PowerPC section flag tidy
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
82704155 2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
54static bfd_reloc_status_type ppc64_elf_prefix_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 56static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 57 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 58static bfd_vma opd_entry_value
aef36ac1 59 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 60
6d00b590 61#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 62#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 63#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
64#define TARGET_BIG_NAME "elf64-powerpc"
65#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 66#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
67#define ELF_MACHINE_CODE EM_PPC64
68#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
69#define ELF_COMMONPAGESIZE 0x1000
70#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
71#define elf_info_to_howto ppc64_elf_info_to_howto
72
73#define elf_backend_want_got_sym 0
74#define elf_backend_want_plt_sym 0
75#define elf_backend_plt_alignment 3
76#define elf_backend_plt_not_loaded 1
ad8e1ba5 77#define elf_backend_got_header_size 8
5474d94f 78#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
79#define elf_backend_can_gc_sections 1
80#define elf_backend_can_refcount 1
81#define elf_backend_rela_normal 1
64f52338 82#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 83#define elf_backend_default_execstack 0
ad8e1ba5 84
e717da7e 85#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 86#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 87#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
88#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
89#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
90#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
91#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 92#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 93#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 94#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
95
96#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
97#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
98#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 99#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 100#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 101#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 102#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 103#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 104#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 105#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 106#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 107#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 108#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 109#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 110#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
111#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
112#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 113#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
114#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
115#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 116#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 117#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 118#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
119#define elf_backend_relocate_section ppc64_elf_relocate_section
120#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
121#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
122#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 123#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 124#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 125#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 126#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 127#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 128
5bd4f169
AM
129/* The name of the dynamic interpreter. This is put in the .interp
130 section. */
131#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
132
133/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 134#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 135#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
136
137/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 138#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 139
a078d95a
AM
140/* Offsets to some stack save slots. */
141#define STK_LR 16
142#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 143/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
144 CR save slot. Used only by optimised __tls_get_addr call stub,
145 relying on __tls_get_addr_opt not saving CR.. */
146#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
147
5bd4f169 148/* TOC base pointers offset from start of TOC. */
411e1bfb 149#define TOC_BASE_OFF 0x8000
a27e685f
AM
150/* TOC base alignment. */
151#define TOC_BASE_ALIGN 256
411e1bfb
AM
152
153/* Offset of tp and dtp pointers from start of TLS block. */
154#define TP_OFFSET 0x7000
155#define DTP_OFFSET 0x8000
5bd4f169 156
ad8e1ba5
AM
157/* .plt call stub instructions. The normal stub is like this, but
158 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 159 insert an addi to adjust r11. */
a078d95a 160#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
161#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
162#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
163#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
164#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
165#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
166#define BCTR 0x4e800420 /* bctr */
167
07d6d2b8 168#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
169#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
170#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
171#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
172#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
173
174#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
175#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
176#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
177#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
178#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
179#define BNECTR 0x4ca20420 /* bnectr+ */
180#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 181
71a39c98 182#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 183#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 184#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 185
07d6d2b8
AM
186#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
187#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
188#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 189
04bdff6a 190#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 191#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 192#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 193#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
194#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
195#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 196#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 197#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 198#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 199#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 200#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 201#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 202#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
203#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
204#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
205#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
206#define PADDI_R12_PC 0x0610000039800000ULL
207#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 208#define PNOP 0x0700000000000000ULL
a345bc8d 209
9e390558
AM
210/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
211#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 212 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
213 /* 0: */
214 /* .quad plt0-1f */
215 /* __glink: */
216#define MFLR_R12 0x7d8802a6 /* mflr %12 */
217#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
218 /* 1: */
219#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 220 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 221#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
222#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
223 /* ld %12,0(%11) */
224 /* ld %2,8(%11) */
225 /* mtctr %12 */
226 /* ld %11,16(%11) */
ee4bf8d2 227 /* bctr */
b9e5796b
AM
228#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
229#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
230#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
231#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
232#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
233
234/* Pad with this. */
235#define NOP 0x60000000
236
721956f4
AM
237/* Some other nops. */
238#define CROR_151515 0x4def7b82
239#define CROR_313131 0x4ffffb82
240
cedb70c5 241/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
242#define LI_R0_0 0x38000000 /* li %r0,0 */
243#define B_DOT 0x48000000 /* b . */
244
245/* After that, we need two instructions to load the index, followed by
246 a branch. */
247#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 248#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 249
deb0e272
AM
250/* Instructions used by the save and restore reg functions. */
251#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
252#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
253#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
254#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
255#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
256#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
257#define LI_R12_0 0x39800000 /* li %r12,0 */
258#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
259#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
260#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
261#define BLR 0x4e800020 /* blr */
262
41bd81ab
AM
263/* Since .opd is an array of descriptors and each entry will end up
264 with identical R_PPC64_RELATIVE relocs, there is really no need to
265 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 266 relocate .opd without reloc entries. */
41bd81ab
AM
267#ifndef NO_OPD_RELOCS
268#define NO_OPD_RELOCS 0
269#endif
810d4e75 270
a4b6fadd
AM
271#ifndef ARRAY_SIZE
272#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
273#endif
274
810d4e75
AM
275static inline int
276abiversion (bfd *abfd)
277{
278 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
279}
280
281static inline void
282set_abiversion (bfd *abfd, int ver)
283{
284 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
285 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
286}
5bd4f169
AM
287\f
288/* Relocation HOWTO's. */
46807bf4
AM
289/* Like other ELF RELA targets that don't apply multiple
290 field-altering relocations to the same localation, src_mask is
291 always zero and pcrel_offset is the same as pc_relative.
292 PowerPC can always use a zero bitpos, even when the field is not at
293 the LSB. For example, a REL24 could use rightshift=2, bisize=24
294 and bitpos=2 which matches the ABI description, or as we do here,
295 rightshift=0, bitsize=26 and bitpos=0. */
296#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
297 complain, special_func) \
298 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
299 complain_overflow_ ## complain, special_func, \
300 #type, FALSE, 0, mask, pc_relative)
301
04c9666a 302static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 303
f3185997
NC
304static reloc_howto_type ppc64_elf_howto_raw[] =
305{
5bd4f169 306 /* This reloc does nothing. */
46807bf4
AM
307 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 32 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* An absolute 26 bit branch; the lower two bits must be zero.
315 FIXME: we don't check that, we just clear them. */
46807bf4
AM
316 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
317 bfd_elf_generic_reloc),
5bd4f169
AM
318
319 /* A standard 16 bit relocation. */
46807bf4
AM
320 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A 16 bit relocation without overflow. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* Bits 16-31 of an address. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
332 bits, treated as a signed number, is negative. */
46807bf4
AM
333 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
334 ppc64_elf_ha_reloc),
5bd4f169
AM
335
336 /* An absolute 16 bit branch; the lower two bits must be zero.
337 FIXME: we don't check that, we just clear them. */
46807bf4
AM
338 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
339 ppc64_elf_branch_reloc),
5bd4f169
AM
340
341 /* An absolute 16 bit branch, for which bit 10 should be set to
342 indicate that the branch is expected to be taken. The lower two
343 bits must be zero. */
46807bf4
AM
344 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
345 ppc64_elf_brtaken_reloc),
5bd4f169
AM
346
347 /* An absolute 16 bit branch, for which bit 10 should be set to
348 indicate that the branch is not expected to be taken. The lower
349 two bits must be zero. */
46807bf4
AM
350 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
351 ppc64_elf_brtaken_reloc),
5bd4f169
AM
352
353 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
355 ppc64_elf_branch_reloc),
5bd4f169 356
05d0e962 357 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
358 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
05d0e962 360
5bd4f169 361 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
362 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
5bd4f169
AM
364
365 /* A relative 16 bit branch. Bit 10 should be set to indicate that
366 the branch is expected to be taken. The lower two bits must be
367 zero. */
46807bf4
AM
368 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
369 ppc64_elf_brtaken_reloc),
5bd4f169
AM
370
371 /* A relative 16 bit branch. Bit 10 should be set to indicate that
372 the branch is not expected to be taken. The lower two bits must
373 be zero. */
46807bf4
AM
374 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
375 ppc64_elf_brtaken_reloc),
5bd4f169
AM
376
377 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
378 symbol. */
46807bf4
AM
379 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
380 ppc64_elf_unhandled_reloc),
5bd4f169
AM
381
382 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
383 the symbol. */
46807bf4
AM
384 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
385 ppc64_elf_unhandled_reloc),
5bd4f169
AM
386
387 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
388 the symbol. */
46807bf4
AM
389 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
390 ppc64_elf_unhandled_reloc),
5bd4f169
AM
391
392 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
393 the symbol. */
46807bf4
AM
394 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
395 ppc64_elf_unhandled_reloc),
5bd4f169
AM
396
397 /* This is used only by the dynamic linker. The symbol should exist
398 both in the object being run and in some shared library. The
399 dynamic linker copies the data addressed by the symbol from the
400 shared library into the object, because the object being
401 run has to have the data at some particular address. */
46807bf4
AM
402 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
403 ppc64_elf_unhandled_reloc),
5bd4f169
AM
404
405 /* Like R_PPC64_ADDR64, but used when setting global offset table
406 entries. */
46807bf4
AM
407 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
408 ppc64_elf_unhandled_reloc),
5bd4f169
AM
409
410 /* Created by the link editor. Marks a procedure linkage table
411 entry for a symbol. */
46807bf4
AM
412 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
413 ppc64_elf_unhandled_reloc),
5bd4f169
AM
414
415 /* Used only by the dynamic linker. When the object is run, this
416 doubleword64 is set to the load address of the object, plus the
417 addend. */
46807bf4
AM
418 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
419 bfd_elf_generic_reloc),
5bd4f169
AM
420
421 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
422 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* 32-bit PC relative. */
46807bf4
AM
430 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 bfd_elf_generic_reloc),
5bd4f169 432
10ed1bba 433 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
434 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
435 ppc64_elf_unhandled_reloc),
5bd4f169
AM
436
437 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
438 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
439 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
440 ppc64_elf_unhandled_reloc),
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
443 the symbol. */
46807bf4
AM
444 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
445 ppc64_elf_unhandled_reloc),
5bd4f169
AM
446
447 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
448 the symbol. */
46807bf4
AM
449 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
450 ppc64_elf_unhandled_reloc),
5bd4f169
AM
451
452 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
453 the symbol. */
46807bf4
AM
454 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
455 ppc64_elf_unhandled_reloc),
5bd4f169 456
c061c2d8 457 /* 16-bit section relative relocation. */
46807bf4
AM
458 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
459 ppc64_elf_sectoff_reloc),
5bd4f169 460
c061c2d8 461 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
463 ppc64_elf_sectoff_reloc),
5bd4f169
AM
464
465 /* 16-bit upper half section relative relocation. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_ha_reloc),
5bd4f169 472
04c9666a 473 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
474 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
475 bfd_elf_generic_reloc),
5bd4f169
AM
476
477 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
478
479 /* A standard 64-bit relocation. */
46807bf4
AM
480 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
481 bfd_elf_generic_reloc),
5bd4f169
AM
482
483 /* The bits 32-47 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* The bits 48-63 of an address. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address, plus 1 if the contents of the low
497 16 bits, treated as a signed number, is negative. */
46807bf4
AM
498 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
499 ppc64_elf_ha_reloc),
5bd4f169
AM
500
501 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
502 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
503 bfd_elf_generic_reloc),
5bd4f169
AM
504
505 /* 64-bit relative relocation. */
46807bf4
AM
506 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
507 bfd_elf_generic_reloc),
5bd4f169 508
cedb70c5 509 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
510 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
511 ppc64_elf_unhandled_reloc),
5bd4f169
AM
512
513 /* 64-bit PC relative relocation to the symbol's procedure linkage
514 table. */
515 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
516 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
517 ppc64_elf_unhandled_reloc),
5bd4f169
AM
518
519 /* 16 bit TOC-relative relocation. */
5bd4f169 520 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
521 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
522 ppc64_elf_toc_reloc),
5bd4f169
AM
523
524 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 525 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
526 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
527 ppc64_elf_toc_reloc),
5bd4f169
AM
528
529 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 530 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
531 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
532 ppc64_elf_toc_reloc),
5bd4f169
AM
533
534 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
535 contents of the low 16 bits, treated as a signed number, is
536 negative. */
5bd4f169 537 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
538 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
539 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
540
541 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 542 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
543 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
544 ppc64_elf_toc64_reloc),
5bd4f169
AM
545
546 /* Like R_PPC64_GOT16, but also informs the link editor that the
547 value to relocate may (!) refer to a PLT entry which the link
548 editor (a) may replace with the symbol value. If the link editor
549 is unable to fully resolve the symbol, it may (b) create a PLT
550 entry and store the address to the new PLT entry in the GOT.
551 This permits lazy resolution of function symbols at run time.
552 The link editor may also skip all of this and just (c) emit a
553 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
554 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
555 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
556 ppc64_elf_unhandled_reloc),
411e1bfb
AM
557
558 /* Like R_PPC64_PLTGOT16, but without overflow. */
559 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
560 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
561 ppc64_elf_unhandled_reloc),
411e1bfb
AM
562
563 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
564 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
565 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
566 ppc64_elf_unhandled_reloc),
411e1bfb
AM
567
568 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
569 1 if the contents of the low 16 bits, treated as a signed number,
570 is negative. */
571 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
572 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
573 ppc64_elf_unhandled_reloc),
411e1bfb
AM
574
575 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
576 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
577 bfd_elf_generic_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
585 ppc64_elf_unhandled_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
597 ppc64_elf_sectoff_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_toc_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
612 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
613 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
614 ppc64_elf_unhandled_reloc),
411e1bfb
AM
615
616 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
617 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
618 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
619 ppc64_elf_unhandled_reloc),
411e1bfb 620
727fc41e 621 /* Marker relocs for TLS. */
46807bf4
AM
622 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
623 bfd_elf_generic_reloc),
624
625 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
727fc41e 630
23cedd1d
AM
631 /* Marker reloc for optimizing r2 save in prologue rather than on
632 each plt call stub. */
46807bf4
AM
633 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
634 bfd_elf_generic_reloc),
3b421ab3 635
23cedd1d 636 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
637 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
23cedd1d 642
411e1bfb
AM
643 /* Computes the load module index of the load module that contains the
644 definition of its TLS sym. */
46807bf4
AM
645 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
646 ppc64_elf_unhandled_reloc),
411e1bfb
AM
647
648 /* Computes a dtv-relative displacement, the difference between the value
649 of sym+add and the base address of the thread-local storage block that
650 contains the definition of sym, minus 0x8000. */
46807bf4
AM
651 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
652 ppc64_elf_unhandled_reloc),
411e1bfb
AM
653
654 /* A 16 bit dtprel reloc. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* Like DTPREL16, but no overflow. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Computes a tp-relative displacement, the difference between the value of
695 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
696 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
697 ppc64_elf_unhandled_reloc),
411e1bfb
AM
698
699 /* A 16 bit tprel reloc. */
46807bf4
AM
700 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* Like TPREL16, but no overflow. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
740 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
741 to the first entry relative to the TOC base (r2). */
46807bf4
AM
742 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
743 ppc64_elf_unhandled_reloc),
5bd4f169 744
411e1bfb 745 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb
AM
757 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
758 with values (sym+add)@dtpmod and zero, and computes the offset to the
759 first entry relative to the TOC base (r2). */
46807bf4
AM
760 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
761 ppc64_elf_unhandled_reloc),
5bd4f169 762
411e1bfb 763 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb
AM
775 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
776 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
777 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
778 ppc64_elf_unhandled_reloc),
5bd4f169 779
411e1bfb 780 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
411e1bfb
AM
791
792 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
793 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
794 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
795 ppc64_elf_unhandled_reloc),
5bd4f169 796
411e1bfb 797 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
813 bfd_elf_generic_reloc),
e054468f 814
25f23106 815 /* A 16 bit relative relocation. */
46807bf4
AM
816 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
817 bfd_elf_generic_reloc),
25f23106
AM
818
819 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
820 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* The high order 16 bits of a relative address. */
46807bf4
AM
824 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address, plus 1 if the contents of
828 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
829 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
830 ppc64_elf_ha_reloc),
25f23106 831
4a969973
AM
832 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
833 bfd_elf_generic_reloc),
834
835 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
836 ppc64_elf_ha_reloc),
837
838 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
839 bfd_elf_generic_reloc),
840
841 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
842 ppc64_elf_ha_reloc),
843
844 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
845 bfd_elf_generic_reloc),
846
847 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
848 ppc64_elf_ha_reloc),
849
a680de9a 850 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
851 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
852 ppc64_elf_ha_reloc),
a680de9a 853
7ba71655 854 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
855 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
856 ppc64_elf_ha_reloc),
7ba71655 857
f9c6b907 858 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
859 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
860 bfd_elf_generic_reloc),
f9c6b907
AM
861
862 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
864 ppc64_elf_ha_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_unhandled_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907 881
006589cf 882 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
883 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
884 bfd_elf_generic_reloc),
006589cf 885
45965137 886 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
887 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
45965137 889
5663e321
AM
890 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
900 ppc64_elf_prefix_reloc),
901
902 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_unhandled_reloc),
916
917 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
c213164a
AM
923 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
924 ppc64_elf_unhandled_reloc),
925
926 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
5663e321
AM
941 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
942 bfd_elf_generic_reloc),
943
944 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
945 ppc64_elf_ha_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
948 bfd_elf_generic_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
951 ppc64_elf_ha_reloc),
952
953 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
954 bfd_elf_generic_reloc),
955
956 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
957 ppc64_elf_ha_reloc),
958
959 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
960 bfd_elf_generic_reloc),
961
962 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
963 ppc64_elf_ha_reloc),
964
965 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
966 ppc64_elf_prefix_reloc),
967
968 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
969 ppc64_elf_prefix_reloc),
970
5bd4f169 971 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
972 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
973 NULL),
5bd4f169
AM
974
975 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978};
979
980\f
981/* Initialize the ppc64_elf_howto_table, so that linear accesses can
982 be done. */
983
984static void
4ce794b7 985ppc_howto_init (void)
5bd4f169
AM
986{
987 unsigned int i, type;
988
a4b6fadd 989 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
990 {
991 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 992 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
993 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
994 }
995}
996
997static reloc_howto_type *
f3185997 998ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 999 bfd_reloc_code_real_type code)
5bd4f169 1000{
411e1bfb 1001 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1002
1003 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1004 /* Initialize howto table if needed. */
1005 ppc_howto_init ();
1006
4ce794b7 1007 switch (code)
5bd4f169
AM
1008 {
1009 default:
f3185997 1010 /* xgettext:c-format */
2cdcc330
AM
1011 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1012 (int) code);
f3185997 1013 bfd_set_error (bfd_error_bad_value);
4ce794b7 1014 return NULL;
5bd4f169 1015
411e1bfb
AM
1016 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1017 break;
1018 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1019 break;
1020 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1021 break;
1022 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1023 break;
1024 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1025 break;
1026 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1027 break;
f9c6b907
AM
1028 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1029 break;
411e1bfb 1030 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1031 break;
f9c6b907
AM
1032 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1033 break;
411e1bfb 1034 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1041 break;
05d0e962
AM
1042 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1043 break;
411e1bfb 1044 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1051 break;
411e1bfb 1052 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1053 break;
411e1bfb 1054 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1055 break;
411e1bfb 1056 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1063 break;
411e1bfb 1064 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1065 break;
411e1bfb 1066 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1067 break;
411e1bfb 1068 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1069 break;
411e1bfb 1070 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1071 break;
411e1bfb 1072 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1073 break;
411e1bfb 1074 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1075 break;
411e1bfb 1076 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1077 break;
411e1bfb 1078 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1079 break;
411e1bfb 1080 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1081 break;
411e1bfb 1082 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1083 break;
411e1bfb 1084 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1085 break;
411e1bfb 1086 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1087 break;
411e1bfb 1088 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1089 break;
411e1bfb 1090 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1091 break;
411e1bfb 1092 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1093 break;
411e1bfb 1094 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1095 break;
411e1bfb 1096 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1097 break;
411e1bfb 1098 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1099 break;
411e1bfb 1100 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1101 break;
411e1bfb 1102 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1103 break;
411e1bfb 1104 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1105 break;
411e1bfb 1106 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1107 break;
411e1bfb 1108 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1109 break;
411e1bfb 1110 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1111 break;
411e1bfb 1112 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1113 break;
411e1bfb 1114 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1115 break;
411e1bfb 1116 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1117 break;
411e1bfb 1118 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1119 break;
411e1bfb 1120 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1121 break;
411e1bfb 1122 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1123 break;
411e1bfb 1124 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1125 break;
411e1bfb 1126 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1127 break;
411e1bfb 1128 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1129 break;
411e1bfb 1130 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1131 break;
411e1bfb 1132 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1133 break;
411e1bfb 1134 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1135 break;
411e1bfb 1136 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1137 break;
411e1bfb 1138 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1139 break;
c213164a 1140 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1141 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1142 break;
727fc41e
AM
1143 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1144 break;
1145 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1146 break;
411e1bfb 1147 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1148 break;
411e1bfb 1149 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1150 break;
411e1bfb 1151 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1152 break;
411e1bfb 1153 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1154 break;
f9c6b907
AM
1155 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1156 break;
411e1bfb 1157 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1158 break;
f9c6b907
AM
1159 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1160 break;
411e1bfb 1161 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1162 break;
411e1bfb
AM
1163 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1164 break;
1165 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1168 break;
f9c6b907
AM
1169 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1170 break;
411e1bfb
AM
1171 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1172 break;
f9c6b907
AM
1173 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1174 break;
411e1bfb
AM
1175 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1176 break;
1177 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1178 break;
1179 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1200 break;
1201 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1202 break;
1203 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1208 break;
1209 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1210 break;
1211 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1220 break;
1221 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1222 break;
1223 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1232 break;
25f23106
AM
1233 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1234 break;
1235 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1236 break;
1237 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1238 break;
1239 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1240 break;
4a969973
AM
1241 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1242 break;
1243 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1252 break;
7ba71655
AM
1253 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1254 break;
a680de9a
PB
1255 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1256 break;
006589cf
AM
1257 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1258 break;
45965137
AM
1259 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1260 break;
5663e321
AM
1261 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1262 break;
1263 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1264 break;
1265 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1266 break;
1267 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1268 break;
1269 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1270 break;
1271 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1272 break;
1273 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1274 break;
c213164a
AM
1275 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1276 break;
1277 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1278 break;
1279 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1280 break;
1281 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1286 break;
5663e321
AM
1287 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1288 break;
1289 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1294 break;
1295 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1296 break;
1297 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1302 break;
1303 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1304 break;
1305 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1306 break;
411e1bfb
AM
1307 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1308 break;
1309 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1310 break;
1311 }
1312
4ce794b7 1313 return ppc64_elf_howto_table[r];
5bd4f169
AM
1314};
1315
157090f7
AM
1316static reloc_howto_type *
1317ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1318 const char *r_name)
1319{
1320 unsigned int i;
1321
a4b6fadd 1322 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1323 if (ppc64_elf_howto_raw[i].name != NULL
1324 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1325 return &ppc64_elf_howto_raw[i];
1326
1327 return NULL;
1328}
1329
5bd4f169
AM
1330/* Set the howto pointer for a PowerPC ELF reloc. */
1331
f3185997 1332static bfd_boolean
4aef7643 1333ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1334 Elf_Internal_Rela *dst)
5bd4f169 1335{
65f38f15
AM
1336 unsigned int type;
1337
ef60b7ff 1338 /* Initialize howto table if needed. */
5bd4f169 1339 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1340 ppc_howto_init ();
1341
65f38f15 1342 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1343 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1344 {
695344c0 1345 /* xgettext:c-format */
0aa13fee 1346 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1347 abfd, type);
f3185997
NC
1348 bfd_set_error (bfd_error_bad_value);
1349 return FALSE;
d0fb9a8d 1350 }
65f38f15 1351 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1352 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1353 {
1354 /* xgettext:c-format */
1355 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1356 abfd, type);
1357 bfd_set_error (bfd_error_bad_value);
1358 return FALSE;
1359 }
2cdcc330 1360
f3185997 1361 return TRUE;
5bd4f169
AM
1362}
1363
04c9666a 1364/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1365
1366static bfd_reloc_status_type
4ce794b7
AM
1367ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1368 void *data, asection *input_section,
1369 bfd *output_bfd, char **error_message)
5bd4f169 1370{
a680de9a
PB
1371 enum elf_ppc64_reloc_type r_type;
1372 long insn;
1373 bfd_size_type octets;
3de43e7b 1374 bfd_vma value;
a680de9a 1375
805fc799
AM
1376 /* If this is a relocatable link (output_bfd test tells us), just
1377 call the generic function. Any adjustment will be done at final
1378 link time. */
1379 if (output_bfd != NULL)
cedb70c5 1380 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1381 input_section, output_bfd, error_message);
1382
5663e321
AM
1383 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1384 We won't actually be using the low bits, so trashing them
805fc799 1385 doesn't matter. */
a680de9a 1386 r_type = reloc_entry->howto->type;
5663e321
AM
1387 if (r_type == R_PPC64_ADDR16_HIGHERA34
1388 || r_type == R_PPC64_ADDR16_HIGHESTA34
1389 || r_type == R_PPC64_REL16_HIGHERA34
1390 || r_type == R_PPC64_REL16_HIGHESTA34)
1391 reloc_entry->addend += 1ULL << 33;
1392 else
1393 reloc_entry->addend += 1U << 15;
a680de9a
PB
1394 if (r_type != R_PPC64_REL16DX_HA)
1395 return bfd_reloc_continue;
1396
1397 value = 0;
1398 if (!bfd_is_com_section (symbol->section))
1399 value = symbol->value;
1400 value += (reloc_entry->addend
1401 + symbol->section->output_offset
1402 + symbol->section->output_section->vma);
1403 value -= (reloc_entry->address
1404 + input_section->output_offset
1405 + input_section->output_section->vma);
3de43e7b 1406 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1407
1408 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1409 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1410 insn &= ~0x1fffc1;
3de43e7b 1411 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1412 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1413 if (value + 0x8000 > 0xffff)
a680de9a
PB
1414 return bfd_reloc_overflow;
1415 return bfd_reloc_ok;
805fc799 1416}
5bd4f169 1417
2441e016
AM
1418static bfd_reloc_status_type
1419ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1420 void *data, asection *input_section,
1421 bfd *output_bfd, char **error_message)
1422{
1423 if (output_bfd != NULL)
1424 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1425 input_section, output_bfd, error_message);
1426
699733f6
AM
1427 if (strcmp (symbol->section->name, ".opd") == 0
1428 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1429 {
1430 bfd_vma dest = opd_entry_value (symbol->section,
1431 symbol->value + reloc_entry->addend,
aef36ac1 1432 NULL, NULL, FALSE);
2441e016
AM
1433 if (dest != (bfd_vma) -1)
1434 reloc_entry->addend = dest - (symbol->value
1435 + symbol->section->output_section->vma
1436 + symbol->section->output_offset);
1437 }
810d4e75
AM
1438 else
1439 {
1440 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1441
1442 if (symbol->section->owner != abfd
9f284bf9 1443 && symbol->section->owner != NULL
810d4e75
AM
1444 && abiversion (symbol->section->owner) >= 2)
1445 {
1446 unsigned int i;
1447
1448 for (i = 0; i < symbol->section->owner->symcount; ++i)
1449 {
1450 asymbol *symdef = symbol->section->owner->outsymbols[i];
1451
1452 if (strcmp (symdef->name, symbol->name) == 0)
1453 {
1454 elfsym = (elf_symbol_type *) symdef;
1455 break;
1456 }
1457 }
1458 }
1459 reloc_entry->addend
1460 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1461 }
2441e016
AM
1462 return bfd_reloc_continue;
1463}
1464
805fc799 1465static bfd_reloc_status_type
4ce794b7
AM
1466ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1467 void *data, asection *input_section,
1468 bfd *output_bfd, char **error_message)
805fc799
AM
1469{
1470 long insn;
04c9666a 1471 enum elf_ppc64_reloc_type r_type;
805fc799 1472 bfd_size_type octets;
794e51c0
AM
1473 /* Assume 'at' branch hints. */
1474 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1475
1476 /* If this is a relocatable link (output_bfd test tells us), just
1477 call the generic function. Any adjustment will be done at final
1478 link time. */
5bd4f169 1479 if (output_bfd != NULL)
cedb70c5 1480 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1481 input_section, output_bfd, error_message);
1482
1483 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1484 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1485 insn &= ~(0x01 << 21);
4ce794b7 1486 r_type = reloc_entry->howto->type;
805fc799
AM
1487 if (r_type == R_PPC64_ADDR14_BRTAKEN
1488 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1489 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1490
794e51c0 1491 if (is_isa_v2)
5bd4f169 1492 {
805fc799
AM
1493 /* Set 'a' bit. This is 0b00010 in BO field for branch
1494 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1495 for branch on CTR insns (BO == 1a00t or 1a01t). */
1496 if ((insn & (0x14 << 21)) == (0x04 << 21))
1497 insn |= 0x02 << 21;
1498 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1499 insn |= 0x08 << 21;
1500 else
2441e016 1501 goto out;
5bd4f169 1502 }
805fc799
AM
1503 else
1504 {
1505 bfd_vma target = 0;
1506 bfd_vma from;
5bd4f169 1507
805fc799
AM
1508 if (!bfd_is_com_section (symbol->section))
1509 target = symbol->value;
1510 target += symbol->section->output_section->vma;
1511 target += symbol->section->output_offset;
1512 target += reloc_entry->addend;
5bd4f169 1513
805fc799
AM
1514 from = (reloc_entry->address
1515 + input_section->output_offset
1516 + input_section->output_section->vma);
5bd4f169 1517
805fc799
AM
1518 /* Invert 'y' bit if not the default. */
1519 if ((bfd_signed_vma) (target - from) < 0)
1520 insn ^= 0x01 << 21;
1521 }
4ce794b7 1522 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1523 out:
1524 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1525 input_section, output_bfd, error_message);
805fc799 1526}
5bd4f169 1527
805fc799 1528static bfd_reloc_status_type
4ce794b7
AM
1529ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1530 void *data, asection *input_section,
1531 bfd *output_bfd, char **error_message)
805fc799
AM
1532{
1533 /* If this is a relocatable link (output_bfd test tells us), just
1534 call the generic function. Any adjustment will be done at final
1535 link time. */
1536 if (output_bfd != NULL)
cedb70c5 1537 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1538 input_section, output_bfd, error_message);
5bd4f169 1539
805fc799
AM
1540 /* Subtract the symbol section base address. */
1541 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1542 return bfd_reloc_continue;
1543}
1544
805fc799 1545static bfd_reloc_status_type
4ce794b7
AM
1546ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1547 void *data, asection *input_section,
1548 bfd *output_bfd, char **error_message)
805fc799
AM
1549{
1550 /* If this is a relocatable link (output_bfd test tells us), just
1551 call the generic function. Any adjustment will be done at final
1552 link time. */
1553 if (output_bfd != NULL)
cedb70c5 1554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1555 input_section, output_bfd, error_message);
1556
1557 /* Subtract the symbol section base address. */
1558 reloc_entry->addend -= symbol->section->output_section->vma;
1559
1560 /* Adjust the addend for sign extension of the low 16 bits. */
1561 reloc_entry->addend += 0x8000;
1562 return bfd_reloc_continue;
1563}
1564
1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 bfd_vma TOCstart;
1571
1572 /* If this is a relocatable link (output_bfd test tells us), just
1573 call the generic function. Any adjustment will be done at final
1574 link time. */
1575 if (output_bfd != NULL)
cedb70c5 1576 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1577 input_section, output_bfd, error_message);
1578
1579 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1580 if (TOCstart == 0)
1c865ab2 1581 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1582
1583 /* Subtract the TOC base address. */
1584 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1585 return bfd_reloc_continue;
1586}
1587
1588static bfd_reloc_status_type
4ce794b7
AM
1589ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1590 void *data, asection *input_section,
1591 bfd *output_bfd, char **error_message)
805fc799
AM
1592{
1593 bfd_vma TOCstart;
1594
1595 /* If this is a relocatable link (output_bfd test tells us), just
1596 call the generic function. Any adjustment will be done at final
1597 link time. */
1598 if (output_bfd != NULL)
cedb70c5 1599 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1600 input_section, output_bfd, error_message);
1601
1602 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1603 if (TOCstart == 0)
1c865ab2 1604 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1605
1606 /* Subtract the TOC base address. */
1607 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1608
1609 /* Adjust the addend for sign extension of the low 16 bits. */
1610 reloc_entry->addend += 0x8000;
1611 return bfd_reloc_continue;
1612}
1613
1614static bfd_reloc_status_type
4ce794b7
AM
1615ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1616 void *data, asection *input_section,
1617 bfd *output_bfd, char **error_message)
805fc799
AM
1618{
1619 bfd_vma TOCstart;
1620 bfd_size_type octets;
1621
1622 /* If this is a relocatable link (output_bfd test tells us), just
1623 call the generic function. Any adjustment will be done at final
1624 link time. */
1625 if (output_bfd != NULL)
cedb70c5 1626 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1627 input_section, output_bfd, error_message);
1628
1629 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1630 if (TOCstart == 0)
1c865ab2 1631 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1632
1633 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1634 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1635 return bfd_reloc_ok;
1636}
1637
5663e321
AM
1638static bfd_reloc_status_type
1639ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1640 void *data, asection *input_section,
1641 bfd *output_bfd, char **error_message)
1642{
1643 uint64_t insn;
1644 bfd_vma targ;
1645
1646 if (output_bfd != NULL)
1647 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1648 input_section, output_bfd, error_message);
1649
1650 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1651 insn <<= 32;
1652 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1653
1654 targ = (symbol->section->output_section->vma
1655 + symbol->section->output_offset
1656 + reloc_entry->addend);
1657 if (!bfd_is_com_section (symbol->section))
1658 targ += symbol->value;
1659 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1660 targ += 1ULL << 33;
1661 if (reloc_entry->howto->pc_relative)
1662 {
1663 bfd_vma from = (reloc_entry->address
1664 + input_section->output_offset
1665 + input_section->output_section->vma);
1666 targ -=from;
1667 }
1668 targ >>= reloc_entry->howto->rightshift;
1669 insn &= ~reloc_entry->howto->dst_mask;
1670 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1671 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1672 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1673 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1674 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1675 >= 1ULL << reloc_entry->howto->bitsize))
1676 return bfd_reloc_overflow;
1677 return bfd_reloc_ok;
1678}
1679
805fc799 1680static bfd_reloc_status_type
4ce794b7
AM
1681ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1682 void *data, asection *input_section,
1683 bfd *output_bfd, char **error_message)
805fc799
AM
1684{
1685 /* If this is a relocatable link (output_bfd test tells us), just
1686 call the generic function. Any adjustment will be done at final
1687 link time. */
1688 if (output_bfd != NULL)
cedb70c5 1689 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1690 input_section, output_bfd, error_message);
1691
1692 if (error_message != NULL)
1693 {
1694 static char buf[60];
1695 sprintf (buf, "generic linker can't handle %s",
1696 reloc_entry->howto->name);
1697 *error_message = buf;
1698 }
1699 return bfd_reloc_dangerous;
1700}
1701
927be08e
AM
1702/* Track GOT entries needed for a given symbol. We might need more
1703 than one got entry per symbol. */
1704struct got_entry
1705{
1706 struct got_entry *next;
1707
1708 /* The symbol addend that we'll be placing in the GOT. */
1709 bfd_vma addend;
1710
1711 /* Unlike other ELF targets, we use separate GOT entries for the same
1712 symbol referenced from different input files. This is to support
1713 automatic multiple TOC/GOT sections, where the TOC base can vary
1714 from one input file to another. After partitioning into TOC groups
1715 we merge entries within the group.
1716
1717 Point to the BFD owning this GOT entry. */
1718 bfd *owner;
1719
1720 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1721 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1722 unsigned char tls_type;
927be08e
AM
1723
1724 /* Non-zero if got.ent points to real entry. */
f961d9dd 1725 unsigned char is_indirect;
927be08e
AM
1726
1727 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1728 union
2cdcc330
AM
1729 {
1730 bfd_signed_vma refcount;
1731 bfd_vma offset;
1732 struct got_entry *ent;
1733 } got;
927be08e
AM
1734};
1735
1736/* The same for PLT. */
1737struct plt_entry
1738{
1739 struct plt_entry *next;
1740
1741 bfd_vma addend;
1742
1743 union
2cdcc330
AM
1744 {
1745 bfd_signed_vma refcount;
1746 bfd_vma offset;
1747 } plt;
927be08e
AM
1748};
1749
e717da7e
AM
1750struct ppc64_elf_obj_tdata
1751{
1752 struct elf_obj_tdata elf;
1753
1754 /* Shortcuts to dynamic linker sections. */
1755 asection *got;
1756 asection *relgot;
1757
b3fac117
AM
1758 /* Used during garbage collection. We attach global symbols defined
1759 on removed .opd entries to this section so that the sym is removed. */
1760 asection *deleted_section;
81688140 1761
927be08e 1762 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1763 sections means we potentially need one of these for each input bfd. */
927be08e 1764 struct got_entry tlsld_got;
8860955f 1765
2cdcc330
AM
1766 union
1767 {
729eabd5
AM
1768 /* A copy of relocs before they are modified for --emit-relocs. */
1769 Elf_Internal_Rela *relocs;
1770
1771 /* Section contents. */
1772 bfd_byte *contents;
1773 } opd;
d77c8a4b
AM
1774
1775 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1776 the reloc to be in the range -32768 to 32767. */
98528052
AM
1777 unsigned int has_small_toc_reloc : 1;
1778
560c8763
AM
1779 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1780 instruction not one we handle. */
1781 unsigned int unexpected_toc_insn : 1;
066f4018 1782
903b777d
AM
1783 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1784 this file. */
1785 unsigned int has_optrel : 1;
e717da7e
AM
1786};
1787
1788#define ppc64_elf_tdata(bfd) \
1789 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1790
1791#define ppc64_tlsld_got(bfd) \
1792 (&ppc64_elf_tdata (bfd)->tlsld_got)
1793
0c8d6e5c
AM
1794#define is_ppc64_elf(bfd) \
1795 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1796 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1797
e717da7e
AM
1798/* Override the generic function because we store some extras. */
1799
1800static bfd_boolean
1801ppc64_elf_mkobject (bfd *abfd)
1802{
0ffa91dd 1803 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1804 PPC64_ELF_DATA);
e717da7e
AM
1805}
1806
feee612b 1807/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1808 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1809
b34976b6 1810static bfd_boolean
4ce794b7 1811ppc64_elf_object_p (bfd *abfd)
feee612b 1812{
14b57c7c
AM
1813 if (!abfd->arch_info->the_default)
1814 return TRUE;
1815
1816 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1817 {
1818 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1819
1820 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1821 {
1822 /* Relies on arch after 32 bit default being 64 bit default. */
1823 abfd->arch_info = abfd->arch_info->next;
1824 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1825 }
1826 }
14b57c7c 1827 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1828}
1829
d37c89e5
AM
1830/* Support for core dump NOTE sections. */
1831
1832static bfd_boolean
1833ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1834{
eea6121a 1835 size_t offset, size;
d37c89e5
AM
1836
1837 if (note->descsz != 504)
1838 return FALSE;
1839
1840 /* pr_cursig */
228e534f 1841 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1842
1843 /* pr_pid */
228e534f 1844 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1845
1846 /* pr_reg */
1847 offset = 112;
eea6121a 1848 size = 384;
d37c89e5
AM
1849
1850 /* Make a ".reg/999" section. */
1851 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1852 size, note->descpos + offset);
d37c89e5
AM
1853}
1854
1855static bfd_boolean
1856ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1857{
1858 if (note->descsz != 136)
1859 return FALSE;
1860
228e534f 1861 elf_tdata (abfd)->core->pid
bc989cdc 1862 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1863 elf_tdata (abfd)->core->program
d37c89e5 1864 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1865 elf_tdata (abfd)->core->command
d37c89e5
AM
1866 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1867
1868 return TRUE;
1869}
1870
183e98be
AM
1871static char *
1872ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1873 ...)
1874{
1875 switch (note_type)
1876 {
1877 default:
1878 return NULL;
1879
1880 case NT_PRPSINFO:
1881 {
9ef6d1e3 1882 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1883 va_list ap;
1884
1885 va_start (ap, note_type);
75cd47ed 1886 memset (data, 0, sizeof (data));
183e98be 1887 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1888#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1889 DIAGNOSTIC_PUSH;
be3e27bb 1890 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1891 -Wstringop-truncation:
1892 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1893 */
95da9854
L
1894 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1895#endif
183e98be 1896 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1897#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1898 DIAGNOSTIC_POP;
fe75810f 1899#endif
183e98be
AM
1900 va_end (ap);
1901 return elfcore_write_note (abfd, buf, bufsiz,
1902 "CORE", note_type, data, sizeof (data));
1903 }
1904
1905 case NT_PRSTATUS:
1906 {
1907 char data[504];
1908 va_list ap;
1909 long pid;
1910 int cursig;
1911 const void *greg;
1912
1913 va_start (ap, note_type);
1914 memset (data, 0, 112);
1915 pid = va_arg (ap, long);
1916 bfd_put_32 (abfd, pid, data + 32);
1917 cursig = va_arg (ap, int);
1918 bfd_put_16 (abfd, cursig, data + 12);
1919 greg = va_arg (ap, const void *);
1920 memcpy (data + 112, greg, 384);
1921 memset (data + 496, 0, 8);
1922 va_end (ap);
1923 return elfcore_write_note (abfd, buf, bufsiz,
1924 "CORE", note_type, data, sizeof (data));
1925 }
1926 }
1927}
1928
5d35169e
AM
1929/* Add extra PPC sections. */
1930
2cdcc330 1931static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1932{
07d6d2b8
AM
1933 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1934 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1935 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1936 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1937 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1938 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1939 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1940};
1941
7c8fe5c4
AM
1942enum _ppc64_sec_type {
1943 sec_normal = 0,
1944 sec_opd = 1,
1945 sec_toc = 2
1946};
1947
f0abc2a1
AM
1948struct _ppc64_elf_section_data
1949{
1950 struct bfd_elf_section_data elf;
411e1bfb 1951
f0abc2a1
AM
1952 union
1953 {
51aecdc5
AM
1954 /* An array with one entry for each opd function descriptor,
1955 and some spares since opd entries may be either 16 or 24 bytes. */
1956#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1957 struct _opd_sec_data
1958 {
1959 /* Points to the function code section for local opd entries. */
1960 asection **func_sec;
1961
1962 /* After editing .opd, adjust references to opd local syms. */
1963 long *adjust;
1964 } opd;
7c8fe5c4 1965
3a71aa26
AM
1966 /* An array for toc sections, indexed by offset/8. */
1967 struct _toc_sec_data
1968 {
1969 /* Specifies the relocation symbol index used at a given toc offset. */
1970 unsigned *symndx;
1971
1972 /* And the relocation addend. */
1973 bfd_vma *add;
1974 } toc;
7c8fe5c4
AM
1975 } u;
1976
1977 enum _ppc64_sec_type sec_type:2;
411e1bfb 1978
7c8fe5c4
AM
1979 /* Flag set when small branches are detected. Used to
1980 select suitable defaults for the stub group size. */
1981 unsigned int has_14bit_branch:1;
3e04d765
AM
1982
1983 /* Flag set when PLTCALL relocs are detected. */
1984 unsigned int has_pltcall:1;
066f4018 1985
903b777d
AM
1986 /* Flag set when section has PLT/GOT/TOC relocations that can be
1987 optimised. */
1988 unsigned int has_optrel:1;
f0abc2a1
AM
1989};
1990
1991#define ppc64_elf_section_data(sec) \
411e1bfb 1992 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1993
1994static bfd_boolean
4ce794b7 1995ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1996{
f592407e
AM
1997 if (!sec->used_by_bfd)
1998 {
1999 struct _ppc64_elf_section_data *sdata;
2000 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 2001
f592407e
AM
2002 sdata = bfd_zalloc (abfd, amt);
2003 if (sdata == NULL)
2004 return FALSE;
2005 sec->used_by_bfd = sdata;
2006 }
f0abc2a1
AM
2007
2008 return _bfd_elf_new_section_hook (abfd, sec);
2009}
4025353c 2010
74f0fb50 2011static struct _opd_sec_data *
4025353c
AM
2012get_opd_info (asection * sec)
2013{
2014 if (sec != NULL
2015 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2016 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2017 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2018 return NULL;
2019}
90e3cdf2
JJ
2020\f
2021/* Parameters for the qsort hook. */
90e3cdf2 2022static bfd_boolean synthetic_relocatable;
cd285db5 2023static asection *synthetic_opd;
90e3cdf2 2024
699733f6 2025/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2026
2027static int
2028compare_symbols (const void *ap, const void *bp)
2029{
2cdcc330
AM
2030 const asymbol *a = *(const asymbol **) ap;
2031 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2032
699733f6
AM
2033 /* Section symbols first. */
2034 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2035 return -1;
699733f6 2036 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2037 return 1;
2038
699733f6 2039 /* then .opd symbols. */
cd285db5
AM
2040 if (synthetic_opd != NULL)
2041 {
2042 if (strcmp (a->section->name, ".opd") == 0
2043 && strcmp (b->section->name, ".opd") != 0)
2044 return -1;
2045 if (strcmp (a->section->name, ".opd") != 0
2046 && strcmp (b->section->name, ".opd") == 0)
2047 return 1;
2048 }
90e3cdf2 2049
699733f6 2050 /* then other code symbols. */
2cdcc330
AM
2051 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2052 == (SEC_CODE | SEC_ALLOC))
2053 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2054 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2055 return -1;
2056
2cdcc330
AM
2057 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2058 != (SEC_CODE | SEC_ALLOC))
2059 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2060 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2061 return 1;
2062
2063 if (synthetic_relocatable)
2064 {
2065 if (a->section->id < b->section->id)
2066 return -1;
2067
2068 if (a->section->id > b->section->id)
2069 return 1;
2070 }
2071
2072 if (a->value + a->section->vma < b->value + b->section->vma)
2073 return -1;
2074
2075 if (a->value + a->section->vma > b->value + b->section->vma)
2076 return 1;
2077
4d35a0aa
AM
2078 /* For syms with the same value, prefer strong dynamic global function
2079 syms over other syms. */
2080 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2081 return -1;
2082
2083 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2084 return 1;
2085
2086 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2087 return -1;
2088
2089 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2090 return 1;
2091
2092 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2093 return -1;
2094
2095 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2096 return 1;
2097
2098 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2099 return -1;
2100
2101 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2102 return 1;
2103
aaed6f5b 2104 return a > b;
90e3cdf2
JJ
2105}
2106
699733f6 2107/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2108
699733f6 2109static asymbol *
7292b3ac 2110sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 2111{
699733f6 2112 long mid;
90e3cdf2 2113
7292b3ac 2114 if (id == (unsigned) -1)
699733f6
AM
2115 {
2116 while (lo < hi)
2117 {
2118 mid = (lo + hi) >> 1;
2119 if (syms[mid]->value + syms[mid]->section->vma < value)
2120 lo = mid + 1;
2121 else if (syms[mid]->value + syms[mid]->section->vma > value)
2122 hi = mid;
2123 else
2124 return syms[mid];
2125 }
2126 }
2127 else
2128 {
2129 while (lo < hi)
2130 {
2131 mid = (lo + hi) >> 1;
2132 if (syms[mid]->section->id < id)
2133 lo = mid + 1;
2134 else if (syms[mid]->section->id > id)
2135 hi = mid;
2136 else if (syms[mid]->value < value)
2137 lo = mid + 1;
2138 else if (syms[mid]->value > value)
2139 hi = mid;
2140 else
2141 return syms[mid];
2142 }
2143 }
2144 return NULL;
90e3cdf2
JJ
2145}
2146
468392fb
AM
2147static bfd_boolean
2148section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2149{
2150 bfd_vma vma = *(bfd_vma *) ptr;
2151 return ((section->flags & SEC_ALLOC) != 0
2152 && section->vma <= vma
2153 && vma < section->vma + section->size);
2154}
2155
699733f6 2156/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2157 entry syms. Also generate @plt symbols for the glink branch table.
