 }
f6c52c13 17090
b34976b6 17091 return TRUE;
5bd4f169
AM
17092}
17093
5bd4f169 17094#include "elf64-target.h"
7b8e7dad
AM
17095
17096/* FreeBSD support */
17097
17098#undef TARGET_LITTLE_SYM
17099#undef TARGET_LITTLE_NAME
17100
17101#undef TARGET_BIG_SYM
6d00b590 17102#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17103#undef TARGET_BIG_NAME
17104#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17105
17106#undef ELF_OSABI
17107#define ELF_OSABI ELFOSABI_FREEBSD
17108
17109#undef elf64_bed
17110#define elf64_bed elf64_powerpc_fbsd_bed
17111
17112#include "elf64-target.h"
This page took 3.031715 seconds and 4 git commands to generate.