2158 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2159
2160static long
a7535cf3
AM
2161ppc64_elf_get_synthetic_symtab (bfd *abfd,
2162 long static_count, asymbol **static_syms,
2163 long dyn_count, asymbol **dyn_syms,
c9727e01 2164 asymbol **ret)
90e3cdf2
JJ
2165{
2166 asymbol *s;
0ccf57bd 2167 size_t i, j, count;
90e3cdf2 2168 char *names;
0ccf57bd 2169 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2170 asection *opd = NULL;
90e3cdf2 2171 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2172 asymbol **syms;
ee67d69a 2173 int abi = abiversion (abfd);
90e3cdf2
JJ
2174
2175 *ret = NULL;
2176
ee67d69a
AM
2177 if (abi < 2)
2178 {
2179 opd = bfd_get_section_by_name (abfd, ".opd");
2180 if (opd == NULL && abi == 1)
2181 return 0;
2182 }
90e3cdf2 2183
a5259595
AM
2184 syms = NULL;
2185 codesecsym = 0;
2186 codesecsymend = 0;
2187 secsymend = 0;
2188 opdsymend = 0;
2189 symcount = 0;
2190 if (opd != NULL)
c9727e01 2191 {
a5259595
AM
2192 symcount = static_count;
2193 if (!relocatable)
2194 symcount += dyn_count;
2195 if (symcount == 0)
2196 return 0;
c9727e01 2197
a5259595
AM
2198 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2199 if (syms == NULL)
2200 return -1;
90e3cdf2 2201
a5259595
AM
2202 if (!relocatable && static_count != 0 && dyn_count != 0)
2203 {
2204 /* Use both symbol tables. */
2205 memcpy (syms, static_syms, static_count * sizeof (*syms));
2206 memcpy (syms + static_count, dyn_syms,
2207 (dyn_count + 1) * sizeof (*syms));
2208 }
2209 else if (!relocatable && static_count == 0)
2210 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2211 else
2212 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2213
0ccf57bd
AM
2214 /* Trim uninteresting symbols. Interesting symbols are section,
2215 function, and notype symbols. */
2216 for (i = 0, j = 0; i < symcount; ++i)
2217 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2218 | BSF_RELC | BSF_SRELC)) == 0)
2219 syms[j++] = syms[i];
2220 symcount = j;
2221
a5259595
AM
2222 synthetic_relocatable = relocatable;
2223 synthetic_opd = opd;
2224 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2225
a5259595
AM
2226 if (!relocatable && symcount > 1)
2227 {
bfa5bd2a
PA
2228 /* Trim duplicate syms, since we may have merged the normal
2229 and dynamic symbols. Actually, we only care about syms
2230 that have different values, so trim any with the same
2231 value. Don't consider ifunc and ifunc resolver symbols
2232 duplicates however, because GDB wants to know whether a
2233 text symbol is an ifunc resolver. */
a5259595 2234 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2235 {
2236 const asymbol *s0 = syms[i - 1];
2237 const asymbol *s1 = syms[i];
2238
2239 if ((s0->value + s0->section->vma
2240 != s1->value + s1->section->vma)
2241 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2242 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2243 syms[j++] = syms[i];
2244 }
a5259595
AM
2245 symcount = j;
2246 }
699733f6 2247
a5259595
AM
2248 i = 0;
2249 /* Note that here and in compare_symbols we can't compare opd and
2250 sym->section directly. With separate debug info files, the
2251 symbols will be extracted from the debug file while abfd passed
2252 to this function is the real binary. */
0ccf57bd 2253 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2254 ++i;
2255 codesecsym = i;
2256
2257 for (; i < symcount; ++i)
2258 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2259 | SEC_THREAD_LOCAL))
2260 != (SEC_CODE | SEC_ALLOC))
2261 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2262 break;
2263 codesecsymend = i;
2264
2265 for (; i < symcount; ++i)
2266 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2267 break;
2268 secsymend = i;
2269
2270 for (; i < symcount; ++i)
2271 if (strcmp (syms[i]->section->name, ".opd") != 0)
2272 break;
2273 opdsymend = i;
2274
2275 for (; i < symcount; ++i)
2cdcc330
AM
2276 if (((syms[i]->section->flags
2277 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2278 != (SEC_CODE | SEC_ALLOC))
2279 break;
2280 symcount = i;
2281 }
c9727e01 2282 count = 0;
90e3cdf2 2283
699733f6 2284 if (relocatable)
90e3cdf2 2285 {
699733f6
AM
2286 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2287 arelent *r;
2288 size_t size;
0ccf57bd 2289 size_t relcount;
90e3cdf2 2290
468392fb
AM
2291 if (opdsymend == secsymend)
2292 goto done;
2293
699733f6 2294 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2295 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2296 if (relcount == 0)
c9727e01 2297 goto done;
90e3cdf2 2298
7356fed5
AM
2299 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2300 {
2301 count = -1;
2302 goto done;
2303 }
2304
699733f6 2305 size = 0;
595da8c5 2306 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2307 {
2308 asymbol *sym;
90e3cdf2 2309
595da8c5 2310 while (r < opd->relocation + relcount
699733f6
AM
2311 && r->address < syms[i]->value + opd->vma)
2312 ++r;
90e3cdf2 2313
595da8c5 2314 if (r == opd->relocation + relcount)
699733f6 2315 break;
90e3cdf2 2316
699733f6
AM
2317 if (r->address != syms[i]->value + opd->vma)
2318 continue;
90e3cdf2 2319
699733f6
AM
2320 if (r->howto->type != R_PPC64_ADDR64)
2321 continue;
90e3cdf2 2322
699733f6
AM
2323 sym = *r->sym_ptr_ptr;
2324 if (!sym_exists_at (syms, opdsymend, symcount,
2325 sym->section->id, sym->value + r->addend))
2326 {
2327 ++count;
2328 size += sizeof (asymbol);
2329 size += strlen (syms[i]->name) + 2;
2330 }
2331 }
90e3cdf2 2332
c4b0b099
AM
2333 if (size == 0)
2334 goto done;
699733f6
AM
2335 s = *ret = bfd_malloc (size);
2336 if (s == NULL)
2337 {
7356fed5 2338 count = -1;
c9727e01 2339 goto done;
699733f6 2340 }
90e3cdf2 2341
699733f6 2342 names = (char *) (s + count);
90e3cdf2 2343
595da8c5 2344 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2345 {
699733f6 2346 asymbol *sym;
90e3cdf2 2347
595da8c5 2348 while (r < opd->relocation + relcount
699733f6
AM
2349 && r->address < syms[i]->value + opd->vma)
2350 ++r;
90e3cdf2 2351
595da8c5 2352 if (r == opd->relocation + relcount)
699733f6
AM
2353 break;
2354
2355 if (r->address != syms[i]->value + opd->vma)
2356 continue;
2357
2358 if (r->howto->type != R_PPC64_ADDR64)
2359 continue;
90e3cdf2 2360
699733f6
AM
2361 sym = *r->sym_ptr_ptr;
2362 if (!sym_exists_at (syms, opdsymend, symcount,
2363 sym->section->id, sym->value + r->addend))
2364 {
2365 size_t len;
2366
2367 *s = *syms[i];
6ba2a415 2368 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2369 s->section = sym->section;
2370 s->value = sym->value + r->addend;
2371 s->name = names;
2372 *names++ = '.';
2373 len = strlen (syms[i]->name);
2374 memcpy (names, syms[i]->name, len + 1);
2375 names += len + 1;
6f610d07
UW
2376 /* Have udata.p point back to the original symbol this
2377 synthetic symbol was derived from. */
2378 s->udata.p = syms[i];
699733f6
AM
2379 s++;
2380 }
2381 }
2382 }
2383 else
90e3cdf2 2384 {
468392fb 2385 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2386 bfd_byte *contents = NULL;
699733f6 2387 size_t size;
0ccf57bd 2388 size_t plt_count = 0;
468392fb
AM
2389 bfd_vma glink_vma = 0, resolv_vma = 0;
2390 asection *dynamic, *glink = NULL, *relplt = NULL;
2391 arelent *p;
90e3cdf2 2392
ee67d69a 2393 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2394 {
c4b0b099
AM
2395 free_contents_and_exit_err:
2396 count = -1;
ee67d69a 2397 free_contents_and_exit:
699733f6 2398 if (contents)
ee67d69a 2399 free (contents);
c9727e01 2400 goto done;
699733f6 2401 }
90e3cdf2 2402
699733f6
AM
2403 size = 0;
2404 for (i = secsymend; i < opdsymend; ++i)
2405 {
2406 bfd_vma ent;
90e3cdf2 2407
5ef11c02
AM
2408 /* Ignore bogus symbols. */
2409 if (syms[i]->value > opd->size - 8)
2410 continue;
2411
699733f6
AM
2412 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2413 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2414 {
2415 ++count;
2416 size += sizeof (asymbol);
2417 size += strlen (syms[i]->name) + 2;
2418 }
2419 }
90e3cdf2 2420
468392fb 2421 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2422 if (dyn_count != 0
2423 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2424 {
2425 bfd_byte *dynbuf, *extdyn, *extdynend;
2426 size_t extdynsize;
2427 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2428
2429 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2430 goto free_contents_and_exit_err;
468392fb
AM
2431
2432 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2433 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2434
2435 extdyn = dynbuf;
2436 extdynend = extdyn + dynamic->size;
2437 for (; extdyn < extdynend; extdyn += extdynsize)
2438 {
2439 Elf_Internal_Dyn dyn;
2440 (*swap_dyn_in) (abfd, extdyn, &dyn);
2441
2442 if (dyn.d_tag == DT_NULL)
2443 break;
2444
2445 if (dyn.d_tag == DT_PPC64_GLINK)
2446 {
9e390558
AM
2447 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2448 See comment in ppc64_elf_finish_dynamic_sections. */
2449 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2450 /* The .glink section usually does not survive the final
2451 link; search for the section (usually .text) where the
2452 glink stubs now reside. */
2453 glink = bfd_sections_find_if (abfd, section_covers_vma,
2454 &glink_vma);
2455 break;
2456 }
2457 }
2458
2459 free (dynbuf);
2460 }
2461
2462 if (glink != NULL)
2463 {
2464 /* Determine __glink trampoline by reading the relative branch
2465 from the first glink stub. */
2466 bfd_byte buf[4];
b9e5796b
AM
2467 unsigned int off = 0;
2468
2469 while (bfd_get_section_contents (abfd, glink, buf,
2470 glink_vma + off - glink->vma, 4))
468392fb
AM
2471 {
2472 unsigned int insn = bfd_get_32 (abfd, buf);
2473 insn ^= B_DOT;
2474 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2475 {
2cdcc330
AM
2476 resolv_vma
2477 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2478 break;
2479 }
2480 off += 4;
2481 if (off > 4)
2482 break;
468392fb
AM
2483 }
2484
2485 if (resolv_vma)
2486 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2487
066ee829
AM
2488 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2489 if (relplt != NULL)
2490 {
2491 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2492 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2493 goto free_contents_and_exit_err;
68ffbac6 2494
066ee829
AM
2495 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2496 size += plt_count * sizeof (asymbol);
468392fb 2497
066ee829
AM
2498 p = relplt->relocation;
2499 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2500 {
2501 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2502 if (p->addend != 0)
2503 size += sizeof ("+0x") - 1 + 16;
2504 }
066ee829 2505 }
468392fb
AM
2506 }
2507
c4b0b099
AM
2508 if (size == 0)
2509 goto free_contents_and_exit;
699733f6
AM
2510 s = *ret = bfd_malloc (size);
2511 if (s == NULL)
c4b0b099 2512 goto free_contents_and_exit_err;
90e3cdf2 2513
468392fb 2514 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2515
699733f6 2516 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2517 {
699733f6 2518 bfd_vma ent;
90e3cdf2 2519
5ef11c02
AM
2520 if (syms[i]->value > opd->size - 8)
2521 continue;
2522
699733f6
AM
2523 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2524 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2525 {
0ccf57bd 2526 size_t lo, hi;
699733f6 2527 size_t len;
c9727e01 2528 asection *sec = abfd->sections;
90e3cdf2 2529
699733f6
AM
2530 *s = *syms[i];
2531 lo = codesecsym;
2532 hi = codesecsymend;
2533 while (lo < hi)
2534 {
0ccf57bd 2535 size_t mid = (lo + hi) >> 1;
699733f6
AM
2536 if (syms[mid]->section->vma < ent)
2537 lo = mid + 1;
2538 else if (syms[mid]->section->vma > ent)
2539 hi = mid;
2540 else
c9727e01
AM
2541 {
2542 sec = syms[mid]->section;
2543 break;
2544 }
699733f6
AM
2545 }
2546
c9727e01 2547 if (lo >= hi && lo > codesecsym)
699733f6 2548 sec = syms[lo - 1]->section;
699733f6
AM
2549
2550 for (; sec != NULL; sec = sec->next)
2551 {
2552 if (sec->vma > ent)
2553 break;
63524580
JK
2554 /* SEC_LOAD may not be set if SEC is from a separate debug
2555 info file. */
2556 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2557 break;
2558 if ((sec->flags & SEC_CODE) != 0)
2559 s->section = sec;
2560 }
6ba2a415 2561 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2562 s->value = ent - s->section->vma;
2563 s->name = names;
2564 *names++ = '.';
2565 len = strlen (syms[i]->name);
2566 memcpy (names, syms[i]->name, len + 1);
2567 names += len + 1;
6f610d07
UW
2568 /* Have udata.p point back to the original symbol this
2569 synthetic symbol was derived from. */
2570 s->udata.p = syms[i];
699733f6 2571 s++;
90e3cdf2 2572 }
90e3cdf2 2573 }
699733f6 2574 free (contents);
468392fb
AM
2575
2576 if (glink != NULL && relplt != NULL)
2577 {
2578 if (resolv_vma)
2579 {
2580 /* Add a symbol for the main glink trampoline. */
86a4952b 2581 memset (s, 0, sizeof *s);
468392fb 2582 s->the_bfd = abfd;
6ba2a415 2583 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2584 s->section = glink;
2585 s->value = resolv_vma - glink->vma;
2586 s->name = names;
2cdcc330
AM
2587 memcpy (names, "__glink_PLTresolve",
2588 sizeof ("__glink_PLTresolve"));
468392fb
AM
2589 names += sizeof ("__glink_PLTresolve");
2590 s++;
2591 count++;
2592 }
2593
2594 /* FIXME: It would be very much nicer to put sym@plt on the
2595 stub rather than on the glink branch table entry. The
2596 objdump disassembler would then use a sensible symbol
2597 name on plt calls. The difficulty in doing so is
2598 a) finding the stubs, and,
2599 b) matching stubs against plt entries, and,
2600 c) there can be multiple stubs for a given plt entry.
2601
2602 Solving (a) could be done by code scanning, but older
2603 ppc64 binaries used different stubs to current code.
2604 (b) is the tricky one since you need to known the toc
2605 pointer for at least one function that uses a pic stub to
2606 be able to calculate the plt address referenced.
2607 (c) means gdb would need to set multiple breakpoints (or
2608 find the glink branch itself) when setting breakpoints
2609 for pending shared library loads. */
2610 p = relplt->relocation;
2611 for (i = 0; i < plt_count; i++, p++)
2612 {
2613 size_t len;
2614
2615 *s = **p->sym_ptr_ptr;
2616 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2617 we are defining a symbol, ensure one of them is set. */
2618 if ((s->flags & BSF_LOCAL) == 0)
2619 s->flags |= BSF_GLOBAL;
6ba2a415 2620 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2621 s->section = glink;
2622 s->value = glink_vma - glink->vma;
2623 s->name = names;
2624 s->udata.p = NULL;
2625 len = strlen ((*p->sym_ptr_ptr)->name);
2626 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2627 names += len;
e054468f
AM
2628 if (p->addend != 0)
2629 {
2630 memcpy (names, "+0x", sizeof ("+0x") - 1);
2631 names += sizeof ("+0x") - 1;
2632 bfd_sprintf_vma (abfd, names, p->addend);
2633 names += strlen (names);
2634 }
468392fb
AM
2635 memcpy (names, "@plt", sizeof ("@plt"));
2636 names += sizeof ("@plt");
2637 s++;
b9e5796b
AM
2638 if (abi < 2)
2639 {
2640 glink_vma += 8;
2641 if (i >= 0x8000)
2642 glink_vma += 4;
2643 }
2644 else
468392fb
AM
2645 glink_vma += 4;
2646 }
2647 count += plt_count;
2648 }
90e3cdf2
JJ
2649 }
2650
c9727e01 2651 done:
a7535cf3 2652 free (syms);
90e3cdf2
JJ
2653 return count;
2654}
5bd4f169 2655\f
65f38f15
AM
2656/* The following functions are specific to the ELF linker, while
2657 functions above are used generally. Those named ppc64_elf_* are
2658 called by the main ELF linker code. They appear in this file more
2659 or less in the order in which they are called. eg.
2660 ppc64_elf_check_relocs is called early in the link process,
2661 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2662 called.
2663
2664 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2665 functions have both a function code symbol and a function descriptor
2666 symbol. A call to foo in a relocatable object file looks like:
2667
2668 . .text
2669 . x:
2670 . bl .foo
2671 . nop
2672
2673 The function definition in another object file might be:
2674
2675 . .section .opd
2676 . foo: .quad .foo
2677 . .quad .TOC.@tocbase
2678 . .quad 0
2679 .
2680 . .text
2681 . .foo: blr
2682
2683 When the linker resolves the call during a static link, the branch
2684 unsurprisingly just goes to .foo and the .opd information is unused.
2685 If the function definition is in a shared library, things are a little
2686 different: The call goes via a plt call stub, the opd information gets
2687 copied to the plt, and the linker patches the nop.
2688
2689 . x:
2690 . bl .foo_stub
2691 . ld 2,40(1)
2692 .
2693 .
2694 . .foo_stub:
71a39c98
AM
2695 . std 2,40(1) # in practice, the call stub
2696 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2697 . addi 11,11,Lfoo@toc@l # this is the general idea
2698 . ld 12,0(11)
2699 . ld 2,8(11)
2700 . mtctr 12
2701 . ld 11,16(11)
e86ce104
AM
2702 . bctr
2703 .
2704 . .section .plt
2705 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2706
2707 The "reloc ()" notation is supposed to indicate that the linker emits
2708 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2709 copying.
2710
2711 What are the difficulties here? Well, firstly, the relocations
2712 examined by the linker in check_relocs are against the function code
2713 sym .foo, while the dynamic relocation in the plt is emitted against
2714 the function descriptor symbol, foo. Somewhere along the line, we need
2715 to carefully copy dynamic link information from one symbol to the other.
2716 Secondly, the generic part of the elf linker will make .foo a dynamic
2717 symbol as is normal for most other backends. We need foo dynamic
2718 instead, at least for an application final link. However, when
2719 creating a shared library containing foo, we need to have both symbols
2720 dynamic so that references to .foo are satisfied during the early
2721 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2722 definition from some other object, eg. a static library.
2723
2724 Update: As of August 2004, we support a new convention. Function
2725 calls may use the function descriptor symbol, ie. "bl foo". This
2726 behaves exactly as "bl .foo". */
65f38f15 2727
7c8bbca5
AM
2728/* Of those relocs that might be copied as dynamic relocs, this
2729 function selects those that must be copied when linking a shared
2730 library or PIE, even when the symbol is local. */
65f38f15 2731
1d483afe
AM
2732static int
2733must_be_dyn_reloc (struct bfd_link_info *info,
2734 enum elf_ppc64_reloc_type r_type)
2735{
2736 switch (r_type)
2737 {
2738 default:
7c8bbca5
AM
2739 /* Only relative relocs can be resolved when the object load
2740 address isn't fixed. DTPREL64 is excluded because the
2741 dynamic linker needs to differentiate global dynamic from
2742 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2743 return 1;
2744
2745 case R_PPC64_REL32:
2746 case R_PPC64_REL64:
2747 case R_PPC64_REL30:
1bdd8fac
AM
2748 case R_PPC64_TOC16:
2749 case R_PPC64_TOC16_DS:
2750 case R_PPC64_TOC16_LO:
2751 case R_PPC64_TOC16_HI:
2752 case R_PPC64_TOC16_HA:
2753 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2754 return 0;
2755
2756 case R_PPC64_TPREL16:
2757 case R_PPC64_TPREL16_LO:
2758 case R_PPC64_TPREL16_HI:
2759 case R_PPC64_TPREL16_HA:
2760 case R_PPC64_TPREL16_DS:
2761 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2762 case R_PPC64_TPREL16_HIGH:
2763 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2764 case R_PPC64_TPREL16_HIGHER:
2765 case R_PPC64_TPREL16_HIGHERA:
2766 case R_PPC64_TPREL16_HIGHEST:
2767 case R_PPC64_TPREL16_HIGHESTA:
2768 case R_PPC64_TPREL64:
c213164a 2769 case R_PPC64_TPREL34:
7c8bbca5
AM
2770 /* These relocations are relative but in a shared library the
2771 linker doesn't know the thread pointer base. */
2772 return bfd_link_dll (info);
1d483afe
AM
2773 }
2774}
65f38f15 2775
f4656909
AM
2776/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2777 copying dynamic variables from a shared lib into an app's dynbss
2778 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2779 shared lib. With code that gcc generates, it's vital that this be
2780 enabled; In the PowerPC64 ABI, the address of a function is actually
2781 the address of a function descriptor, which resides in the .opd
2782 section. gcc uses the descriptor directly rather than going via the
2783 GOT as some other ABI's do, which means that initialized function
2784 pointers must reference the descriptor. Thus, a function pointer
2785 initialized to the address of a function in a shared library will
2786 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2787 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2788 presents a problem as a plt entry for that function is also
2789 initialized from the function descriptor symbol and the copy reloc
2790 may not be initialized first. */
a23b6845 2791#define ELIMINATE_COPY_RELOCS 1
f4656909 2792
721956f4 2793/* Section name for stubs is the associated section name plus this
29942be8
NC
2794 string. */
2795#define STUB_SUFFIX ".stub"
721956f4
AM
2796
2797/* Linker stubs.
2798 ppc_stub_long_branch:
2799 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2800 destination, but a 24 bit branch in a stub section will reach.
2801 . b dest
2802
2803 ppc_stub_plt_branch:
2804 Similar to the above, but a 24 bit branch in the stub section won't
2805 reach its destination.
71a39c98
AM
2806 . addis %r11,%r2,xxx@toc@ha
2807 . ld %r12,xxx@toc@l(%r11)
2808 . mtctr %r12
721956f4
AM
2809 . bctr
2810
2811 ppc_stub_plt_call:
2c66dc6c
AM
2812 Used to call a function in a shared library. If it so happens that
2813 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2814 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2815 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2816 . addis %r11,%r2,xxx@toc@ha
2817 . ld %r12,xxx+0@toc@l(%r11)
2818 . mtctr %r12
2819 . ld %r2,xxx+8@toc@l(%r11)
2820 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2821 . bctr
ad8e1ba5
AM
2822
2823 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2824 code to adjust the value and save r2 to support multiple toc sections.
2825 A ppc_stub_long_branch with an r2 offset looks like:
2826 . std %r2,40(%r1)
2827 . addis %r2,%r2,off@ha
2828 . addi %r2,%r2,off@l
2829 . b dest
2830
2831 A ppc_stub_plt_branch with an r2 offset looks like:
2832 . std %r2,40(%r1)
71a39c98
AM
2833 . addis %r11,%r2,xxx@toc@ha
2834 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2835 . addis %r2,%r2,off@ha
2836 . addi %r2,%r2,off@l
71a39c98 2837 . mtctr %r12
ad8e1ba5 2838 . bctr
ac2df442 2839
05d0e962
AM
2840 All of the above stubs are shown as their ELFv1 variants. ELFv2
2841 variants exist too, simpler for plt calls since a new toc pointer
2842 and static chain are not loaded by the stub. In addition, ELFv2
2843 has some more complex stubs to handle calls marked with NOTOC
2844 relocs from functions where r2 is not a valid toc pointer. These
2845 come in two flavours, the ones shown below, and _both variants that
2846 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2847 one call is from a function where r2 is used as the toc pointer but
2848 needs a toc adjusting stub for small-model multi-toc, and another
2849 call is from a function where r2 is not valid.
2850 ppc_stub_long_branch_notoc:
2851 . mflr %r12
2852 . bcl 20,31,1f
2853 . 1:
2854 . mflr %r11
2855 . mtlr %r12
2cdcc330
AM
2856 . addis %r12,%r11,dest-1b@ha
2857 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2858 . b dest
2859
2860 ppc_stub_plt_branch_notoc:
2861 . mflr %r12
2862 . bcl 20,31,1f
2863 . 1:
2864 . mflr %r11
2865 . mtlr %r12
2866 . lis %r12,xxx-1b@highest
f891966f 2867 . ori %r12,%r12,xxx-1b@higher
05d0e962 2868 . sldi %r12,%r12,32
f891966f 2869 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2870 . ori %r12,%r12,xxx-1b@l
2871 . add %r12,%r11,%r12
2872 . mtctr %r12
2873 . bctr
2874
2875 ppc_stub_plt_call_notoc:
2876 . mflr %r12
2877 . bcl 20,31,1f
2878 . 1:
2879 . mflr %r11
2880 . mtlr %r12
2881 . lis %r12,xxx-1b@highest
f891966f 2882 . ori %r12,%r12,xxx-1b@higher
05d0e962 2883 . sldi %r12,%r12,32
f891966f 2884 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2885 . ori %r12,%r12,xxx-1b@l
2886 . ldx %r12,%r11,%r12
2887 . mtctr %r12
2888 . bctr
2889
04bdff6a
AM
2890 There are also ELFv1 powerxx variants of these stubs.
2891 ppc_stub_long_branch_notoc:
d4b87b1e 2892 . pla %r12,dest@pcrel
04bdff6a
AM
2893 . b dest
2894 ppc_stub_plt_branch_notoc:
2895 . lis %r11,(dest-1f)@highesta34
2896 . ori %r11,%r11,(dest-1f)@highera34
2897 . sldi %r11,%r11,34
d4b87b1e 2898 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2899 . add %r12,%r11,%r12
2900 . mtctr %r12
2901 . bctr
2902 ppc_stub_plt_call_notoc:
2903 . lis %r11,(xxx-1f)@highesta34
2904 . ori %r11,%r11,(xxx-1f)@highera34
2905 . sldi %r11,%r11,34
d4b87b1e 2906 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2907 . ldx %r12,%r11,%r12
2908 . mtctr %r12
2909 . bctr
2910
05d0e962
AM
2911 In cases where the high instructions would add zero, they are
2912 omitted and following instructions modified in some cases.
04bdff6a
AM
2913 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2914 to
2915 . pld %r12,xxx@pcrel
2916 . mtctr %r12
2917 . bctr
05d0e962
AM
2918
2919 For a given stub group (a set of sections all using the same toc
2920 pointer value) there will be just one stub type used for any
2921 particular function symbol. For example, if printf is called from
2922 code with the tocsave optimization (ie. r2 saved in function
2923 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2924 and from other code without the tocsave optimization requiring a
2925 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2926 type will be created. Calls with the tocsave optimization will
2927 enter this stub after the instruction saving r2. A similar
2928 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2929 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2930 to call an external function like printf. If other calls to printf
2931 require a ppc_stub_plt_call linkage stub then a single
2932 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2933 call. If other calls to printf require a ppc_stub_plt_call_r2save
2934 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2935 be created and calls not requiring r2 to be saved will enter the
2936 stub after the r2 save instruction. There is an analogous
2937 hierarchy of long branch and plt branch stubs for local call
2938 linkage. */
721956f4 2939
2cdcc330
AM
2940enum ppc_stub_type
2941{
721956f4
AM
2942 ppc_stub_none,
2943 ppc_stub_long_branch,
ad8e1ba5 2944 ppc_stub_long_branch_r2off,
05d0e962
AM
2945 ppc_stub_long_branch_notoc,
2946 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2947 ppc_stub_plt_branch,
ad8e1ba5 2948 ppc_stub_plt_branch_r2off,
05d0e962
AM
2949 ppc_stub_plt_branch_notoc,
2950 ppc_stub_plt_branch_both,
794e51c0 2951 ppc_stub_plt_call,
7341d5e2 2952 ppc_stub_plt_call_r2save,
05d0e962
AM
2953 ppc_stub_plt_call_notoc,
2954 ppc_stub_plt_call_both,
a4b6fadd
AM
2955 ppc_stub_global_entry,
2956 ppc_stub_save_res
721956f4
AM
2957};
2958
6f20ed8a
AM
2959/* Information on stub grouping. */
2960struct map_stub
2961{
2962 /* The stub section. */
2963 asection *stub_sec;
2964 /* This is the section to which stubs in the group will be attached. */
2965 asection *link_sec;
a4b6fadd
AM
2966 /* Next group. */
2967 struct map_stub *next;
2968 /* Whether to emit a copy of register save/restore functions in this
2969 group. */
2970 int needs_save_res;
df136d64
AM
2971 /* Current offset within stubs after the insn restoring lr in a
2972 _notoc or _both stub using bcl for pc-relative addressing, or
2973 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2974 unsigned int lr_restore;
2975 /* Accumulated size of EH info emitted to describe return address
2976 if stubs modify lr. Does not include 17 byte FDE header. */
2977 unsigned int eh_size;
2978 /* Offset in glink_eh_frame to the start of EH info for this group. */
2979 unsigned int eh_base;
6f20ed8a
AM
2980};
2981
2cdcc330
AM
2982struct ppc_stub_hash_entry
2983{
721956f4
AM
2984 /* Base hash table entry structure. */
2985 struct bfd_hash_entry root;
2986
ad8e1ba5
AM
2987 enum ppc_stub_type stub_type;
2988
6f20ed8a
AM
2989 /* Group information. */
2990 struct map_stub *group;
721956f4
AM
2991
2992 /* Offset within stub_sec of the beginning of this stub. */
2993 bfd_vma stub_offset;
2994
2995 /* Given the symbol's value and its section we can determine its final
2996 value when building the stubs (so the stub knows where to jump. */
2997 bfd_vma target_value;
2998 asection *target_section;
2999
721956f4
AM
3000 /* The symbol table entry, if any, that this was derived from. */
3001 struct ppc_link_hash_entry *h;
e054468f 3002 struct plt_entry *plt_ent;
721956f4 3003
2d7ad24e
AM
3004 /* Symbol type. */
3005 unsigned char symtype;
3006
6911b7dc
AM
3007 /* Symbol st_other. */
3008 unsigned char other;
721956f4
AM
3009};
3010
2cdcc330
AM
3011struct ppc_branch_hash_entry
3012{
721956f4
AM
3013 /* Base hash table entry structure. */
3014 struct bfd_hash_entry root;
3015
c456f082 3016 /* Offset within branch lookup table. */
721956f4
AM
3017 unsigned int offset;
3018
3019 /* Generation marker. */
3020 unsigned int iter;
3021};
65f38f15 3022
19e08130
AM
3023/* Used to track dynamic relocations for local symbols. */
3024struct ppc_dyn_relocs
3025{
3026 struct ppc_dyn_relocs *next;
3027
3028 /* The input section of the reloc. */
3029 asection *sec;
3030
3031 /* Total number of relocs copied for the input section. */
3032 unsigned int count : 31;
3033
3034 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3035 unsigned int ifunc : 1;
3036};
3037
65f38f15
AM
3038struct ppc_link_hash_entry
3039{
3040 struct elf_link_hash_entry elf;
3041
2cdcc330
AM
3042 union
3043 {
b3fac117
AM
3044 /* A pointer to the most recently used stub hash entry against this
3045 symbol. */
3046 struct ppc_stub_hash_entry *stub_cache;
3047
3048 /* A pointer to the next symbol starting with a '.' */
3049 struct ppc_link_hash_entry *next_dot_sym;
3050 } u;
721956f4 3051
65f38f15 3052 /* Track dynamic relocs copied for this symbol. */
6061a67d 3053 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3054
721956f4 3055 /* Link between function code and descriptor symbols. */
34814b9f 3056 struct ppc_link_hash_entry *oh;
721956f4 3057
e86ce104
AM
3058 /* Flag function code and descriptor symbols. */
3059 unsigned int is_func:1;
3060 unsigned int is_func_descriptor:1;
908b32fc 3061 unsigned int fake:1;
411e1bfb 3062
c5614fa4
AM
3063 /* Whether global opd/toc sym has been adjusted or not.
3064 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3065 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3066 unsigned int adjust_done:1;
3067
a4b6fadd
AM
3068 /* Set if this is an out-of-line register save/restore function,
3069 with non-standard calling convention. */
3070 unsigned int save_res:1;
3071
8b5f1ed8
AM
3072 /* Set if a duplicate symbol with non-zero localentry is detected,
3073 even when the duplicate symbol does not provide a definition. */
3074 unsigned int non_zero_localentry:1;
3075
411e1bfb 3076 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3077 Bits are or'd into the mask as the corresponding relocs are
3078 encountered during check_relocs, with TLS_TLS being set when any
3079 of the other TLS bits are set. tls_optimize clears bits when
3080 optimizing to indicate the corresponding GOT entry type is not
3081 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3082 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3083 These flags are also kept for local symbols. */
3084#define TLS_TLS 1 /* Any TLS reloc. */
3085#define TLS_GD 2 /* GD reloc. */
3086#define TLS_LD 4 /* LD reloc. */
3087#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3088#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3089#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3090#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3091#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3092 unsigned char tls_mask;
37da22e5
AM
3093
3094 /* The above field is also used to mark function symbols. In which
3095 case TLS_TLS will be 0. */
3096#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3097#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3098#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3099};
3100
3101/* ppc64 ELF linker hash table. */
3102
3103struct ppc_link_hash_table
3104{
3105 struct elf_link_hash_table elf;
3106
721956f4
AM
3107 /* The stub hash table. */
3108 struct bfd_hash_table stub_hash_table;
3109
3110 /* Another hash table for plt_branch stubs. */
3111 struct bfd_hash_table branch_hash_table;
3112
3b421ab3
AM
3113 /* Hash table for function prologue tocsave. */
3114 htab_t tocsave_htab;
3115
e7d1c40c
AM
3116 /* Various options and other info passed from the linker. */
3117 struct ppc64_elf_params *params;
721956f4 3118
6f20ed8a
AM
3119 /* The size of sec_info below. */
3120 unsigned int sec_info_arr_size;
3121
3122 /* Per-section array of extra section info. Done this way rather
3123 than as part of ppc64_elf_section_data so we have the info for
3124 non-ppc64 sections. */
3125 struct
3126 {
3127 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3128 bfd_vma toc_off;
6f20ed8a
AM
3129
3130 union
3131 {
3132 /* The section group that this section belongs to. */
3133 struct map_stub *group;
3134 /* A temp section list pointer. */
3135 asection *list;
3136 } u;
3137 } *sec_info;
721956f4 3138
a4b6fadd
AM
3139 /* Linked list of groups. */
3140 struct map_stub *group;
3141
ad8e1ba5
AM
3142 /* Temp used when calculating TOC pointers. */
3143 bfd_vma toc_curr;
bf102f86
AM
3144 bfd *toc_bfd;
3145 asection *toc_first_sec;
ad8e1ba5 3146
b3fac117
AM
3147 /* Used when adding symbols. */
3148 struct ppc_link_hash_entry *dot_syms;
3149
33e44f2e 3150 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3151 asection *glink;
9e390558 3152 asection *global_entry;
82bd7b59 3153 asection *sfpr;
2d7ad24e
AM
3154 asection *pltlocal;
3155 asection *relpltlocal;
4ce794b7
AM
3156 asection *brlt;
3157 asection *relbrlt;
58d180e8 3158 asection *glink_eh_frame;
ec338859 3159
8387904d
AM
3160 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3161 struct ppc_link_hash_entry *tls_get_addr;
3162 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3163
927be08e
AM
3164 /* The size of reliplt used by got entry relocs. */
3165 bfd_size_type got_reli_size;
3166
9b5ecbd0 3167 /* Statistics. */
7341d5e2 3168 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3169
ee75fd95
AM
3170 /* Number of stubs against global syms. */
3171 unsigned long stub_globals;
3172
ee67d69a
AM
3173 /* Set if we're linking code with function descriptors. */
3174 unsigned int opd_abi:1;
3175
4c52953f 3176 /* Support for multiple toc sections. */
33c0ec9d 3177 unsigned int do_multi_toc:1;
4c52953f 3178 unsigned int multi_toc_needed:1;
927be08e 3179 unsigned int second_toc_pass:1;
67f0cbdb 3180 unsigned int do_toc_opt:1;
4c52953f 3181
9a23f96e
AM
3182 /* Set if tls optimization is enabled. */
3183 unsigned int do_tls_opt:1;
3184
3e04d765
AM
3185 /* Set if inline plt calls should be converted to direct calls. */
3186 unsigned int can_convert_all_inline_plt:1;
3187
5d1634d7 3188 /* Set on error. */
99877b66 3189 unsigned int stub_error:1;
721956f4 3190
8c5b4e52
AM
3191 /* Whether func_desc_adjust needs to be run over symbols. */
3192 unsigned int need_func_desc_adj:1;
721956f4 3193
82e66161
AM
3194 /* Whether there exist local gnu indirect function resolvers,
3195 referenced by dynamic relocations. */
3196 unsigned int local_ifunc_resolver:1;
3197 unsigned int maybe_local_ifunc_resolver:1;
3198
f378ab09
AM
3199 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3200 unsigned int has_plt_localentry0:1;
3201
5663e321
AM
3202 /* Whether calls are made via the PLT from NOTOC functions. */
3203 unsigned int notoc_plt:1;
3204
04bdff6a
AM
3205 /* Whether to use powerxx instructions in linkage stubs. */
3206 unsigned int powerxx_stubs:1;
3207
721956f4
AM
3208 /* Incremented every time we size stubs. */
3209 unsigned int stub_iteration;
5d1634d7 3210
87d72d41
AM
3211 /* Small local sym cache. */
3212 struct sym_cache sym_cache;
65f38f15
AM
3213};
3214
4c52953f
AM
3215/* Rename some of the generic section flags to better document how they
3216 are used here. */
b0dddeec
AM
3217
3218/* Nonzero if this section has TLS related relocations. */
3219#define has_tls_reloc sec_flg0
3220
9737e8af
AM
3221/* Nonzero if this section has a call to __tls_get_addr lacking marker
3222 relocations. */
3223#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3224
3225/* Nonzero if this section has any toc or got relocs. */
3226#define has_toc_reloc sec_flg2
3227
3228/* Nonzero if this section has a call to another section that uses
3229 the toc or got. */
d77c8a4b 3230#define makes_toc_func_call sec_flg3
b0dddeec
AM
3231
3232/* Recursion protection when determining above flag. */
d77c8a4b 3233#define call_check_in_progress sec_flg4
70cc837d 3234#define call_check_done sec_flg5
4c52953f 3235
65f38f15
AM
3236/* Get the ppc64 ELF linker hash table from a link_info structure. */
3237
3238#define ppc_hash_table(p) \
4dfe6ac6
NC
3239 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3240 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3241
721956f4
AM
3242#define ppc_stub_hash_lookup(table, string, create, copy) \
3243 ((struct ppc_stub_hash_entry *) \
3244 bfd_hash_lookup ((table), (string), (create), (copy)))
3245
3246#define ppc_branch_hash_lookup(table, string, create, copy) \
3247 ((struct ppc_branch_hash_entry *) \
3248 bfd_hash_lookup ((table), (string), (create), (copy)))
3249
3250/* Create an entry in the stub hash table. */
3251
3252static struct bfd_hash_entry *
4ce794b7
AM
3253stub_hash_newfunc (struct bfd_hash_entry *entry,
3254 struct bfd_hash_table *table,
3255 const char *string)
721956f4
AM
3256{
3257 /* Allocate the structure if it has not already been allocated by a
3258 subclass. */
3259 if (entry == NULL)
3260 {
3261 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3262 if (entry == NULL)
3263 return entry;
3264 }
3265
3266 /* Call the allocation method of the superclass. */
3267 entry = bfd_hash_newfunc (entry, table, string);
3268 if (entry != NULL)
3269 {
3270 struct ppc_stub_hash_entry *eh;
3271
3272 /* Initialize the local fields. */
3273 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3274 eh->stub_type = ppc_stub_none;
6f20ed8a 3275 eh->group = NULL;
721956f4
AM
3276 eh->stub_offset = 0;
3277 eh->target_value = 0;
3278 eh->target_section = NULL;
721956f4 3279 eh->h = NULL;
6911b7dc 3280 eh->plt_ent = NULL;
6911b7dc 3281 eh->other = 0;
721956f4
AM
3282 }
3283
3284 return entry;
3285}
3286
3287/* Create an entry in the branch hash table. */
3288
3289static struct bfd_hash_entry *
4ce794b7
AM
3290branch_hash_newfunc (struct bfd_hash_entry *entry,
3291 struct bfd_hash_table *table,
3292 const char *string)
721956f4
AM
3293{
3294 /* Allocate the structure if it has not already been allocated by a
3295 subclass. */
3296 if (entry == NULL)
3297 {
3298 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3299 if (entry == NULL)
3300 return entry;
3301 }
3302
3303 /* Call the allocation method of the superclass. */
3304 entry = bfd_hash_newfunc (entry, table, string);
3305 if (entry != NULL)
3306 {
3307 struct ppc_branch_hash_entry *eh;
3308
3309 /* Initialize the local fields. */
3310 eh = (struct ppc_branch_hash_entry *) entry;
3311 eh->offset = 0;
3312 eh->iter = 0;
3313 }
3314
3315 return entry;
3316}
3317
65f38f15
AM
3318/* Create an entry in a ppc64 ELF linker hash table. */
3319
3320static struct bfd_hash_entry *
4ce794b7
AM
3321link_hash_newfunc (struct bfd_hash_entry *entry,
3322 struct bfd_hash_table *table,
3323 const char *string)
65f38f15
AM
3324{
3325 /* Allocate the structure if it has not already been allocated by a
3326 subclass. */
3327 if (entry == NULL)
3328 {
3329 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3330 if (entry == NULL)
3331 return entry;
3332 }
3333
3334 /* Call the allocation method of the superclass. */
3335 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3336 if (entry != NULL)
3337 {
3338 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3339
b3fac117 3340 memset (&eh->u.stub_cache, 0,
908b32fc 3341 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3342 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3343
3344 /* When making function calls, old ABI code references function entry
3345 points (dot symbols), while new ABI code references the function
3346 descriptor symbol. We need to make any combination of reference and
3347 definition work together, without breaking archive linking.
3348
3349 For a defined function "foo" and an undefined call to "bar":
3350 An old object defines "foo" and ".foo", references ".bar" (possibly
3351 "bar" too).
3352 A new object defines "foo" and references "bar".
3353
3354 A new object thus has no problem with its undefined symbols being
3355 satisfied by definitions in an old object. On the other hand, the
3356 old object won't have ".bar" satisfied by a new object.
3357
3358 Keep a list of newly added dot-symbols. */
3359
3360 if (string[0] == '.')
3361 {
3362 struct ppc_link_hash_table *htab;
3363
3364 htab = (struct ppc_link_hash_table *) table;
3365 eh->u.next_dot_sym = htab->dot_syms;
3366 htab->dot_syms = eh;
3367 }
65f38f15
AM
3368 }
3369
3370 return entry;
3371}
3372
2cdcc330
AM
3373struct tocsave_entry
3374{
3b421ab3
AM
3375 asection *sec;
3376 bfd_vma offset;
3377};
3378
3379static hashval_t
3380tocsave_htab_hash (const void *p)
3381{
3382 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3383 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3384}
3385
3386static int
3387tocsave_htab_eq (const void *p1, const void *p2)
3388{
3389 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3390 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3391 return e1->sec == e2->sec && e1->offset == e2->offset;
3392}
3393
68faa637
AM
3394/* Destroy a ppc64 ELF linker hash table. */
3395
3396static void
d495ab0d 3397ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3398{
d495ab0d 3399 struct ppc_link_hash_table *htab;
68faa637 3400
d495ab0d 3401 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3402 if (htab->tocsave_htab)
3403 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3404 bfd_hash_table_free (&htab->branch_hash_table);
3405 bfd_hash_table_free (&htab->stub_hash_table);
3406 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3407}
3408
65f38f15
AM
3409/* Create a ppc64 ELF linker hash table. */
3410
3411static struct bfd_link_hash_table *
4ce794b7 3412ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3413{
3414 struct ppc_link_hash_table *htab;
3415 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3416
4ce794b7 3417 htab = bfd_zmalloc (amt);
65f38f15
AM
3418 if (htab == NULL)
3419 return NULL;
3420
66eb6687 3421 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3422 sizeof (struct ppc_link_hash_entry),
3423 PPC64_ELF_DATA))
65f38f15 3424 {
e2d34d7d 3425 free (htab);
65f38f15
AM
3426 return NULL;
3427 }
3428
721956f4 3429 /* Init the stub hash table too. */
66eb6687
AM
3430 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3431 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3432 {
d495ab0d 3433 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3434 return NULL;
3435 }
721956f4
AM
3436
3437 /* And the branch hash table. */
66eb6687
AM
3438 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3439 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3440 {
3441 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3442 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3443 return NULL;
3444 }
721956f4 3445
3b421ab3
AM
3446 htab->tocsave_htab = htab_try_create (1024,
3447 tocsave_htab_hash,
3448 tocsave_htab_eq,
3449 NULL);
3450 if (htab->tocsave_htab == NULL)
2915c55b 3451 {
d495ab0d 3452 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3453 return NULL;
3454 }
d495ab0d 3455 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3456
3254fd24
AM
3457 /* Initializing two fields of the union is just cosmetic. We really
3458 only care about glist, but when compiled on a 32-bit host the
3459 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3460 debugger inspection of these fields look nicer. */
a6aa5195
AM
3461 htab->elf.init_got_refcount.refcount = 0;
3462 htab->elf.init_got_refcount.glist = NULL;
3463 htab->elf.init_plt_refcount.refcount = 0;
3464 htab->elf.init_plt_refcount.glist = NULL;
3465 htab->elf.init_got_offset.offset = 0;
3466 htab->elf.init_got_offset.glist = NULL;
3467 htab->elf.init_plt_offset.offset = 0;
3468 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3469
65f38f15
AM
3470 return &htab->elf.root;
3471}
3472
bfeb4a28
AM
3473/* Create sections for linker generated code. */
3474
3475static bfd_boolean
3476create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3477{
3478 struct ppc_link_hash_table *htab;
3479 flagword flags;
3480
3481 htab = ppc_hash_table (info);
3482
bfeb4a28
AM
3483 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3484 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3485 if (htab->params->save_restore_funcs)
3486 {
3487 /* Create .sfpr for code to save and restore fp regs. */
3488 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3489 flags);
3490 if (htab->sfpr == NULL
fd361982 3491 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3492 return FALSE;
3493 }
3494
3495 if (bfd_link_relocatable (info))
3496 return TRUE;
bfeb4a28
AM
3497
3498 /* Create .glink for lazy dynamic linking support. */
3499 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3500 flags);
3501 if (htab->glink == NULL
fd361982 3502 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3503 return FALSE;
3504
9e390558
AM
3505 /* The part of .glink used by global entry stubs, separate so that
3506 it can be aligned appropriately without affecting htab->glink. */
3507 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3508 flags);
3509 if (htab->global_entry == NULL
fd361982 3510 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3511 return FALSE;
3512
bfeb4a28
AM
3513 if (!info->no_ld_generated_unwind_info)
3514 {
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3516 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3518 ".eh_frame",
3519 flags);
3520 if (htab->glink_eh_frame == NULL
fd361982 3521 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3522 return FALSE;
3523 }
3524
3525 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3526 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3527 if (htab->elf.iplt == NULL
fd361982 3528 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3529 return FALSE;
3530
3531 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3532 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3533 htab->elf.irelplt
3534 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3535 if (htab->elf.irelplt == NULL
fd361982 3536 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3537 return FALSE;
3538
3539 /* Create branch lookup table for plt_branch stubs. */
3540 flags = (SEC_ALLOC | SEC_LOAD
3541 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3542 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3543 flags);
3544 if (htab->brlt == NULL
fd361982 3545 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3546 return FALSE;
3547
2d7ad24e
AM
3548 /* Local plt entries, put in .branch_lt but a separate section for
3549 convenience. */
3550 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3551 flags);
3552 if (htab->pltlocal == NULL
fd361982 3553 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3554 return FALSE;
3555
0e1862bb 3556 if (!bfd_link_pic (info))
bfeb4a28
AM
3557 return TRUE;
3558
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3560 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3561 htab->relbrlt
3562 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3563 if (htab->relbrlt == NULL
fd361982 3564 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3565 return FALSE;
3566
2d7ad24e
AM
3567 htab->relpltlocal
3568 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3569 if (htab->relpltlocal == NULL
fd361982 3570 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3571 return FALSE;
3572
bfeb4a28
AM
3573 return TRUE;
3574}
3575
e717da7e
AM
3576/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3577
bfeb4a28 3578bfd_boolean
e7d1c40c
AM
3579ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3580 struct ppc64_elf_params *params)
e717da7e
AM
3581{
3582 struct ppc_link_hash_table *htab;
3583
e7d1c40c 3584 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3585
3586/* Always hook our dynamic sections into the first bfd, which is the
3587 linker created stub bfd. This ensures that the GOT header is at
3588 the start of the output TOC section. */
3589 htab = ppc_hash_table (info);
e7d1c40c
AM
3590 htab->elf.dynobj = params->stub_bfd;
3591 htab->params = params;
bfeb4a28 3592
bfeb4a28 3593 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3594}
3595
721956f4
AM
3596/* Build a name for an entry in the stub hash table. */
3597
3598static char *
4ce794b7
AM
3599ppc_stub_name (const asection *input_section,
3600 const asection *sym_sec,
3601 const struct ppc_link_hash_entry *h,
3602 const Elf_Internal_Rela *rel)
721956f4
AM
3603{
3604 char *stub_name;
bcaa2f82 3605 ssize_t len;
721956f4
AM
3606
3607 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3608 offsets from a sym as a branch target? In fact, we could
3609 probably assume the addend is always zero. */
3610 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3611
3612 if (h)
3613 {
3614 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3615 stub_name = bfd_malloc (len);
46de2a7c
AM
3616 if (stub_name == NULL)
3617 return stub_name;
3618
bcaa2f82
AM
3619 len = sprintf (stub_name, "%08x.%s+%x",
3620 input_section->id & 0xffffffff,
3621 h->elf.root.root.string,
3622 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3623 }
3624 else
3625 {
ad8e1ba5 3626 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3627 stub_name = bfd_malloc (len);
46de2a7c
AM
3628 if (stub_name == NULL)
3629 return stub_name;
3630
bcaa2f82
AM
3631 len = sprintf (stub_name, "%08x.%x:%x+%x",
3632 input_section->id & 0xffffffff,
3633 sym_sec->id & 0xffffffff,
3634 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3635 (int) rel->r_addend & 0xffffffff);
721956f4 3636 }
bcaa2f82 3637 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3638 stub_name[len - 2] = 0;
721956f4
AM
3639 return stub_name;
3640}
3641
3642/* Look up an entry in the stub hash. Stub entries are cached because
3643 creating the stub name takes a bit of time. */
3644
3645static struct ppc_stub_hash_entry *
4ce794b7
AM
3646ppc_get_stub_entry (const asection *input_section,
3647 const asection *sym_sec,
039b3fef 3648 struct ppc_link_hash_entry *h,
4ce794b7
AM
3649 const Elf_Internal_Rela *rel,
3650 struct ppc_link_hash_table *htab)
721956f4
AM
3651{
3652 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3653 struct map_stub *group;
721956f4
AM
3654
3655 /* If this input section is part of a group of sections sharing one
3656 stub section, then use the id of the first section in the group.
3657 Stub names need to include a section id, as there may well be
3658 more than one stub used to reach say, printf, and we need to
3659 distinguish between them. */
6f20ed8a 3660 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3661 if (group == NULL)
3662 return NULL;
721956f4 3663
b3fac117
AM
3664 if (h != NULL && h->u.stub_cache != NULL
3665 && h->u.stub_cache->h == h
6f20ed8a 3666 && h->u.stub_cache->group == group)
721956f4 3667 {
b3fac117 3668 stub_entry = h->u.stub_cache;
721956f4
AM
3669 }
3670 else
3671 {
3672 char *stub_name;
3673
6f20ed8a 3674 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3675 if (stub_name == NULL)
3676 return NULL;
3677
3678 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3679 stub_name, FALSE, FALSE);
721956f4 3680 if (h != NULL)
b3fac117 3681 h->u.stub_cache = stub_entry;
721956f4
AM
3682
3683 free (stub_name);
3684 }
3685
3686 return stub_entry;
3687}
3688
3689/* Add a new stub entry to the stub hash. Not all fields of the new
3690 stub entry are initialised. */
3691
3692static struct ppc_stub_hash_entry *
4ce794b7
AM
3693ppc_add_stub (const char *stub_name,
3694 asection *section,
25f53a85 3695 struct bfd_link_info *info)
721956f4 3696{
25f53a85 3697 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3698 struct map_stub *group;
721956f4
AM
3699 asection *link_sec;
3700 asection *stub_sec;
3701 struct ppc_stub_hash_entry *stub_entry;
3702
6f20ed8a
AM
3703 group = htab->sec_info[section->id].u.group;
3704 link_sec = group->link_sec;
3705 stub_sec = group->stub_sec;
721956f4
AM
3706 if (stub_sec == NULL)
3707 {
6f20ed8a
AM
3708 size_t namelen;
3709 bfd_size_type len;
3710 char *s_name;
721956f4 3711
6f20ed8a
AM
3712 namelen = strlen (link_sec->name);
3713 len = namelen + sizeof (STUB_SUFFIX);
3714 s_name = bfd_alloc (htab->params->stub_bfd, len);
3715 if (s_name == NULL)
3716 return NULL;
721956f4 3717
6f20ed8a
AM
3718 memcpy (s_name, link_sec->name, namelen);
3719 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3720 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3721 if (stub_sec == NULL)
3722 return NULL;
3723 group->stub_sec = stub_sec;
721956f4
AM
3724 }
3725
3726 /* Enter this entry into the linker stub hash table. */
3727 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3728 TRUE, FALSE);
721956f4
AM
3729 if (stub_entry == NULL)
3730 {
695344c0 3731 /* xgettext:c-format */
cf97bcb0
AM
3732 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3733 section->owner, stub_name);
721956f4
AM
3734 return NULL;
3735 }
3736
6f20ed8a 3737 stub_entry->group = group;
721956f4 3738 stub_entry->stub_offset = 0;
721956f4
AM
3739 return stub_entry;
3740}
3741
e717da7e
AM
3742/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3743 not already done. */
65f38f15 3744
b34976b6 3745static bfd_boolean
e717da7e 3746create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3747{
e717da7e
AM
3748 asection *got, *relgot;
3749 flagword flags;
3750 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3751
0c8d6e5c 3752 if (!is_ppc64_elf (abfd))
0ffa91dd 3753 return FALSE;
4dfe6ac6
NC
3754 if (htab == NULL)
3755 return FALSE;
0ffa91dd 3756
33e44f2e
AM
3757 if (!htab->elf.sgot
3758 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3759 return FALSE;
e717da7e
AM
3760
3761 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3762 | SEC_LINKER_CREATED);
3763
c456f082 3764 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3765 if (!got
fd361982 3766 || !bfd_set_section_alignment (got, 3))
e717da7e 3767 return FALSE;
65f38f15 3768
c456f082
AM
3769 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3770 flags | SEC_READONLY);
e717da7e 3771 if (!relgot
fd361982 3772 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3773 return FALSE;
e717da7e
AM
3774
3775 ppc64_elf_tdata (abfd)->got = got;
3776 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3777 return TRUE;
65f38f15 3778}
5bd4f169 3779
b31867b6
AM
3780/* Follow indirect and warning symbol links. */
3781
3782static inline struct bfd_link_hash_entry *
3783follow_link (struct bfd_link_hash_entry *h)
3784{
3785 while (h->type == bfd_link_hash_indirect
3786 || h->type == bfd_link_hash_warning)
3787 h = h->u.i.link;
3788 return h;
3789}
3790
3791static inline struct elf_link_hash_entry *
3792elf_follow_link (struct elf_link_hash_entry *h)
3793{
3794 return (struct elf_link_hash_entry *) follow_link (&h->root);
3795}
3796
3797static inline struct ppc_link_hash_entry *
3798ppc_follow_link (struct ppc_link_hash_entry *h)
3799{
3800 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3801}
3802
40d16e0b
AM
3803/* Merge PLT info on FROM with that on TO. */
3804
3805static void
3806move_plt_plist (struct ppc_link_hash_entry *from,
3807 struct ppc_link_hash_entry *to)
3808{
3809 if (from->elf.plt.plist != NULL)
3810 {
3811 if (to->elf.plt.plist != NULL)
3812 {
3813 struct plt_entry **entp;
3814 struct plt_entry *ent;
3815
3816 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3817 {
3818 struct plt_entry *dent;
3819
3820 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3821 if (dent->addend == ent->addend)
3822 {
3823 dent->plt.refcount += ent->plt.refcount;
3824 *entp = ent->next;
3825 break;
3826 }
3827 if (dent == NULL)
3828 entp = &ent->next;
3829 }
3830 *entp = to->elf.plt.plist;
3831 }
3832
3833 to->elf.plt.plist = from->elf.plt.plist;
3834 from->elf.plt.plist = NULL;
3835 }
3836}
3837
65f38f15
AM
3838/* Copy the extra info we tack onto an elf_link_hash_entry. */
3839
3840static void
fcfa13d2
AM
3841ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3842 struct elf_link_hash_entry *dir,
3843 struct elf_link_hash_entry *ind)
65f38f15
AM
3844{
3845 struct ppc_link_hash_entry *edir, *eind;
3846
3847 edir = (struct ppc_link_hash_entry *) dir;
3848 eind = (struct ppc_link_hash_entry *) ind;
3849
c79d6685
AM
3850 edir->is_func |= eind->is_func;
3851 edir->is_func_descriptor |= eind->is_func_descriptor;
3852 edir->tls_mask |= eind->tls_mask;
3853 if (eind->oh != NULL)
3854 edir->oh = ppc_follow_link (eind->oh);
3855
474436e6 3856 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3857 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3858 edir->elf.ref_regular |= eind->elf.ref_regular;
3859 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3860 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3861 edir->elf.needs_plt |= eind->elf.needs_plt;
3862 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3863
d311bc8b
AM
3864 /* If we were called to copy over info for a weak sym, don't copy
3865 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3866 in order to simplify readonly_dynrelocs and save a field in the
3867 symbol hash entry, but that means dyn_relocs can't be used in any
3868 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3869 are then tested. */
d311bc8b 3870 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3871 return;
d311bc8b 3872
411e1bfb 3873 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3874 if (eind->dyn_relocs != NULL)
65f38f15 3875 {
bbd7ec4a
AM
3876 if (edir->dyn_relocs != NULL)
3877 {
6061a67d
AM
3878 struct elf_dyn_relocs **pp;
3879 struct elf_dyn_relocs *p;
bbd7ec4a 3880
fcfa13d2 3881 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3882 list. Merge any entries against the same section. */
3883 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3884 {
6061a67d 3885 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3886
3887 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3888 if (q->sec == p->sec)
3889 {
3890 q->pc_count += p->pc_count;
3891 q->count += p->count;
3892 *pp = p->next;
3893 break;
3894 }
3895 if (q == NULL)
3896 pp = &p->next;
3897 }
3898 *pp = edir->dyn_relocs;
3899 }
3900
65f38f15
AM
3901 edir->dyn_relocs = eind->dyn_relocs;
3902 eind->dyn_relocs = NULL;
3903 }
65f38f15 3904
81848ca0
AM
3905 /* Copy over got entries that we may have already seen to the
3906 symbol which just became indirect. */
411e1bfb
AM
3907 if (eind->elf.got.glist != NULL)
3908 {
3909 if (edir->elf.got.glist != NULL)
3910 {
3911 struct got_entry **entp;
3912 struct got_entry *ent;
3913
3914 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3915 {
3916 struct got_entry *dent;
3917
3918 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3919 if (dent->addend == ent->addend
e717da7e 3920 && dent->owner == ent->owner
411e1bfb
AM
3921 && dent->tls_type == ent->tls_type)
3922 {
3923 dent->got.refcount += ent->got.refcount;
3924 *entp = ent->next;
3925 break;
3926 }
3927 if (dent == NULL)
3928 entp = &ent->next;
3929 }
3930 *entp = edir->elf.got.glist;
3931 }
3932
3933 edir->elf.got.glist = eind->elf.got.glist;
3934 eind->elf.got.glist = NULL;
3935 }
3936
3937 /* And plt entries. */
40d16e0b 3938 move_plt_plist (eind, edir);
411e1bfb 3939
fcfa13d2 3940 if (eind->elf.dynindx != -1)
411e1bfb 3941 {
fcfa13d2
AM
3942 if (edir->elf.dynindx != -1)
3943 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3944 edir->elf.dynstr_index);
411e1bfb
AM
3945 edir->elf.dynindx = eind->elf.dynindx;
3946 edir->elf.dynstr_index = eind->elf.dynstr_index;
3947 eind->elf.dynindx = -1;
3948 eind->elf.dynstr_index = 0;
3949 }
411e1bfb
AM
3950}
3951
8387904d
AM
3952/* Find the function descriptor hash entry from the given function code
3953 hash entry FH. Link the entries via their OH fields. */
3954
3955static struct ppc_link_hash_entry *
b31867b6 3956lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3957{
3958 struct ppc_link_hash_entry *fdh = fh->oh;
3959
3960 if (fdh == NULL)
3961 {
3962 const char *fd_name = fh->elf.root.root.string + 1;
3963
3964 fdh = (struct ppc_link_hash_entry *)
3965 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3966 if (fdh == NULL)
3967 return fdh;
3968
3969 fdh->is_func_descriptor = 1;
3970 fdh->oh = fh;
3971 fh->is_func = 1;
3972 fh->oh = fdh;
8387904d
AM
3973 }
3974
8c5b4e52
AM
3975 fdh = ppc_follow_link (fdh);
3976 fdh->is_func_descriptor = 1;
3977 fdh->oh = fh;
3978 return fdh;
8387904d
AM
3979}
3980
8c5b4e52 3981/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3982
3983static struct ppc_link_hash_entry *
3984make_fdh (struct bfd_link_info *info,
908b32fc 3985 struct ppc_link_hash_entry *fh)
bb700d78 3986{
8c5b4e52
AM
3987 bfd *abfd = fh->elf.root.u.undef.abfd;
3988 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3989 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3990 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3991 ? BSF_WEAK
3992 : BSF_GLOBAL);
3993
3994 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3995 fh->elf.root.root.string + 1,
3996 flags, bfd_und_section_ptr, 0,
3997 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3998 return NULL;
3999
4000 fdh = (struct ppc_link_hash_entry *) bh;
4001 fdh->elf.non_elf = 0;
908b32fc
AM
4002 fdh->fake = 1;
4003 fdh->is_func_descriptor = 1;
4004 fdh->oh = fh;
4005 fh->is_func = 1;
4006 fh->oh = fdh;
bb700d78
AM
4007 return fdh;
4008}
4009
8387904d
AM
4010/* Fix function descriptor symbols defined in .opd sections to be
4011 function type. */
555cd476
AM
4012
4013static bfd_boolean
c16153ae 4014ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4015 struct bfd_link_info *info,
555cd476 4016 Elf_Internal_Sym *isym,
6911b7dc 4017 const char **name,
555cd476
AM
4018 flagword *flags ATTRIBUTE_UNUSED,
4019 asection **sec,
b53dfeb2 4020 bfd_vma *value)
555cd476 4021{
b53dfeb2 4022 if (*sec != NULL
f1885d1e 4023 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4024 {
4025 asection *code_sec;
4026
4027 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4028 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4029 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4030
4031 /* If the symbol is a function defined in .opd, and the function
4032 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4033 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4034 && (*sec)->reloc_count != 0
4035 && opd_entry_value (*sec, *value, &code_sec, NULL,
4036 FALSE) != (bfd_vma) -1
4037 && discarded_section (code_sec))
4038 {
4039 *sec = bfd_und_section_ptr;
4040 isym->st_shndx = SHN_UNDEF;
4041 }
4042 }
dbd1e97e
AM
4043 else if (*sec != NULL
4044 && strcmp ((*sec)->name, ".toc") == 0
4045 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4046 {
4047 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4048 if (htab != NULL)
4049 htab->params->object_in_toc = 1;
4050 }
433817dd 4051
6911b7dc
AM
4052 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4053 {
4054 if (abiversion (ibfd) == 0)
4055 set_abiversion (ibfd, 2);
4056 else if (abiversion (ibfd) == 1)
4057 {
cf97bcb0
AM
4058 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4059 " for ABI version 1"), *name);
6911b7dc
AM
4060 bfd_set_error (bfd_error_bad_value);
4061 return FALSE;
4062 }
4063 }
4064
555cd476
AM
4065 return TRUE;
4066}
4067
6911b7dc
AM
4068/* Merge non-visibility st_other attributes: local entry point. */
4069
4070static void
4071ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4072 const Elf_Internal_Sym *isym,
4073 bfd_boolean definition,
4074 bfd_boolean dynamic)
4075{
f378ab09 4076 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4077 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4078 | ELF_ST_VISIBILITY (h->other));
4079}
4080
8c5b4e52
AM
4081/* Hook called on merging a symbol. We use this to clear "fake" since
4082 we now have a real symbol. */
4083
4084static bfd_boolean
4085ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4086 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4087 asection **psec ATTRIBUTE_UNUSED,
4088 bfd_boolean newdef ATTRIBUTE_UNUSED,
4089 bfd_boolean olddef ATTRIBUTE_UNUSED,
4090 bfd *oldbfd ATTRIBUTE_UNUSED,
4091 const asection *oldsec ATTRIBUTE_UNUSED)
4092{
4093 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
4094 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4095 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
4096 return TRUE;
4097}
4098
8387904d 4099/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4100 inclusion of a new ABI object archive that defines "bar".
4101 NAME is a symbol defined in an archive. Return a symbol in the hash
4102 table that might be satisfied by the archive symbols. */
8387904d
AM
4103
4104static struct elf_link_hash_entry *
4105ppc64_elf_archive_symbol_lookup (bfd *abfd,
4106 struct bfd_link_info *info,
4107 const char *name)
4108{
4109 struct elf_link_hash_entry *h;
4110 char *dot_name;
4111 size_t len;
4112
4113 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4114 if (h != NULL
4115 /* Don't return this sym if it is a fake function descriptor
4116 created by add_symbol_adjust. */
8c5b4e52 4117 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
4118 return h;
4119
4120 if (name[0] == '.')
4121 return h;
4122
4123 len = strlen (name);
4124 dot_name = bfd_alloc (abfd, len + 2);
4125 if (dot_name == NULL)
e99955cd 4126 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4127 dot_name[0] = '.';
4128 memcpy (dot_name + 1, name, len + 1);
4129 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4130 bfd_release (abfd, dot_name);
4131 return h;
4132}
4133
4134/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4135 new ABI object defines "bar". Well, at least, undefined dot symbols
4136 are made weak. This stops later archive searches from including an
4137 object if we already have a function descriptor definition. It also
35b0ce59
AM
4138 prevents the linker complaining about undefined symbols.
4139 We also check and correct mismatched symbol visibility here. The
4140 most restrictive visibility of the function descriptor and the
4141 function entry symbol is used. */
8387904d
AM
4142
4143static bfd_boolean
b3fac117 4144add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4145{
8387904d
AM
4146 struct ppc_link_hash_table *htab;
4147 struct ppc_link_hash_entry *fdh;
4148
b3fac117
AM
4149 if (eh->elf.root.type == bfd_link_hash_warning)
4150 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4151
8400d40d
AM
4152 if (eh->elf.root.type == bfd_link_hash_indirect)
4153 return TRUE;
4154
b3fac117
AM
4155 if (eh->elf.root.root.string[0] != '.')
4156 abort ();
8387904d 4157
b3fac117 4158 htab = ppc_hash_table (info);
4dfe6ac6
NC
4159 if (htab == NULL)
4160 return FALSE;
4161
b31867b6 4162 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4163 if (fdh == NULL
4164 && !bfd_link_relocatable (info)
4165 && (eh->elf.root.type == bfd_link_hash_undefined
4166 || eh->elf.root.type == bfd_link_hash_undefweak)
4167 && eh->elf.ref_regular)
4168 {
4169 /* Make an undefined function descriptor sym, in order to
4170 pull in an --as-needed shared lib. Archives are handled
4171 elsewhere. */
4172 fdh = make_fdh (info, eh);
4173 if (fdh == NULL)
4174 return FALSE;
bb700d78 4175 }
8c5b4e52
AM
4176
4177 if (fdh != NULL)
8387904d 4178 {
35b0ce59
AM
4179 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4180 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4181
4182 /* Make both descriptor and entry symbol have the most
4183 constraining visibility of either symbol. */
35b0ce59
AM
4184 if (entry_vis < descr_vis)
4185 fdh->elf.other += entry_vis - descr_vis;
4186 else if (entry_vis > descr_vis)
4187 eh->elf.other += descr_vis - entry_vis;
4188
8c5b4e52
AM
4189 /* Propagate reference flags from entry symbol to function
4190 descriptor symbol. */
bc4e12de 4191 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4192 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4193 fdh->elf.ref_regular |= eh->elf.ref_regular;
4194 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4195
4196 if (!fdh->elf.forced_local
4197 && fdh->elf.dynindx == -1
4198 && fdh->elf.versioned != versioned_hidden
4199 && (bfd_link_dll (info)
4200 || fdh->elf.def_dynamic
4201 || fdh->elf.ref_dynamic)
4202 && (eh->elf.ref_regular
4203 || eh->elf.def_regular))
4204 {
2cdcc330 4205 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4206 return FALSE;
35b0ce59 4207 }
8387904d 4208 }
99877b66 4209
8387904d
AM
4210 return TRUE;
4211}
4212
f6c7c3e8
AM
4213/* Set up opd section info and abiversion for IBFD, and process list
4214 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4215
8387904d 4216static bfd_boolean
f6c7c3e8 4217ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4218{
99877b66 4219 struct ppc_link_hash_table *htab;
b3fac117 4220 struct ppc_link_hash_entry **p, *eh;
459609d6 4221 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4222
459609d6 4223 if (opd != NULL && opd->size != 0)
b3fac117 4224 {
b9399fcf
AM
4225 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4226 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4227
459609d6
AM
4228 if (abiversion (ibfd) == 0)
4229 set_abiversion (ibfd, 1);
8a2058b5 4230 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4231 {
695344c0 4232 /* xgettext:c-format */
cf97bcb0
AM
4233 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4234 ibfd, abiversion (ibfd));
459609d6
AM
4235 bfd_set_error (bfd_error_bad_value);
4236 return FALSE;
f6c7c3e8 4237 }
b9399fcf 4238 }
f6c7c3e8 4239
b9399fcf
AM
4240 if (is_ppc64_elf (info->output_bfd))
4241 {
4242 /* For input files without an explicit abiversion in e_flags
4243 we should have flagged any with symbol st_other bits set
4244 as ELFv1 and above flagged those with .opd as ELFv2.
4245 Set the output abiversion if not yet set, and for any input
4246 still ambiguous, take its abiversion from the output.
4247 Differences in ABI are reported later. */
4248 if (abiversion (info->output_bfd) == 0)
4249 set_abiversion (info->output_bfd, abiversion (ibfd));
4250 else if (abiversion (ibfd) == 0)
4251 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4252 }
4253
459609d6
AM
4254 htab = ppc_hash_table (info);
4255 if (htab == NULL)
b9399fcf 4256 return TRUE;
459609d6 4257
b9399fcf
AM
4258 if (opd != NULL && opd->size != 0
4259 && (ibfd->flags & DYNAMIC) == 0
4260 && (opd->flags & SEC_RELOC) != 0
4261 && opd->reloc_count != 0
4262 && !bfd_is_abs_section (opd->output_section)
4263 && info->gc_sections)
4264 {
4265 /* Garbage collection needs some extra help with .opd sections.
4266 We don't want to necessarily keep everything referenced by
4267 relocs in .opd, as that would keep all functions. Instead,
4268 if we reference an .opd symbol (a function descriptor), we
4269 want to keep the function code symbol's section. This is
4270 easy for global symbols, but for local syms we need to keep
4271 information about the associated function section. */
4272 bfd_size_type amt;
4273 asection **opd_sym_map;
4274 Elf_Internal_Shdr *symtab_hdr;
4275 Elf_Internal_Rela *relocs, *rel_end, *rel;
4276
4277 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4278 opd_sym_map = bfd_zalloc (ibfd, amt);
4279 if (opd_sym_map == NULL)
4280 return FALSE;
4281 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4282 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4283 info->keep_memory);
4284 if (relocs == NULL)
4285 return FALSE;
4286 symtab_hdr = &elf_symtab_hdr (ibfd);
4287 rel_end = relocs + opd->reloc_count - 1;
4288 for (rel = relocs; rel < rel_end; rel++)
4289 {
4290 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4291 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4292
4293 if (r_type == R_PPC64_ADDR64
4294 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4295 && r_symndx < symtab_hdr->sh_info)
4296 {
4297 Elf_Internal_Sym *isym;
4298 asection *s;
4299
4300 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4301 if (isym == NULL)
4302 {
4303 if (elf_section_data (opd)->relocs != relocs)
4304 free (relocs);
4305 return FALSE;
4306 }
4307
4308 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4309 if (s != NULL && s != opd)
4310 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4311 }
4312 }
4313 if (elf_section_data (opd)->relocs != relocs)
4314 free (relocs);
4315 }
459609d6
AM
4316
4317 p = &htab->dot_syms;
4318 while ((eh = *p) != NULL)
4319 {
4320 *p = NULL;
4321 if (&eh->elf == htab->elf.hgot)
4322 ;
4323 else if (htab->elf.hgot == NULL
4324 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4325 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4326 else if (abiversion (ibfd) <= 1)
4327 {
4328 htab->need_func_desc_adj = 1;
4329 if (!add_symbol_adjust (eh, info))
4330 return FALSE;
4331 }
459609d6
AM
4332 p = &eh->u.next_dot_sym;
4333 }
b3fac117 4334 return TRUE;
8387904d
AM
4335}
4336
97fed1c9
JJ
4337/* Undo hash table changes when an --as-needed input file is determined
4338 not to be needed. */
4339
4340static bfd_boolean
e5034e59
AM
4341ppc64_elf_notice_as_needed (bfd *ibfd,
4342 struct bfd_link_info *info,
4343 enum notice_asneeded_action act)
97fed1c9 4344{
e5034e59
AM
4345 if (act == notice_not_needed)
4346 {
4347 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4348
e5034e59
AM
4349 if (htab == NULL)
4350 return FALSE;
4dfe6ac6 4351
e5034e59
AM
4352 htab->dot_syms = NULL;
4353 }
4354 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4355}
4356
aa374f67
AM
4357/* If --just-symbols against a final linked binary, then assume we need
4358 toc adjusting stubs when calling functions defined there. */
4359
4360static void
4361ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4362{
4363 if ((sec->flags & SEC_CODE) != 0
4364 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4365 && is_ppc64_elf (sec->owner))
4366 {
2c3f079f
AM
4367 if (abiversion (sec->owner) >= 2
4368 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4369 sec->has_toc_reloc = 1;
4370 }
4371 _bfd_elf_link_just_syms (sec, info);
4372}
4373
e054468f 4374static struct plt_entry **
4ce794b7
AM
4375update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4376 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4377{
4378 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4379 struct plt_entry **local_plt;
f961d9dd 4380 unsigned char *local_got_tls_masks;
411e1bfb
AM
4381
4382 if (local_got_ents == NULL)
4383 {
4384 bfd_size_type size = symtab_hdr->sh_info;
4385
e054468f
AM
4386 size *= (sizeof (*local_got_ents)
4387 + sizeof (*local_plt)
4388 + sizeof (*local_got_tls_masks));
4ce794b7 4389 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4390 if (local_got_ents == NULL)
e054468f 4391 return NULL;
411e1bfb
AM
4392 elf_local_got_ents (abfd) = local_got_ents;
4393 }
4394
37da22e5 4395 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4396 {
4397 struct got_entry *ent;
4398
4399 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4400 if (ent->addend == r_addend
4401 && ent->owner == abfd
4402 && ent->tls_type == tls_type)
411e1bfb
AM
4403 break;
4404 if (ent == NULL)
4405 {
4406 bfd_size_type amt = sizeof (*ent);
4ce794b7 4407 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4408 if (ent == NULL)
4409 return FALSE;
4410 ent->next = local_got_ents[r_symndx];
4411 ent->addend = r_addend;
e717da7e 4412 ent->owner = abfd;
411e1bfb 4413 ent->tls_type = tls_type;
927be08e 4414 ent->is_indirect = FALSE;
411e1bfb
AM
4415 ent->got.refcount = 0;
4416 local_got_ents[r_symndx] = ent;
4417 }
4418 ent->got.refcount += 1;
4419 }
4420
e054468f 4421 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4422 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4423 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4424
4425 return local_plt + r_symndx;
65f38f15
AM
4426}
4427
411e1bfb 4428static bfd_boolean
e054468f 4429update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4430{
411e1bfb 4431 struct plt_entry *ent;
1e2f5b6e 4432
e054468f 4433 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4434 if (ent->addend == addend)
4435 break;
4436 if (ent == NULL)
1e2f5b6e 4437 {
411e1bfb 4438 bfd_size_type amt = sizeof (*ent);
4ce794b7 4439 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4440 if (ent == NULL)
4441 return FALSE;
e054468f 4442 ent->next = *plist;
411e1bfb
AM
4443 ent->addend = addend;
4444 ent->plt.refcount = 0;
e054468f 4445 *plist = ent;
1e2f5b6e 4446 }
411e1bfb 4447 ent->plt.refcount += 1;
b34976b6 4448 return TRUE;
1e2f5b6e
AM
4449}
4450
e054468f
AM
4451static bfd_boolean
4452is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4453{
4454 return (r_type == R_PPC64_REL24
05d0e962 4455 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4456 || r_type == R_PPC64_REL14
4457 || r_type == R_PPC64_REL14_BRTAKEN
4458 || r_type == R_PPC64_REL14_BRNTAKEN
4459 || r_type == R_PPC64_ADDR24
4460 || r_type == R_PPC64_ADDR14
4461 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4462 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4463 || r_type == R_PPC64_PLTCALL
4464 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4465}
4466
4467/* Relocs on inline plt call sequence insns prior to the call. */
4468
4469static bfd_boolean
4470is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4471{
4472 return (r_type == R_PPC64_PLT16_HA
4473 || r_type == R_PPC64_PLT16_HI
4474 || r_type == R_PPC64_PLT16_LO
4475 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4476 || r_type == R_PPC64_PLT_PCREL34
4477 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4478 || r_type == R_PPC64_PLTSEQ
4479 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4480}
4481
5bd4f169 4482/* Look through the relocs for a section during the first phase, and
65f38f15 4483 calculate needed space in the global offset table, procedure
5d1634d7 4484 linkage table, and dynamic reloc sections. */
5bd4f169 4485
b34976b6 4486static bfd_boolean
4ce794b7
AM
4487ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4488 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4489{
65f38f15 4490 struct ppc_link_hash_table *htab;
5bd4f169 4491 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4492 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4493 const Elf_Internal_Rela *rel;
4494 const Elf_Internal_Rela *rel_end;
5bd4f169 4495 asection *sreloc;
3a71aa26 4496 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4497 bfd_boolean is_opd;
5bd4f169 4498
0e1862bb 4499 if (bfd_link_relocatable (info))
b34976b6 4500 return TRUE;
5bd4f169 4501
680a3378
AM
4502 /* Don't do anything special with non-loaded, non-alloced sections.
4503 In particular, any relocs in such sections should not affect GOT
4504 and PLT reference counting (ie. we don't allow them to create GOT
4505 or PLT entries), there's no possibility or desire to optimize TLS
4506 relocs, and there's not much point in propagating relocs to shared
4507 libs that the dynamic linker won't relocate. */
4508 if ((sec->flags & SEC_ALLOC) == 0)
4509 return TRUE;
4510
0c8d6e5c 4511 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4512
65f38f15 4513 htab = ppc_hash_table (info);
4dfe6ac6
NC
4514 if (htab == NULL)
4515 return FALSE;
4516
3a71aa26
AM
4517 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4518 FALSE, FALSE, TRUE);
4519 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4520 FALSE, FALSE, TRUE);
0ffa91dd 4521 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4522 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4523 sreloc = NULL;
b9399fcf 4524 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4525 rel_end = relocs + sec->reloc_count;
4526 for (rel = relocs; rel < rel_end; rel++)
4527 {
4528 unsigned long r_symndx;
4529 struct elf_link_hash_entry *h;
04c9666a 4530 enum elf_ppc64_reloc_type r_type;
727fc41e 4531 int tls_type;
7c8fe5c4 4532 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4533 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4534
4535 r_symndx = ELF64_R_SYM (rel->r_info);
4536 if (r_symndx < symtab_hdr->sh_info)
4537 h = NULL;
4538 else
973a3492
L
4539 {
4540 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4541 h = elf_follow_link (h);
1c865ab2
AM
4542
4543 if (h == htab->elf.hgot)
4544 sec->has_toc_reloc = 1;
973a3492 4545 }
5bd4f169 4546
5663e321
AM
4547 r_type = ELF64_R_TYPE (rel->r_info);
4548 switch (r_type)
4549 {
04bdff6a
AM
4550 case R_PPC64_D34:
4551 case R_PPC64_D34_LO:
4552 case R_PPC64_D34_HI30:
4553 case R_PPC64_D34_HA30:
4554 case R_PPC64_D28:
c213164a
AM
4555 case R_PPC64_TPREL34:
4556 case R_PPC64_DTPREL34:
04bdff6a 4557 case R_PPC64_PCREL34:
5663e321 4558 case R_PPC64_GOT_PCREL34:
c213164a
AM
4559 case R_PPC64_GOT_TLSGD34:
4560 case R_PPC64_GOT_TLSLD34:
4561 case R_PPC64_GOT_TPREL34:
4562 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4563 case R_PPC64_PLT_PCREL34:
4564 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4565 case R_PPC64_PCREL28:
4566 htab->powerxx_stubs = 1;
133a1f60
AM
4567 break;
4568 default:
5663e321
AM
4569 break;
4570 }
903b777d
AM
4571
4572 switch (r_type)
4573 {
4574 case R_PPC64_PLT16_HA:
4575 case R_PPC64_GOT_TLSLD16_HA:
4576 case R_PPC64_GOT_TLSGD16_HA:
4577 case R_PPC64_GOT_TPREL16_HA:
4578 case R_PPC64_GOT_DTPREL16_HA:
4579 case R_PPC64_GOT16_HA:
4580 case R_PPC64_TOC16_HA:
4581 case R_PPC64_PLT16_LO:
4582 case R_PPC64_PLT16_LO_DS:
4583 case R_PPC64_GOT_TLSLD16_LO:
4584 case R_PPC64_GOT_TLSGD16_LO:
4585 case R_PPC64_GOT_TPREL16_LO_DS:
4586 case R_PPC64_GOT_DTPREL16_LO_DS:
4587 case R_PPC64_GOT16_LO:
4588 case R_PPC64_GOT16_LO_DS:
4589 case R_PPC64_TOC16_LO:
4590 case R_PPC64_TOC16_LO_DS:
4591 case R_PPC64_GOT_PCREL34:
4592 ppc64_elf_tdata (abfd)->has_optrel = 1;
4593 ppc64_elf_section_data (sec)->has_optrel = 1;
4594 break;
4595 default:
4596 break;
4597 }
4598
f749f26e 4599 ifunc = NULL;
25f23106
AM
4600 if (h != NULL)
4601 {
4602 if (h->type == STT_GNU_IFUNC)
4603 {
4604 h->needs_plt = 1;
4605 ifunc = &h->plt.plist;
4606 }
4607 }
4608 else
4609 {
4610 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4611 abfd, r_symndx);
4612 if (isym == NULL)
4613 return FALSE;
4614
4615 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4616 {
4617 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4618 rel->r_addend,
37da22e5 4619 NON_GOT | PLT_IFUNC);
25f23106
AM
4620 if (ifunc == NULL)
4621 return FALSE;
4622 }
4623 }
727fc41e 4624
f749f26e 4625 tls_type = 0;
a33d1f77 4626 switch (r_type)
5bd4f169 4627 {
727fc41e
AM
4628 case R_PPC64_TLSGD:
4629 case R_PPC64_TLSLD:
4630 /* These special tls relocs tie a call to __tls_get_addr with
4631 its parameter symbol. */
37da22e5
AM
4632 if (h != NULL)
4633 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4634 else
4635 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4636 rel->r_addend,
37da22e5
AM
4637 NON_GOT | TLS_TLS | TLS_MARK))
4638 return FALSE;
4639 sec->has_tls_reloc = 1;
727fc41e
AM
4640 break;
4641
411e1bfb
AM
4642 case R_PPC64_GOT_TLSLD16:
4643 case R_PPC64_GOT_TLSLD16_LO:
4644 case R_PPC64_GOT_TLSLD16_HI:
4645 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4646 case R_PPC64_GOT_TLSLD34:
951fd09b 4647 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4648 goto dogottls;
4649
4650 case R_PPC64_GOT_TLSGD16:
4651 case R_PPC64_GOT_TLSGD16_LO:
4652 case R_PPC64_GOT_TLSGD16_HI:
4653 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4654 case R_PPC64_GOT_TLSGD34:
951fd09b 4655 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4656 goto dogottls;
4657
4658 case R_PPC64_GOT_TPREL16_DS:
4659 case R_PPC64_GOT_TPREL16_LO_DS:
4660 case R_PPC64_GOT_TPREL16_HI:
4661 case R_PPC64_GOT_TPREL16_HA:
c213164a 4662 case R_PPC64_GOT_TPREL34:
7c8bbca5 4663 if (bfd_link_dll (info))
411e1bfb
AM
4664 info->flags |= DF_STATIC_TLS;
4665 tls_type = TLS_TLS | TLS_TPREL;
4666 goto dogottls;
4667
4668 case R_PPC64_GOT_DTPREL16_DS:
4669 case R_PPC64_GOT_DTPREL16_LO_DS:
4670 case R_PPC64_GOT_DTPREL16_HI:
4671 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4672 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4673 tls_type = TLS_TLS | TLS_DTPREL;
4674 dogottls:
4675 sec->has_tls_reloc = 1;
066f4018 4676 goto dogot;
411e1bfb 4677
903b777d
AM
4678 case R_PPC64_GOT16:
4679 case R_PPC64_GOT16_LO:
4680 case R_PPC64_GOT16_HI:
65f38f15 4681 case R_PPC64_GOT16_HA:
903b777d 4682 case R_PPC64_GOT16_DS:
066f4018 4683 case R_PPC64_GOT16_LO_DS:
4a421c53 4684 case R_PPC64_GOT_PCREL34:
066f4018 4685 dogot:
65f38f15 4686 /* This symbol requires a global offset table entry. */
4c52953f 4687 sec->has_toc_reloc = 1;
33c0ec9d
AM
4688 if (r_type == R_PPC64_GOT_TLSLD16
4689 || r_type == R_PPC64_GOT_TLSGD16
4690 || r_type == R_PPC64_GOT_TPREL16_DS
4691 || r_type == R_PPC64_GOT_DTPREL16_DS
4692 || r_type == R_PPC64_GOT16
4693 || r_type == R_PPC64_GOT16_DS)
4694 {
4695 htab->do_multi_toc = 1;
d77c8a4b 4696 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4697 }
4698
e717da7e
AM
4699 if (ppc64_elf_tdata (abfd)->got == NULL
4700 && !create_got_section (abfd, info))
b34976b6 4701 return FALSE;
5bd4f169
AM
4702
4703 if (h != NULL)
4704 {
411e1bfb
AM
4705 struct ppc_link_hash_entry *eh;
4706 struct got_entry *ent;
65f38f15 4707
411e1bfb
AM
4708 eh = (struct ppc_link_hash_entry *) h;
4709 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4710 if (ent->addend == rel->r_addend
e717da7e 4711 && ent->owner == abfd
411e1bfb
AM
4712 && ent->tls_type == tls_type)
4713 break;
4714 if (ent == NULL)
5bd4f169 4715 {
411e1bfb 4716 bfd_size_type amt = sizeof (*ent);
4ce794b7 4717 ent = bfd_alloc (abfd, amt);
411e1bfb 4718 if (ent == NULL)
b34976b6 4719 return FALSE;
411e1bfb 4720 ent->next = eh->elf.got.glist;
133a1f60 4721 ent->addend = rel->r_addend;
e717da7e 4722 ent->owner = abfd;
411e1bfb 4723 ent->tls_type = tls_type;
927be08e 4724 ent->is_indirect = FALSE;
411e1bfb
AM
4725 ent->got.refcount = 0;
4726 eh->elf.got.glist = ent;
5bd4f169 4727 }
411e1bfb 4728 ent->got.refcount += 1;
e7b938ca 4729 eh->tls_mask |= tls_type;
5bd4f169 4730 }
411e1bfb
AM
4731 else
4732 /* This is a global offset table entry for a local symbol. */
4733 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4734 rel->r_addend, tls_type))
411e1bfb 4735 return FALSE;
a345bc8d
AM
4736
4737 /* We may also need a plt entry if the symbol turns out to be
4738 an ifunc. */
0e1862bb 4739 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4740 {
133a1f60 4741 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
a345bc8d
AM
4742 return FALSE;
4743 }
5bd4f169
AM
4744 break;
4745
5bd4f169 4746 case R_PPC64_PLT16_HA:
65f38f15
AM
4747 case R_PPC64_PLT16_HI:
4748 case R_PPC64_PLT16_LO:
08be3224 4749 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4750 case R_PPC64_PLT_PCREL34:
4751 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4752 case R_PPC64_PLT32:
4753 case R_PPC64_PLT64:
cbf95972
AM
4754 /* This symbol requires a procedure linkage table entry. */
4755 plt_list = ifunc;
4756 if (h != NULL)
e054468f 4757 {
e054468f
AM
4758 h->needs_plt = 1;
4759 if (h->root.root.string[0] == '.'
4760 && h->root.root.string[1] != '\0')
4761 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4762 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4763 plt_list = &h->plt.plist;
4764 }
4765 if (plt_list == NULL)
2d7ad24e 4766 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4767 rel->r_addend,
2d7ad24e 4768 NON_GOT | PLT_KEEP);
133a1f60 4769 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4770 return FALSE;
5bd4f169
AM
4771 break;
4772
4773 /* The following relocations don't need to propagate the
4774 relocation if linking a shared object since they are
4775 section relative. */
4776 case R_PPC64_SECTOFF:
4777 case R_PPC64_SECTOFF_LO:
4778 case R_PPC64_SECTOFF_HI:
4779 case R_PPC64_SECTOFF_HA:
4780 case R_PPC64_SECTOFF_DS:
4781 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4782 case R_PPC64_DTPREL16:
4783 case R_PPC64_DTPREL16_LO:
4784 case R_PPC64_DTPREL16_HI:
4785 case R_PPC64_DTPREL16_HA:
4786 case R_PPC64_DTPREL16_DS:
4787 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4788 case R_PPC64_DTPREL16_HIGH:
4789 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4790 case R_PPC64_DTPREL16_HIGHER:
4791 case R_PPC64_DTPREL16_HIGHERA:
4792 case R_PPC64_DTPREL16_HIGHEST:
4793 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4794 break;
4795
ad8e1ba5 4796 /* Nor do these. */
25f23106
AM
4797 case R_PPC64_REL16:
4798 case R_PPC64_REL16_LO:
4799 case R_PPC64_REL16_HI:
4800 case R_PPC64_REL16_HA:
4a969973
AM
4801 case R_PPC64_REL16_HIGH:
4802 case R_PPC64_REL16_HIGHA:
4803 case R_PPC64_REL16_HIGHER:
4804 case R_PPC64_REL16_HIGHERA:
4805 case R_PPC64_REL16_HIGHEST:
4806 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4807 case R_PPC64_REL16_HIGHER34:
4808 case R_PPC64_REL16_HIGHERA34:
4809 case R_PPC64_REL16_HIGHEST34:
4810 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4811 case R_PPC64_REL16DX_HA:
25f23106
AM
4812 break;
4813
45965137
AM
4814 /* Not supported as a dynamic relocation. */
4815 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4816 if (bfd_link_pic (info))
45965137
AM
4817 {
4818 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4819 ppc_howto_init ();
695344c0 4820 /* xgettext:c-format */
174d0a74 4821 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4822 "in shared libraries and PIEs\n"),
45965137
AM
4823 abfd, sec, rel->r_offset,
4824 ppc64_elf_howto_table[r_type]->name);
4825 bfd_set_error (bfd_error_bad_value);
4826 return FALSE;
4827 }
4828 break;
4829
ad8e1ba5 4830 case R_PPC64_TOC16:
33c0ec9d
AM
4831 case R_PPC64_TOC16_DS:
4832 htab->do_multi_toc = 1;
d77c8a4b 4833 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4834 /* Fall through. */
ad8e1ba5
AM
4835 case R_PPC64_TOC16_LO:
4836 case R_PPC64_TOC16_HI:
4837 case R_PPC64_TOC16_HA:
ad8e1ba5 4838 case R_PPC64_TOC16_LO_DS:
4c52953f 4839 sec->has_toc_reloc = 1;
ec73ddcd 4840 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4841 {
4842 /* We may need a copy reloc. */
4843 h->non_got_ref = 1;
4844 /* Strongly prefer a copy reloc over a dynamic reloc.
4845 glibc ld.so as of 2019-08 will error out if one of
4846 these relocations is emitted. */
4847 h->needs_copy = 1;
4848 goto dodyn;
4849 }
ad8e1ba5
AM
4850 break;
4851
006589cf
AM
4852 /* Marker reloc. */
4853 case R_PPC64_ENTRY:
4854 break;
4855
5bd4f169
AM
4856 /* This relocation describes the C++ object vtable hierarchy.
4857 Reconstruct it for later use during GC. */
4858 case R_PPC64_GNU_VTINHERIT:
c152c796 4859 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4860 return FALSE;
5bd4f169
AM
4861 break;
4862
4863 /* This relocation describes which C++ vtable entries are actually
4864 used. Record for later use during GC. */
4865 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4866 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4867 return FALSE;
5bd4f169
AM
4868 break;
4869
721956f4
AM
4870 case R_PPC64_REL14:
4871 case R_PPC64_REL14_BRTAKEN:
4872 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4873 {
4874 asection *dest = NULL;
4875
4876 /* Heuristic: If jumping outside our section, chances are
4877 we are going to need a stub. */
4878 if (h != NULL)
4879 {
4880 /* If the sym is weak it may be overridden later, so
4881 don't assume we know where a weak sym lives. */
4882 if (h->root.type == bfd_link_hash_defined)
4883 dest = h->root.u.def.section;
4884 }
4885 else
87d72d41
AM
4886 {
4887 Elf_Internal_Sym *isym;
4888
4889 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4890 abfd, r_symndx);
4891 if (isym == NULL)
4892 return FALSE;
4893
4894 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4895 }
4896
220c76dd 4897 if (dest != sec)
7c8fe5c4 4898 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4899 }
3e04d765
AM
4900 goto rel24;
4901
4902 case R_PPC64_PLTCALL:
5663e321 4903 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4904 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4905 /* Fall through. */
4906
5d1634d7 4907 case R_PPC64_REL24:
05d0e962 4908 case R_PPC64_REL24_NOTOC:
3e04d765 4909 rel24:
cbf95972
AM
4910 plt_list = ifunc;
4911 if (h != NULL)
5d1634d7 4912 {
e054468f
AM
4913 h->needs_plt = 1;
4914 if (h->root.root.string[0] == '.'
4915 && h->root.root.string[1] != '\0')
4916 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4917
3a71aa26 4918 if (h == tga || h == dottga)
cbf95972
AM
4919 {
4920 sec->has_tls_reloc = 1;
4921 if (rel != relocs
4922 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4923 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4924 /* We have a new-style __tls_get_addr call with
4925 a marker reloc. */
4926 ;
4927 else
4928 /* Mark this section as having an old-style call. */
9737e8af 4929 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4930 }
4931 plt_list = &h->plt.plist;
411e1bfb 4932 }
cbf95972
AM
4933
4934 /* We may need a .plt entry if the function this reloc
4935 refers to is in a shared lib. */
4936 if (plt_list
133a1f60 4937 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4938 return FALSE;
411e1bfb
AM
4939 break;
4940
cbf95972
AM
4941 case R_PPC64_ADDR14:
4942 case R_PPC64_ADDR14_BRNTAKEN:
4943 case R_PPC64_ADDR14_BRTAKEN:
4944 case R_PPC64_ADDR24:
4945 goto dodyn;
4946
411e1bfb
AM
4947 case R_PPC64_TPREL64:
4948 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4949 if (bfd_link_dll (info))
411e1bfb
AM
4950 info->flags |= DF_STATIC_TLS;
4951 goto dotlstoc;
4952
4953 case R_PPC64_DTPMOD64:
4954 if (rel + 1 < rel_end
4955 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4956 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4957 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4958 else
951fd09b 4959 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4960 goto dotlstoc;
4961
4962 case R_PPC64_DTPREL64:
4963 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4964 if (rel != relocs
4965 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4966 && rel[-1].r_offset == rel->r_offset - 8)
4967 /* This is the second reloc of a dtpmod, dtprel pair.
4968 Don't mark with TLS_DTPREL. */
4969 goto dodyn;
4970
4971 dotlstoc:
4972 sec->has_tls_reloc = 1;
4973 if (h != NULL)
4974 {
4975 struct ppc_link_hash_entry *eh;
4976 eh = (struct ppc_link_hash_entry *) h;
46e9995a 4977 eh->tls_mask |= tls_type & 0xff;
411e1bfb
AM
4978 }
4979 else
4980 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4981 rel->r_addend, tls_type))
411e1bfb
AM
4982 return FALSE;
4983
7c8fe5c4
AM
4984 ppc64_sec = ppc64_elf_section_data (sec);
4985 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4986 {
3a71aa26
AM
4987 bfd_size_type amt;
4988
e7b938ca 4989 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4990 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4991 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4992 if (ppc64_sec->u.toc.symndx == NULL)
4993 return FALSE;
4994 amt = sec->size * sizeof (bfd_vma) / 8;
4995 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4996 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4997 return FALSE;
7c8fe5c4
AM
4998 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4999 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5000 }
5001 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5002 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5003 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5004
5005 /* Mark the second slot of a GD or LD entry.
5006 -1 to indicate GD and -2 to indicate LD. */
5007 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5008 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5009 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5010 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5011 goto dodyn;
5012
5013 case R_PPC64_TPREL16:
5014 case R_PPC64_TPREL16_LO:
5015 case R_PPC64_TPREL16_HI:
5016 case R_PPC64_TPREL16_HA:
5017 case R_PPC64_TPREL16_DS:
5018 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5019 case R_PPC64_TPREL16_HIGH:
5020 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5021 case R_PPC64_TPREL16_HIGHER:
5022 case R_PPC64_TPREL16_HIGHERA:
5023 case R_PPC64_TPREL16_HIGHEST:
5024 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5025 case R_PPC64_TPREL34:
7c8bbca5
AM
5026 if (bfd_link_dll (info))
5027 info->flags |= DF_STATIC_TLS;
5028 goto dodyn;
5d1634d7 5029
e86ce104 5030 case R_PPC64_ADDR64:
b9399fcf 5031 if (is_opd
1e2f5b6e 5032 && rel + 1 < rel_end
4ce794b7 5033 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5034 {
8387904d 5035 if (h != NULL)
8c5b4e52 5036 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 5037 }
e86ce104
AM
5038 /* Fall through. */
5039
65f38f15
AM
5040 case R_PPC64_ADDR16:
5041 case R_PPC64_ADDR16_DS:
5042 case R_PPC64_ADDR16_HA:
5043 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5044 case R_PPC64_ADDR16_HIGH:
5045 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5046 case R_PPC64_ADDR16_HIGHER:
5047 case R_PPC64_ADDR16_HIGHERA:
5048 case R_PPC64_ADDR16_HIGHEST:
5049 case R_PPC64_ADDR16_HIGHESTA:
5050 case R_PPC64_ADDR16_LO:
5051 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5052 case R_PPC64_D34:
5053 case R_PPC64_D34_LO:
5054 case R_PPC64_D34_HI30:
5055 case R_PPC64_D34_HA30:
5056 case R_PPC64_ADDR16_HIGHER34:
5057 case R_PPC64_ADDR16_HIGHERA34:
5058 case R_PPC64_ADDR16_HIGHEST34:
5059 case R_PPC64_ADDR16_HIGHESTA34:
5060 case R_PPC64_D28:
0e1862bb 5061 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5062 && rel->r_addend == 0)
5063 {
5064 /* We may need a .plt entry if this reloc refers to a
5065 function in a shared lib. */
5663e321 5066 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5067 return FALSE;
5068 h->pointer_equality_needed = 1;
5069 }
5070 /* Fall through. */
5071
5072 case R_PPC64_REL30:
5073 case R_PPC64_REL32:
5074 case R_PPC64_REL64:
65f38f15 5075 case R_PPC64_ADDR32:
65f38f15
AM
5076 case R_PPC64_UADDR16:
5077 case R_PPC64_UADDR32:
5078 case R_PPC64_UADDR64:
5bd4f169 5079 case R_PPC64_TOC:
ec73ddcd 5080 if (h != NULL && bfd_link_executable (info))
81848ca0 5081 /* We may need a copy reloc. */
f5385ebf 5082 h->non_got_ref = 1;
81848ca0 5083
41bd81ab 5084 /* Don't propagate .opd relocs. */
b9399fcf 5085 if (NO_OPD_RELOCS && is_opd)
e86ce104 5086 break;
e86ce104 5087
65f38f15
AM
5088 /* If we are creating a shared library, and this is a reloc
5089 against a global symbol, or a non PC relative reloc
5090 against a local symbol, then we need to copy the reloc
5091 into the shared library. However, if we are linking with
5092 -Bsymbolic, we do not need to copy a reloc against a
5093 global symbol which is defined in an object we are
5094 including in the link (i.e., DEF_REGULAR is set). At
5095 this point we have not seen all the input files, so it is
5096 possible that DEF_REGULAR is not set now but will be set
5097 later (it is never cleared). In case of a weak definition,
5098 DEF_REGULAR may be cleared later by a strong definition in
5099 a shared library. We account for that possibility below by
f4656909 5100 storing information in the dyn_relocs field of the hash
65f38f15
AM
5101 table entry. A similar situation occurs when creating
5102 shared libraries and symbol visibility changes render the
5103 symbol local.
5104
5105 If on the other hand, we are creating an executable, we
5106 may need to keep relocations for symbols satisfied by a
5107 dynamic library if we manage to avoid copy relocs for the
5108 symbol. */
411e1bfb 5109 dodyn:
ec73ddcd
AM
5110 if ((h != NULL
5111 && (h->root.type == bfd_link_hash_defweak
5112 || !h->def_regular))
5113 || (h != NULL
5114 && !bfd_link_executable (info)
5115 && !SYMBOLIC_BIND (info, h))
5116 || (bfd_link_pic (info)
5117 && must_be_dyn_reloc (info, r_type))
0e1862bb 5118 || (!bfd_link_pic (info)
25f23106 5119 && ifunc != NULL))
5bd4f169 5120 {
65f38f15
AM
5121 /* We must copy these reloc types into the output file.
5122 Create a reloc section in dynobj and make room for
5123 this reloc. */
5bd4f169
AM
5124 if (sreloc == NULL)
5125 {
83bac4b0
NC
5126 sreloc = _bfd_elf_make_dynamic_reloc_section
5127 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5128
5bd4f169 5129 if (sreloc == NULL)
83bac4b0 5130 return FALSE;
5bd4f169
AM
5131 }
5132
65f38f15
AM
5133 /* If this is a global symbol, we count the number of
5134 relocations we need for this symbol. */
5135 if (h != NULL)
5136 {
19e08130
AM
5137 struct elf_dyn_relocs *p;
5138 struct elf_dyn_relocs **head;
5139
ec338859 5140 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5141 p = *head;
5142 if (p == NULL || p->sec != sec)
5143 {
5144 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5145 if (p == NULL)
5146 return FALSE;
5147 p->next = *head;
5148 *head = p;
5149 p->sec = sec;
5150 p->count = 0;
5151 p->pc_count = 0;
5152 }
5153 p->count += 1;
5154 if (!must_be_dyn_reloc (info, r_type))
5155 p->pc_count += 1;
65f38f15
AM
5156 }
5157 else
5158 {
ec338859
AM
5159 /* Track dynamic relocs needed for local syms too.
5160 We really need local syms available to do this
5161 easily. Oh well. */
19e08130
AM
5162 struct ppc_dyn_relocs *p;
5163 struct ppc_dyn_relocs **head;
5164 bfd_boolean is_ifunc;
ec338859 5165 asection *s;
6edfbbad 5166 void *vpp;
87d72d41 5167 Elf_Internal_Sym *isym;
6edfbbad 5168
87d72d41
AM
5169 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5170 abfd, r_symndx);
5171 if (isym == NULL)
b34976b6 5172 return FALSE;
ec338859 5173
87d72d41
AM
5174 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5175 if (s == NULL)
5176 s = sec;
5177
6edfbbad 5178 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5179 head = (struct ppc_dyn_relocs **) vpp;
5180 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5181 p = *head;
5182 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5183 p = p->next;
5184 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5185 {
5186 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5187 if (p == NULL)
5188 return FALSE;
5189 p->next = *head;
5190 *head = p;
5191 p->sec = sec;
5192 p->ifunc = is_ifunc;
5193 p->count = 0;
5194 }
5195 p->count += 1;
ec338859 5196 }
65f38f15 5197 }
5bd4f169 5198 break;
65f38f15
AM
5199
5200 default:
96e0dda4 5201 break;
5bd4f169
AM
5202 }
5203 }
5204
b34976b6 5205 return TRUE;
5bd4f169
AM
5206}
5207
ee67d69a
AM
5208/* Merge backend specific data from an object file to the output
5209 object file when linking. */
5210
5211static bfd_boolean
50e03d47 5212ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5213{
50e03d47 5214 bfd *obfd = info->output_bfd;
ee67d69a
AM
5215 unsigned long iflags, oflags;
5216
5217 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5218 return TRUE;
5219
5220 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5221 return TRUE;
5222
50e03d47 5223 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5224 return FALSE;
5225
5226 iflags = elf_elfheader (ibfd)->e_flags;
5227 oflags = elf_elfheader (obfd)->e_flags;
5228
f6c7c3e8 5229 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5230 {
4eca0228 5231 _bfd_error_handler
695344c0 5232 /* xgettext:c-format */
871b3ab2 5233 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5234 bfd_set_error (bfd_error_bad_value);
5235 return FALSE;
5236 }
f6c7c3e8 5237 else if (iflags != oflags && iflags != 0)
ee67d69a 5238 {
4eca0228 5239 _bfd_error_handler
695344c0 5240 /* xgettext:c-format */
871b3ab2 5241 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5242 ibfd, iflags, oflags);
5243 bfd_set_error (bfd_error_bad_value);
5244 return FALSE;
5245 }
5246
4a91d0ba
AM
5247 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5248 return FALSE;
005d79fd 5249
ee67d69a 5250 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5251 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5252}
5253
5254static bfd_boolean
5255ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5256{
5257 /* Print normal ELF private data. */
5258 _bfd_elf_print_private_bfd_data (abfd, ptr);
5259
5260 if (elf_elfheader (abfd)->e_flags != 0)
5261 {
5262 FILE *file = ptr;
5263
ee67d69a
AM
5264 fprintf (file, _("private flags = 0x%lx:"),
5265 elf_elfheader (abfd)->e_flags);
5266
5267 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5268 fprintf (file, _(" [abiv%ld]"),
5269 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5270 fputc ('\n', file);
5271 }
5272
5273 return TRUE;
5274}
5275
8387904d 5276/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5277 of the code entry point, and its section, which must be in the same
5278 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5279
5280static bfd_vma
5281opd_entry_value (asection *opd_sec,
5282 bfd_vma offset,
5283 asection **code_sec,
aef36ac1
AM
5284 bfd_vma *code_off,
5285 bfd_boolean in_code_sec)
8387904d
AM
5286{
5287 bfd *opd_bfd = opd_sec->owner;
8860955f 5288 Elf_Internal_Rela *relocs;
8387904d 5289 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5290 bfd_vma val;
8387904d 5291
9f296da3
AM
5292 /* No relocs implies we are linking a --just-symbols object, or looking
5293 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5294 if (opd_sec->reloc_count == 0)
5295 {
729eabd5 5296 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5297
729eabd5
AM
5298 if (contents == NULL)
5299 {
5300 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5301 return (bfd_vma) -1;
5302 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5303 }
ee1e4ede 5304
dbb3fbbb 5305 /* PR 17512: file: 64b9dfbb. */
451dfd38 5306 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5307 return (bfd_vma) -1;
5308
729eabd5 5309 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5310 if (code_sec != NULL)
5311 {
5312 asection *sec, *likely = NULL;
ee1e4ede 5313
aef36ac1 5314 if (in_code_sec)
4b85d634 5315 {
aef36ac1
AM
5316 sec = *code_sec;
5317 if (sec->vma <= val
5318 && val < sec->vma + sec->size)
5319 likely = sec;
5320 else
5321 val = -1;
5322 }
5323 else
5324 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5325 if (sec->vma <= val
5326 && (sec->flags & SEC_LOAD) != 0
5327 && (sec->flags & SEC_ALLOC) != 0)
5328 likely = sec;
5329 if (likely != NULL)
5330 {
5331 *code_sec = likely;
5332 if (code_off != NULL)
5333 *code_off = val - likely->vma;
4b85d634
AM
5334 }
5335 }
aef36ac1 5336 return val;
4b85d634
AM
5337 }
5338
0c8d6e5c 5339 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5340
729eabd5 5341 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5342 if (relocs == NULL)
5343 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5344 /* PR 17512: file: df8e1fd6. */
5345 if (relocs == NULL)
5346 return (bfd_vma) -1;
645ea6a9 5347
8387904d 5348 /* Go find the opd reloc at the sym address. */
8860955f 5349 lo = relocs;
8387904d 5350 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5351 val = (bfd_vma) -1;
8387904d
AM
5352 while (lo < hi)
5353 {
5354 look = lo + (hi - lo) / 2;
5355 if (look->r_offset < offset)
5356 lo = look + 1;
5357 else if (look->r_offset > offset)
5358 hi = look;
5359 else
5360 {
0ffa91dd
NC
5361 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5362
8387904d
AM
5363 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5364 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5365 {
5366 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5367 asection *sec = NULL;
8387904d 5368
b53dfeb2
AM
5369 if (symndx >= symtab_hdr->sh_info
5370 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5371 {
5372 struct elf_link_hash_entry **sym_hashes;
5373 struct elf_link_hash_entry *rh;
5374
5375 sym_hashes = elf_sym_hashes (opd_bfd);
5376 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5377 if (rh != NULL)
5378 {
5379 rh = elf_follow_link (rh);
bb854a36
AM
5380 if (rh->root.type != bfd_link_hash_defined
5381 && rh->root.type != bfd_link_hash_defweak)
5382 break;
5383 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5384 {
bb854a36
AM
5385 val = rh->root.u.def.value;
5386 sec = rh->root.u.def.section;
b53dfeb2
AM
5387 }
5388 }
5389 }
5390
5391 if (sec == NULL)
5392 {
5393 Elf_Internal_Sym *sym;
5394
5395 if (symndx < symtab_hdr->sh_info)
5396 {
5397 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5398 if (sym == NULL)
5399 {
5400 size_t symcnt = symtab_hdr->sh_info;
5401 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5402 symcnt, 0,
5403 NULL, NULL, NULL);
5404 if (sym == NULL)
5405 break;
5406 symtab_hdr->contents = (bfd_byte *) sym;
5407 }
5408 sym += symndx;
128205bb
AM
5409 }
5410 else
5411 {
b53dfeb2
AM
5412 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5413 1, symndx,
5414 NULL, NULL, NULL);
128205bb
AM
5415 if (sym == NULL)
5416 break;
128205bb 5417 }
b53dfeb2
AM
5418 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5419 if (sec == NULL)
5420 break;
5421 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5422 val = sym->st_value;
8387904d 5423 }
b53dfeb2 5424
8387904d
AM
5425 val += look->r_addend;
5426 if (code_off != NULL)
5427 *code_off = val;
5428 if (code_sec != NULL)
aef36ac1
AM
5429 {
5430 if (in_code_sec && *code_sec != sec)
5431 return -1;
5432 else
5433 *code_sec = sec;
5434 }
b53dfeb2 5435 if (sec->output_section != NULL)
8387904d 5436 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5437 }
5438 break;
5439 }
5440 }
645ea6a9 5441
645ea6a9 5442 return val;
8387904d
AM
5443}
5444
aef36ac1
AM
5445/* If the ELF symbol SYM might be a function in SEC, return the
5446 function size and set *CODE_OFF to the function's entry point,
5447 otherwise return zero. */
9f296da3 5448
aef36ac1
AM
5449static bfd_size_type
5450ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5451 bfd_vma *code_off)
9f296da3 5452{
aef36ac1
AM
5453 bfd_size_type size;
5454
5455 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5456 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5457 return 0;
5458
5459 size = 0;
5460 if (!(sym->flags & BSF_SYNTHETIC))
5461 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5462
5463 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5464 {
b07bca4e
AM
5465 struct _opd_sec_data *opd = get_opd_info (sym->section);
5466 bfd_vma symval = sym->value;
5467
5468 if (opd != NULL
5469 && opd->adjust != NULL
5470 && elf_section_data (sym->section)->relocs != NULL)
5471 {
5472 /* opd_entry_value will use cached relocs that have been
5473 adjusted, but with raw symbols. That means both local
5474 and global symbols need adjusting. */
5475 long adjust = opd->adjust[OPD_NDX (symval)];
5476 if (adjust == -1)
5477 return 0;
5478 symval += adjust;
5479 }
5480
5481 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5482 &sec, code_off, TRUE) == (bfd_vma) -1)
5483 return 0;
5484 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5485 symbol. This size has nothing to do with the code size of the
5486 function, which is what we're supposed to return, but the
5487 code size isn't available without looking up the dot-sym.
5488 However, doing that would be a waste of time particularly
5489 since elf_find_function will look at the dot-sym anyway.
5490 Now, elf_find_function will keep the largest size of any
5491 function sym found at the code address of interest, so return
5492 1 here to avoid it incorrectly caching a larger function size
5493 for a small function. This does mean we return the wrong
5494 size for a new-ABI function of size 24, but all that does is
5495 disable caching for such functions. */
5496 if (size == 24)
5497 size = 1;
9f296da3 5498 }
aef36ac1
AM
5499 else
5500 {
5501 if (sym->section != sec)
5502 return 0;
5503 *code_off = sym->value;
5504 }
5505 if (size == 0)
5506 size = 1;
5507 return size;
9f296da3
AM
5508}
5509
f378ab09
AM
5510/* Return true if symbol is a strong function defined in an ELFv2
5511 object with st_other localentry bits of zero, ie. its local entry
5512 point coincides with its global entry point. */
5513
5514static bfd_boolean
5515is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5516{
5517 return (h != NULL
5518 && h->type == STT_FUNC
5519 && h->root.type == bfd_link_hash_defined
5520 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5521 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5522 && is_ppc64_elf (h->root.u.def.section->owner)
5523 && abiversion (h->root.u.def.section->owner) >= 2);
5524}
5525
854b41e7
AM
5526/* Return true if symbol is defined in a regular object file. */
5527
5528static bfd_boolean
5529is_static_defined (struct elf_link_hash_entry *h)
5530{
5531 return ((h->root.type == bfd_link_hash_defined
5532 || h->root.type == bfd_link_hash_defweak)
5533 && h->root.u.def.section != NULL
5534 && h->root.u.def.section->output_section != NULL);
5535}
5536
b31867b6
AM
5537/* If FDH is a function descriptor symbol, return the associated code
5538 entry symbol if it is defined. Return NULL otherwise. */
5539
5540static struct ppc_link_hash_entry *
5541defined_code_entry (struct ppc_link_hash_entry *fdh)
5542{
5543 if (fdh->is_func_descriptor)
5544 {
5545 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5546 if (fh->elf.root.type == bfd_link_hash_defined
5547 || fh->elf.root.type == bfd_link_hash_defweak)
5548 return fh;
5549 }
5550 return NULL;
5551}
5552
5553/* If FH is a function code entry symbol, return the associated
5554 function descriptor symbol if it is defined. Return NULL otherwise. */
5555
5556static struct ppc_link_hash_entry *
5557defined_func_desc (struct ppc_link_hash_entry *fh)
5558{
5559 if (fh->oh != NULL
5560 && fh->oh->is_func_descriptor)
5561 {
5562 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5563 if (fdh->elf.root.type == bfd_link_hash_defined
5564 || fdh->elf.root.type == bfd_link_hash_defweak)
5565 return fdh;
5566 }
5567 return NULL;
5568}
5569
8c5b4e52
AM
5570static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5571
5572/* Garbage collect sections, after first dealing with dot-symbols. */
5573
5574static bfd_boolean
5575ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5576{
5577 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5578
5579 if (htab != NULL && htab->need_func_desc_adj)
5580 {
5581 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5582 htab->need_func_desc_adj = 0;
5583 }
5584 return bfd_elf_gc_sections (abfd, info);
5585}
5586
74f0fb50
AM
5587/* Mark all our entry sym sections, both opd and code section. */
5588
5589static void
5590ppc64_elf_gc_keep (struct bfd_link_info *info)
5591{
5592 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5593 struct bfd_sym_chain *sym;
5594
4dfe6ac6
NC
5595 if (htab == NULL)
5596 return;
5597
74f0fb50
AM
5598 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5599 {
b31867b6 5600 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5601 asection *sec;
5602
5603 eh = (struct ppc_link_hash_entry *)
b31867b6 5604 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5605 if (eh == NULL)
5606 continue;
5607 if (eh->elf.root.type != bfd_link_hash_defined
5608 && eh->elf.root.type != bfd_link_hash_defweak)
5609 continue;
5610
b31867b6
AM
5611 fh = defined_code_entry (eh);
5612 if (fh != NULL)
74f0fb50 5613 {
b31867b6 5614 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5615 sec->flags |= SEC_KEEP;
5616 }
5617 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5618 && opd_entry_value (eh->elf.root.u.def.section,
5619 eh->elf.root.u.def.value,
aef36ac1 5620 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5621 sec->flags |= SEC_KEEP;
5622
5623 sec = eh->elf.root.u.def.section;
5624 sec->flags |= SEC_KEEP;
5625 }
5626}
5627
64d03ab5
AM
5628/* Mark sections containing dynamically referenced symbols. When
5629 building shared libraries, we must assume that any visible symbol is
5630 referenced. */
5631
5632static bfd_boolean
5633ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5634{
5635 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5636 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5637 struct ppc_link_hash_entry *fdh;
b407645f 5638 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5639
64d03ab5 5640 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5641 fdh = defined_func_desc (eh);
5642 if (fdh != NULL)
5643 eh = fdh;
64d03ab5
AM
5644
5645 if ((eh->elf.root.type == bfd_link_hash_defined
5646 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5647 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5648 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5649 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5650 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5651 && (!bfd_link_executable (info)
e278ae05 5652 || info->gc_keep_exported
b407645f
AM
5653 || info->export_dynamic
5654 || (eh->elf.dynamic
5655 && d != NULL
2cdcc330
AM
5656 && (*d->match) (&d->head, NULL,
5657 eh->elf.root.root.string)))
e278ae05 5658 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5659 || !bfd_hide_sym_by_version (info->version_info,
5660 eh->elf.root.root.string)))))
64d03ab5
AM
5661 {
5662 asection *code_sec;
b31867b6 5663 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5664
5665 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5666
5667 /* Function descriptor syms cause the associated
5668 function code sym section to be marked. */
b31867b6
AM
5669 fh = defined_code_entry (eh);
5670 if (fh != NULL)
5671 {
5672 code_sec = fh->elf.root.u.def.section;
5673 code_sec->flags |= SEC_KEEP;
5674 }
64d03ab5
AM
5675 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5676 && opd_entry_value (eh->elf.root.u.def.section,
5677 eh->elf.root.u.def.value,
aef36ac1 5678 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5679 code_sec->flags |= SEC_KEEP;
5680 }
5681
5682 return TRUE;
5683}
5684
5bd4f169
AM
5685/* Return the section that should be marked against GC for a given
5686 relocation. */
5687
5688static asection *
4ce794b7 5689ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5690 struct bfd_link_info *info,
4ce794b7
AM
5691 Elf_Internal_Rela *rel,
5692 struct elf_link_hash_entry *h,
5693 Elf_Internal_Sym *sym)
5bd4f169 5694{
ccfa59ea
AM
5695 asection *rsec;
5696
ccfa59ea
AM
5697 /* Syms return NULL if we're marking .opd, so we avoid marking all
5698 function sections, as all functions are referenced in .opd. */
5699 rsec = NULL;
5700 if (get_opd_info (sec) != NULL)
5701 return rsec;
1e2f5b6e 5702
5bd4f169
AM
5703 if (h != NULL)
5704 {
04c9666a 5705 enum elf_ppc64_reloc_type r_type;
b31867b6 5706 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5707
4ce794b7 5708 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5709 switch (r_type)
5bd4f169
AM
5710 {
5711 case R_PPC64_GNU_VTINHERIT:
5712 case R_PPC64_GNU_VTENTRY:
5713 break;
5714
5715 default:
5716 switch (h->root.type)
5717 {
5718 case bfd_link_hash_defined:
5719 case bfd_link_hash_defweak:
ccfa59ea 5720 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5721 fdh = defined_func_desc (eh);
5722 if (fdh != NULL)
8c5b4e52
AM
5723 {
5724 /* -mcall-aixdesc code references the dot-symbol on
5725 a call reloc. Mark the function descriptor too
5726 against garbage collection. */
5727 fdh->elf.mark = 1;
60d67dc8
AM
5728 if (fdh->elf.is_weakalias)
5729 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5730 eh = fdh;
5731 }
1e2f5b6e
AM
5732
5733 /* Function descriptor syms cause the associated
5734 function code sym section to be marked. */
b31867b6
AM
5735 fh = defined_code_entry (eh);
5736 if (fh != NULL)
ccfa59ea
AM
5737 {
5738 /* They also mark their opd section. */
74f0fb50 5739 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5740
b31867b6 5741 rsec = fh->elf.root.u.def.section;
ccfa59ea 5742 }
8387904d
AM
5743 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5744 && opd_entry_value (eh->elf.root.u.def.section,
5745 eh->elf.root.u.def.value,
aef36ac1 5746 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5747 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5748 else
1e2f5b6e
AM
5749 rsec = h->root.u.def.section;
5750 break;
5bd4f169
AM
5751
5752 case bfd_link_hash_common:
1e2f5b6e
AM
5753 rsec = h->root.u.c.p->section;
5754 break;
5bd4f169
AM
5755
5756 default:
fb34365b 5757 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5758 }
5759 }
5760 }
5761 else
5762 {
74f0fb50 5763 struct _opd_sec_data *opd;
1e2f5b6e
AM
5764
5765 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5766 opd = get_opd_info (rsec);
5767 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5768 {
74f0fb50 5769 rsec->gc_mark = 1;
ccfa59ea 5770
51aecdc5 5771 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5772 }
5bd4f169
AM
5773 }
5774
1e2f5b6e 5775 return rsec;
5bd4f169
AM
5776}
5777
deb0e272
AM
5778/* The maximum size of .sfpr. */
5779#define SFPR_MAX (218*4)
5780
5781struct sfpr_def_parms
5782{
699733f6
AM
5783 const char name[12];
5784 unsigned char lo, hi;
2cdcc330
AM
5785 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5786 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5787};
5788
a4b6fadd
AM
5789/* Auto-generate _save*, _rest* functions in .sfpr.
5790 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5791 instead. */
deb0e272 5792
4dfe6ac6 5793static bfd_boolean
a4b6fadd
AM
5794sfpr_define (struct bfd_link_info *info,
5795 const struct sfpr_def_parms *parm,
5796 asection *stub_sec)
deb0e272
AM
5797{
5798 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5799 unsigned int i;
5800 size_t len = strlen (parm->name);
5801 bfd_boolean writing = FALSE;
699733f6 5802 char sym[16];
deb0e272 5803
4dfe6ac6
NC
5804 if (htab == NULL)
5805 return FALSE;
5806
deb0e272
AM
5807 memcpy (sym, parm->name, len);
5808 sym[len + 2] = 0;
5809
5810 for (i = parm->lo; i <= parm->hi; i++)
5811 {
a4b6fadd 5812 struct ppc_link_hash_entry *h;
deb0e272
AM
5813
5814 sym[len + 0] = i / 10 + '0';
5815 sym[len + 1] = i % 10 + '0';
a4b6fadd 5816 h = (struct ppc_link_hash_entry *)
b32547cd 5817 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5818 if (stub_sec != NULL)
deb0e272 5819 {
a4b6fadd
AM
5820 if (h != NULL
5821 && h->elf.root.type == bfd_link_hash_defined
5822 && h->elf.root.u.def.section == htab->sfpr)
5823 {
5824 struct elf_link_hash_entry *s;
5825 char buf[32];
5826 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5827 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5828 if (s == NULL)
5829 return FALSE;
5830 if (s->root.type == bfd_link_hash_new
5831 || (s->root.type = bfd_link_hash_defined
5832 && s->root.u.def.section == stub_sec))
5833 {
5834 s->root.type = bfd_link_hash_defined;
5835 s->root.u.def.section = stub_sec;
7dda8d3c 5836 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5837 + h->elf.root.u.def.value);
5838 s->ref_regular = 1;
5839 s->def_regular = 1;
5840 s->ref_regular_nonweak = 1;
5841 s->forced_local = 1;
5842 s->non_elf = 0;
5843 s->root.linker_def = 1;
5844 }
5845 }
5846 continue;
5847 }
5848 if (h != NULL)
5849 {
5850 h->save_res = 1;
5851 if (!h->elf.def_regular)
deb0e272 5852 {
a4b6fadd
AM
5853 h->elf.root.type = bfd_link_hash_defined;
5854 h->elf.root.u.def.section = htab->sfpr;
5855 h->elf.root.u.def.value = htab->sfpr->size;
5856 h->elf.type = STT_FUNC;
5857 h->elf.def_regular = 1;
b32547cd 5858 h->elf.non_elf = 0;
a4b6fadd
AM
5859 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5860 writing = TRUE;
deb0e272 5861 if (htab->sfpr->contents == NULL)
a4b6fadd 5862 {
2cdcc330
AM
5863 htab->sfpr->contents
5864 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5865 if (htab->sfpr->contents == NULL)
5866 return FALSE;
5867 }
deb0e272
AM
5868 }
5869 }
5870 if (writing)
5871 {
5872 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5873 if (i != parm->hi)
5874 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5875 else
5876 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5877 htab->sfpr->size = p - htab->sfpr->contents;
5878 }
5879 }
5880
5881 return TRUE;
5882}
5883
5884static bfd_byte *
5885savegpr0 (bfd *abfd, bfd_byte *p, int r)
5886{
5887 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5888 return p + 4;
5889}
5890
5891static bfd_byte *
5892savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5893{
5894 p = savegpr0 (abfd, p, r);
a078d95a 5895 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5896 p = p + 4;
5897 bfd_put_32 (abfd, BLR, p);
5898 return p + 4;
5899}
5900
5901static bfd_byte *
5902restgpr0 (bfd *abfd, bfd_byte *p, int r)
5903{
5904 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5905 return p + 4;
5906}
5907
5908static bfd_byte *
5909restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5910{
a078d95a 5911 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5912 p = p + 4;
5913 p = restgpr0 (abfd, p, r);
5914 bfd_put_32 (abfd, MTLR_R0, p);
5915 p = p + 4;
5916 if (r == 29)
5917 {
5918 p = restgpr0 (abfd, p, 30);
5919 p = restgpr0 (abfd, p, 31);
5920 }
5921 bfd_put_32 (abfd, BLR, p);
5922 return p + 4;
5923}
5924
5925static bfd_byte *
5926savegpr1 (bfd *abfd, bfd_byte *p, int r)
5927{
5928 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5929 return p + 4;
5930}
5931
5932static bfd_byte *
5933savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5934{
5935 p = savegpr1 (abfd, p, r);
5936 bfd_put_32 (abfd, BLR, p);
5937 return p + 4;
5938}
5939
5940static bfd_byte *
5941restgpr1 (bfd *abfd, bfd_byte *p, int r)
5942{
5943 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5944 return p + 4;
5945}
5946
5947static bfd_byte *
5948restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5949{
5950 p = restgpr1 (abfd, p, r);
5951 bfd_put_32 (abfd, BLR, p);
5952 return p + 4;
5953}
5954
5955static bfd_byte *
5956savefpr (bfd *abfd, bfd_byte *p, int r)
5957{
5958 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5959 return p + 4;
5960}
5961
5962static bfd_byte *
5963savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5964{
5965 p = savefpr (abfd, p, r);
a078d95a 5966 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5967 p = p + 4;
5968 bfd_put_32 (abfd, BLR, p);
5969 return p + 4;
5970}
5971
5972static bfd_byte *
5973restfpr (bfd *abfd, bfd_byte *p, int r)
5974{
5975 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5976 return p + 4;
5977}
5978
5979static bfd_byte *
5980restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5981{
a078d95a 5982 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5983 p = p + 4;
5984 p = restfpr (abfd, p, r);
5985 bfd_put_32 (abfd, MTLR_R0, p);
5986 p = p + 4;
5987 if (r == 29)
5988 {
5989 p = restfpr (abfd, p, 30);
5990 p = restfpr (abfd, p, 31);
5991 }
5992 bfd_put_32 (abfd, BLR, p);
5993 return p + 4;
5994}
5995
5996static bfd_byte *
5997savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5998{
5999 p = savefpr (abfd, p, r);
6000 bfd_put_32 (abfd, BLR, p);
6001 return p + 4;
6002}
6003
6004static bfd_byte *
6005restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6006{
6007 p = restfpr (abfd, p, r);
6008 bfd_put_32 (abfd, BLR, p);
6009 return p + 4;
6010}
6011
6012static bfd_byte *
6013savevr (bfd *abfd, bfd_byte *p, int r)
6014{
6015 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6016 p = p + 4;
6017 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6018 return p + 4;
6019}
6020
6021static bfd_byte *
6022savevr_tail (bfd *abfd, bfd_byte *p, int r)
6023{
6024 p = savevr (abfd, p, r);
6025 bfd_put_32 (abfd, BLR, p);
6026 return p + 4;
6027}
6028
6029static bfd_byte *
6030restvr (bfd *abfd, bfd_byte *p, int r)
6031{
6032 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6033 p = p + 4;
6034 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6035 return p + 4;
6036}
6037
6038static bfd_byte *
6039restvr_tail (bfd *abfd, bfd_byte *p, int r)
6040{
6041 p = restvr (abfd, p, r);
6042 bfd_put_32 (abfd, BLR, p);
6043 return p + 4;
6044}
6045
e86ce104
AM
6046/* Called via elf_link_hash_traverse to transfer dynamic linking
6047 information on function code symbol entries to their corresponding
6048 function descriptor symbol entries. */
deb0e272 6049
b34976b6 6050static bfd_boolean
4ce794b7 6051func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6052{
e86ce104 6053 struct bfd_link_info *info;
65f38f15 6054 struct ppc_link_hash_table *htab;
50bc7936
AM
6055 struct ppc_link_hash_entry *fh;
6056 struct ppc_link_hash_entry *fdh;
6057 bfd_boolean force_local;
5bd4f169 6058
50bc7936
AM
6059 fh = (struct ppc_link_hash_entry *) h;
6060 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6061 return TRUE;
e86ce104 6062
8c5b4e52
AM
6063 if (!fh->is_func)
6064 return TRUE;
6065
6066 if (fh->elf.root.root.string[0] != '.'
6067 || fh->elf.root.root.string[1] == '\0')
6068 return TRUE;
6069
4ce794b7 6070 info = inf;
65f38f15 6071 htab = ppc_hash_table (info);
4dfe6ac6
NC
6072 if (htab == NULL)
6073 return FALSE;
5bd4f169 6074
8c5b4e52
AM
6075 /* Find the corresponding function descriptor symbol. */
6076 fdh = lookup_fdh (fh, htab);
6077
c09bdfe5
AM
6078 /* Resolve undefined references to dot-symbols as the value
6079 in the function descriptor, if we have one in a regular object.
6080 This is to satisfy cases like ".quad .foo". Calls to functions
6081 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6082 if ((fh->elf.root.type == bfd_link_hash_undefined
6083 || fh->elf.root.type == bfd_link_hash_undefweak)
6084 && (fdh->elf.root.type == bfd_link_hash_defined
6085 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6086 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6087 && opd_entry_value (fdh->elf.root.u.def.section,
6088 fdh->elf.root.u.def.value,
c09bdfe5 6089 &fh->elf.root.u.def.section,
aef36ac1 6090 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6091 {
b31867b6 6092 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6093 fh->elf.forced_local = 1;
b31867b6
AM
6094 fh->elf.def_regular = fdh->elf.def_regular;
6095 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6096 }
6097
8c5b4e52
AM
6098 if (!fh->elf.dynamic)
6099 {
6100 struct plt_entry *ent;
5bd4f169 6101
8c5b4e52
AM
6102 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6103 if (ent->plt.refcount > 0)
6104 break;
6105 if (ent == NULL)
6106 return TRUE;
6107 }
5bd4f169 6108
8c5b4e52 6109 /* Create a descriptor as undefined if necessary. */
50bc7936 6110 if (fdh == NULL
0e1862bb 6111 && !bfd_link_executable (info)
50bc7936
AM
6112 && (fh->elf.root.type == bfd_link_hash_undefined
6113 || fh->elf.root.type == bfd_link_hash_undefweak))
6114 {
908b32fc 6115 fdh = make_fdh (info, fh);
bb700d78
AM
6116 if (fdh == NULL)
6117 return FALSE;
50bc7936 6118 }
648cca2c 6119
8c5b4e52 6120 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6121 if (fdh != NULL
6122 && fdh->fake
8c5b4e52
AM
6123 && (fh->elf.root.type == bfd_link_hash_defined
6124 || fh->elf.root.type == bfd_link_hash_defweak))
6125 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6126
8c5b4e52
AM
6127 /* Transfer dynamic linking information to the function descriptor. */
6128 if (fdh != NULL)
6129 {
f5385ebf
AM
6130 fdh->elf.ref_regular |= fh->elf.ref_regular;
6131 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6132 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6133 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6134 fdh->elf.dynamic |= fh->elf.dynamic;
6135 fdh->elf.needs_plt |= (fh->elf.needs_plt
6136 || fh->elf.type == STT_FUNC
6137 || fh->elf.type == STT_GNU_IFUNC);
6138 move_plt_plist (fh, fdh);
6139
6140 if (!fdh->elf.forced_local
6141 && fh->elf.dynindx != -1)
6142 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6143 return FALSE;
e86ce104
AM
6144 }
6145
50bc7936
AM
6146 /* Now that the info is on the function descriptor, clear the
6147 function code sym info. Any function code syms for which we
6148 don't have a definition in a regular file, we force local.
6149 This prevents a shared library from exporting syms that have
6150 been imported from another library. Function code syms that
6151 are really in the library we must leave global to prevent the
6152 linker dragging in a definition from a static library. */
93f3fa99
AM
6153 force_local = (!fh->elf.def_regular
6154 || fdh == NULL
6155 || !fdh->elf.def_regular
6156 || fdh->elf.forced_local);
50bc7936
AM
6157 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6158
b34976b6 6159 return TRUE;
e86ce104 6160}
40b8271b 6161
a4b6fadd
AM
6162static const struct sfpr_def_parms save_res_funcs[] =
6163 {
6164 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6165 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6166 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6167 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6168 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6169 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6170 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6171 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6172 { "._savef", 14, 31, savefpr, savefpr1_tail },
6173 { "._restf", 14, 31, restfpr, restfpr1_tail },
6174 { "_savevr_", 20, 31, savevr, savevr_tail },
6175 { "_restvr_", 20, 31, restvr, restvr_tail }
6176 };
6177
e86ce104 6178/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6179 this hook to a) provide some gcc support functions, and b) transfer
6180 dynamic linking information gathered so far on function code symbol
6181 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6182
b34976b6 6183static bfd_boolean
4ce794b7
AM
6184ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6185 struct bfd_link_info *info)
e86ce104
AM
6186{
6187 struct ppc_link_hash_table *htab;
6188
6189 htab = ppc_hash_table (info);
4dfe6ac6
NC
6190 if (htab == NULL)
6191 return FALSE;
6192
b32547cd
AM
6193 /* Provide any missing _save* and _rest* functions. */
6194 if (htab->sfpr != NULL)
6195 {
6196 unsigned int i;
6197
6198 htab->sfpr->size = 0;
6199 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6200 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6201 return FALSE;
6202 if (htab->sfpr->size == 0)
6203 htab->sfpr->flags |= SEC_EXCLUDE;
6204 }
6205
6206 if (bfd_link_relocatable (info))
6207 return TRUE;
6208
6209 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6210 {
6211 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6212 /* Make .TOC. defined so as to prevent it being made dynamic.
6213 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6214 if (!htab->elf.hgot->def_regular
6215 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6216 {
6217 htab->elf.hgot->root.type = bfd_link_hash_defined;
6218 htab->elf.hgot->root.u.def.value = 0;
6219 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6220 htab->elf.hgot->def_regular = 1;
6221 htab->elf.hgot->root.linker_def = 1;
6222 }
dba6fa9b 6223 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6224 htab->elf.hgot->other
6225 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6226 }
c66bb0ee 6227
8c5b4e52
AM
6228 if (htab->need_func_desc_adj)
6229 {
6230 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6231 htab->need_func_desc_adj = 0;
6232 }
805fc799 6233
b34976b6 6234 return TRUE;
e86ce104
AM
6235}
6236
98bbb1b8 6237/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6238
98bbb1b8 6239static asection *
a345bc8d
AM
6240readonly_dynrelocs (struct elf_link_hash_entry *h)
6241{
6242 struct ppc_link_hash_entry *eh;
6243 struct elf_dyn_relocs *p;
6244
6245 eh = (struct ppc_link_hash_entry *) h;
6246 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6247 {
6248 asection *s = p->sec->output_section;
6249
6250 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6251 return p->sec;
a345bc8d 6252 }
98bbb1b8 6253 return NULL;
a345bc8d
AM
6254}
6255
d311bc8b 6256/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6257 aliases, that apply to read-only sections. Cannot be used after
6258 size_dynamic_sections. */
d311bc8b
AM
6259
6260static bfd_boolean
6261alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6262{
6263 struct ppc_link_hash_entry *eh;
6264
6265 eh = (struct ppc_link_hash_entry *) h;
6266 do
6267 {
6268 if (readonly_dynrelocs (&eh->elf))
6269 return TRUE;
ab2477e1 6270 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
6271 }
6272 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6273
6274 return FALSE;
6275}
8a2058b5 6276
8a9e8e72
AM
6277/* Return whether EH has pc-relative dynamic relocs. */
6278
6279static bfd_boolean
6280pc_dynrelocs (struct ppc_link_hash_entry *eh)
6281{
6282 struct elf_dyn_relocs *p;
6283
6284 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6285 if (p->pc_count != 0)
6286 return TRUE;
6287 return FALSE;
6288}
6289
8a2058b5
AM
6290/* Return true if a global entry stub will be created for H. Valid
6291 for ELFv2 before plt entries have been allocated. */
6292
6293static bfd_boolean
6294global_entry_stub (struct elf_link_hash_entry *h)
6295{
6296 struct plt_entry *pent;
6297
6298 if (!h->pointer_equality_needed
6299 || h->def_regular)
6300 return FALSE;
6301
6302 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6303 if (pent->plt.refcount > 0
6304 && pent->addend == 0)
6305 return TRUE;
6306
6307 return FALSE;
6308}
6309
e86ce104
AM
6310/* Adjust a symbol defined by a dynamic object and referenced by a
6311 regular object. The current definition is in some section of the
6312 dynamic object, but we're not including those sections. We have to
6313 change the definition to something the rest of the link can
6314 understand. */
6315
b34976b6 6316static bfd_boolean
4ce794b7
AM
6317ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6318 struct elf_link_hash_entry *h)
e86ce104
AM
6319{
6320 struct ppc_link_hash_table *htab;
5474d94f 6321 asection *s, *srel;
e86ce104
AM
6322
6323 htab = ppc_hash_table (info);
4dfe6ac6
NC
6324 if (htab == NULL)
6325 return FALSE;
e86ce104
AM
6326
6327 /* Deal with function syms. */
6328 if (h->type == STT_FUNC
e054468f 6329 || h->type == STT_GNU_IFUNC
f5385ebf 6330 || h->needs_plt)
e86ce104 6331 {
529fe20e
AM
6332 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6333 || SYMBOL_CALLS_LOCAL (info, h)
6334 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6335 /* Discard dyn_relocs when non-pic if we've decided that a
6336 function symbol is local and not an ifunc. We keep dynamic
6337 relocs for ifuncs when local rather than always emitting a
6338 plt call stub for them and defining the symbol on the call
6339 stub. We can't do that for ELFv1 anyway (a function symbol
6340 is defined on a descriptor, not code) and it can be faster at
6341 run-time due to not needing to bounce through a stub. The
6342 dyn_relocs for ifuncs will be applied even in a static
6343 executable. */
6344 if (!bfd_link_pic (info)
6345 && h->type != STT_GNU_IFUNC
6346 && local)
6347 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6348
e86ce104
AM
6349 /* Clear procedure linkage table information for any symbol that
6350 won't need a .plt entry. */
411e1bfb
AM
6351 struct plt_entry *ent;
6352 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6353 if (ent->plt.refcount > 0)
6354 break;
8387904d 6355 if (ent == NULL
2d7ad24e
AM
6356 || (h->type != STT_GNU_IFUNC
6357 && local
3e04d765
AM
6358 && (htab->can_convert_all_inline_plt
6359 || (((struct ppc_link_hash_entry *) h)->tls_mask
6360 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6361 {
411e1bfb 6362 h->plt.plist = NULL;
f5385ebf 6363 h->needs_plt = 0;
d1eca1e4 6364 h->pointer_equality_needed = 0;
40b8271b 6365 }
8a2058b5 6366 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6367 {
d1eca1e4
AM
6368 /* Taking a function's address in a read/write section
6369 doesn't require us to define the function symbol in the
6370 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6371 be used instead. The reason we prefer a few more dynamic
6372 relocs is that calling via a global entry stub costs a
6373 few more instructions, and pointer_equality_needed causes
6374 extra work in ld.so when resolving these symbols. */
529fe20e 6375 if (global_entry_stub (h))
d1eca1e4 6376 {
ab2477e1 6377 if (!readonly_dynrelocs (h))
529fe20e
AM
6378 {
6379 h->pointer_equality_needed = 0;
04383fd1
AM
6380 /* If we haven't seen a branch reloc and the symbol
6381 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6382 if (!h->needs_plt)
6383 h->plt.plist = NULL;
6384 }
6385 else if (!bfd_link_pic (info))
6386 /* We are going to be defining the function symbol on the
6387 plt stub, so no dyn_relocs needed when non-pic. */
6388 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6389 }
6390
3988aed5
AM
6391 /* ELFv2 function symbols can't have copy relocs. */
6392 return TRUE;
6393 }
6394 else if (!h->needs_plt
ab2477e1 6395 && !readonly_dynrelocs (h))
3988aed5 6396 {
04383fd1
AM
6397 /* If we haven't seen a branch reloc and the symbol isn't an
6398 ifunc then we don't need a plt entry. */
3988aed5
AM
6399 h->plt.plist = NULL;
6400 h->pointer_equality_needed = 0;
a345bc8d
AM
6401 return TRUE;
6402 }
5bd4f169 6403 }
bbd7ec4a 6404 else
411e1bfb 6405 h->plt.plist = NULL;
5bd4f169
AM
6406
6407 /* If this is a weak symbol, and there is a real definition, the
6408 processor independent code will have arranged for us to see the
6409 real definition first, and we can just use the same value. */
60d67dc8 6410 if (h->is_weakalias)
5bd4f169 6411 {
60d67dc8
AM
6412 struct elf_link_hash_entry *def = weakdef (h);
6413 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6414 h->root.u.def.section = def->root.u.def.section;
6415 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6416 if (def->root.u.def.section == htab->elf.sdynbss
6417 || def->root.u.def.section == htab->elf.sdynrelro)
6418 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6419 return TRUE;
5bd4f169
AM
6420 }
6421
5bd4f169
AM
6422 /* If we are creating a shared library, we must presume that the
6423 only references to the symbol are via the global offset table.
6424 For such cases we need not do anything here; the relocations will
6425 be handled correctly by relocate_section. */
ec73ddcd 6426 if (!bfd_link_executable (info))
b34976b6 6427 return TRUE;
5bd4f169 6428
65f38f15
AM
6429 /* If there are no references to this symbol that do not use the
6430 GOT, we don't need to generate a copy reloc. */
f5385ebf 6431 if (!h->non_got_ref)
b34976b6 6432 return TRUE;
65f38f15 6433
b186458a 6434 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6435 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6436
d93d1c80
AM
6437 /* If -z nocopyreloc was given, don't generate them either. */
6438 || info->nocopyreloc
a127494f 6439
dce2246a 6440 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6441 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6442 || (ELIMINATE_COPY_RELOCS
6443 && !h->needs_copy
6444 && !alias_readonly_dynrelocs (h))
65f38f15 6445
d93d1c80
AM
6446 /* Protected variables do not work with .dynbss. The copy in
6447 .dynbss won't be used by the shared library with the protected
6448 definition for the variable. Text relocations are preferable
6449 to an incorrect program. */
6450 || h->protected_def)
529fe20e 6451 return TRUE;
a127494f 6452
5d35169e 6453 if (h->plt.plist != NULL)
97b639ba
AM
6454 {
6455 /* We should never get here, but unfortunately there are versions
6456 of gcc out there that improperly (for this ABI) put initialized
6457 function pointers, vtable refs and suchlike in read-only
6458 sections. Allow them to proceed, but warn that this might
6459 break at runtime. */
25f53a85 6460 info->callbacks->einfo
c1c8c1ef 6461 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6462 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6463 h->root.root.string);
6464 }
5d35169e
AM
6465
6466 /* This is a reference to a symbol defined by a dynamic object which
6467 is not a function. */
6468
5bd4f169
AM
6469 /* We must allocate the symbol in our .dynbss section, which will
6470 become part of the .bss section of the executable. There will be
6471 an entry for this symbol in the .dynsym section. The dynamic
6472 object will contain position independent code, so all references
6473 from the dynamic object to this symbol will go through the global
6474 offset table. The dynamic linker will use the .dynsym entry to
6475 determine the address it must put in the global offset table, so
6476 both the dynamic object and the regular object will refer to the
6477 same memory location for the variable. */
5474d94f
AM
6478 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6479 {
6480 s = htab->elf.sdynrelro;
6481 srel = htab->elf.sreldynrelro;
6482 }
6483 else
6484 {
6485 s = htab->elf.sdynbss;
6486 srel = htab->elf.srelbss;
6487 }
1d7e9d18 6488 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6489 {
4a7e5234
AM
6490 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6491 linker to copy the initial value out of the dynamic object
6492 and into the runtime process image. */
5474d94f 6493 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6494 h->needs_copy = 1;
5bd4f169
AM
6495 }
6496
529fe20e
AM
6497 /* We no longer want dyn_relocs. */
6498 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6499 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6500}
6501
e86ce104
AM
6502/* If given a function descriptor symbol, hide both the function code
6503 sym and the descriptor. */
6504static void
4ce794b7
AM
6505ppc64_elf_hide_symbol (struct bfd_link_info *info,
6506 struct elf_link_hash_entry *h,
6507 bfd_boolean force_local)
e86ce104 6508{
34814b9f 6509 struct ppc_link_hash_entry *eh;
e86ce104
AM
6510 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6511
87469ba2
AM
6512 if (ppc_hash_table (info) == NULL)
6513 return;
6514
34814b9f
AM
6515 eh = (struct ppc_link_hash_entry *) h;
6516 if (eh->is_func_descriptor)
e86ce104 6517 {
34814b9f 6518 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6519
721956f4 6520 if (fh == NULL)
d1329ca3
AM
6521 {
6522 const char *p, *q;
b8ac2841 6523 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6524 char save;
6525
6526 /* We aren't supposed to use alloca in BFD because on
6527 systems which do not have alloca the version in libiberty
6528 calls xmalloc, which might cause the program to crash
6529 when it runs out of memory. This function doesn't have a
6530 return status, so there's no way to gracefully return an
6531 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6532 accessed; It's either a string in an ELF string table,
6533 or allocated in an objalloc structure. */
d1329ca3 6534
34814b9f 6535 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6536 save = *p;
6537 *(char *) p = '.';
34814b9f 6538 fh = (struct ppc_link_hash_entry *)
b8ac2841 6539 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6540 *(char *) p = save;
6541
6542 /* Unfortunately, if it so happens that the string we were
6543 looking for was allocated immediately before this string,
6544 then we overwrote the string terminator. That's the only
6545 reason the lookup should fail. */
6546 if (fh == NULL)
6547 {
34814b9f
AM
6548 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6549 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6550 --q, --p;
34814b9f
AM
6551 if (q < eh->elf.root.root.string && *p == '.')
6552 fh = (struct ppc_link_hash_entry *)
b8ac2841 6553 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6554 }
6555 if (fh != NULL)
6556 {
34814b9f
AM
6557 eh->oh = fh;
6558 fh->oh = eh;
d1329ca3
AM
6559 }
6560 }
e86ce104 6561 if (fh != NULL)
34814b9f 6562 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6563 }
6564}
6565
411e1bfb 6566static bfd_boolean
8843416a
AM
6567get_sym_h (struct elf_link_hash_entry **hp,
6568 Elf_Internal_Sym **symp,
6569 asection **symsecp,
f961d9dd 6570 unsigned char **tls_maskp,
8843416a
AM
6571 Elf_Internal_Sym **locsymsp,
6572 unsigned long r_symndx,
6573 bfd *ibfd)
411e1bfb 6574{
0ffa91dd 6575 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6576
6577 if (r_symndx >= symtab_hdr->sh_info)
6578 {
6579 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6580 struct elf_link_hash_entry *h;
6581
6582 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6583 h = elf_follow_link (h);
411e1bfb
AM
6584
6585 if (hp != NULL)
6586 *hp = h;
6587
6588 if (symp != NULL)
6589 *symp = NULL;
6590
6591 if (symsecp != NULL)
6592 {
6593 asection *symsec = NULL;
6594 if (h->root.type == bfd_link_hash_defined
6595 || h->root.type == bfd_link_hash_defweak)
6596 symsec = h->root.u.def.section;
6597 *symsecp = symsec;
6598 }
6599
e7b938ca 6600 if (tls_maskp != NULL)
411e1bfb
AM
6601 {
6602 struct ppc_link_hash_entry *eh;
6603
6604 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6605 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6606 }
6607 }
6608 else
6609 {
6610 Elf_Internal_Sym *sym;
6611 Elf_Internal_Sym *locsyms = *locsymsp;
6612
6613 if (locsyms == NULL)
6614 {
6615 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6616 if (locsyms == NULL)
6617 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6618 symtab_hdr->sh_info,
6619 0, NULL, NULL, NULL);
6620 if (locsyms == NULL)
6621 return FALSE;
6622 *locsymsp = locsyms;
6623 }
6624 sym = locsyms + r_symndx;
6625
6626 if (hp != NULL)
6627 *hp = NULL;
6628
6629 if (symp != NULL)
6630 *symp = sym;
6631
6632 if (symsecp != NULL)
cb33740c 6633 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6634
e7b938ca 6635 if (tls_maskp != NULL)
411e1bfb
AM
6636 {
6637 struct got_entry **lgot_ents;
f961d9dd 6638 unsigned char *tls_mask;
411e1bfb 6639
e7b938ca 6640 tls_mask = NULL;
411e1bfb
AM
6641 lgot_ents = elf_local_got_ents (ibfd);
6642 if (lgot_ents != NULL)
6643 {
e054468f
AM
6644 struct plt_entry **local_plt = (struct plt_entry **)
6645 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6646 unsigned char *lgot_masks = (unsigned char *)
e054468f 6647 (local_plt + symtab_hdr->sh_info);
e7b938ca 6648 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6649 }
e7b938ca 6650 *tls_maskp = tls_mask;
411e1bfb
AM
6651 }
6652 }
6653 return TRUE;
6654}
6655
e7b938ca 6656/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6657 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6658 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6659
6660static int
f961d9dd 6661get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6662 unsigned long *toc_symndx,
6663 bfd_vma *toc_addend,
0d4792f7 6664 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6665 const Elf_Internal_Rela *rel,
6666 bfd *ibfd)
411e1bfb
AM
6667{
6668 unsigned long r_symndx;
0d4792f7 6669 int next_r;
411e1bfb
AM
6670 struct elf_link_hash_entry *h;
6671 Elf_Internal_Sym *sym;
6672 asection *sec;
6673 bfd_vma off;
6674
6675 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6676 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6677 return 0;
411e1bfb 6678
37da22e5
AM
6679 if ((*tls_maskp != NULL
6680 && (**tls_maskp & TLS_TLS) != 0
6681 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6682 || sec == NULL
6bee8834 6683 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6684 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6685 return 1;
411e1bfb
AM
6686
6687 /* Look inside a TOC section too. */
6688 if (h != NULL)
6689 {
6690 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6691 off = h->root.u.def.value;
6692 }
6693 else
6694 off = sym->st_value;
6695 off += rel->r_addend;
6696 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6697 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6698 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6699 if (toc_symndx != NULL)
6700 *toc_symndx = r_symndx;
3a71aa26
AM
6701 if (toc_addend != NULL)
6702 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6703 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6704 return 0;
854b41e7 6705 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6706 && (next_r == -1 || next_r == -2))
6707 return 1 - next_r;
951fd09b 6708 return 1;
411e1bfb
AM
6709}
6710
3b421ab3
AM
6711/* Find (or create) an entry in the tocsave hash table. */
6712
6713static struct tocsave_entry *
6714tocsave_find (struct ppc_link_hash_table *htab,
6715 enum insert_option insert,
6716 Elf_Internal_Sym **local_syms,
6717 const Elf_Internal_Rela *irela,
6718 bfd *ibfd)
6719{
6720 unsigned long r_indx;
6721 struct elf_link_hash_entry *h;
6722 Elf_Internal_Sym *sym;
6723 struct tocsave_entry ent, *p;
6724 hashval_t hash;
6725 struct tocsave_entry **slot;
6726
6727 r_indx = ELF64_R_SYM (irela->r_info);
6728 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6729 return NULL;
6730 if (ent.sec == NULL || ent.sec->output_section == NULL)
6731 {
4eca0228 6732 _bfd_error_handler
871b3ab2 6733 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6734 return NULL;
6735 }
6736
6737 if (h != NULL)
6738 ent.offset = h->root.u.def.value;
6739 else
6740 ent.offset = sym->st_value;
6741 ent.offset += irela->r_addend;
6742
6743 hash = tocsave_htab_hash (&ent);
6744 slot = ((struct tocsave_entry **)
6745 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6746 if (slot == NULL)
6747 return NULL;
6748
6749 if (*slot == NULL)
6750 {
6751 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6752 if (p == NULL)
6753 return NULL;
6754 *p = ent;
6755 *slot = p;
6756 }
6757 return *slot;
6758}
6759
754021d0 6760/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6761 code for the old ABI, these will already have been done. */
754021d0
AM
6762
6763static bfd_boolean
6764adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6765{
6766 struct ppc_link_hash_entry *eh;
6767 asection *sym_sec;
74f0fb50 6768 struct _opd_sec_data *opd;
754021d0
AM
6769
6770 if (h->root.type == bfd_link_hash_indirect)
6771 return TRUE;
6772
754021d0
AM
6773 if (h->root.type != bfd_link_hash_defined
6774 && h->root.type != bfd_link_hash_defweak)
6775 return TRUE;
6776
6777 eh = (struct ppc_link_hash_entry *) h;
6778 if (eh->adjust_done)
6779 return TRUE;
6780
6781 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6782 opd = get_opd_info (sym_sec);
6783 if (opd != NULL && opd->adjust != NULL)
754021d0 6784 {
51aecdc5 6785 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6786 if (adjust == -1)
6787 {
6788 /* This entry has been deleted. */
b3fac117 6789 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6790 if (dsec == NULL)
6791 {
6792 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6793 if (discarded_section (dsec))
81688140 6794 {
b3fac117 6795 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6796 break;
6797 }
6798 }
4025353c 6799 eh->elf.root.u.def.value = 0;
81688140 6800 eh->elf.root.u.def.section = dsec;
4025353c
AM
6801 }
6802 else
6803 eh->elf.root.u.def.value += adjust;
754021d0
AM
6804 eh->adjust_done = 1;
6805 }
6806 return TRUE;
6807}
6808
8c1d1bb8 6809/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6810 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6811 have already been determined. */
6812
6813static bfd_boolean
6814dec_dynrel_count (bfd_vma r_info,
6815 asection *sec,
6816 struct bfd_link_info *info,
6817 Elf_Internal_Sym **local_syms,
6818 struct elf_link_hash_entry *h,
19e08130 6819 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6820{
6821 enum elf_ppc64_reloc_type r_type;
19e08130 6822 asection *sym_sec = NULL;
8c1d1bb8
AM
6823
6824 /* Can this reloc be dynamic? This switch, and later tests here
6825 should be kept in sync with the code in check_relocs. */
6826 r_type = ELF64_R_TYPE (r_info);
6827 switch (r_type)
6828 {
6829 default:
6830 return TRUE;
6831
1bdd8fac
AM
6832 case R_PPC64_TOC16:
6833 case R_PPC64_TOC16_DS:
6834 case R_PPC64_TOC16_LO:
6835 case R_PPC64_TOC16_HI:
6836 case R_PPC64_TOC16_HA:
6837 case R_PPC64_TOC16_LO_DS:
6838 if (h == NULL)
6839 return TRUE;
6840 break;
6841
8c1d1bb8
AM
6842 case R_PPC64_TPREL16:
6843 case R_PPC64_TPREL16_LO:
6844 case R_PPC64_TPREL16_HI:
6845 case R_PPC64_TPREL16_HA:
6846 case R_PPC64_TPREL16_DS:
6847 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6848 case R_PPC64_TPREL16_HIGH:
6849 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6850 case R_PPC64_TPREL16_HIGHER:
6851 case R_PPC64_TPREL16_HIGHERA:
6852 case R_PPC64_TPREL16_HIGHEST:
6853 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6854 case R_PPC64_TPREL64:
c213164a 6855 case R_PPC64_TPREL34:
8c1d1bb8
AM
6856 case R_PPC64_DTPMOD64:
6857 case R_PPC64_DTPREL64:
6858 case R_PPC64_ADDR64:
6859 case R_PPC64_REL30:
6860 case R_PPC64_REL32:
6861 case R_PPC64_REL64:
6862 case R_PPC64_ADDR14:
6863 case R_PPC64_ADDR14_BRNTAKEN:
6864 case R_PPC64_ADDR14_BRTAKEN:
6865 case R_PPC64_ADDR16:
6866 case R_PPC64_ADDR16_DS:
6867 case R_PPC64_ADDR16_HA:
6868 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6869 case R_PPC64_ADDR16_HIGH:
6870 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6871 case R_PPC64_ADDR16_HIGHER:
6872 case R_PPC64_ADDR16_HIGHERA:
6873 case R_PPC64_ADDR16_HIGHEST:
6874 case R_PPC64_ADDR16_HIGHESTA:
6875 case R_PPC64_ADDR16_LO:
6876 case R_PPC64_ADDR16_LO_DS:
6877 case R_PPC64_ADDR24:
6878 case R_PPC64_ADDR32:
6879 case R_PPC64_UADDR16:
6880 case R_PPC64_UADDR32:
6881 case R_PPC64_UADDR64:
6882 case R_PPC64_TOC:
5663e321
AM
6883 case R_PPC64_D34:
6884 case R_PPC64_D34_LO:
6885 case R_PPC64_D34_HI30:
6886 case R_PPC64_D34_HA30:
6887 case R_PPC64_ADDR16_HIGHER34:
6888 case R_PPC64_ADDR16_HIGHERA34:
6889 case R_PPC64_ADDR16_HIGHEST34:
6890 case R_PPC64_ADDR16_HIGHESTA34:
6891 case R_PPC64_D28:
8c1d1bb8
AM
6892 break;
6893 }
6894
6895 if (local_syms != NULL)
6896 {
6897 unsigned long r_symndx;
8c1d1bb8
AM
6898 bfd *ibfd = sec->owner;
6899
6900 r_symndx = ELF64_R_SYM (r_info);
6901 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6902 return FALSE;
6903 }
6904
ec73ddcd
AM
6905 if ((h != NULL
6906 && (h->root.type == bfd_link_hash_defweak
6907 || !h->def_regular))
6908 || (h != NULL
6909 && !bfd_link_executable (info)
6910 && !SYMBOLIC_BIND (info, h))
6911 || (bfd_link_pic (info)
6912 && must_be_dyn_reloc (info, r_type))
6913 || (!bfd_link_pic (info)
6914 && (h != NULL
6915 ? h->type == STT_GNU_IFUNC
6916 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
6917 ;
6918 else
6919 return TRUE;
6920
6921 if (h != NULL)
6edfbbad 6922 {
19e08130
AM
6923 struct elf_dyn_relocs *p;
6924 struct elf_dyn_relocs **pp;
6925 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6926
6927 /* elf_gc_sweep may have already removed all dyn relocs associated
6928 with local syms for a given section. Also, symbol flags are
6929 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6930 report a dynreloc miscount. */
6931 if (*pp == NULL && info->gc_sections)
6932 return TRUE;
6933
6934 while ((p = *pp) != NULL)
60124e18 6935 {
19e08130
AM
6936 if (p->sec == sec)
6937 {
6938 if (!must_be_dyn_reloc (info, r_type))
6939 p->pc_count -= 1;
6940 p->count -= 1;
6941 if (p->count == 0)
6942 *pp = p->next;
6943 return TRUE;
6944 }
6945 pp = &p->next;
60124e18 6946 }
6edfbbad 6947 }
19e08130
AM
6948 else
6949 {
6950 struct ppc_dyn_relocs *p;
6951 struct ppc_dyn_relocs **pp;
6952 void *vpp;
6953 bfd_boolean is_ifunc;
8c1d1bb8 6954
19e08130
AM
6955 if (local_syms == NULL)
6956 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6957 if (sym_sec == NULL)
6958 sym_sec = sec;
c57da1a7 6959
19e08130
AM
6960 vpp = &elf_section_data (sym_sec)->local_dynrel;
6961 pp = (struct ppc_dyn_relocs **) vpp;
6962
6963 if (*pp == NULL && info->gc_sections)
6964 return TRUE;
6965
6966 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6967 while ((p = *pp) != NULL)
8c1d1bb8 6968 {
19e08130
AM
6969 if (p->sec == sec && p->ifunc == is_ifunc)
6970 {
6971 p->count -= 1;
6972 if (p->count == 0)
6973 *pp = p->next;
6974 return TRUE;
6975 }
6976 pp = &p->next;
8c1d1bb8 6977 }
8c1d1bb8
AM
6978 }
6979
695344c0 6980 /* xgettext:c-format */
cf97bcb0
AM
6981 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6982 sec->owner, sec);
8c1d1bb8
AM
6983 bfd_set_error (bfd_error_bad_value);
6984 return FALSE;
6985}
6986
754021d0
AM
6987/* Remove unused Official Procedure Descriptor entries. Currently we
6988 only remove those associated with functions in discarded link-once
6989 sections, or weakly defined functions that have been overridden. It
6990 would be possible to remove many more entries for statically linked
6991 applications. */
6992
b34976b6 6993bfd_boolean
e7d1c40c 6994ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6995{
6996 bfd *ibfd;
754021d0 6997 bfd_boolean some_edited = FALSE;
3f764659 6998 asection *need_pad = NULL;
e7d1c40c
AM
6999 struct ppc_link_hash_table *htab;
7000
7001 htab = ppc_hash_table (info);
7002 if (htab == NULL)
7003 return FALSE;
1e2f5b6e 7004
c72f2fb2 7005 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7006 {
7007 asection *sec;
7008 Elf_Internal_Rela *relstart, *rel, *relend;
7009 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7010 Elf_Internal_Sym *local_syms;
74f0fb50 7011 struct _opd_sec_data *opd;
51aecdc5 7012 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7013 bfd_size_type cnt_16b = 0;
1e2f5b6e 7014
854b41e7
AM
7015 if (!is_ppc64_elf (ibfd))
7016 continue;
7017
1e2f5b6e 7018 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7019 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7020 continue;
7021
dbaa2011 7022 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7023 continue;
7024
1e2f5b6e
AM
7025 if (sec->output_section == bfd_abs_section_ptr)
7026 continue;
7027
7028 /* Look through the section relocs. */
7029 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7030 continue;
7031
6cdc0ccc 7032 local_syms = NULL;
0ffa91dd 7033 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7034
7035 /* Read the relocations. */
4ce794b7 7036 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7037 info->keep_memory);
1e2f5b6e 7038 if (relstart == NULL)
b34976b6 7039 return FALSE;
1e2f5b6e
AM
7040
7041 /* First run through the relocs to check they are sane, and to
7042 determine whether we need to edit this opd section. */
b34976b6 7043 need_edit = FALSE;
51aecdc5 7044 broken = FALSE;
3f764659 7045 need_pad = sec;
1e2f5b6e 7046 relend = relstart + sec->reloc_count;
50bc7936 7047 for (rel = relstart; rel < relend; )
1e2f5b6e 7048 {
04c9666a 7049 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7050 unsigned long r_symndx;
7051 asection *sym_sec;
7052 struct elf_link_hash_entry *h;
7053 Elf_Internal_Sym *sym;
51aecdc5 7054 bfd_vma offset;
1e2f5b6e 7055
51aecdc5 7056 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7057 only interested in the reloc pointing to a function entry
7058 point. */
51aecdc5
AM
7059 offset = rel->r_offset;
7060 if (rel + 1 == relend
7061 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7062 {
7063 /* If someone messes with .opd alignment then after a
7064 "ld -r" we might have padding in the middle of .opd.
7065 Also, there's nothing to prevent someone putting
7066 something silly in .opd with the assembler. No .opd
b34976b6 7067 optimization for them! */
3f764659 7068 broken_opd:
4eca0228 7069 _bfd_error_handler
871b3ab2 7070 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7071 broken = TRUE;
1e2f5b6e
AM
7072 break;
7073 }
7074
50bc7936
AM
7075 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7076 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7077 {
4eca0228 7078 _bfd_error_handler
695344c0 7079 /* xgettext:c-format */
871b3ab2 7080 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7081 ibfd, r_type);
51aecdc5 7082 broken = TRUE;
50bc7936
AM
7083 break;
7084 }
7085
1e2f5b6e 7086 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7087 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7088 r_symndx, ibfd))
50bc7936 7089 goto error_ret;
1e2f5b6e
AM
7090
7091 if (sym_sec == NULL || sym_sec->owner == NULL)
7092 {
411e1bfb
AM
7093 const char *sym_name;
7094 if (h != NULL)
7095 sym_name = h->root.root.string;
7096 else
26c61ae5
L
7097 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7098 sym_sec);
411e1bfb 7099
4eca0228 7100 _bfd_error_handler
695344c0 7101 /* xgettext:c-format */
871b3ab2 7102 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7103 ibfd, sym_name);
51aecdc5 7104 broken = TRUE;
1e2f5b6e
AM
7105 break;
7106 }
7107
51020317
AM
7108 /* opd entries are always for functions defined in the
7109 current input bfd. If the symbol isn't defined in the
7110 input bfd, then we won't be using the function in this
7111 bfd; It must be defined in a linkonce section in another
7112 bfd, or is weak. It's also possible that we are
7113 discarding the function due to a linker script /DISCARD/,
7114 which we test for via the output_section. */
7115 if (sym_sec->owner != ibfd
7116 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7117 need_edit = TRUE;
1e2f5b6e 7118
50bc7936 7119 rel += 2;
51aecdc5
AM
7120 if (rel + 1 == relend
7121 || (rel + 2 < relend
7122 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7123 ++rel;
7124
7125 if (rel == relend)
3f764659
JJ
7126 {
7127 if (sec->size == offset + 24)
7128 {
7129 need_pad = NULL;
7130 break;
7131 }
51aecdc5 7132 if (sec->size == offset + 16)
3f764659
JJ
7133 {
7134 cnt_16b++;
7135 break;
7136 }
7137 goto broken_opd;
7138 }
3f764659
JJ
7139 else if (rel + 1 < relend
7140 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7141 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7142 {
51aecdc5
AM
7143 if (rel[0].r_offset == offset + 16)
7144 cnt_16b++;
7145 else if (rel[0].r_offset != offset + 24)
7146 goto broken_opd;
3f764659
JJ
7147 }
7148 else
7149 goto broken_opd;
1e2f5b6e
AM
7150 }
7151
e7d1c40c 7152 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7153
51aecdc5 7154 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7155 {
7156 Elf_Internal_Rela *write_rel;
d4730f92 7157 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7158 bfd_byte *rptr, *wptr;
983bddc8 7159 bfd_byte *new_contents;
74f0fb50
AM
7160 bfd_size_type amt;
7161
983bddc8 7162 new_contents = NULL;
51aecdc5 7163 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7164 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7165 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7166 if (opd->adjust == NULL)
7167 return FALSE;
1e2f5b6e
AM
7168
7169 /* This seems a waste of time as input .opd sections are all
7170 zeros as generated by gcc, but I suppose there's no reason
7171 this will always be so. We might start putting something in
7172 the third word of .opd entries. */
7173 if ((sec->flags & SEC_IN_MEMORY) == 0)
7174 {
eea6121a
AM
7175 bfd_byte *loc;
7176 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7177 {
eea6121a
AM
7178 if (loc != NULL)
7179 free (loc);
50bc7936 7180 error_ret:
6cdc0ccc
AM
7181 if (local_syms != NULL
7182 && symtab_hdr->contents != (unsigned char *) local_syms)
7183 free (local_syms);
6cdc0ccc
AM
7184 if (elf_section_data (sec)->relocs != relstart)
7185 free (relstart);
b34976b6 7186 return FALSE;
6cdc0ccc 7187 }
1e2f5b6e
AM
7188 sec->contents = loc;
7189 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7190 }
7191
7192 elf_section_data (sec)->relocs = relstart;
7193
3f764659 7194 new_contents = sec->contents;
3f764659
JJ
7195 if (add_aux_fields)
7196 {
7197 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7198 if (new_contents == NULL)
7199 return FALSE;
51aecdc5 7200 need_pad = NULL;
3f764659 7201 }
b4f4e59f
AM
7202 wptr = new_contents;
7203 rptr = sec->contents;
1e2f5b6e 7204 write_rel = relstart;
51aecdc5 7205 for (rel = relstart; rel < relend; )
1e2f5b6e 7206 {
50bc7936
AM
7207 unsigned long r_symndx;
7208 asection *sym_sec;
7209 struct elf_link_hash_entry *h;
51aecdc5 7210 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7211 Elf_Internal_Sym *sym;
51aecdc5
AM
7212 long opd_ent_size;
7213 Elf_Internal_Rela *next_rel;
7214 bfd_boolean skip;
50bc7936
AM
7215
7216 r_symndx = ELF64_R_SYM (rel->r_info);
7217 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7218 r_symndx, ibfd))
50bc7936
AM
7219 goto error_ret;
7220
51aecdc5
AM
7221 next_rel = rel + 2;
7222 if (next_rel + 1 == relend
7223 || (next_rel + 2 < relend
7224 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7225 ++next_rel;
7226
7227 /* See if the .opd entry is full 24 byte or
7228 16 byte (with fd_aux entry overlapped with next
7229 fd_func). */
7230 opd_ent_size = 24;
7231 if (next_rel == relend)
1e2f5b6e 7232 {
51aecdc5 7233 if (sec->size == rel->r_offset + 16)
3f764659 7234 opd_ent_size = 16;
51aecdc5
AM
7235 }
7236 else if (next_rel->r_offset == rel->r_offset + 16)
7237 opd_ent_size = 16;
3f764659 7238
51aecdc5
AM
7239 if (h != NULL
7240 && h->root.root.string[0] == '.')
7241 {
8c5b4e52
AM
7242 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7243 if (fdh != NULL)
7244 {
7245 fdh = ppc_follow_link (fdh);
7246 if (fdh->elf.root.type != bfd_link_hash_defined
7247 && fdh->elf.root.type != bfd_link_hash_defweak)
7248 fdh = NULL;
7249 }
51aecdc5 7250 }
1e2f5b6e 7251
51aecdc5
AM
7252 skip = (sym_sec->owner != ibfd
7253 || sym_sec->output_section == bfd_abs_section_ptr);
7254 if (skip)
7255 {
7256 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7257 {
51aecdc5
AM
7258 /* Arrange for the function descriptor sym
7259 to be dropped. */
7260 fdh->elf.root.u.def.value = 0;
7261 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7262 }
51aecdc5 7263 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7264
0e1862bb 7265 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7266 rel = next_rel;
7267 else
7268 while (1)
7269 {
7270 if (!dec_dynrel_count (rel->r_info, sec, info,
7271 NULL, h, sym))
7272 goto error_ret;
754021d0 7273
51aecdc5
AM
7274 if (++rel == next_rel)
7275 break;
1e2f5b6e 7276
51aecdc5
AM
7277 r_symndx = ELF64_R_SYM (rel->r_info);
7278 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7279 r_symndx, ibfd))
7280 goto error_ret;
7281 }
50bc7936
AM
7282 }
7283 else
1e2f5b6e 7284 {
51aecdc5
AM
7285 /* We'll be keeping this opd entry. */
7286 long adjust;
7287
7288 if (fdh != NULL)
7289 {
7290 /* Redefine the function descriptor symbol to
7291 this location in the opd section. It is
7292 necessary to update the value here rather
7293 than using an array of adjustments as we do
7294 for local symbols, because various places
7295 in the generic ELF code use the value
7296 stored in u.def.value. */
7297 fdh->elf.root.u.def.value = wptr - new_contents;
7298 fdh->adjust_done = 1;
7299 }
7300
7301 /* Local syms are a bit tricky. We could
7302 tweak them as they can be cached, but
7303 we'd need to look through the local syms
7304 for the function descriptor sym which we
7305 don't have at the moment. So keep an
7306 array of adjustments. */
7307 adjust = (wptr - new_contents) - (rptr - sec->contents);
7308 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7309
7310 if (wptr != rptr)
7311 memcpy (wptr, rptr, opd_ent_size);
7312 wptr += opd_ent_size;
7313 if (add_aux_fields && opd_ent_size == 16)
7314 {
7315 memset (wptr, '\0', 8);
7316 wptr += 8;
7317 }
7318
50bc7936 7319 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7320 new opd entries. */
7321 for ( ; rel != next_rel; ++rel)
7322 {
7323 rel->r_offset += adjust;
7324 if (write_rel != rel)
7325 memcpy (write_rel, rel, sizeof (*rel));
7326 ++write_rel;
7327 }
1e2f5b6e 7328 }
51aecdc5
AM
7329
7330 rptr += opd_ent_size;
1e2f5b6e
AM
7331 }
7332
3f764659 7333 sec->size = wptr - new_contents;
1e2f5b6e 7334 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7335 if (add_aux_fields)
7336 {
7337 free (sec->contents);
7338 sec->contents = new_contents;
7339 }
7340
05bf9422 7341 /* Fudge the header size too, as this is used later in
cdcf6e38 7342 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7343 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7344 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7345 some_edited = TRUE;
1e2f5b6e 7346 }
6cdc0ccc 7347 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7348 free (relstart);
6cdc0ccc 7349
411e1bfb
AM
7350 if (local_syms != NULL
7351 && symtab_hdr->contents != (unsigned char *) local_syms)
7352 {
7353 if (!info->keep_memory)
7354 free (local_syms);
7355 else
7356 symtab_hdr->contents = (unsigned char *) local_syms;
7357 }
7358 }
7359
754021d0
AM
7360 if (some_edited)
7361 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7362
3f764659
JJ
7363 /* If we are doing a final link and the last .opd entry is just 16 byte
7364 long, add a 8 byte padding after it. */
0e1862bb 7365 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7366 {
7367 bfd_byte *p;
7368
7369 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7370 {
7371 BFD_ASSERT (need_pad->size > 0);
7372
7373 p = bfd_malloc (need_pad->size + 8);
7374 if (p == NULL)
7375 return FALSE;
699733f6 7376
2cdcc330
AM
7377 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7378 p, 0, need_pad->size))
3f764659
JJ
7379 return FALSE;
7380
7381 need_pad->contents = p;
7382 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7383 }
7384 else
7385 {
7386 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7387 if (p == NULL)
7388 return FALSE;
7389
7390 need_pad->contents = p;
7391 }
7392
7393 memset (need_pad->contents + need_pad->size, 0, 8);
7394 need_pad->size += 8;
7395 }
7396
411e1bfb
AM
7397 return TRUE;
7398}
7399
3e04d765
AM
7400/* Analyze inline PLT call relocations to see whether calls to locally
7401 defined functions can be converted to direct calls. */
7402
7403bfd_boolean
7404ppc64_elf_inline_plt (struct bfd_link_info *info)
7405{
7406 struct ppc_link_hash_table *htab;
7407 bfd *ibfd;
7408 asection *sec;
7409 bfd_vma low_vma, high_vma, limit;
7410
7411 htab = ppc_hash_table (info);
7412 if (htab == NULL)
7413 return FALSE;
7414
7415 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7416 reduced somewhat to cater for possible stubs that might be added
7417 between the call and its destination. */
7418 if (htab->params->group_size < 0)
7419 {
7420 limit = -htab->params->group_size;
7421 if (limit == 1)
7422 limit = 0x1e00000;
7423 }
7424 else
7425 {
7426 limit = htab->params->group_size;
7427 if (limit == 1)
7428 limit = 0x1c00000;
7429 }
7430
7431 low_vma = -1;
7432 high_vma = 0;
7433 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7434 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7435 {
7436 if (low_vma > sec->vma)
7437 low_vma = sec->vma;
7438 if (high_vma < sec->vma + sec->size)
7439 high_vma = sec->vma + sec->size;
7440 }
7441
7442 /* If a "bl" can reach anywhere in local code sections, then we can
7443 convert all inline PLT sequences to direct calls when the symbol
7444 is local. */
7445 if (high_vma - low_vma < limit)
7446 {
7447 htab->can_convert_all_inline_plt = 1;
7448 return TRUE;
7449 }
7450
7451 /* Otherwise, go looking through relocs for cases where a direct
7452 call won't reach. Mark the symbol on any such reloc to disable
7453 the optimization and keep the PLT entry as it seems likely that
7454 this will be better than creating trampolines. Note that this
7455 will disable the optimization for all inline PLT calls to a
7456 particular symbol, not just those that won't reach. The
7457 difficulty in doing a more precise optimization is that the
7458 linker needs to make a decision depending on whether a
7459 particular R_PPC64_PLTCALL insn can be turned into a direct
7460 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7461 the sequence, and there is nothing that ties those relocs
7462 together except their symbol. */
7463
7464 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7465 {
7466 Elf_Internal_Shdr *symtab_hdr;
7467 Elf_Internal_Sym *local_syms;
7468
7469 if (!is_ppc64_elf (ibfd))
7470 continue;
7471
7472 local_syms = NULL;
7473 symtab_hdr = &elf_symtab_hdr (ibfd);
7474
7475 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7476 if (ppc64_elf_section_data (sec)->has_pltcall
7477 && !bfd_is_abs_section (sec->output_section))
7478 {
7479 Elf_Internal_Rela *relstart, *rel, *relend;
7480
7481 /* Read the relocations. */
7482 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7483 info->keep_memory);
7484 if (relstart == NULL)
7485 return FALSE;
7486
7487 relend = relstart + sec->reloc_count;
7488 for (rel = relstart; rel < relend; )
7489 {
7490 enum elf_ppc64_reloc_type r_type;
7491 unsigned long r_symndx;
7492 asection *sym_sec;
7493 struct elf_link_hash_entry *h;
7494 Elf_Internal_Sym *sym;
7495 unsigned char *tls_maskp;
7496
7497 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7498 if (r_type != R_PPC64_PLTCALL
7499 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7500 continue;
7501
7502 r_symndx = ELF64_R_SYM (rel->r_info);
7503 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7504 r_symndx, ibfd))
7505 {
7506 if (elf_section_data (sec)->relocs != relstart)
7507 free (relstart);
7508 if (local_syms != NULL
2cdcc330 7509 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7510 free (local_syms);
7511 return FALSE;
7512 }
7513
7514 if (sym_sec != NULL && sym_sec->output_section != NULL)
7515 {
7516 bfd_vma from, to;
7517 if (h != NULL)
7518 to = h->root.u.def.value;
7519 else
7520 to = sym->st_value;
7521 to += (rel->r_addend
7522 + sym_sec->output_offset
7523 + sym_sec->output_section->vma);
7524 from = (rel->r_offset
7525 + sec->output_offset
7526 + sec->output_section->vma);
5663e321
AM
7527 if (to - from + limit < 2 * limit
7528 && !(r_type == R_PPC64_PLTCALL_NOTOC
7529 && (((h ? h->other : sym->st_other)
7530 & STO_PPC64_LOCAL_MASK)
4a4e7361 7531 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7532 *tls_maskp &= ~PLT_KEEP;
7533 }
7534 }
7535 if (elf_section_data (sec)->relocs != relstart)
7536 free (relstart);
7537 }
7538
7539 if (local_syms != NULL
7540 && symtab_hdr->contents != (unsigned char *) local_syms)
7541 {
7542 if (!info->keep_memory)
7543 free (local_syms);
7544 else
7545 symtab_hdr->contents = (unsigned char *) local_syms;
7546 }
7547 }
7548
7549 return TRUE;
7550}
7551
e1918d23 7552/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7553
e1918d23 7554asection *
e7d1c40c 7555ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7556{
411e1bfb
AM
7557 struct ppc_link_hash_table *htab;
7558
411e1bfb 7559 htab = ppc_hash_table (info);
4dfe6ac6
NC
7560 if (htab == NULL)
7561 return NULL;
7562
ee67d69a
AM
7563 if (abiversion (info->output_bfd) == 1)
7564 htab->opd_abi = 1;
7565
e7d1c40c 7566 if (htab->params->no_multi_toc)
33c0ec9d
AM
7567 htab->do_multi_toc = 0;
7568 else if (!htab->do_multi_toc)
e7d1c40c 7569 htab->params->no_multi_toc = 1;
33c0ec9d 7570
8b5f1ed8
AM
7571 /* Default to --no-plt-localentry, as this option can cause problems
7572 with symbol interposition. For example, glibc libpthread.so and
7573 libc.so duplicate many pthread symbols, with a fallback
7574 implementation in libc.so. In some cases the fallback does more
7575 work than the pthread implementation. __pthread_condattr_destroy
7576 is one such symbol: the libpthread.so implementation is
7577 localentry:0 while the libc.so implementation is localentry:8.
7578 An app that "cleverly" uses dlopen to only load necessary
7579 libraries at runtime may omit loading libpthread.so when not
7580 running multi-threaded, which then results in the libc.so
7581 fallback symbols being used and ld.so complaining. Now there
7582 are workarounds in ld (see non_zero_localentry) to detect the
7583 pthread situation, but that may not be the only case where
7584 --plt-localentry can cause trouble. */
f378ab09 7585 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7586 htab->params->plt_localentry0 = 0;
d44c746a
AM
7587 if (htab->params->plt_localentry0
7588 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7589 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7590 _bfd_error_handler
7591 (_("warning: --plt-localentry is especially dangerous without "
7592 "ld.so support to detect ABI violations"));
f378ab09 7593
3a71aa26
AM
7594 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7595 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7596 FALSE, FALSE, TRUE));
a7f2871e
AM
7597 /* Move dynamic linking info to the function descriptor sym. */
7598 if (htab->tls_get_addr != NULL)
7599 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7600 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7601 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7602 FALSE, FALSE, TRUE));
7c9cf415 7603 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7604 {
7605 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7606
7607 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7608 FALSE, FALSE, TRUE);
7609 if (opt != NULL)
7610 func_desc_adjust (opt, info);
7611 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7612 FALSE, FALSE, TRUE);
7613 if (opt_fd != NULL
7614 && (opt_fd->root.type == bfd_link_hash_defined
7615 || opt_fd->root.type == bfd_link_hash_defweak))
7616 {
7617 /* If glibc supports an optimized __tls_get_addr call stub,
7618 signalled by the presence of __tls_get_addr_opt, and we'll
7619 be calling __tls_get_addr via a plt call stub, then
7620 make __tls_get_addr point to __tls_get_addr_opt. */
7621 tga_fd = &htab->tls_get_addr_fd->elf;
7622 if (htab->elf.dynamic_sections_created
7623 && tga_fd != NULL
7624 && (tga_fd->type == STT_FUNC
7625 || tga_fd->needs_plt)
7626 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7627 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7628 {
7629 struct plt_entry *ent;
7630
7631 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7632 if (ent->plt.refcount > 0)
7633 break;
7634 if (ent != NULL)
7635 {
7636 tga_fd->root.type = bfd_link_hash_indirect;
7637 tga_fd->root.u.i.link = &opt_fd->root;
7638 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7639 opt_fd->mark = 1;
a7f2871e
AM
7640 if (opt_fd->dynindx != -1)
7641 {
7642 /* Use __tls_get_addr_opt in dynamic relocations. */
7643 opt_fd->dynindx = -1;
7644 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7645 opt_fd->dynstr_index);
7646 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7647 return NULL;
a7f2871e 7648 }
2cdcc330
AM
7649 htab->tls_get_addr_fd
7650 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7651 tga = &htab->tls_get_addr->elf;
7652 if (opt != NULL && tga != NULL)
7653 {
7654 tga->root.type = bfd_link_hash_indirect;
7655 tga->root.u.i.link = &opt->root;
7656 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7657 opt->mark = 1;
a7f2871e
AM
7658 _bfd_elf_link_hash_hide_symbol (info, opt,
7659 tga->forced_local);
7660 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7661 }
7662 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7663 htab->tls_get_addr_fd->is_func_descriptor = 1;
7664 if (htab->tls_get_addr != NULL)
7665 {
7666 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7667 htab->tls_get_addr->is_func = 1;
7668 }
7669 }
7670 }
7671 }
7c9cf415
AM
7672 else if (htab->params->tls_get_addr_opt < 0)
7673 htab->params->tls_get_addr_opt = 0;
a7f2871e 7674 }
33c0ec9d 7675 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7676}
8387904d 7677
3a71aa26
AM
7678/* Return TRUE iff REL is a branch reloc with a global symbol matching
7679 HASH1 or HASH2. */
8387904d 7680
3a71aa26
AM
7681static bfd_boolean
7682branch_reloc_hash_match (const bfd *ibfd,
7683 const Elf_Internal_Rela *rel,
7684 const struct ppc_link_hash_entry *hash1,
7685 const struct ppc_link_hash_entry *hash2)
7686{
7687 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7688 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7689 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7690
e054468f 7691 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7692 {
3a71aa26
AM
7693 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7694 struct elf_link_hash_entry *h;
8387904d 7695
3a71aa26 7696 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7697 h = elf_follow_link (h);
3a71aa26
AM
7698 if (h == &hash1->elf || h == &hash2->elf)
7699 return TRUE;
a48ebf4d 7700 }
3a71aa26 7701 return FALSE;
951fd09b 7702}
411e1bfb 7703
951fd09b
AM
7704/* Run through all the TLS relocs looking for optimization
7705 opportunities. The linker has been hacked (see ppc64elf.em) to do
7706 a preliminary section layout so that we know the TLS segment
7707 offsets. We can't optimize earlier because some optimizations need
7708 to know the tp offset, and we need to optimize before allocating
7709 dynamic relocations. */
7710
7711bfd_boolean
33c0ec9d 7712ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7713{
7714 bfd *ibfd;
7715 asection *sec;
7716 struct ppc_link_hash_table *htab;
663a1470 7717 unsigned char *toc_ref;
102890f0 7718 int pass;
951fd09b 7719
3cbc1e5e 7720 if (!bfd_link_executable (info))
411e1bfb
AM
7721 return TRUE;
7722
951fd09b 7723 htab = ppc_hash_table (info);
4dfe6ac6
NC
7724 if (htab == NULL)
7725 return FALSE;
7726
663a1470
AM
7727 /* Make two passes over the relocs. On the first pass, mark toc
7728 entries involved with tls relocs, and check that tls relocs
7729 involved in setting up a tls_get_addr call are indeed followed by
7730 such a call. If they are not, we can't do any tls optimization.
7731 On the second pass twiddle tls_mask flags to notify
7732 relocate_section that optimization can be done, and adjust got
7733 and plt refcounts. */
7734 toc_ref = NULL;
7735 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7736 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7737 {
7738 Elf_Internal_Sym *locsyms = NULL;
7739 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7740
102890f0
AM
7741 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7742 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7743 {
7744 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7745 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7746
102890f0
AM
7747 /* Read the relocations. */
7748 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7749 info->keep_memory);
7750 if (relstart == NULL)
2915c55b
JK
7751 {
7752 free (toc_ref);
7753 return FALSE;
7754 }
411e1bfb 7755
102890f0
AM
7756 relend = relstart + sec->reloc_count;
7757 for (rel = relstart; rel < relend; rel++)
7758 {
7759 enum elf_ppc64_reloc_type r_type;
7760 unsigned long r_symndx;
7761 struct elf_link_hash_entry *h;
7762 Elf_Internal_Sym *sym;
7763 asection *sym_sec;
f961d9dd 7764 unsigned char *tls_mask;
46e9995a 7765 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7766 bfd_vma value;
7767 bfd_boolean ok_tprel, is_local;
7768 long toc_ref_index = 0;
7769 int expecting_tls_get_addr = 0;
663a1470 7770 bfd_boolean ret = FALSE;
411e1bfb 7771
102890f0
AM
7772 r_symndx = ELF64_R_SYM (rel->r_info);
7773 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7774 r_symndx, ibfd))
7775 {
7776 err_free_rel:
7777 if (elf_section_data (sec)->relocs != relstart)
7778 free (relstart);
7779 if (toc_ref != NULL)
7780 free (toc_ref);
7781 if (locsyms != NULL
0ffa91dd 7782 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7783 != (unsigned char *) locsyms))
7784 free (locsyms);
663a1470 7785 return ret;
102890f0 7786 }
411e1bfb 7787
102890f0
AM
7788 if (h != NULL)
7789 {
766bc656
AM
7790 if (h->root.type == bfd_link_hash_defined
7791 || h->root.type == bfd_link_hash_defweak)
7792 value = h->root.u.def.value;
7793 else if (h->root.type == bfd_link_hash_undefweak)
7794 value = 0;
7795 else
663a1470
AM
7796 {
7797 found_tls_get_addr_arg = 0;
7798 continue;
7799 }
102890f0
AM
7800 }
7801 else
7802 /* Symbols referenced by TLS relocs must be of type
7803 STT_TLS. So no need for .opd local sym adjust. */
7804 value = sym->st_value;
7805
7806 ok_tprel = FALSE;
f749f26e
AM
7807 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7808 if (is_local)
102890f0 7809 {
766bc656
AM
7810 if (h != NULL
7811 && h->root.type == bfd_link_hash_undefweak)
7812 ok_tprel = TRUE;
c27b8c2a
AM
7813 else if (sym_sec != NULL
7814 && sym_sec->output_section != NULL)
766bc656
AM
7815 {
7816 value += sym_sec->output_offset;
7817 value += sym_sec->output_section->vma;
0b147428 7818 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
7819 /* Note that even though the prefix insns
7820 allow a 1<<33 offset we use the same test
7821 as for addis;addi. There may be a mix of
7822 pcrel and non-pcrel code and the decision
7823 to optimise is per symbol, not per TLS
7824 sequence. */
0b147428 7825 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 7826 }
102890f0 7827 }
951fd09b 7828
102890f0 7829 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7830 /* If this section has old-style __tls_get_addr calls
7831 without marker relocs, then check that each
7832 __tls_get_addr call reloc is preceded by a reloc
7833 that conceivably belongs to the __tls_get_addr arg
7834 setup insn. If we don't find matching arg setup
7835 relocs, don't do any tls optimization. */
7836 if (pass == 0
9737e8af 7837 && sec->nomark_tls_get_addr
663a1470
AM
7838 && h != NULL
7839 && (h == &htab->tls_get_addr->elf
7840 || h == &htab->tls_get_addr_fd->elf)
7841 && !found_tls_get_addr_arg
7842 && is_branch_reloc (r_type))
7843 {
25f53a85 7844 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7845 "TLS optimization disabled\n"),
7846 ibfd, sec, rel->r_offset);
7847 ret = TRUE;
7848 goto err_free_rel;
7849 }
7850
7851 found_tls_get_addr_arg = 0;
102890f0
AM
7852 switch (r_type)
7853 {
7854 case R_PPC64_GOT_TLSLD16:
7855 case R_PPC64_GOT_TLSLD16_LO:
c213164a 7856 case R_PPC64_GOT_TLSLD34:
102890f0 7857 expecting_tls_get_addr = 1;
663a1470 7858 found_tls_get_addr_arg = 1;
1a0670f3 7859 /* Fall through. */
102890f0
AM
7860
7861 case R_PPC64_GOT_TLSLD16_HI:
7862 case R_PPC64_GOT_TLSLD16_HA:
7863 /* These relocs should never be against a symbol
7864 defined in a shared lib. Leave them alone if
7865 that turns out to be the case. */
7866 if (!is_local)
7867 continue;
411e1bfb 7868
102890f0 7869 /* LD -> LE */
411e1bfb 7870 tls_set = 0;
102890f0
AM
7871 tls_clear = TLS_LD;
7872 tls_type = TLS_TLS | TLS_LD;
7873 break;
411e1bfb 7874
102890f0
AM
7875 case R_PPC64_GOT_TLSGD16:
7876 case R_PPC64_GOT_TLSGD16_LO:
c213164a 7877 case R_PPC64_GOT_TLSGD34:
102890f0 7878 expecting_tls_get_addr = 1;
663a1470 7879 found_tls_get_addr_arg = 1;
1a0670f3 7880 /* Fall through. */
102890f0
AM
7881
7882 case R_PPC64_GOT_TLSGD16_HI:
7883 case R_PPC64_GOT_TLSGD16_HA:
7884 if (ok_tprel)
7885 /* GD -> LE */
411e1bfb 7886 tls_set = 0;
102890f0
AM
7887 else
7888 /* GD -> IE */
b00a0a86 7889 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
7890 tls_clear = TLS_GD;
7891 tls_type = TLS_TLS | TLS_GD;
7892 break;
7893
c213164a 7894 case R_PPC64_GOT_TPREL34:
102890f0
AM
7895 case R_PPC64_GOT_TPREL16_DS:
7896 case R_PPC64_GOT_TPREL16_LO_DS:
7897 case R_PPC64_GOT_TPREL16_HI:
7898 case R_PPC64_GOT_TPREL16_HA:
7899 if (ok_tprel)
7900 {
7901 /* IE -> LE */
7902 tls_set = 0;
7903 tls_clear = TLS_TPREL;
7904 tls_type = TLS_TLS | TLS_TPREL;
7905 break;
7906 }
411e1bfb
AM
7907 continue;
7908
727fc41e
AM
7909 case R_PPC64_TLSGD:
7910 case R_PPC64_TLSLD:
23cedd1d
AM
7911 if (rel + 1 < relend
7912 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7913 {
7914 if (pass != 0
2cdcc330 7915 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
7916 != R_PPC64_PLTSEQ)
7917 && (ELF64_R_TYPE (rel[1].r_info)
7918 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
7919 {
7920 r_symndx = ELF64_R_SYM (rel[1].r_info);
7921 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7922 r_symndx, ibfd))
23cedd1d
AM
7923 goto err_free_rel;
7924 if (h != NULL)
7925 {
7926 struct plt_entry *ent = NULL;
7927
7928 for (ent = h->plt.plist;
7929 ent != NULL;
7930 ent = ent->next)
7931 if (ent->addend == rel[1].r_addend)
7932 break;
7933
7934 if (ent != NULL
7935 && ent->plt.refcount > 0)
7936 ent->plt.refcount -= 1;
7937 }
7938 }
7939 continue;
7940 }
663a1470 7941 found_tls_get_addr_arg = 1;
1a0670f3 7942 /* Fall through. */
663a1470
AM
7943
7944 case R_PPC64_TLS:
7945 case R_PPC64_TOC16:
7946 case R_PPC64_TOC16_LO:
102890f0
AM
7947 if (sym_sec == NULL || sym_sec != toc)
7948 continue;
7949
7950 /* Mark this toc entry as referenced by a TLS
7951 code sequence. We can do that now in the
7952 case of R_PPC64_TLS, and after checking for
7953 tls_get_addr for the TOC16 relocs. */
7954 if (toc_ref == NULL)
2cdcc330
AM
7955 toc_ref
7956 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7957 if (toc_ref == NULL)
7958 goto err_free_rel;
7959
102890f0
AM
7960 if (h != NULL)
7961 value = h->root.u.def.value;
7962 else
7963 value = sym->st_value;
7964 value += rel->r_addend;
73242275
AM
7965 if (value % 8 != 0)
7966 continue;
7967 BFD_ASSERT (value < toc->size
7968 && toc->output_offset % 8 == 0);
663a1470 7969 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7970 if (r_type == R_PPC64_TLS
7971 || r_type == R_PPC64_TLSGD
7972 || r_type == R_PPC64_TLSLD)
102890f0
AM
7973 {
7974 toc_ref[toc_ref_index] = 1;
7975 continue;
7976 }
7977
7978 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7979 continue;
7980
7981 tls_set = 0;
7982 tls_clear = 0;
7983 expecting_tls_get_addr = 2;
7984 break;
7985
7986 case R_PPC64_TPREL64:
7987 if (pass == 0
7988 || sec != toc
7989 || toc_ref == NULL
663a1470 7990 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7991 continue;
7992 if (ok_tprel)
7993 {
7994 /* IE -> LE */
7995 tls_set = TLS_EXPLICIT;
7996 tls_clear = TLS_TPREL;
7997 break;
7998 }
7999 continue;
8000
8001 case R_PPC64_DTPMOD64:
8002 if (pass == 0
8003 || sec != toc
8004 || toc_ref == NULL
663a1470 8005 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8006 continue;
8007 if (rel + 1 < relend
8008 && (rel[1].r_info
8009 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8010 && rel[1].r_offset == rel->r_offset + 8)
8011 {
8012 if (ok_tprel)
8013 /* GD -> LE */
8014 tls_set = TLS_EXPLICIT | TLS_GD;
8015 else
8016 /* GD -> IE */
b00a0a86 8017 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8018 tls_clear = TLS_GD;
8019 }
8020 else
8021 {
8022 if (!is_local)
8023 continue;
8024
8025 /* LD -> LE */
8026 tls_set = TLS_EXPLICIT;
8027 tls_clear = TLS_LD;
8028 }
8029 break;
8030
8031 default:
8032 continue;
8033 }
8034
8035 if (pass == 0)
8036 {
727fc41e 8037 if (!expecting_tls_get_addr
9737e8af 8038 || !sec->nomark_tls_get_addr)
102890f0
AM
8039 continue;
8040
3a71aa26
AM
8041 if (rel + 1 < relend
8042 && branch_reloc_hash_match (ibfd, rel + 1,
8043 htab->tls_get_addr,
8044 htab->tls_get_addr_fd))
102890f0 8045 {
3a71aa26 8046 if (expecting_tls_get_addr == 2)
102890f0 8047 {
3a71aa26 8048 /* Check for toc tls entries. */
f961d9dd 8049 unsigned char *toc_tls;
3a71aa26
AM
8050 int retval;
8051
8052 retval = get_tls_mask (&toc_tls, NULL, NULL,
8053 &locsyms,
8054 rel, ibfd);
8055 if (retval == 0)
8056 goto err_free_rel;
663a1470
AM
8057 if (toc_tls != NULL)
8058 {
37da22e5
AM
8059 if ((*toc_tls & TLS_TLS) != 0
8060 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8061 found_tls_get_addr_arg = 1;
8062 if (retval > 1)
8063 toc_ref[toc_ref_index] = 1;
8064 }
102890f0 8065 }
3a71aa26 8066 continue;
102890f0
AM
8067 }
8068
102890f0
AM
8069 /* Uh oh, we didn't find the expected call. We
8070 could just mark this symbol to exclude it
8071 from tls optimization but it's safer to skip
663a1470 8072 the entire optimization. */
695344c0 8073 /* xgettext:c-format */
25f53a85 8074 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8075 "TLS optimization disabled\n"),
8076 ibfd, sec, rel->r_offset);
8077 ret = TRUE;
8078 goto err_free_rel;
102890f0
AM
8079 }
8080
37da22e5
AM
8081 /* If we don't have old-style __tls_get_addr calls
8082 without TLSGD/TLSLD marker relocs, and we haven't
8083 found a new-style __tls_get_addr call with a
8084 marker for this symbol, then we either have a
8085 broken object file or an -mlongcall style
8086 indirect call to __tls_get_addr without a marker.
8087 Disable optimization in this case. */
8088 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8089 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8090 && !sec->nomark_tls_get_addr
37da22e5
AM
8091 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8092 != (TLS_TLS | TLS_MARK)))
8093 continue;
8094
23cedd1d 8095 if (expecting_tls_get_addr)
102890f0 8096 {
23cedd1d
AM
8097 struct plt_entry *ent = NULL;
8098
8099 if (htab->tls_get_addr != NULL)
8100 for (ent = htab->tls_get_addr->elf.plt.plist;
8101 ent != NULL;
8102 ent = ent->next)
8103 if (ent->addend == 0)
102890f0 8104 break;
411e1bfb 8105
23cedd1d
AM
8106 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8107 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8108 ent != NULL;
8109 ent = ent->next)
8110 if (ent->addend == 0)
102890f0 8111 break;
23cedd1d
AM
8112
8113 if (ent != NULL
8114 && ent->plt.refcount > 0)
8115 ent->plt.refcount -= 1;
102890f0 8116 }
411e1bfb 8117
102890f0 8118 if (tls_clear == 0)
30038c59
AM
8119 continue;
8120
102890f0
AM
8121 if ((tls_set & TLS_EXPLICIT) == 0)
8122 {
8123 struct got_entry *ent;
411e1bfb 8124
102890f0
AM
8125 /* Adjust got entry for this reloc. */
8126 if (h != NULL)
8127 ent = h->got.glist;
8128 else
8129 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8130
102890f0
AM
8131 for (; ent != NULL; ent = ent->next)
8132 if (ent->addend == rel->r_addend
8133 && ent->owner == ibfd
8134 && ent->tls_type == tls_type)
8135 break;
8136 if (ent == NULL)
8137 abort ();
411e1bfb 8138
102890f0
AM
8139 if (tls_set == 0)
8140 {
8141 /* We managed to get rid of a got entry. */
8142 if (ent->got.refcount > 0)
8143 ent->got.refcount -= 1;
8144 }
8145 }
8146 else
8147 {
8148 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8149 we'll lose one or two dyn relocs. */
8150 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8151 NULL, h, sym))
102890f0 8152 return FALSE;
411e1bfb 8153
102890f0
AM
8154 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8155 {
8156 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8157 NULL, h, sym))
102890f0
AM
8158 return FALSE;
8159 }
8160 }
411e1bfb 8161
46e9995a 8162 *tls_mask |= tls_set & 0xff;
102890f0
AM
8163 *tls_mask &= ~tls_clear;
8164 }
8c1d1bb8 8165
102890f0
AM
8166 if (elf_section_data (sec)->relocs != relstart)
8167 free (relstart);
8168 }
411e1bfb 8169
663a1470
AM
8170 if (locsyms != NULL
8171 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8172 {
8173 if (!info->keep_memory)
8174 free (locsyms);
8175 else
8176 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8177 }
8178 }
411e1bfb 8179
663a1470
AM
8180 if (toc_ref != NULL)
8181 free (toc_ref);
9a23f96e 8182 htab->do_tls_opt = 1;
b34976b6 8183 return TRUE;
1e2f5b6e 8184}
b34976b6 8185
c5614fa4
AM
8186/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8187 the values of any global symbols in a toc section that has been
8188 edited. Globals in toc sections should be a rarity, so this function
8189 sets a flag if any are found in toc sections other than the one just
de194d85 8190 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8191
8192struct adjust_toc_info
8193{
8194 asection *toc;
8195 unsigned long *skip;
8196 bfd_boolean global_toc_syms;
8197};
8198
ba761f19
AM
8199enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8200
c5614fa4
AM
8201static bfd_boolean
8202adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8203{
8204 struct ppc_link_hash_entry *eh;
8205 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8206 unsigned long i;
c5614fa4 8207
c5614fa4
AM
8208 if (h->root.type != bfd_link_hash_defined
8209 && h->root.type != bfd_link_hash_defweak)
8210 return TRUE;
8211
8212 eh = (struct ppc_link_hash_entry *) h;
8213 if (eh->adjust_done)
8214 return TRUE;
8215
8216 if (eh->elf.root.u.def.section == toc_inf->toc)
8217 {
854b41e7
AM
8218 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8219 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8220 else
854b41e7
AM
8221 i = eh->elf.root.u.def.value >> 3;
8222
ba761f19 8223 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8224 {
4eca0228 8225 _bfd_error_handler
854b41e7
AM
8226 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8227 do
8228 ++i;
ba761f19 8229 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8230 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8231 }
854b41e7
AM
8232
8233 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8234 eh->adjust_done = 1;
8235 }
8236 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8237 toc_inf->global_toc_syms = TRUE;
8238
8239 return TRUE;
8240}
8241
39eeab25
AM
8242/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8243 on a _LO variety toc/got reloc. */
560c8763
AM
8244
8245static bfd_boolean
39eeab25 8246ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8247{
39eeab25
AM
8248 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8249 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
8250 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8251 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8252 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8253 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8254 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8255 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8256 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8257 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8258 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8259 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8260 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8261 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8262 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
8263 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8264 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8265 /* Exclude lfqu by testing reloc. If relocs are ever
8266 defined for the reduced D field in psq_lu then those
8267 will need testing too. */
8268 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8269 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8270 && (insn & 1) == 0)
8271 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8272 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8273 /* Exclude stfqu. psq_stu as above for psq_lu. */
8274 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8275 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8276 && (insn & 1) == 0));
560c8763
AM
8277}
8278
4a421c53
AM
8279/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8280 pld ra,symbol@got@pcrel
dd9b12c2 8281 load/store rt,off(ra)
4a421c53 8282 or
d4b87b1e 8283 pla ra,symbol@pcrel
dd9b12c2 8284 load/store rt,off(ra)
4a421c53 8285 may be translated to
dd9b12c2 8286 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8287 nop.
8288 This function returns true if the optimization is possible, placing
dd9b12c2 8289 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8290
8291 On entry to this function, the linker has already determined that
d4b87b1e 8292 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8293 while *PINSN2 is the second instruction. */
8294
8295static bfd_boolean
dd9b12c2 8296xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8297{
77486630
AM
8298 uint64_t insn1 = *pinsn1;
8299 uint64_t insn2 = *pinsn2;
dd9b12c2 8300 bfd_signed_vma off;
4a421c53 8301
77486630
AM
8302 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8303 {
8304 /* Check that regs match. */
8305 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8306 return FALSE;
8307
8308 /* P8LS or PMLS form, non-pcrel. */
8309 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8310 return FALSE;
8311
8312 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8313 *pinsn2 = PNOP;
8314 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8315 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8316 return TRUE;
8317 }
8318
8319 insn2 >>= 32;
8320
4a421c53 8321 /* Check that regs match. */
77486630 8322 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8323 return FALSE;
8324
8325 switch ((insn2 >> 26) & 63)
8326 {
8327 default:
8328 return FALSE;
8329
8330 case 32: /* lwz */
8331 case 34: /* lbz */
8332 case 36: /* stw */
8333 case 38: /* stb */
8334 case 40: /* lhz */
8335 case 42: /* lha */
8336 case 44: /* sth */
8337 case 48: /* lfs */
8338 case 50: /* lfd */
8339 case 52: /* stfs */
8340 case 54: /* stfd */
8341 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8342 on the insn. */
77486630 8343 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8344 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8345 off = insn2 & 0xffff;
4a421c53
AM
8346 break;
8347
8348 case 58: /* lwa, ld */
dd9b12c2 8349 if ((insn2 & 1) != 0)
4a421c53 8350 return FALSE;
77486630 8351 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8352 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8353 | (insn2 & (31ULL << 21)));
dd9b12c2 8354 off = insn2 & 0xfffc;
4a421c53
AM
8355 break;
8356
8357 case 57: /* lxsd, lxssp */
dd9b12c2 8358 if ((insn2 & 3) < 2)
4a421c53 8359 return FALSE;
77486630 8360 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8361 | ((40ULL | (insn2 & 3)) << 26)
8362 | (insn2 & (31ULL << 21)));
dd9b12c2 8363 off = insn2 & 0xfffc;
4a421c53
AM
8364 break;
8365
8366 case 61: /* stxsd, stxssp, lxv, stxv */
8367 if ((insn2 & 3) == 0)
8368 return FALSE;
8369 else if ((insn2 & 3) >= 2)
8370 {
77486630 8371 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8372 | ((44ULL | (insn2 & 3)) << 26)
8373 | (insn2 & (31ULL << 21)));
dd9b12c2 8374 off = insn2 & 0xfffc;
4a421c53
AM
8375 }
8376 else
8377 {
77486630 8378 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8379 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8380 | (insn2 & (31ULL << 21)));
dd9b12c2 8381 off = insn2 & 0xfff0;
4a421c53
AM
8382 }
8383 break;
8384
8385 case 56: /* lq */
77486630 8386 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8387 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8388 off = insn2 & 0xffff;
4a421c53
AM
8389 break;
8390
8391 case 62: /* std, stq */
dd9b12c2 8392 if ((insn2 & 1) != 0)
4a421c53 8393 return FALSE;
77486630 8394 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8395 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8396 | (insn2 & (31ULL << 21)));
dd9b12c2 8397 off = insn2 & 0xfffc;
4a421c53
AM
8398 break;
8399 }
8400
77486630 8401 *pinsn1 = insn1;
4a421c53 8402 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8403 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8404 return TRUE;
8405}
8406
c5614fa4
AM
8407/* Examine all relocs referencing .toc sections in order to remove
8408 unused .toc entries. */
8409
8410bfd_boolean
33c0ec9d 8411ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8412{
8413 bfd *ibfd;
8414 struct adjust_toc_info toc_inf;
67f0cbdb 8415 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8416
67f0cbdb 8417 htab->do_toc_opt = 1;
c5614fa4 8418 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8419 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8420 {
8421 asection *toc, *sec;
8422 Elf_Internal_Shdr *symtab_hdr;
8423 Elf_Internal_Sym *local_syms;
425b145b 8424 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8425 unsigned long *skip, *drop;
8426 unsigned char *used;
8427 unsigned char *keep, last, some_unused;
8428
854b41e7
AM
8429 if (!is_ppc64_elf (ibfd))
8430 continue;
8431
c5614fa4
AM
8432 toc = bfd_get_section_by_name (ibfd, ".toc");
8433 if (toc == NULL
92b7a70f 8434 || toc->size == 0
dbaa2011
AM
8435 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8436 || discarded_section (toc))
c5614fa4
AM
8437 continue;
8438
425b145b 8439 toc_relocs = NULL;
c5614fa4 8440 local_syms = NULL;
0ffa91dd 8441 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8442
8443 /* Look at sections dropped from the final link. */
8444 skip = NULL;
8445 relstart = NULL;
8446 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8447 {
8448 if (sec->reloc_count == 0
dbaa2011 8449 || !discarded_section (sec)
c5614fa4
AM
8450 || get_opd_info (sec)
8451 || (sec->flags & SEC_ALLOC) == 0
8452 || (sec->flags & SEC_DEBUGGING) != 0)
8453 continue;
8454
8455 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8456 if (relstart == NULL)
8457 goto error_ret;
8458
8459 /* Run through the relocs to see which toc entries might be
8460 unused. */
8461 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8462 {
8463 enum elf_ppc64_reloc_type r_type;
8464 unsigned long r_symndx;
8465 asection *sym_sec;
8466 struct elf_link_hash_entry *h;
8467 Elf_Internal_Sym *sym;
8468 bfd_vma val;
8469
8470 r_type = ELF64_R_TYPE (rel->r_info);
8471 switch (r_type)
8472 {
8473 default:
8474 continue;
8475
8476 case R_PPC64_TOC16:
8477 case R_PPC64_TOC16_LO:
8478 case R_PPC64_TOC16_HI:
8479 case R_PPC64_TOC16_HA:
8480 case R_PPC64_TOC16_DS:
8481 case R_PPC64_TOC16_LO_DS:
8482 break;
8483 }
8484
8485 r_symndx = ELF64_R_SYM (rel->r_info);
8486 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8487 r_symndx, ibfd))
8488 goto error_ret;
8489
8490 if (sym_sec != toc)
8491 continue;
8492
8493 if (h != NULL)
8494 val = h->root.u.def.value;
8495 else
8496 val = sym->st_value;
8497 val += rel->r_addend;
8498
8499 if (val >= toc->size)
8500 continue;
8501
8502 /* Anything in the toc ought to be aligned to 8 bytes.
8503 If not, don't mark as unused. */
8504 if (val & 7)
8505 continue;
8506
8507 if (skip == NULL)
8508 {
854b41e7 8509 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8510 if (skip == NULL)
8511 goto error_ret;
8512 }
8513
ba761f19 8514 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8515 }
8516
8517 if (elf_section_data (sec)->relocs != relstart)
8518 free (relstart);
8519 }
8520
ba761f19
AM
8521 /* For largetoc loads of address constants, we can convert
8522 . addis rx,2,addr@got@ha
8523 . ld ry,addr@got@l(rx)
8524 to
8525 . addis rx,2,addr@toc@ha
8526 . addi ry,rx,addr@toc@l
8527 when addr is within 2G of the toc pointer. This then means
8528 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8529
ba761f19
AM
8530 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8531 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8532 && toc->reloc_count != 0)
8533 {
8534 /* Read toc relocs. */
425b145b
AM
8535 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8536 info->keep_memory);
8537 if (toc_relocs == NULL)
ba761f19
AM
8538 goto error_ret;
8539
425b145b 8540 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8541 {
8542 enum elf_ppc64_reloc_type r_type;
8543 unsigned long r_symndx;
8544 asection *sym_sec;
8545 struct elf_link_hash_entry *h;
8546 Elf_Internal_Sym *sym;
8547 bfd_vma val, addr;
8548
8549 r_type = ELF64_R_TYPE (rel->r_info);
8550 if (r_type != R_PPC64_ADDR64)
8551 continue;
8552
8553 r_symndx = ELF64_R_SYM (rel->r_info);
8554 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8555 r_symndx, ibfd))
8556 goto error_ret;
8557
425b145b 8558 if (sym_sec == NULL
c27b8c2a 8559 || sym_sec->output_section == NULL
dbaa2011 8560 || discarded_section (sym_sec))
425b145b
AM
8561 continue;
8562
afe397ea 8563 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8564 continue;
8565
8566 if (h != NULL)
bddc25c9
AM
8567 {
8568 if (h->type == STT_GNU_IFUNC)
8569 continue;
8570 val = h->root.u.def.value;
8571 }
ba761f19 8572 else
bddc25c9
AM
8573 {
8574 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8575 continue;
8576 val = sym->st_value;
8577 }
ba761f19
AM
8578 val += rel->r_addend;
8579 val += sym_sec->output_section->vma + sym_sec->output_offset;
8580
8581 /* We don't yet know the exact toc pointer value, but we
8582 know it will be somewhere in the toc section. Don't
8583 optimize if the difference from any possible toc
8584 pointer is outside [ff..f80008000, 7fff7fff]. */
8585 addr = toc->output_section->vma + TOC_BASE_OFF;
8586 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8587 continue;
8588
8589 addr = toc->output_section->vma + toc->output_section->rawsize;
8590 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8591 continue;
8592
8593 if (skip == NULL)
8594 {
8595 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8596 if (skip == NULL)
8597 goto error_ret;
8598 }
8599
8600 skip[rel->r_offset >> 3]
425b145b 8601 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8602 }
ba761f19
AM
8603 }
8604
c5614fa4
AM
8605 if (skip == NULL)
8606 continue;
8607
8608 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8609 if (used == NULL)
8610 {
8611 error_ret:
8612 if (local_syms != NULL
8613 && symtab_hdr->contents != (unsigned char *) local_syms)
8614 free (local_syms);
8615 if (sec != NULL
8616 && relstart != NULL
8617 && elf_section_data (sec)->relocs != relstart)
8618 free (relstart);
425b145b
AM
8619 if (toc_relocs != NULL
8620 && elf_section_data (toc)->relocs != toc_relocs)
8621 free (toc_relocs);
c5614fa4
AM
8622 if (skip != NULL)
8623 free (skip);
8624 return FALSE;
8625 }
8626
30038c59
AM
8627 /* Now check all kept sections that might reference the toc.
8628 Check the toc itself last. */
8629 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8630 : ibfd->sections);
c5614fa4 8631 sec != NULL;
c5614fa4 8632 sec = (sec == toc ? NULL
c5614fa4 8633 : sec->next == NULL ? toc
30038c59 8634 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8635 : sec->next))
8636 {
8637 int repeat;
8638
8639 if (sec->reloc_count == 0
dbaa2011 8640 || discarded_section (sec)
c5614fa4
AM
8641 || get_opd_info (sec)
8642 || (sec->flags & SEC_ALLOC) == 0
8643 || (sec->flags & SEC_DEBUGGING) != 0)
8644 continue;
8645
854b41e7
AM
8646 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8647 info->keep_memory);
c5614fa4 8648 if (relstart == NULL)
2915c55b
JK
8649 {
8650 free (used);
8651 goto error_ret;
8652 }
c5614fa4
AM
8653
8654 /* Mark toc entries referenced as used. */
c5614fa4 8655 do
d4f1ee75
AM
8656 {
8657 repeat = 0;
8658 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8659 {
8660 enum elf_ppc64_reloc_type r_type;
8661 unsigned long r_symndx;
8662 asection *sym_sec;
8663 struct elf_link_hash_entry *h;
8664 Elf_Internal_Sym *sym;
8665 bfd_vma val;
98528052 8666
d4f1ee75 8667 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8668 switch (r_type)
8669 {
8670 case R_PPC64_TOC16:
8671 case R_PPC64_TOC16_LO:
8672 case R_PPC64_TOC16_HI:
8673 case R_PPC64_TOC16_HA:
8674 case R_PPC64_TOC16_DS:
8675 case R_PPC64_TOC16_LO_DS:
8676 /* In case we're taking addresses of toc entries. */
8677 case R_PPC64_ADDR64:
8678 break;
c5614fa4 8679
d4f1ee75
AM
8680 default:
8681 continue;
8682 }
c5614fa4 8683
d4f1ee75
AM
8684 r_symndx = ELF64_R_SYM (rel->r_info);
8685 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8686 r_symndx, ibfd))
8687 {
8688 free (used);
8689 goto error_ret;
8690 }
c5614fa4 8691
d4f1ee75
AM
8692 if (sym_sec != toc)
8693 continue;
c5614fa4 8694
d4f1ee75
AM
8695 if (h != NULL)
8696 val = h->root.u.def.value;
8697 else
8698 val = sym->st_value;
8699 val += rel->r_addend;
ba761f19 8700
d4f1ee75
AM
8701 if (val >= toc->size)
8702 continue;
ba761f19 8703
d4f1ee75
AM
8704 if ((skip[val >> 3] & can_optimize) != 0)
8705 {
8706 bfd_vma off;
8707 unsigned char opc;
8708
8709 switch (r_type)
8710 {
8711 case R_PPC64_TOC16_HA:
ba761f19 8712 break;
ba761f19 8713
d4f1ee75
AM
8714 case R_PPC64_TOC16_LO_DS:
8715 off = rel->r_offset;
8716 off += (bfd_big_endian (ibfd) ? -2 : 3);
8717 if (!bfd_get_section_contents (ibfd, sec, &opc,
8718 off, 1))
8719 {
8720 free (used);
8721 goto error_ret;
8722 }
8723 if ((opc & (0x3f << 2)) == (58u << 2))
8724 break;
1a0670f3 8725 /* Fall through. */
ba761f19 8726
d4f1ee75
AM
8727 default:
8728 /* Wrong sort of reloc, or not a ld. We may
8729 as well clear ref_from_discarded too. */
8730 skip[val >> 3] = 0;
8731 }
8732 }
8733
8734 if (sec != toc)
8735 used[val >> 3] = 1;
8736 /* For the toc section, we only mark as used if this
8737 entry itself isn't unused. */
8738 else if ((used[rel->r_offset >> 3]
8739 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8740 && !used[val >> 3])
8741 {
8742 /* Do all the relocs again, to catch reference
8743 chains. */
8744 repeat = 1;
8745 used[val >> 3] = 1;
8746 }
8747 }
8748 }
c5614fa4 8749 while (repeat);
854b41e7
AM
8750
8751 if (elf_section_data (sec)->relocs != relstart)
8752 free (relstart);
c5614fa4
AM
8753 }
8754
8755 /* Merge the used and skip arrays. Assume that TOC
8756 doublewords not appearing as either used or unused belong
de194d85 8757 to an entry more than one doubleword in size. */
c5614fa4
AM
8758 for (drop = skip, keep = used, last = 0, some_unused = 0;
8759 drop < skip + (toc->size + 7) / 8;
8760 ++drop, ++keep)
8761 {
8762 if (*keep)
8763 {
ba761f19
AM
8764 *drop &= ~ref_from_discarded;
8765 if ((*drop & can_optimize) != 0)
8766 some_unused = 1;
c5614fa4
AM
8767 last = 0;
8768 }
b140b010 8769 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8770 {
8771 some_unused = 1;
ba761f19 8772 last = ref_from_discarded;
c5614fa4
AM
8773 }
8774 else
8775 *drop = last;
8776 }
8777
8778 free (used);
8779
8780 if (some_unused)
8781 {
8782 bfd_byte *contents, *src;
8783 unsigned long off;
d62b3684 8784 Elf_Internal_Sym *sym;
ba761f19 8785 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8786
8787 /* Shuffle the toc contents, and at the same time convert the
8788 skip array from booleans into offsets. */
8789 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8790 goto error_ret;
8791
8792 elf_section_data (toc)->this_hdr.contents = contents;
8793
8794 for (src = contents, off = 0, drop = skip;
8795 src < contents + toc->size;
8796 src += 8, ++drop)
8797 {
ba761f19
AM
8798 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8799 off += 8;
c5614fa4
AM
8800 else if (off != 0)
8801 {
8802 *drop = off;
8803 memcpy (src - off, src, 8);
8804 }
8805 }
854b41e7 8806 *drop = off;
c5614fa4
AM
8807 toc->rawsize = toc->size;
8808 toc->size = src - contents - off;
8809
ba761f19
AM
8810 /* Adjust addends for relocs against the toc section sym,
8811 and optimize any accesses we can. */
c5614fa4
AM
8812 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8813 {
8814 if (sec->reloc_count == 0
dbaa2011 8815 || discarded_section (sec))
c5614fa4
AM
8816 continue;
8817
8818 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8819 info->keep_memory);
c5614fa4
AM
8820 if (relstart == NULL)
8821 goto error_ret;
8822
8823 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8824 {
8825 enum elf_ppc64_reloc_type r_type;
8826 unsigned long r_symndx;
8827 asection *sym_sec;
8828 struct elf_link_hash_entry *h;
854b41e7 8829 bfd_vma val;
c5614fa4
AM
8830
8831 r_type = ELF64_R_TYPE (rel->r_info);
8832 switch (r_type)
8833 {
8834 default:
8835 continue;
8836
8837 case R_PPC64_TOC16:
8838 case R_PPC64_TOC16_LO:
8839 case R_PPC64_TOC16_HI:
8840 case R_PPC64_TOC16_HA:
8841 case R_PPC64_TOC16_DS:
8842 case R_PPC64_TOC16_LO_DS:
8843 case R_PPC64_ADDR64:
8844 break;
8845 }
8846
8847 r_symndx = ELF64_R_SYM (rel->r_info);
8848 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8849 r_symndx, ibfd))
8850 goto error_ret;
8851
ba761f19 8852 if (sym_sec != toc)
c5614fa4
AM
8853 continue;
8854
ba761f19
AM
8855 if (h != NULL)
8856 val = h->root.u.def.value;
8857 else
8858 {
8859 val = sym->st_value;
8860 if (val != 0)
8861 local_toc_syms = TRUE;
8862 }
8863
8864 val += rel->r_addend;
854b41e7
AM
8865
8866 if (val > toc->rawsize)
8867 val = toc->rawsize;
ba761f19
AM
8868 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8869 continue;
8870 else if ((skip[val >> 3] & can_optimize) != 0)
8871 {
8872 Elf_Internal_Rela *tocrel
425b145b 8873 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8874 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8875
8876 switch (r_type)
8877 {
8878 case R_PPC64_TOC16_HA:
8879 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8880 break;
8881
8882 case R_PPC64_TOC16_LO_DS:
8883 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8884 break;
8885
8886 default:
28942f62
AM
8887 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8888 ppc_howto_init ();
b140b010 8889 info->callbacks->einfo
695344c0 8890 /* xgettext:c-format */
174d0a74 8891 (_("%H: %s references "
b140b010
AM
8892 "optimized away TOC entry\n"),
8893 ibfd, sec, rel->r_offset,
8894 ppc64_elf_howto_table[r_type]->name);
8895 bfd_set_error (bfd_error_bad_value);
8896 goto error_ret;
ba761f19
AM
8897 }
8898 rel->r_addend = tocrel->r_addend;
8899 elf_section_data (sec)->relocs = relstart;
8900 continue;
8901 }
8902
8903 if (h != NULL || sym->st_value != 0)
8904 continue;
854b41e7
AM
8905
8906 rel->r_addend -= skip[val >> 3];
8907 elf_section_data (sec)->relocs = relstart;
c5614fa4 8908 }
854b41e7
AM
8909
8910 if (elf_section_data (sec)->relocs != relstart)
8911 free (relstart);
c5614fa4
AM
8912 }
8913
8914 /* We shouldn't have local or global symbols defined in the TOC,
8915 but handle them anyway. */
df22d223
AM
8916 if (local_syms != NULL)
8917 for (sym = local_syms;
8918 sym < local_syms + symtab_hdr->sh_info;
8919 ++sym)
8920 if (sym->st_value != 0
8921 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8922 {
8923 unsigned long i;
854b41e7 8924
df22d223
AM
8925 if (sym->st_value > toc->rawsize)
8926 i = toc->rawsize >> 3;
8927 else
8928 i = sym->st_value >> 3;
854b41e7 8929
df22d223
AM
8930 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8931 {
8932 if (local_toc_syms)
4eca0228 8933 _bfd_error_handler
df22d223
AM
8934 (_("%s defined on removed toc entry"),
8935 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8936 do
8937 ++i;
8938 while ((skip[i] & (ref_from_discarded | can_optimize)));
8939 sym->st_value = (bfd_vma) i << 3;
8940 }
d62b3684 8941
df22d223
AM
8942 sym->st_value -= skip[i];
8943 symtab_hdr->contents = (unsigned char *) local_syms;
8944 }
c5614fa4 8945
854b41e7 8946 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8947 if (toc_inf.global_toc_syms)
8948 {
8949 toc_inf.toc = toc;
8950 toc_inf.skip = skip;
8951 toc_inf.global_toc_syms = FALSE;
8952 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8953 &toc_inf);
8954 }
854b41e7
AM
8955
8956 if (toc->reloc_count != 0)
8957 {
d4730f92 8958 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8959 Elf_Internal_Rela *wrel;
8960 bfd_size_type sz;
8961
854b41e7 8962 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8963 if (toc_relocs == NULL)
8964 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8965 info->keep_memory);
8966 if (toc_relocs == NULL)
8967 goto error_ret;
8968
425b145b
AM
8969 wrel = toc_relocs;
8970 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8971 if ((skip[rel->r_offset >> 3]
8972 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8973 {
8974 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8975 wrel->r_info = rel->r_info;
8976 wrel->r_addend = rel->r_addend;
8977 ++wrel;
8978 }
8979 else if (!dec_dynrel_count (rel->r_info, toc, info,
8980 &local_syms, NULL, NULL))
8981 goto error_ret;
8982
425b145b
AM
8983 elf_section_data (toc)->relocs = toc_relocs;
8984 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8985 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8986 sz = rel_hdr->sh_entsize;
8987 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8988 }
c5614fa4 8989 }
28be611c
AM
8990 else if (toc_relocs != NULL
8991 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8992 free (toc_relocs);
c5614fa4
AM
8993
8994 if (local_syms != NULL
8995 && symtab_hdr->contents != (unsigned char *) local_syms)
8996 {
8997 if (!info->keep_memory)
8998 free (local_syms);
8999 else
9000 symtab_hdr->contents = (unsigned char *) local_syms;
9001 }
9002 free (skip);
9003 }
9004
066f4018 9005 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9006 a GOT relative or PC relative access, possibly reducing the
9007 number of GOT entries. */
066f4018
AM
9008 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9009 {
9010 asection *sec;
9011 Elf_Internal_Shdr *symtab_hdr;
9012 Elf_Internal_Sym *local_syms;
9013 Elf_Internal_Rela *relstart, *rel;
9014 bfd_vma got;
9015
9016 if (!is_ppc64_elf (ibfd))
9017 continue;
9018
903b777d 9019 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9020 continue;
9021
9022 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9023 got = 0;
9024 if (sec != NULL)
9025 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9026
9027 local_syms = NULL;
9028 symtab_hdr = &elf_symtab_hdr (ibfd);
9029
9030 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9031 {
9032 if (sec->reloc_count == 0
903b777d 9033 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9034 || discarded_section (sec))
9035 continue;
9036
9037 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9038 info->keep_memory);
9039 if (relstart == NULL)
9040 {
9041 got_error_ret:
9042 if (local_syms != NULL
9043 && symtab_hdr->contents != (unsigned char *) local_syms)
9044 free (local_syms);
9045 if (sec != NULL
9046 && relstart != NULL
9047 && elf_section_data (sec)->relocs != relstart)
9048 free (relstart);
9049 return FALSE;
9050 }
9051
9052 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9053 {
9054 enum elf_ppc64_reloc_type r_type;
9055 unsigned long r_symndx;
9056 Elf_Internal_Sym *sym;
9057 asection *sym_sec;
9058 struct elf_link_hash_entry *h;
9059 struct got_entry *ent;
133a1f60 9060 bfd_vma val, pc;
4a421c53 9061 unsigned char buf[8];
066f4018 9062 unsigned int insn;
903b777d 9063 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9064
9065 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9066 switch (r_type)
9067 {
9068 default:
9069 insn_check = no_check;
9070 break;
9071
9072 case R_PPC64_PLT16_HA:
9073 case R_PPC64_GOT_TLSLD16_HA:
9074 case R_PPC64_GOT_TLSGD16_HA:
9075 case R_PPC64_GOT_TPREL16_HA:
9076 case R_PPC64_GOT_DTPREL16_HA:
9077 case R_PPC64_GOT16_HA:
9078 case R_PPC64_TOC16_HA:
9079 insn_check = check_ha;
9080 break;
9081
9082 case R_PPC64_PLT16_LO:
9083 case R_PPC64_PLT16_LO_DS:
9084 case R_PPC64_GOT_TLSLD16_LO:
9085 case R_PPC64_GOT_TLSGD16_LO:
9086 case R_PPC64_GOT_TPREL16_LO_DS:
9087 case R_PPC64_GOT_DTPREL16_LO_DS:
9088 case R_PPC64_GOT16_LO:
9089 case R_PPC64_GOT16_LO_DS:
9090 case R_PPC64_TOC16_LO:
9091 case R_PPC64_TOC16_LO_DS:
9092 insn_check = check_lo;
9093 break;
9094 }
9095
9096 if (insn_check != no_check)
9097 {
9098 bfd_vma off = rel->r_offset & ~3;
9099
9100 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9101 goto got_error_ret;
9102
9103 insn = bfd_get_32 (ibfd, buf);
9104 if (insn_check == check_lo
9105 ? !ok_lo_toc_insn (insn, r_type)
9106 : ((insn & ((0x3f << 26) | 0x1f << 16))
9107 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9108 {
9109 char str[12];
9110
9111 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9112 sprintf (str, "%#08x", insn);
9113 info->callbacks->einfo
9114 /* xgettext:c-format */
9115 (_("%H: got/toc optimization is not supported for"
9116 " %s instruction\n"),
9117 ibfd, sec, rel->r_offset & ~3, str);
9118 continue;
9119 }
9120 }
9121
066f4018
AM
9122 switch (r_type)
9123 {
bb22a418
AM
9124 /* Note that we don't delete GOT entries for
9125 R_PPC64_GOT16_DS since we'd need a lot more
9126 analysis. For starters, the preliminary layout is
9127 before the GOT, PLT, dynamic sections and stubs are
9128 laid out. Then we'd need to allow for changes in
9129 distance between sections caused by alignment. */
066f4018
AM
9130 default:
9131 continue;
9132
066f4018
AM
9133 case R_PPC64_GOT16_HA:
9134 case R_PPC64_GOT16_LO_DS:
4a421c53 9135 case R_PPC64_GOT_PCREL34:
066f4018
AM
9136 break;
9137 }
9138
9139 r_symndx = ELF64_R_SYM (rel->r_info);
9140 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9141 r_symndx, ibfd))
9142 goto got_error_ret;
9143
6d5554a6
AM
9144 if (sym_sec == NULL
9145 || sym_sec->output_section == NULL
9146 || discarded_section (sym_sec))
9147 continue;
9148
066f4018
AM
9149 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9150 continue;
9151
9152 if (h != NULL)
9153 val = h->root.u.def.value;
9154 else
9155 val = sym->st_value;
133a1f60 9156 val += rel->r_addend;
066f4018
AM
9157 val += sym_sec->output_section->vma + sym_sec->output_offset;
9158
bb22a418
AM
9159/* Fudge factor to allow for the fact that the preliminary layout
9160 isn't exact. Reduce limits by this factor. */
9161#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9162
066f4018
AM
9163 switch (r_type)
9164 {
9165 default:
9166 continue;
9167
066f4018 9168 case R_PPC64_GOT16_HA:
bb22a418
AM
9169 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9170 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9171 continue;
9172
9173 if (!bfd_get_section_contents (ibfd, sec, buf,
9174 rel->r_offset & ~3, 4))
9175 goto got_error_ret;
9176 insn = bfd_get_32 (ibfd, buf);
9177 if (((insn & ((0x3f << 26) | 0x1f << 16))
9178 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9179 continue;
9180 break;
9181
9182 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9183 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9184 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9185 continue;
9186 if (!bfd_get_section_contents (ibfd, sec, buf,
9187 rel->r_offset & ~3, 4))
9188 goto got_error_ret;
9189 insn = bfd_get_32 (ibfd, buf);
9190 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9191 continue;
9192 break;
4a421c53
AM
9193
9194 case R_PPC64_GOT_PCREL34:
9195 pc = rel->r_offset;
9196 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9197 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9198 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9199 continue;
9200 if (!bfd_get_section_contents (ibfd, sec, buf,
9201 rel->r_offset & ~3, 8))
9202 goto got_error_ret;
9203 insn = bfd_get_32 (ibfd, buf);
9204 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9205 continue;
9206 insn = bfd_get_32 (ibfd, buf + 4);
9207 if ((insn & (0x3f << 26)) != 57u << 26)
9208 continue;
9209 break;
066f4018 9210 }
bb22a418 9211#undef LIMIT_ADJUST
066f4018
AM
9212
9213 if (h != NULL)
9214 ent = h->got.glist;
9215 else
9216 {
9217 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9218 ent = local_got_ents[r_symndx];
9219 }
9220 for (; ent != NULL; ent = ent->next)
133a1f60 9221 if (ent->addend == rel->r_addend
066f4018
AM
9222 && ent->owner == ibfd
9223 && ent->tls_type == 0)
9224 break;
9225 BFD_ASSERT (ent && ent->got.refcount > 0);
9226 ent->got.refcount -= 1;
9227 }
9228
9229 if (elf_section_data (sec)->relocs != relstart)
9230 free (relstart);
9231 }
9232
9233 if (local_syms != NULL
9234 && symtab_hdr->contents != (unsigned char *) local_syms)
9235 {
9236 if (!info->keep_memory)
9237 free (local_syms);
9238 else
9239 symtab_hdr->contents = (unsigned char *) local_syms;
9240 }
9241 }
9242
c5614fa4
AM
9243 return TRUE;
9244}
9245
1bbe0902
AM
9246/* Return true iff input section I references the TOC using
9247 instructions limited to +/-32k offsets. */
9248
9249bfd_boolean
9250ppc64_elf_has_small_toc_reloc (asection *i)
9251{
9252 return (is_ppc64_elf (i->owner)
9253 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9254}
9255
927be08e
AM
9256/* Allocate space for one GOT entry. */
9257
9258static void
9259allocate_got (struct elf_link_hash_entry *h,
9260 struct bfd_link_info *info,
9261 struct got_entry *gent)
9262{
9263 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9264 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9265 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9266 ? 16 : 8);
9267 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9268 ? 2 : 1) * sizeof (Elf64_External_Rela);
9269 asection *got = ppc64_elf_tdata (gent->owner)->got;
9270
9271 gent->got.offset = got->size;
9272 got->size += entsize;
9273
19e08130 9274 if (h->type == STT_GNU_IFUNC)
927be08e 9275 {
33e44f2e 9276 htab->elf.irelplt->size += rentsize;
19e08130 9277 htab->got_reli_size += rentsize;
927be08e 9278 }
f15d0b54 9279 else if (((bfd_link_pic (info)
f749f26e 9280 && !(gent->tls_type != 0
f15d0b54
AM
9281 && bfd_link_executable (info)
9282 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9283 || (htab->elf.dynamic_sections_created
9284 && h->dynindx != -1
9285 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9286 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9287 {
19e08130 9288 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9289 relgot->size += rentsize;
927be08e
AM
9290 }
9291}
9292
7865406b
AM
9293/* This function merges got entries in the same toc group. */
9294
9295static void
9296merge_got_entries (struct got_entry **pent)
9297{
9298 struct got_entry *ent, *ent2;
9299
9300 for (ent = *pent; ent != NULL; ent = ent->next)
9301 if (!ent->is_indirect)
9302 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9303 if (!ent2->is_indirect
9304 && ent2->addend == ent->addend
9305 && ent2->tls_type == ent->tls_type
9306 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9307 {
9308 ent2->is_indirect = TRUE;
9309 ent2->got.ent = ent;
9310 }
9311}
9312
46434633 9313/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9314
9315static bfd_boolean
46434633
AM
9316ensure_undef_dynamic (struct bfd_link_info *info,
9317 struct elf_link_hash_entry *h)
f0158f44
AM
9318{
9319 struct elf_link_hash_table *htab = elf_hash_table (info);
9320
9321 if (htab->dynamic_sections_created
46434633
AM
9322 && ((info->dynamic_undefined_weak != 0
9323 && h->root.type == bfd_link_hash_undefweak)
9324 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9325 && h->dynindx == -1
9326 && !h->forced_local
9327 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9328 return bfd_elf_link_record_dynamic_symbol (info, h);
9329 return TRUE;
9330}
9331
65f38f15
AM
9332/* Allocate space in .plt, .got and associated reloc sections for
9333 dynamic relocs. */
5bd4f169 9334
b34976b6 9335static bfd_boolean
4ce794b7 9336allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9337{
65f38f15
AM
9338 struct bfd_link_info *info;
9339 struct ppc_link_hash_table *htab;
5bd4f169 9340 asection *s;
65f38f15 9341 struct ppc_link_hash_entry *eh;
0b8bcf0d 9342 struct got_entry **pgent, *gent;
5bd4f169 9343
e92d460e 9344 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9345 return TRUE;
5bd4f169 9346
65f38f15
AM
9347 info = (struct bfd_link_info *) inf;
9348 htab = ppc_hash_table (info);
4dfe6ac6
NC
9349 if (htab == NULL)
9350 return FALSE;
5bd4f169 9351
951fd09b
AM
9352 eh = (struct ppc_link_hash_entry *) h;
9353 /* Run through the TLS GD got entries first if we're changing them
9354 to TPREL. */
b00a0a86 9355 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9356 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9357 if (gent->got.refcount > 0
9358 && (gent->tls_type & TLS_GD) != 0)
9359 {
9360 /* This was a GD entry that has been converted to TPREL. If
9361 there happens to be a TPREL entry we can use that one. */
9362 struct got_entry *ent;
9363 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9364 if (ent->got.refcount > 0
9365 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9366 && ent->addend == gent->addend
9367 && ent->owner == gent->owner)
951fd09b
AM
9368 {
9369 gent->got.refcount = 0;
9370 break;
9371 }
9372
9373 /* If not, then we'll be using our own TPREL entry. */
9374 if (gent->got.refcount != 0)
9375 gent->tls_type = TLS_TLS | TLS_TPREL;
9376 }
9377
7865406b
AM
9378 /* Remove any list entry that won't generate a word in the GOT before
9379 we call merge_got_entries. Otherwise we risk merging to empty
9380 entries. */
0b8bcf0d
AM
9381 pgent = &h->got.glist;
9382 while ((gent = *pgent) != NULL)
411e1bfb 9383 if (gent->got.refcount > 0)
7865406b
AM
9384 {
9385 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9386 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9387 {
9388 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9389 *pgent = gent->next;
9390 }
9391 else
9392 pgent = &gent->next;
9393 }
9394 else
9395 *pgent = gent->next;
9396
9397 if (!htab->do_multi_toc)
9398 merge_got_entries (&h->got.glist);
9399
9400 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9401 if (!gent->is_indirect)
411e1bfb 9402 {
ec73ddcd
AM
9403 /* Ensure we catch all the cases where this symbol should
9404 be made dynamic. */
46434633 9405 if (!ensure_undef_dynamic (info, h))
f0158f44 9406 return FALSE;
65f38f15 9407
0c8d6e5c 9408 if (!is_ppc64_elf (gent->owner))
927be08e 9409 abort ();
0ffa91dd 9410
927be08e 9411 allocate_got (h, info, gent);
411e1bfb 9412 }
65f38f15 9413
954b63d4
AM
9414 /* If no dynamic sections we can't have dynamic relocs, except for
9415 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9416 if (!htab->elf.dynamic_sections_created
9417 && h->type != STT_GNU_IFUNC)
9418 eh->dyn_relocs = NULL;
9419
529fe20e
AM
9420 /* Discard relocs on undefined symbols that must be local. */
9421 else if (h->root.type == bfd_link_hash_undefined
9422 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9423 eh->dyn_relocs = NULL;
9424
954b63d4
AM
9425 /* Also discard relocs on undefined weak syms with non-default
9426 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9427 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9428 eh->dyn_relocs = NULL;
9429
8a2058b5 9430 if (eh->dyn_relocs != NULL)
65f38f15 9431 {
8a2058b5
AM
9432 struct elf_dyn_relocs *p, **pp;
9433
57e7d118
AM
9434 /* In the shared -Bsymbolic case, discard space allocated for
9435 dynamic pc-relative relocs against symbols which turn out to
9436 be defined in regular objects. For the normal shared case,
9437 discard space for relocs that have become local due to symbol
9438 visibility changes. */
57e7d118 9439 if (bfd_link_pic (info))
65f38f15 9440 {
57e7d118
AM
9441 /* Relocs that use pc_count are those that appear on a call
9442 insn, or certain REL relocs (see must_be_dyn_reloc) that
9443 can be generated via assembly. We want calls to
9444 protected symbols to resolve directly to the function
9445 rather than going via the plt. If people want function
9446 pointer comparisons to work as expected then they should
9447 avoid writing weird assembly. */
9448 if (SYMBOL_CALLS_LOCAL (info, h))
9449 {
57e7d118
AM
9450 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9451 {
9452 p->count -= p->pc_count;
9453 p->pc_count = 0;
9454 if (p->count == 0)
9455 *pp = p->next;
9456 else
9457 pp = &p->next;
9458 }
9459 }
65f38f15 9460
954b63d4 9461 if (eh->dyn_relocs != NULL)
5bd4f169 9462 {
ec73ddcd
AM
9463 /* Ensure we catch all the cases where this symbol
9464 should be made dynamic. */
46434633 9465 if (!ensure_undef_dynamic (info, h))
f0158f44 9466 return FALSE;
5bd4f169 9467 }
65f38f15 9468 }
ec73ddcd
AM
9469
9470 /* For a fixed position executable, discard space for
9471 relocs against symbols which are not dynamic. */
9472 else if (h->type != STT_GNU_IFUNC)
57e7d118 9473 {
529fe20e
AM
9474 if (h->dynamic_adjusted
9475 && !h->def_regular
9476 && !ELF_COMMON_DEF_P (h))
f0158f44 9477 {
ec73ddcd
AM
9478 /* Ensure we catch all the cases where this symbol
9479 should be made dynamic. */
46434633 9480 if (!ensure_undef_dynamic (info, h))
f0158f44 9481 return FALSE;
dfbb6ac9 9482
ec73ddcd 9483 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9484 if (h->dynindx == -1)
9485 eh->dyn_relocs = NULL;
9486 }
9487 else
8a2058b5 9488 eh->dyn_relocs = NULL;
57e7d118
AM
9489 }
9490
9491 /* Finally, allocate space. */
9492 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9493 {
9494 asection *sreloc = elf_section_data (p->sec)->sreloc;
9495 if (eh->elf.type == STT_GNU_IFUNC)
9496 sreloc = htab->elf.irelplt;
9497 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9498 }
65f38f15 9499 }
57e7d118 9500
2d7ad24e
AM
9501 /* We might need a PLT entry when the symbol
9502 a) is dynamic, or
9503 b) is an ifunc, or
9504 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9505 d) has plt16 relocs and we are linking statically. */
9506 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9507 || h->type == STT_GNU_IFUNC
9508 || (h->needs_plt && h->dynamic_adjusted)
9509 || (h->needs_plt
9510 && h->def_regular
9511 && !htab->elf.dynamic_sections_created
3e04d765 9512 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
9513 && (((struct ppc_link_hash_entry *) h)->tls_mask
9514 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9515 {
57e7d118
AM
9516 struct plt_entry *pent;
9517 bfd_boolean doneone = FALSE;
9518 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9519 if (pent->plt.refcount > 0)
9520 {
9521 if (!htab->elf.dynamic_sections_created
9522 || h->dynindx == -1)
9523 {
2d7ad24e
AM
9524 if (h->type == STT_GNU_IFUNC)
9525 {
9526 s = htab->elf.iplt;
9527 pent->plt.offset = s->size;
9528 s->size += PLT_ENTRY_SIZE (htab);
9529 s = htab->elf.irelplt;
9530 }
9531 else
9532 {
9533 s = htab->pltlocal;
9534 pent->plt.offset = s->size;
9535 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9536 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9537 }
57e7d118
AM
9538 }
9539 else
9540 {
9541 /* If this is the first .plt entry, make room for the special
9542 first entry. */
9543 s = htab->elf.splt;
9544 if (s->size == 0)
9545 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9546
57e7d118 9547 pent->plt.offset = s->size;
65f38f15 9548
57e7d118
AM
9549 /* Make room for this entry. */
9550 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9551
57e7d118
AM
9552 /* Make room for the .glink code. */
9553 s = htab->glink;
9554 if (s->size == 0)
9e390558 9555 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9556 if (htab->opd_abi)
9557 {
9558 /* We need bigger stubs past index 32767. */
9e390558 9559 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9560 s->size += 4;
9561 s->size += 2*4;
9562 }
9563 else
9564 s->size += 4;
65f38f15 9565
57e7d118
AM
9566 /* We also need to make an entry in the .rela.plt section. */
9567 s = htab->elf.srelplt;
9568 }
2d7ad24e
AM
9569 if (s != NULL)
9570 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9571 doneone = TRUE;
9572 }
9573 else
9574 pent->plt.offset = (bfd_vma) -1;
9575 if (!doneone)
9576 {
9577 h->plt.plist = NULL;
9578 h->needs_plt = 0;
9579 }
65f38f15 9580 }
57e7d118 9581 else
65f38f15 9582 {
57e7d118
AM
9583 h->plt.plist = NULL;
9584 h->needs_plt = 0;
65f38f15
AM
9585 }
9586
b34976b6 9587 return TRUE;
65f38f15
AM
9588}
9589
9e390558
AM
9590#define PPC_LO(v) ((v) & 0xffff)
9591#define PPC_HI(v) (((v) >> 16) & 0xffff)
9592#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9593#define D34(v) \
9594 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9595#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9596
a345bc8d
AM
9597/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9598 to set up space for global entry stubs. These are put in glink,
9599 after the branch table. */
65f38f15 9600
b34976b6 9601static bfd_boolean
a345bc8d 9602size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9603{
a345bc8d
AM
9604 struct bfd_link_info *info;
9605 struct ppc_link_hash_table *htab;
9606 struct plt_entry *pent;
9e390558 9607 asection *s, *plt;
65f38f15 9608
a345bc8d
AM
9609 if (h->root.type == bfd_link_hash_indirect)
9610 return TRUE;
65f38f15 9611
a345bc8d
AM
9612 if (!h->pointer_equality_needed)
9613 return TRUE;
65f38f15 9614
a345bc8d
AM
9615 if (h->def_regular)
9616 return TRUE;
65f38f15 9617
a345bc8d
AM
9618 info = inf;
9619 htab = ppc_hash_table (info);
9620 if (htab == NULL)
9621 return FALSE;
9622
9e390558
AM
9623 s = htab->global_entry;
9624 plt = htab->elf.splt;
a345bc8d
AM
9625 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9626 if (pent->plt.offset != (bfd_vma) -1
9627 && pent->addend == 0)
9628 {
afe397ea
AM
9629 /* For ELFv2, if this symbol is not defined in a regular file
9630 and we are not generating a shared library or pie, then we
9631 need to define the symbol in the executable on a call stub.
9632 This is to avoid text relocations. */
9e390558
AM
9633 bfd_vma off, stub_align, stub_off, stub_size;
9634 unsigned int align_power;
9635
9636 stub_size = 16;
9637 stub_off = s->size;
9638 if (htab->params->plt_stub_align >= 0)
9639 align_power = htab->params->plt_stub_align;
9640 else
9641 align_power = -htab->params->plt_stub_align;
9642 /* Setting section alignment is delayed until we know it is
9643 non-empty. Otherwise the .text output section will be
9644 aligned at least to plt_stub_align even when no global
9645 entry stubs are needed. */
9646 if (s->alignment_power < align_power)
9647 s->alignment_power = align_power;
9648 stub_align = (bfd_vma) 1 << align_power;
9649 if (htab->params->plt_stub_align >= 0
9650 || ((((stub_off + stub_size - 1) & -stub_align)
9651 - (stub_off & -stub_align))
9652 > ((stub_size - 1) & -stub_align)))
9653 stub_off = (stub_off + stub_align - 1) & -stub_align;
9654 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9655 off -= stub_off + s->output_offset + s->output_section->vma;
9656 /* Note that for --plt-stub-align negative we have a possible
9657 dependency between stub offset and size. Break that
9658 dependency by assuming the max stub size when calculating
9659 the stub offset. */
9660 if (PPC_HA (off) == 0)
9661 stub_size -= 4;
8a2058b5 9662 h->root.type = bfd_link_hash_defined;
afe397ea 9663 h->root.u.def.section = s;
9e390558
AM
9664 h->root.u.def.value = stub_off;
9665 s->size = stub_off + stub_size;
a345bc8d
AM
9666 break;
9667 }
9668 return TRUE;
9669}
9670
9671/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9672 read-only sections. */
9673
9674static bfd_boolean
98bbb1b8 9675maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9676{
98bbb1b8
AM
9677 asection *sec;
9678
a345bc8d
AM
9679 if (h->root.type == bfd_link_hash_indirect)
9680 return TRUE;
9681
98bbb1b8
AM
9682 sec = readonly_dynrelocs (h);
9683 if (sec != NULL)
a345bc8d 9684 {
98bbb1b8
AM
9685 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9686
9687 info->flags |= DF_TEXTREL;
2cdcc330
AM
9688 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9689 " in read-only section `%pA'\n"),
9690 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9691
9692 /* Not an error, just cut short the traversal. */
9693 return FALSE;
65f38f15 9694 }
b34976b6 9695 return TRUE;
65f38f15
AM
9696}
9697
9698/* Set the sizes of the dynamic sections. */
9699
b34976b6 9700static bfd_boolean
ee67d69a 9701ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9702 struct bfd_link_info *info)
65f38f15
AM
9703{
9704 struct ppc_link_hash_table *htab;
9705 bfd *dynobj;
9706 asection *s;
b34976b6 9707 bfd_boolean relocs;
65f38f15 9708 bfd *ibfd;
7865406b 9709 struct got_entry *first_tlsld;
65f38f15
AM
9710
9711 htab = ppc_hash_table (info);
4dfe6ac6
NC
9712 if (htab == NULL)
9713 return FALSE;
9714
65f38f15
AM
9715 dynobj = htab->elf.dynobj;
9716 if (dynobj == NULL)
9717 abort ();
9718
9719 if (htab->elf.dynamic_sections_created)
9720 {
9721 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9722 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9723 {
3d4d4302 9724 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9725 if (s == NULL)
9726 abort ();
eea6121a 9727 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9728 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9729 }
9730 }
9731
9732 /* Set up .got offsets for local syms, and space for local dynamic
9733 relocs. */
c72f2fb2 9734 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9735 {
411e1bfb
AM
9736 struct got_entry **lgot_ents;
9737 struct got_entry **end_lgot_ents;
e054468f
AM
9738 struct plt_entry **local_plt;
9739 struct plt_entry **end_local_plt;
f961d9dd 9740 unsigned char *lgot_masks;
65f38f15
AM
9741 bfd_size_type locsymcount;
9742 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9743
0c8d6e5c 9744 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9745 continue;
9746
9747 for (s = ibfd->sections; s != NULL; s = s->next)
9748 {
19e08130 9749 struct ppc_dyn_relocs *p;
65f38f15 9750
6edfbbad 9751 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9752 {
ec338859
AM
9753 if (!bfd_is_abs_section (p->sec)
9754 && bfd_is_abs_section (p->sec->output_section))
9755 {
9756 /* Input section has been discarded, either because
9757 it is a copy of a linkonce section or due to
9758 linker script /DISCARD/, so we'll be discarding
9759 the relocs too. */
9760 }
248866a8 9761 else if (p->count != 0)
ec338859 9762 {
19e08130
AM
9763 asection *srel = elf_section_data (p->sec)->sreloc;
9764 if (p->ifunc)
33e44f2e 9765 srel = htab->elf.irelplt;
eea6121a 9766 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9767 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9768 info->flags |= DF_TEXTREL;
ec338859 9769 }
65f38f15
AM
9770 }
9771 }
9772
411e1bfb
AM
9773 lgot_ents = elf_local_got_ents (ibfd);
9774 if (!lgot_ents)
65f38f15
AM
9775 continue;
9776
0ffa91dd 9777 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9778 locsymcount = symtab_hdr->sh_info;
411e1bfb 9779 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9780 local_plt = (struct plt_entry **) end_lgot_ents;
9781 end_local_plt = local_plt + locsymcount;
f961d9dd 9782 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9783 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9784 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9785 {
0b8bcf0d 9786 struct got_entry **pent, *ent;
411e1bfb 9787
0b8bcf0d
AM
9788 pent = lgot_ents;
9789 while ((ent = *pent) != NULL)
411e1bfb
AM
9790 if (ent->got.refcount > 0)
9791 {
e7b938ca 9792 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9793 {
927be08e 9794 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9795 *pent = ent->next;
411e1bfb
AM
9796 }
9797 else
9798 {
19e08130
AM
9799 unsigned int ent_size = 8;
9800 unsigned int rel_size = sizeof (Elf64_External_Rela);
9801
eea6121a 9802 ent->got.offset = s->size;
e7b938ca 9803 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9804 {
19e08130
AM
9805 ent_size *= 2;
9806 rel_size *= 2;
9807 }
9808 s->size += ent_size;
37da22e5 9809 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9810 {
33e44f2e 9811 htab->elf.irelplt->size += rel_size;
19e08130
AM
9812 htab->got_reli_size += rel_size;
9813 }
f749f26e 9814 else if (bfd_link_dll (info))
19e08130
AM
9815 {
9816 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9817 srel->size += rel_size;
927be08e 9818 }
0b8bcf0d 9819 pent = &ent->next;
411e1bfb
AM
9820 }
9821 }
9822 else
0b8bcf0d 9823 *pent = ent->next;
65f38f15 9824 }
e054468f 9825
2d7ad24e
AM
9826 /* Allocate space for plt calls to local syms. */
9827 lgot_masks = (unsigned char *) end_local_plt;
9828 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9829 {
9830 struct plt_entry *ent;
9831
9832 for (ent = *local_plt; ent != NULL; ent = ent->next)
9833 if (ent->plt.refcount > 0)
9834 {
2d7ad24e
AM
9835 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9836 {
9837 s = htab->elf.iplt;
9838 ent->plt.offset = s->size;
9839 s->size += PLT_ENTRY_SIZE (htab);
9840 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9841 }
3e04d765
AM
9842 else if (htab->can_convert_all_inline_plt
9843 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9844 ent->plt.offset = (bfd_vma) -1;
9845 else
9846 {
9847 s = htab->pltlocal;
9848 ent->plt.offset = s->size;
9849 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9850 if (bfd_link_pic (info))
9851 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9852 }
e054468f
AM
9853 }
9854 else
9855 ent->plt.offset = (bfd_vma) -1;
9856 }
65f38f15
AM
9857 }
9858
9859 /* Allocate global sym .plt and .got entries, and space for global
9860 sym dynamic relocs. */
4ce794b7 9861 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9862
0e1862bb 9863 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9864 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9865
7865406b 9866 first_tlsld = NULL;
c72f2fb2 9867 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9868 {
7865406b
AM
9869 struct got_entry *ent;
9870
0c8d6e5c 9871 if (!is_ppc64_elf (ibfd))
102890f0
AM
9872 continue;
9873
7865406b
AM
9874 ent = ppc64_tlsld_got (ibfd);
9875 if (ent->got.refcount > 0)
102890f0 9876 {
7865406b 9877 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9878 {
7865406b
AM
9879 ent->is_indirect = TRUE;
9880 ent->got.ent = first_tlsld;
9881 }
9882 else
9883 {
9884 if (first_tlsld == NULL)
9885 first_tlsld = ent;
9886 s = ppc64_elf_tdata (ibfd)->got;
9887 ent->got.offset = s->size;
9888 ent->owner = ibfd;
9889 s->size += 16;
f749f26e 9890 if (bfd_link_dll (info))
7865406b
AM
9891 {
9892 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9893 srel->size += sizeof (Elf64_External_Rela);
9894 }
102890f0
AM
9895 }
9896 }
9897 else
7865406b 9898 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9899 }
9900
65f38f15
AM
9901 /* We now have determined the sizes of the various dynamic sections.
9902 Allocate memory for them. */
b34976b6 9903 relocs = FALSE;
65f38f15
AM
9904 for (s = dynobj->sections; s != NULL; s = s->next)
9905 {
9906 if ((s->flags & SEC_LINKER_CREATED) == 0)
9907 continue;
9908
4ce794b7 9909 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9910 /* These haven't been allocated yet; don't strip. */
9911 continue;
33e44f2e
AM
9912 else if (s == htab->elf.sgot
9913 || s == htab->elf.splt
9914 || s == htab->elf.iplt
2d7ad24e 9915 || s == htab->pltlocal
c456f082 9916 || s == htab->glink
9e390558 9917 || s == htab->global_entry
5474d94f
AM
9918 || s == htab->elf.sdynbss
9919 || s == htab->elf.sdynrelro)
65f38f15
AM
9920 {
9921 /* Strip this section if we don't need it; see the
9922 comment below. */
5bd4f169 9923 }
58d180e8
AM
9924 else if (s == htab->glink_eh_frame)
9925 {
9926 if (!bfd_is_abs_section (s->output_section))
9927 /* Not sized yet. */
9928 continue;
9929 }
70cc837d 9930 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9931 {
c456f082 9932 if (s->size != 0)
5bd4f169 9933 {
33e44f2e 9934 if (s != htab->elf.srelplt)
b34976b6 9935 relocs = TRUE;
5bd4f169
AM
9936
9937 /* We use the reloc_count field as a counter if we need
9938 to copy relocs into the output file. */
9939 s->reloc_count = 0;
9940 }
9941 }
65f38f15 9942 else
5bd4f169
AM
9943 {
9944 /* It's not one of our sections, so don't allocate space. */
9945 continue;
9946 }
9947
eea6121a 9948 if (s->size == 0)
5bd4f169 9949 {
c456f082
AM
9950 /* If we don't need this section, strip it from the
9951 output file. This is mostly to handle .rela.bss and
9952 .rela.plt. We must create both sections in
9953 create_dynamic_sections, because they must be created
9954 before the linker maps input sections to output
9955 sections. The linker does that before
9956 adjust_dynamic_symbol is called, and it is that
9957 function which decides whether anything needs to go
9958 into these sections. */
8423293d 9959 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9960 continue;
9961 }
9962
06bcf541
AM
9963 if (bfd_is_abs_section (s->output_section))
9964 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9965 s->name);
9966
c456f082 9967 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9968 continue;
9969
65f38f15
AM
9970 /* Allocate memory for the section contents. We use bfd_zalloc
9971 here in case unused entries are not reclaimed before the
9972 section's contents are written out. This should not happen,
411e1bfb
AM
9973 but this way if it does we get a R_PPC64_NONE reloc in .rela
9974 sections instead of garbage.
9975 We also rely on the section contents being zero when writing
5474d94f 9976 the GOT and .dynrelro. */
eea6121a 9977 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9978 if (s->contents == NULL)
b34976b6 9979 return FALSE;
5bd4f169
AM
9980 }
9981
c72f2fb2 9982 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9983 {
0c8d6e5c 9984 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9985 continue;
9986
e717da7e 9987 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9988 if (s != NULL && s != htab->elf.sgot)
e717da7e 9989 {
eea6121a 9990 if (s->size == 0)
8423293d 9991 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9992 else
9993 {
eea6121a 9994 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9995 if (s->contents == NULL)
9996 return FALSE;
9997 }
9998 }
9999 s = ppc64_elf_tdata (ibfd)->relgot;
10000 if (s != NULL)
10001 {
eea6121a 10002 if (s->size == 0)
8423293d 10003 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10004 else
10005 {
eea6121a 10006 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10007 if (s->contents == NULL)
10008 return FALSE;
10009 relocs = TRUE;
10010 s->reloc_count = 0;
10011 }
10012 }
10013 }
10014
e86ce104 10015 if (htab->elf.dynamic_sections_created)
5bd4f169 10016 {
e8910a83
AM
10017 bfd_boolean tls_opt;
10018
5bd4f169
AM
10019 /* Add some entries to the .dynamic section. We fill in the
10020 values later, in ppc64_elf_finish_dynamic_sections, but we
10021 must add the entries now so that we get the correct size for
10022 the .dynamic section. The DT_DEBUG entry is filled in by the
10023 dynamic linker and used by the debugger. */
dc810e39 10024#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10025 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10026
0e1862bb 10027 if (bfd_link_executable (info))
5bd4f169 10028 {
dc810e39 10029 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10030 return FALSE;
5bd4f169
AM
10031 }
10032
33e44f2e 10033 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10034 {
dc810e39
AM
10035 if (!add_dynamic_entry (DT_PLTGOT, 0)
10036 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10037 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10038 || !add_dynamic_entry (DT_JMPREL, 0)
10039 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10040 return FALSE;
5bd4f169
AM
10041 }
10042
ee67d69a 10043 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10044 {
10045 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10046 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10047 return FALSE;
19397422
AM
10048 }
10049
7c9cf415 10050 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10051 && htab->tls_get_addr_fd != NULL
10052 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10053 if (tls_opt || !htab->opd_abi)
10054 {
10055 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10056 return FALSE;
10057 }
a7f2871e 10058
5bd4f169
AM
10059 if (relocs)
10060 {
dc810e39
AM
10061 if (!add_dynamic_entry (DT_RELA, 0)
10062 || !add_dynamic_entry (DT_RELASZ, 0)
10063 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10064 return FALSE;
5bd4f169 10065
65f38f15
AM
10066 /* If any dynamic relocs apply to a read-only section,
10067 then we need a DT_TEXTREL entry. */
248866a8 10068 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10069 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10070
65f38f15 10071 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10072 {
65f38f15 10073 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10074 return FALSE;
5bd4f169 10075 }
5bd4f169 10076 }
5bd4f169 10077 }
65f38f15 10078#undef add_dynamic_entry
5bd4f169 10079
b34976b6 10080 return TRUE;
5bd4f169
AM
10081}
10082
a345bc8d
AM
10083/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10084
10085static bfd_boolean
10086ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10087{
10088 if (h->plt.plist != NULL
10089 && !h->def_regular
10090 && !h->pointer_equality_needed)
10091 return FALSE;
10092
10093 return _bfd_elf_hash_symbol (h);
10094}
10095
721956f4 10096/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10097
4ce794b7
AM
10098static inline enum ppc_stub_type
10099ppc_type_of_stub (asection *input_sec,
10100 const Elf_Internal_Rela *rel,
10101 struct ppc_link_hash_entry **hash,
e054468f 10102 struct plt_entry **plt_ent,
6911b7dc
AM
10103 bfd_vma destination,
10104 unsigned long local_off)
5bd4f169 10105{
721956f4
AM
10106 struct ppc_link_hash_entry *h = *hash;
10107 bfd_vma location;
10108 bfd_vma branch_offset;
10109 bfd_vma max_branch_offset;
4ce794b7 10110 enum elf_ppc64_reloc_type r_type;
5bd4f169 10111
721956f4
AM
10112 if (h != NULL)
10113 {
e054468f 10114 struct plt_entry *ent;
7fe2b9a6 10115 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10116 if (h->oh != NULL
10117 && h->oh->is_func_descriptor)
7b8f6675
AM
10118 {
10119 fdh = ppc_follow_link (h->oh);
10120 *hash = fdh;
10121 }
8387904d 10122
e054468f
AM
10123 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10124 if (ent->addend == rel->r_addend
10125 && ent->plt.offset != (bfd_vma) -1)
10126 {
e054468f
AM
10127 *plt_ent = ent;
10128 return ppc_stub_plt_call;
10129 }
5bd4f169 10130
7fe2b9a6
AM
10131 /* Here, we know we don't have a plt entry. If we don't have a
10132 either a defined function descriptor or a defined entry symbol
10133 in a regular object file, then it is pointless trying to make
10134 any other type of stub. */
854b41e7
AM
10135 if (!is_static_defined (&fdh->elf)
10136 && !is_static_defined (&h->elf))
721956f4 10137 return ppc_stub_none;
5d1634d7 10138 }
e054468f
AM
10139 else if (elf_local_got_ents (input_sec->owner) != NULL)
10140 {
10141 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10142 struct plt_entry **local_plt = (struct plt_entry **)
10143 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10144 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10145
10146 if (local_plt[r_symndx] != NULL)
10147 {
10148 struct plt_entry *ent;
10149
10150 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10151 if (ent->addend == rel->r_addend
10152 && ent->plt.offset != (bfd_vma) -1)
10153 {
10154 *plt_ent = ent;
10155 return ppc_stub_plt_call;
10156 }
10157 }
10158 }
5d1634d7 10159
721956f4
AM
10160 /* Determine where the call point is. */
10161 location = (input_sec->output_offset
10162 + input_sec->output_section->vma
10163 + rel->r_offset);
5d1634d7 10164
721956f4
AM
10165 branch_offset = destination - location;
10166 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10167
721956f4
AM
10168 /* Determine if a long branch stub is needed. */
10169 max_branch_offset = 1 << 25;
23cedd1d
AM
10170 if (r_type == R_PPC64_REL14
10171 || r_type == R_PPC64_REL14_BRTAKEN
10172 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10173 max_branch_offset = 1 << 15;
5d1634d7 10174
6911b7dc 10175 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10176 /* We need a stub. Figure out whether a long_branch or plt_branch
10177 is needed later. */
10178 return ppc_stub_long_branch;
5d1634d7 10179
721956f4 10180 return ppc_stub_none;
5d1634d7
AM
10181}
10182
f891966f
AM
10183/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10184 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10185 . mflr %r12
10186 . bcl 20,31,1f
10187 .1: mflr %r11
10188 . mtlr %r12
05d0e962 10189 . lis %r12,xxx-1b@highest
f891966f 10190 . ori %r12,%r12,xxx-1b@higher
05d0e962 10191 . sldi %r12,%r12,32
f891966f 10192 . oris %r12,%r12,xxx-1b@high
05d0e962 10193 . ori %r12,%r12,xxx-1b@l
f891966f 10194 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10195
10196static bfd_byte *
10197build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10198{
f891966f
AM
10199 bfd_put_32 (abfd, MFLR_R12, p);
10200 p += 4;
10201 bfd_put_32 (abfd, BCL_20_31, p);
10202 p += 4;
10203 bfd_put_32 (abfd, MFLR_R11, p);
10204 p += 4;
10205 bfd_put_32 (abfd, MTLR_R12, p);
10206 p += 4;
05d0e962
AM
10207 if (off + 0x8000 < 0x10000)
10208 {
10209 if (load)
10210 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10211 else
10212 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10213 p += 4;
10214 }
10215 else if (off + 0x80008000ULL < 0x100000000ULL)
10216 {
10217 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10218 p += 4;
10219 if (load)
10220 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10221 else
10222 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10223 p += 4;
10224 }
10225 else
10226 {
10227 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10228 {
10229 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10230 p += 4;
10231 }
10232 else
10233 {
10234 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10235 p += 4;
10236 if (((off >> 32) & 0xffff) != 0)
10237 {
10238 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10239 p += 4;
10240 }
10241 }
10242 if (((off >> 32) & 0xffffffffULL) != 0)
10243 {
10244 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10245 p += 4;
10246 }
10247 if (PPC_HI (off) != 0)
10248 {
10249 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10250 p += 4;
10251 }
10252 if (PPC_LO (off) != 0)
10253 {
10254 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10255 p += 4;
10256 }
10257 if (load)
10258 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10259 else
10260 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10261 p += 4;
10262 }
10263 return p;
10264}
10265
10266static unsigned int
10267size_offset (bfd_vma off)
10268{
10269 unsigned int size;
10270 if (off + 0x8000 < 0x10000)
10271 size = 4;
10272 else if (off + 0x80008000ULL < 0x100000000ULL)
10273 size = 8;
10274 else
10275 {
10276 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10277 size = 4;
10278 else
10279 {
10280 size = 4;
10281 if (((off >> 32) & 0xffff) != 0)
10282 size += 4;
10283 }
10284 if (((off >> 32) & 0xffffffffULL) != 0)
10285 size += 4;
10286 if (PPC_HI (off) != 0)
10287 size += 4;
10288 if (PPC_LO (off) != 0)
10289 size += 4;
10290 size += 4;
10291 }
f891966f 10292 return size + 16;
05d0e962
AM
10293}
10294
3d58e1fc
AM
10295static unsigned int
10296num_relocs_for_offset (bfd_vma off)
10297{
10298 unsigned int num_rel;
10299 if (off + 0x8000 < 0x10000)
10300 num_rel = 1;
10301 else if (off + 0x80008000ULL < 0x100000000ULL)
10302 num_rel = 2;
10303 else
10304 {
10305 num_rel = 1;
10306 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10307 && ((off >> 32) & 0xffff) != 0)
10308 num_rel += 1;
10309 if (PPC_HI (off) != 0)
10310 num_rel += 1;
10311 if (PPC_LO (off) != 0)
10312 num_rel += 1;
10313 }
10314 return num_rel;
10315}
10316
10317static Elf_Internal_Rela *
10318emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10319 bfd_vma roff, bfd_vma targ, bfd_vma off)
10320{
10321 bfd_vma relative_targ = targ - (roff - 8);
10322 if (bfd_big_endian (info->output_bfd))
10323 roff += 2;
10324 r->r_offset = roff;
10325 r->r_addend = relative_targ + roff;
10326 if (off + 0x8000 < 0x10000)
10327 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10328 else if (off + 0x80008000ULL < 0x100000000ULL)
10329 {
10330 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10331 ++r;
10332 roff += 4;
10333 r->r_offset = roff;
10334 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10335 r->r_addend = relative_targ + roff;
10336 }
10337 else
10338 {
10339 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10340 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10341 else
10342 {
10343 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10344 if (((off >> 32) & 0xffff) != 0)
10345 {
10346 ++r;
10347 roff += 4;
10348 r->r_offset = roff;
10349 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10350 r->r_addend = relative_targ + roff;
10351 }
10352 }
10353 if (((off >> 32) & 0xffffffffULL) != 0)
10354 roff += 4;
10355 if (PPC_HI (off) != 0)
10356 {
10357 ++r;
10358 roff += 4;
10359 r->r_offset = roff;
10360 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10361 r->r_addend = relative_targ + roff;
10362 }
10363 if (PPC_LO (off) != 0)
10364 {
10365 ++r;
10366 roff += 4;
10367 r->r_offset = roff;
10368 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10369 r->r_addend = relative_targ + roff;
10370 }
10371 }
10372 return r;
10373}
10374
04bdff6a
AM
10375static bfd_byte *
10376build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10377 bfd_boolean load)
10378{
10379 uint64_t insn;
10380 if (off - odd + (1ULL << 33) < 1ULL << 34)
10381 {
10382 off -= odd;
10383 if (odd)
10384 {
10385 bfd_put_32 (abfd, NOP, p);
10386 p += 4;
10387 }
10388 if (load)
10389 insn = PLD_R12_PC;
10390 else
10391 insn = PADDI_R12_PC;
10392 insn |= D34 (off);
10393 bfd_put_32 (abfd, insn >> 32, p);
10394 p += 4;
10395 bfd_put_32 (abfd, insn, p);
10396 }
10397 /* The minimum value for paddi is -0x200000000. The minimum value
10398 for li is -0x8000, which when shifted by 34 and added gives a
10399 minimum value of -0x2000200000000. The maximum value is
10400 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10401 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10402 {
10403 off -= 8 - odd;
10404 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10405 p += 4;
10406 if (!odd)
10407 {
10408 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10409 p += 4;
10410 }
10411 insn = PADDI_R12_PC | D34 (off);
10412 bfd_put_32 (abfd, insn >> 32, p);
10413 p += 4;
10414 bfd_put_32 (abfd, insn, p);
10415 p += 4;
10416 if (odd)
10417 {
10418 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10419 p += 4;
10420 }
10421 if (load)
10422 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10423 else
10424 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10425 }
10426 else
10427 {
10428 off -= odd + 8;
10429 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10430 p += 4;
10431 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10432 p += 4;
10433 if (odd)
10434 {
10435 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10436 p += 4;
10437 }
10438 insn = PADDI_R12_PC | D34 (off);
10439 bfd_put_32 (abfd, insn >> 32, p);
10440 p += 4;
10441 bfd_put_32 (abfd, insn, p);
10442 p += 4;
10443 if (!odd)
10444 {
10445 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10446 p += 4;
10447 }
10448 if (load)
10449 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10450 else
10451 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10452 }
10453 p += 4;
10454 return p;
10455}
10456
10457static unsigned int
10458size_powerxx_offset (bfd_vma off, int odd)
10459{
10460 if (off - odd + (1ULL << 33) < 1ULL << 34)
10461 return odd + 8;
10462 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10463 return 20;
10464 else
10465 return 24;
10466}
10467
10468static unsigned int
10469num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10470{
10471 if (off - odd + (1ULL << 33) < 1ULL << 34)
10472 return 1;
10473 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10474 return 2;
10475 else
10476 return 3;
10477}
10478
10479static Elf_Internal_Rela *
10480emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10481 Elf_Internal_Rela *r, bfd_vma roff,
10482 bfd_vma targ, bfd_vma off, int odd)
10483{
10484 if (off - odd + (1ULL << 33) < 1ULL << 34)
10485 roff += odd;
10486 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10487 {
10488 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10489 r->r_offset = roff + d_offset;
10490 r->r_addend = targ + 8 - odd - d_offset;
10491 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10492 ++r;
10493 roff += 8 - odd;
10494 }
10495 else
10496 {
10497 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10498 r->r_offset = roff + d_offset;
10499 r->r_addend = targ + 8 + odd - d_offset;
10500 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10501 ++r;
10502 roff += 4;
10503 r->r_offset = roff + d_offset;
10504 r->r_addend = targ + 4 + odd - d_offset;
10505 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10506 ++r;
10507 roff += 4 + odd;
10508 }
10509 r->r_offset = roff;
10510 r->r_addend = targ;
10511 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10512 return r;
10513}
10514
df136d64
AM
10515/* Emit .eh_frame opcode to advance pc by DELTA. */
10516
10517static bfd_byte *
10518eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10519{
10520 delta /= 4;
10521 if (delta < 64)
10522 *eh++ = DW_CFA_advance_loc + delta;
10523 else if (delta < 256)
10524 {
10525 *eh++ = DW_CFA_advance_loc1;
10526 *eh++ = delta;
10527 }
10528 else if (delta < 65536)
10529 {
10530 *eh++ = DW_CFA_advance_loc2;
10531 bfd_put_16 (abfd, delta, eh);
10532 eh += 2;
10533 }
10534 else
10535 {
10536 *eh++ = DW_CFA_advance_loc4;
10537 bfd_put_32 (abfd, delta, eh);
10538 eh += 4;
10539 }
10540 return eh;
10541}
10542
10543/* Size of required .eh_frame opcode to advance pc by DELTA. */
10544
10545static unsigned int
10546eh_advance_size (unsigned int delta)
10547{
10548 if (delta < 64 * 4)
10549 /* DW_CFA_advance_loc+[1..63]. */
10550 return 1;
10551 if (delta < 256 * 4)
10552 /* DW_CFA_advance_loc1, byte. */
10553 return 2;
10554 if (delta < 65536 * 4)
10555 /* DW_CFA_advance_loc2, 2 bytes. */
10556 return 3;
10557 /* DW_CFA_advance_loc4, 4 bytes. */
10558 return 5;
10559}
10560
794e51c0
AM
10561/* With power7 weakly ordered memory model, it is possible for ld.so
10562 to update a plt entry in one thread and have another thread see a
10563 stale zero toc entry. To avoid this we need some sort of acquire
10564 barrier in the call stub. One solution is to make the load of the
10565 toc word seem to appear to depend on the load of the function entry
10566 word. Another solution is to test for r2 being zero, and branch to
10567 the appropriate glink entry if so.
10568
10569 . fake dep barrier compare
71a39c98
AM
10570 . ld 12,xxx(2) ld 12,xxx(2)
10571 . mtctr 12 mtctr 12
10572 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10573 . add 2,2,11 cmpldi 2,0
10574 . ld 2,xxx+8(2) bnectr+
10575 . bctr b <glink_entry>
10576
10577 The solution involving the compare turns out to be faster, so
10578 that's what we use unless the branch won't reach. */
10579
10580#define ALWAYS_USE_FAKE_DEP 0
10581#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10582
794e51c0
AM
10583static inline unsigned int
10584plt_stub_size (struct ppc_link_hash_table *htab,
10585 struct ppc_stub_hash_entry *stub_entry,
10586 bfd_vma off)
10587{
05d0e962 10588 unsigned size;
b9e5796b 10589
05d0e962
AM
10590 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10591 {
04bdff6a
AM
10592 if (htab->powerxx_stubs)
10593 {
10594 bfd_vma start = (stub_entry->stub_offset
10595 + stub_entry->group->stub_sec->output_offset
10596 + stub_entry->group->stub_sec->output_section->vma);
10597 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10598 start += 4;
10599 size = 8 + size_powerxx_offset (off, start & 4);
10600 }
10601 else
10602 size = 8 + size_offset (off - 8);
05d0e962
AM
10603 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10604 size += 4;
10605 return size;
10606 }
10607
10608 size = 12;
b9e5796b
AM
10609 if (ALWAYS_EMIT_R2SAVE
10610 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10611 size += 4;
10612 if (PPC_HA (off) != 0)
794e51c0 10613 size += 4;
b9e5796b
AM
10614 if (htab->opd_abi)
10615 {
10616 size += 4;
e7d1c40c 10617 if (htab->params->plt_static_chain)
b9e5796b 10618 size += 4;
bd4d2eaa
AM
10619 if (htab->params->plt_thread_safe
10620 && htab->elf.dynamic_sections_created
10621 && stub_entry->h != NULL
10622 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10623 size += 8;
e7d1c40c 10624 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10625 size += 4;
10626 }
794e51c0
AM
10627 if (stub_entry->h != NULL
10628 && (stub_entry->h == htab->tls_get_addr_fd
10629 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10630 && htab->params->tls_get_addr_opt)
f378ab09
AM
10631 {
10632 size += 7 * 4;
e81b4c93 10633 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10634 size += 6 * 4;
f378ab09 10635 }
794e51c0
AM
10636 return size;
10637}
10638
2420fff6
AM
10639/* Depending on the sign of plt_stub_align:
10640 If positive, return the padding to align to a 2**plt_stub_align
10641 boundary.
10642 If negative, if this stub would cross fewer 2**plt_stub_align
10643 boundaries if we align, then return the padding needed to do so. */
10644
794e51c0
AM
10645static inline unsigned int
10646plt_stub_pad (struct ppc_link_hash_table *htab,
10647 struct ppc_stub_hash_entry *stub_entry,
10648 bfd_vma plt_off)
10649{
2420fff6 10650 int stub_align;
1aa42141 10651 unsigned stub_size;
6f20ed8a 10652 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10653
2420fff6
AM
10654 if (htab->params->plt_stub_align >= 0)
10655 {
10656 stub_align = 1 << htab->params->plt_stub_align;
10657 if ((stub_off & (stub_align - 1)) != 0)
10658 return stub_align - (stub_off & (stub_align - 1));
10659 return 0;
10660 }
10661
10662 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10663 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10664 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10665 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10666 return stub_align - (stub_off & (stub_align - 1));
10667 return 0;
10668}
10669
10670/* Build a .plt call stub. */
10671
10672static inline bfd_byte *
10673build_plt_stub (struct ppc_link_hash_table *htab,
10674 struct ppc_stub_hash_entry *stub_entry,
10675 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10676{
e7d1c40c 10677 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10678 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10679 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10680 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10681 && htab->elf.dynamic_sections_created
10682 && stub_entry->h != NULL
10683 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10684 bfd_boolean use_fake_dep = plt_thread_safe;
10685 bfd_vma cmp_branch_off = 0;
10686
10687 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10688 && plt_load_toc
794e51c0 10689 && plt_thread_safe
bd4d2eaa
AM
10690 && !((stub_entry->h == htab->tls_get_addr_fd
10691 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10692 && htab->params->tls_get_addr_opt))
794e51c0
AM
10693 {
10694 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10695 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10696 / PLT_ENTRY_SIZE (htab));
9e390558 10697 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10698 bfd_vma to, from;
10699
68d62958
AM
10700 if (pltindex > 32768)
10701 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10702 to = (glinkoff
10703 + htab->glink->output_offset
10704 + htab->glink->output_section->vma);
6f20ed8a 10705 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10706 + 4 * (ALWAYS_EMIT_R2SAVE
10707 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10708 + 4 * (PPC_HA (offset) != 0)
10709 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10710 != PPC_HA (offset))
10711 + 4 * (plt_static_chain != 0)
10712 + 20
6f20ed8a
AM
10713 + stub_entry->group->stub_sec->output_offset
10714 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10715 cmp_branch_off = to - from;
10716 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10717 }
10718
ac2df442
AM
10719 if (PPC_HA (offset) != 0)
10720 {
176a0d42
AM
10721 if (r != NULL)
10722 {
794e51c0
AM
10723 if (ALWAYS_EMIT_R2SAVE
10724 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10725 r[0].r_offset += 4;
176a0d42 10726 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10727 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10728 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10729 r[1].r_addend = r[0].r_addend;
b9e5796b 10730 if (plt_load_toc)
176a0d42 10731 {
b9e5796b 10732 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10733 {
b9e5796b
AM
10734 r[2].r_offset = r[1].r_offset + 4;
10735 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10736 r[2].r_addend = r[0].r_addend;
10737 }
10738 else
10739 {
10740 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10741 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10742 r[2].r_addend = r[0].r_addend + 8;
10743 if (plt_static_chain)
10744 {
10745 r[3].r_offset = r[2].r_offset + 4;
10746 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10747 r[3].r_addend = r[0].r_addend + 16;
10748 }
c7131b65 10749 }
176a0d42
AM
10750 }
10751 }
794e51c0
AM
10752 if (ALWAYS_EMIT_R2SAVE
10753 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10754 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10755 if (plt_load_toc)
10756 {
10757 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10758 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10759 }
10760 else
10761 {
10762 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10763 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10764 }
b9e5796b
AM
10765 if (plt_load_toc
10766 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10767 {
71a39c98 10768 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10769 offset = 0;
10770 }
71a39c98 10771 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10772 if (plt_load_toc)
794e51c0 10773 {
b9e5796b
AM
10774 if (use_fake_dep)
10775 {
10776 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10777 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10778 }
10779 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10780 if (plt_static_chain)
10781 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10782 }
ac2df442
AM
10783 }
10784 else
10785 {
176a0d42
AM
10786 if (r != NULL)
10787 {
794e51c0
AM
10788 if (ALWAYS_EMIT_R2SAVE
10789 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10790 r[0].r_offset += 4;
176a0d42 10791 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10792 if (plt_load_toc)
176a0d42 10793 {
b9e5796b 10794 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10795 {
b9e5796b
AM
10796 r[1].r_offset = r[0].r_offset + 4;
10797 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10798 r[1].r_addend = r[0].r_addend;
10799 }
10800 else
10801 {
10802 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10803 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10804 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10805 if (plt_static_chain)
10806 {
10807 r[2].r_offset = r[1].r_offset + 4;
10808 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10809 r[2].r_addend = r[0].r_addend + 8;
10810 }
c7131b65 10811 }
176a0d42
AM
10812 }
10813 }
794e51c0
AM
10814 if (ALWAYS_EMIT_R2SAVE
10815 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10816 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10817 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10818 if (plt_load_toc
10819 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10820 {
10821 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10822 offset = 0;
10823 }
71a39c98 10824 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10825 if (plt_load_toc)
794e51c0 10826 {
b9e5796b
AM
10827 if (use_fake_dep)
10828 {
10829 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10830 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10831 }
10832 if (plt_static_chain)
10833 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10834 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10835 }
ac2df442 10836 }
b9e5796b 10837 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10838 {
10839 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10840 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10841 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10842 }
10843 else
407aa07c 10844 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10845 return p;
10846}
10847
a7f2871e
AM
10848/* Build a special .plt call stub for __tls_get_addr. */
10849
10850#define LD_R11_0R3 0xe9630000
10851#define LD_R12_0R3 0xe9830000
10852#define MR_R0_R3 0x7c601b78
10853#define CMPDI_R11_0 0x2c2b0000
10854#define ADD_R3_R12_R13 0x7c6c6a14
10855#define BEQLR 0x4d820020
10856#define MR_R3_R0 0x7c030378
a7f2871e
AM
10857#define STD_R11_0R1 0xf9610000
10858#define BCTRL 0x4e800421
10859#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10860#define MTLR_R11 0x7d6803a6
10861
10862static inline bfd_byte *
794e51c0
AM
10863build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10864 struct ppc_stub_hash_entry *stub_entry,
10865 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10866{
e7d1c40c 10867 bfd *obfd = htab->params->stub_bfd;
df136d64 10868 bfd_byte *loc = p;
794e51c0 10869
a7f2871e
AM
10870 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10871 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10872 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10873 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10874 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10875 bfd_put_32 (obfd, BEQLR, p), p += 4;
10876 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10877 if (r != NULL)
10878 r[0].r_offset += 7 * 4;
e81b4c93 10879 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10880 return build_plt_stub (htab, stub_entry, p, offset, r);
10881
a7f2871e 10882 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10883 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10884
10885 if (r != NULL)
f378ab09 10886 r[0].r_offset += 2 * 4;
794e51c0 10887 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10888 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10889
a078d95a 10890 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10891 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10892 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10893 bfd_put_32 (obfd, BLR, p), p += 4;
10894
df136d64
AM
10895 if (htab->glink_eh_frame != NULL
10896 && htab->glink_eh_frame->size != 0)
10897 {
10898 bfd_byte *base, *eh;
10899 unsigned int lr_used, delta;
10900
10901 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10902 eh = base + stub_entry->group->eh_size;
10903 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10904 delta = lr_used - stub_entry->group->lr_restore;
10905 stub_entry->group->lr_restore = lr_used + 16;
10906 eh = eh_advance (htab->elf.dynobj, eh, delta);
10907 *eh++ = DW_CFA_offset_extended_sf;
10908 *eh++ = 65;
10909 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10910 *eh++ = DW_CFA_advance_loc + 4;
10911 *eh++ = DW_CFA_restore_extended;
10912 *eh++ = 65;
10913 stub_entry->group->eh_size = eh - base;
10914 }
a7f2871e
AM
10915 return p;
10916}
10917
176a0d42
AM
10918static Elf_Internal_Rela *
10919get_relocs (asection *sec, int count)
10920{
10921 Elf_Internal_Rela *relocs;
10922 struct bfd_elf_section_data *elfsec_data;
10923
10924 elfsec_data = elf_section_data (sec);
10925 relocs = elfsec_data->relocs;
10926 if (relocs == NULL)
10927 {
10928 bfd_size_type relsize;
10929 relsize = sec->reloc_count * sizeof (*relocs);
10930 relocs = bfd_alloc (sec->owner, relsize);
10931 if (relocs == NULL)
10932 return NULL;
10933 elfsec_data->relocs = relocs;
d4730f92
BS
10934 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10935 sizeof (Elf_Internal_Shdr));
10936 if (elfsec_data->rela.hdr == NULL)
10937 return NULL;
10938 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10939 * sizeof (Elf64_External_Rela));
10940 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10941 sec->reloc_count = 0;
10942 }
10943 relocs += sec->reloc_count;
10944 sec->reloc_count += count;
10945 return relocs;
10946}
10947
3d58e1fc
AM
10948/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10949 forms, to the equivalent relocs against the global symbol given by
10950 STUB_ENTRY->H. */
10951
10952static bfd_boolean
10953use_global_in_relocs (struct ppc_link_hash_table *htab,
10954 struct ppc_stub_hash_entry *stub_entry,
10955 Elf_Internal_Rela *r, unsigned int num_rel)
10956{
10957 struct elf_link_hash_entry **hashes;
10958 unsigned long symndx;
10959 struct ppc_link_hash_entry *h;
10960 bfd_vma symval;
10961
10962 /* Relocs are always against symbols in their own object file. Fake
10963 up global sym hashes for the stub bfd (which has no symbols). */
10964 hashes = elf_sym_hashes (htab->params->stub_bfd);
10965 if (hashes == NULL)
10966 {
10967 bfd_size_type hsize;
10968
10969 /* When called the first time, stub_globals will contain the
10970 total number of symbols seen during stub sizing. After
10971 allocating, stub_globals is used as an index to fill the
10972 hashes array. */
10973 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10974 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10975 if (hashes == NULL)
10976 return FALSE;
10977 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10978 htab->stub_globals = 1;
10979 }
10980 symndx = htab->stub_globals++;
10981 h = stub_entry->h;
10982 hashes[symndx] = &h->elf;
10983 if (h->oh != NULL && h->oh->is_func)
10984 h = ppc_follow_link (h->oh);
10985 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10986 || h->elf.root.type == bfd_link_hash_defweak);
10987 symval = (h->elf.root.u.def.value
10988 + h->elf.root.u.def.section->output_offset
10989 + h->elf.root.u.def.section->output_section->vma);
10990 while (num_rel-- != 0)
10991 {
10992 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10993 if (h->elf.root.u.def.section != stub_entry->target_section)
10994 {
10995 /* H is an opd symbol. The addend must be zero, and the
10996 branch reloc is the only one we can convert. */
10997 r->r_addend = 0;
10998 break;
10999 }
11000 else
11001 r->r_addend -= symval;
11002 --r;
11003 }
11004 return TRUE;
11005}
11006
aa374f67 11007static bfd_vma
25f53a85 11008get_r2off (struct bfd_link_info *info,
aa374f67
AM
11009 struct ppc_stub_hash_entry *stub_entry)
11010{
25f53a85 11011 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11012 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11013
11014 if (r2off == 0)
11015 {
11016 /* Support linking -R objects. Get the toc pointer from the
11017 opd entry. */
11018 char buf[8];
b9e5796b
AM
11019 if (!htab->opd_abi)
11020 return r2off;
aa374f67
AM
11021 asection *opd = stub_entry->h->elf.root.u.def.section;
11022 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11023
11024 if (strcmp (opd->name, ".opd") != 0
11025 || opd->reloc_count != 0)
11026 {
2cdcc330
AM
11027 info->callbacks->einfo
11028 (_("%P: cannot find opd entry toc for `%pT'\n"),
11029 stub_entry->h->elf.root.root.string);
aa374f67 11030 bfd_set_error (bfd_error_bad_value);
a7c49797 11031 return (bfd_vma) -1;
aa374f67
AM
11032 }
11033 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11034 return (bfd_vma) -1;
aa374f67 11035 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11036 r2off -= elf_gp (info->output_bfd);
aa374f67 11037 }
6f20ed8a 11038 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11039 return r2off;
11040}
11041
b34976b6 11042static bfd_boolean
4ce794b7 11043ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11044{
721956f4
AM
11045 struct ppc_stub_hash_entry *stub_entry;
11046 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11047 struct bfd_link_info *info;
11048 struct ppc_link_hash_table *htab;
721956f4 11049 bfd_byte *loc;
3d58e1fc 11050 bfd_byte *p, *relp;
1aa42141 11051 bfd_vma targ, off;
176a0d42 11052 Elf_Internal_Rela *r;
e054468f 11053 asection *plt;
3d58e1fc 11054 int num_rel;
04bdff6a 11055 int odd;
5d1634d7 11056
721956f4
AM
11057 /* Massage our args to the form they really have. */
11058 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11059 info = in_arg;
5d1634d7 11060
5d1634d7 11061 htab = ppc_hash_table (info);
4dfe6ac6
NC
11062 if (htab == NULL)
11063 return FALSE;
5d1634d7 11064
1aa42141 11065 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11066 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11067
4ce794b7 11068 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11069 switch (stub_entry->stub_type)
5d1634d7 11070 {
721956f4 11071 case ppc_stub_long_branch:
ad8e1ba5 11072 case ppc_stub_long_branch_r2off:
721956f4 11073 /* Branches are relative. This is where we are going to. */
1aa42141 11074 targ = (stub_entry->target_value
6911b7dc
AM
11075 + stub_entry->target_section->output_offset
11076 + stub_entry->target_section->output_section->vma);
1aa42141 11077 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11078
721956f4 11079 /* And this is where we are coming from. */
1aa42141
AM
11080 off = (stub_entry->stub_offset
11081 + stub_entry->group->stub_sec->output_offset
11082 + stub_entry->group->stub_sec->output_section->vma);
11083 off = targ - off;
e86ce104 11084
9e390558 11085 p = loc;
ac2df442 11086 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11087 {
25f53a85 11088 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11089
a7c49797 11090 if (r2off == (bfd_vma) -1)
aa374f67
AM
11091 {
11092 htab->stub_error = TRUE;
11093 return FALSE;
11094 }
9e390558
AM
11095 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11096 p += 4;
ac2df442
AM
11097 if (PPC_HA (r2off) != 0)
11098 {
e7d1c40c 11099 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11100 ADDIS_R2_R2 | PPC_HA (r2off), p);
11101 p += 4;
a7c49797
AM
11102 }
11103 if (PPC_LO (r2off) != 0)
11104 {
11105 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11106 ADDI_R2_R2 | PPC_LO (r2off), p);
11107 p += 4;
ac2df442 11108 }
9e390558 11109 off -= p - loc;
ad8e1ba5 11110 }
9e390558
AM
11111 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11112 p += 4;
ad8e1ba5 11113
5c3dead3
AM
11114 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11115 {
cf97bcb0
AM
11116 _bfd_error_handler
11117 (_("long branch stub `%s' offset overflow"),
bc30df16 11118 stub_entry->root.string);
5c3dead3
AM
11119 htab->stub_error = TRUE;
11120 return FALSE;
11121 }
ee75fd95
AM
11122
11123 if (info->emitrelocations)
11124 {
6f20ed8a 11125 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11126 if (r == NULL)
11127 return FALSE;
9e390558 11128 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11129 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11130 r->r_addend = targ;
3d58e1fc
AM
11131 if (stub_entry->h != NULL
11132 && !use_global_in_relocs (htab, stub_entry, r, 1))
11133 return FALSE;
ee75fd95 11134 }
721956f4 11135 break;
e86ce104 11136
721956f4 11137 case ppc_stub_plt_branch:
ad8e1ba5 11138 case ppc_stub_plt_branch_r2off:
721956f4
AM
11139 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11140 stub_entry->root.string + 9,
b34976b6 11141 FALSE, FALSE);
721956f4
AM
11142 if (br_entry == NULL)
11143 {
cf97bcb0
AM
11144 _bfd_error_handler (_("can't find branch stub `%s'"),
11145 stub_entry->root.string);
b34976b6
AM
11146 htab->stub_error = TRUE;
11147 return FALSE;
721956f4
AM
11148 }
11149
1aa42141 11150 targ = (stub_entry->target_value
176a0d42
AM
11151 + stub_entry->target_section->output_offset
11152 + stub_entry->target_section->output_section->vma);
6911b7dc 11153 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11154 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11155
1aa42141 11156 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11157 htab->brlt->contents + br_entry->offset);
721956f4 11158
f94498ff 11159 if (br_entry->iter == htab->stub_iteration)
721956f4 11160 {
f94498ff 11161 br_entry->iter = 0;
84f5d08e 11162
f94498ff 11163 if (htab->relbrlt != NULL)
84f5d08e 11164 {
f94498ff
AM
11165 /* Create a reloc for the branch lookup table entry. */
11166 Elf_Internal_Rela rela;
11167 bfd_byte *rl;
11168
11169 rela.r_offset = (br_entry->offset
11170 + htab->brlt->output_offset
11171 + htab->brlt->output_section->vma);
11172 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11173 rela.r_addend = targ;
f94498ff
AM
11174
11175 rl = htab->relbrlt->contents;
11176 rl += (htab->relbrlt->reloc_count++
11177 * sizeof (Elf64_External_Rela));
11178 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11179 }
11180 else if (info->emitrelocations)
11181 {
176a0d42
AM
11182 r = get_relocs (htab->brlt, 1);
11183 if (r == NULL)
11184 return FALSE;
11185 /* brlt, being SEC_LINKER_CREATED does not go through the
11186 normal reloc processing. Symbols and offsets are not
11187 translated from input file to output file form, so
11188 set up the offset per the output file. */
f94498ff
AM
11189 r->r_offset = (br_entry->offset
11190 + htab->brlt->output_offset
11191 + htab->brlt->output_section->vma);
11192 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11193 r->r_addend = targ;
84f5d08e 11194 }
84f5d08e 11195 }
721956f4 11196
1aa42141 11197 targ = (br_entry->offset
176a0d42
AM
11198 + htab->brlt->output_offset
11199 + htab->brlt->output_section->vma);
11200
1aa42141
AM
11201 off = (elf_gp (info->output_bfd)
11202 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11203 off = targ - off;
721956f4 11204
ad8e1ba5 11205 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11206 {
25f53a85 11207 info->callbacks->einfo
c1c8c1ef 11208 (_("%P: linkage table error against `%pT'\n"),
721956f4 11209 stub_entry->root.string);
5d1634d7 11210 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11211 htab->stub_error = TRUE;
11212 return FALSE;
5d1634d7 11213 }
41bd81ab 11214
176a0d42
AM
11215 if (info->emitrelocations)
11216 {
6f20ed8a 11217 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11218 if (r == NULL)
11219 return FALSE;
6f20ed8a 11220 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11221 if (bfd_big_endian (info->output_bfd))
11222 r[0].r_offset += 2;
00f412ee 11223 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11224 r[0].r_offset += 4;
11225 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11226 r[0].r_addend = targ;
176a0d42
AM
11227 if (PPC_HA (off) != 0)
11228 {
11229 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11230 r[1].r_offset = r[0].r_offset + 4;
11231 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11232 r[1].r_addend = r[0].r_addend;
11233 }
11234 }
11235
9e390558 11236 p = loc;
00f412ee 11237 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11238 {
176a0d42 11239 if (PPC_HA (off) != 0)
ac2df442 11240 {
e7d1c40c 11241 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11242 ADDIS_R12_R2 | PPC_HA (off), p);
11243 p += 4;
e7d1c40c 11244 bfd_put_32 (htab->params->stub_bfd,
9e390558 11245 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11246 }
11247 else
9e390558
AM
11248 bfd_put_32 (htab->params->stub_bfd,
11249 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11250 }
11251 else
11252 {
25f53a85 11253 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11254
a7c49797 11255 if (r2off == (bfd_vma) -1)
aa374f67
AM
11256 {
11257 htab->stub_error = TRUE;
11258 return FALSE;
11259 }
ad8e1ba5 11260
9e390558
AM
11261 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11262 p += 4;
176a0d42 11263 if (PPC_HA (off) != 0)
ac2df442 11264 {
e7d1c40c 11265 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11266 ADDIS_R12_R2 | PPC_HA (off), p);
11267 p += 4;
e7d1c40c 11268 bfd_put_32 (htab->params->stub_bfd,
9e390558 11269 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11270 }
11271 else
9e390558 11272 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11273
11274 if (PPC_HA (r2off) != 0)
11275 {
9e390558 11276 p += 4;
e7d1c40c 11277 bfd_put_32 (htab->params->stub_bfd,
9e390558 11278 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11279 }
11280 if (PPC_LO (r2off) != 0)
11281 {
9e390558 11282 p += 4;
e7d1c40c 11283 bfd_put_32 (htab->params->stub_bfd,
9e390558 11284 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11285 }
ad8e1ba5 11286 }
9e390558
AM
11287 p += 4;
11288 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11289 p += 4;
407aa07c
AM
11290 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11291 p += 4;
721956f4 11292 break;
5d1634d7 11293
05d0e962
AM
11294 case ppc_stub_long_branch_notoc:
11295 case ppc_stub_long_branch_both:
11296 case ppc_stub_plt_branch_notoc:
11297 case ppc_stub_plt_branch_both:
11298 case ppc_stub_plt_call_notoc:
11299 case ppc_stub_plt_call_both:
11300 p = loc;
f891966f 11301 off = (stub_entry->stub_offset
05d0e962
AM
11302 + stub_entry->group->stub_sec->output_offset
11303 + stub_entry->group->stub_sec->output_section->vma);
11304 if (stub_entry->stub_type == ppc_stub_long_branch_both
11305 || stub_entry->stub_type == ppc_stub_plt_branch_both
11306 || stub_entry->stub_type == ppc_stub_plt_call_both)
11307 {
11308 off += 4;
11309 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11310 p += 4;
11311 }
11312 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11313 {
11314 targ = stub_entry->plt_ent->plt.offset & ~1;
11315 if (targ >= (bfd_vma) -2)
11316 abort ();
11317
11318 plt = htab->elf.splt;
11319 if (!htab->elf.dynamic_sections_created
11320 || stub_entry->h == NULL
11321 || stub_entry->h->elf.dynindx == -1)
11322 {
11323 if (stub_entry->symtype == STT_GNU_IFUNC)
11324 plt = htab->elf.iplt;
11325 else
11326 plt = htab->pltlocal;
11327 }
11328 targ += plt->output_offset + plt->output_section->vma;
11329 }
11330 else
11331 targ = (stub_entry->target_value
11332 + stub_entry->target_section->output_offset
11333 + stub_entry->target_section->output_section->vma);
04bdff6a 11334 odd = off & 4;
05d0e962 11335 off = targ - off;
f891966f 11336
3d58e1fc
AM
11337 relp = p;
11338 num_rel = 0;
04bdff6a
AM
11339 if (htab->powerxx_stubs)
11340 {
11341 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11342 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11343 }
11344 else
11345 {
11346 /* The notoc stubs calculate their target (either a PLT entry or
11347 the global entry point of a function) relative to the PC
11348 returned by the "bcl" two instructions past the start of the
11349 sequence emitted by build_offset. The offset is therefore 8
11350 less than calculated from the start of the sequence. */
11351 off -= 8;
11352 p = build_offset (htab->params->stub_bfd, p, off,
11353 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11354 }
11355
f891966f 11356 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11357 {
f891966f 11358 bfd_vma from;
3d58e1fc 11359 num_rel = 1;
f891966f
AM
11360 from = (stub_entry->stub_offset
11361 + stub_entry->group->stub_sec->output_offset
11362 + stub_entry->group->stub_sec->output_section->vma
11363 + (p - loc));
05d0e962 11364 bfd_put_32 (htab->params->stub_bfd,
f891966f 11365 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11366 }
11367 else
11368 {
11369 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11370 p += 4;
11371 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11372 }
11373 p += 4;
df136d64 11374
3d58e1fc
AM
11375 if (info->emitrelocations)
11376 {
04bdff6a
AM
11377 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11378 if (htab->powerxx_stubs)
11379 num_rel += num_relocs_for_powerxx_offset (off, odd);
11380 else
11381 {
11382 num_rel += num_relocs_for_offset (off);
11383 roff += 16;
11384 }
3d58e1fc
AM
11385 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11386 if (r == NULL)
11387 return FALSE;
04bdff6a
AM
11388 if (htab->powerxx_stubs)
11389 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11390 else
11391 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11392 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11393 || stub_entry->stub_type == ppc_stub_long_branch_both)
11394 {
11395 ++r;
11396 roff = p - 4 - stub_entry->group->stub_sec->contents;
11397 r->r_offset = roff;
11398 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11399 r->r_addend = targ;
11400 if (stub_entry->h != NULL
11401 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11402 return FALSE;
11403 }
11404 }
11405
04bdff6a
AM
11406 if (!htab->powerxx_stubs
11407 && htab->glink_eh_frame != NULL
11408 && htab->glink_eh_frame->size != 0)
df136d64
AM
11409 {
11410 bfd_byte *base, *eh;
11411 unsigned int lr_used, delta;
11412
11413 base = (htab->glink_eh_frame->contents
11414 + stub_entry->group->eh_base + 17);
11415 eh = base + stub_entry->group->eh_size;
11416 lr_used = stub_entry->stub_offset + 8;
11417 if (stub_entry->stub_type == ppc_stub_long_branch_both
11418 || stub_entry->stub_type == ppc_stub_plt_branch_both
11419 || stub_entry->stub_type == ppc_stub_plt_call_both)
11420 lr_used += 4;
11421 delta = lr_used - stub_entry->group->lr_restore;
11422 stub_entry->group->lr_restore = lr_used + 8;
11423 eh = eh_advance (htab->elf.dynobj, eh, delta);
11424 *eh++ = DW_CFA_register;
11425 *eh++ = 65;
11426 *eh++ = 12;
11427 *eh++ = DW_CFA_advance_loc + 2;
11428 *eh++ = DW_CFA_restore_extended;
11429 *eh++ = 65;
11430 stub_entry->group->eh_size = eh - base;
11431 }
05d0e962
AM
11432 break;
11433
721956f4 11434 case ppc_stub_plt_call:
794e51c0 11435 case ppc_stub_plt_call_r2save:
e054468f 11436 if (stub_entry->h != NULL
b31867b6
AM
11437 && stub_entry->h->is_func_descriptor
11438 && stub_entry->h->oh != NULL)
c862ae31 11439 {
b31867b6
AM
11440 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11441
11442 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11443 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11444 if (fh->elf.root.type == bfd_link_hash_undefined
11445 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11446 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11447 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11448 }
11449
721956f4 11450 /* Now build the stub. */
1aa42141
AM
11451 targ = stub_entry->plt_ent->plt.offset & ~1;
11452 if (targ >= (bfd_vma) -2)
721956f4
AM
11453 abort ();
11454
33e44f2e 11455 plt = htab->elf.splt;
25f23106
AM
11456 if (!htab->elf.dynamic_sections_created
11457 || stub_entry->h == NULL
11458 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11459 {
11460 if (stub_entry->symtype == STT_GNU_IFUNC)
11461 plt = htab->elf.iplt;
11462 else
11463 plt = htab->pltlocal;
11464 }
1aa42141 11465 targ += plt->output_offset + plt->output_section->vma;
e054468f 11466
1aa42141
AM
11467 off = (elf_gp (info->output_bfd)
11468 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11469 off = targ - off;
721956f4 11470
ad8e1ba5 11471 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11472 {
25f53a85 11473 info->callbacks->einfo
695344c0 11474 /* xgettext:c-format */
c1c8c1ef 11475 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11476 stub_entry->h != NULL
11477 ? stub_entry->h->elf.root.root.string
11478 : "<local sym>");
721956f4 11479 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11480 htab->stub_error = TRUE;
11481 return FALSE;
721956f4
AM
11482 }
11483
176a0d42
AM
11484 r = NULL;
11485 if (info->emitrelocations)
11486 {
6f20ed8a 11487 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11488 ((PPC_HA (off) != 0)
11489 + (htab->opd_abi
e7d1c40c 11490 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11491 && PPC_HA (off + 16) == PPC_HA (off))
11492 : 1)));
176a0d42
AM
11493 if (r == NULL)
11494 return FALSE;
6f20ed8a 11495 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11496 if (bfd_big_endian (info->output_bfd))
11497 r[0].r_offset += 2;
1aa42141 11498 r[0].r_addend = targ;
176a0d42 11499 }
a7f2871e
AM
11500 if (stub_entry->h != NULL
11501 && (stub_entry->h == htab->tls_get_addr_fd
11502 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11503 && htab->params->tls_get_addr_opt)
794e51c0 11504 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11505 else
794e51c0 11506 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11507 break;
11508
a4b6fadd
AM
11509 case ppc_stub_save_res:
11510 return TRUE;
11511
721956f4
AM
11512 default:
11513 BFD_FAIL ();
b34976b6 11514 return FALSE;
721956f4
AM
11515 }
11516
1aa42141 11517 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11518
e7d1c40c 11519 if (htab->params->emit_stub_syms)
97b639ba
AM
11520 {
11521 struct elf_link_hash_entry *h;
ee75fd95
AM
11522 size_t len1, len2;
11523 char *name;
11524 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11525 "long_branch",
11526 "long_branch",
3f6ff479
AM
11527 "long_branch",
11528 "plt_branch",
ee75fd95 11529 "plt_branch",
05d0e962
AM
11530 "plt_branch",
11531 "plt_branch",
11532 "plt_call",
11533 "plt_call",
794e51c0 11534 "plt_call",
ee75fd95
AM
11535 "plt_call" };
11536
11537 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11538 len2 = strlen (stub_entry->root.string);
11539 name = bfd_malloc (len1 + len2 + 2);
11540 if (name == NULL)
11541 return FALSE;
11542 memcpy (name, stub_entry->root.string, 9);
11543 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11544 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11545 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11546 if (h == NULL)
11547 return FALSE;
11548 if (h->root.type == bfd_link_hash_new)
11549 {
11550 h->root.type = bfd_link_hash_defined;
6f20ed8a 11551 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11552 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11553 h->ref_regular = 1;
11554 h->def_regular = 1;
11555 h->ref_regular_nonweak = 1;
11556 h->forced_local = 1;
11557 h->non_elf = 0;
2ec55de3 11558 h->root.linker_def = 1;
97b639ba
AM
11559 }
11560 }
11561
b34976b6 11562 return TRUE;
721956f4
AM
11563}
11564
11565/* As above, but don't actually build the stub. Just bump offset so
11566 we know stub section sizes, and select plt_branch stubs where
11567 long_branch stubs won't do. */
11568
b34976b6 11569static bfd_boolean
4ce794b7 11570ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11571{
11572 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11573 struct bfd_link_info *info;
721956f4 11574 struct ppc_link_hash_table *htab;
f891966f
AM
11575 asection *plt;
11576 bfd_vma targ, off, r2off;
04bdff6a 11577 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11578
11579 /* Massage our args to the form they really have. */
11580 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11581 info = in_arg;
11582
11583 htab = ppc_hash_table (info);
4dfe6ac6
NC
11584 if (htab == NULL)
11585 return FALSE;
721956f4 11586
1aa42141
AM
11587 /* Make a note of the offset within the stubs for this entry. */
11588 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11589
a4b6fadd
AM
11590 if (stub_entry->h != NULL
11591 && stub_entry->h->save_res
11592 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11593 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11594 {
11595 /* Don't make stubs to out-of-line register save/restore
11596 functions. Instead, emit copies of the functions. */
11597 stub_entry->group->needs_save_res = 1;
11598 stub_entry->stub_type = ppc_stub_save_res;
11599 return TRUE;
11600 }
11601
f891966f 11602 switch (stub_entry->stub_type)
721956f4 11603 {
f891966f
AM
11604 case ppc_stub_plt_branch:
11605 case ppc_stub_plt_branch_r2off:
11606 /* Reset the stub type from the plt branch variant in case we now
11607 can reach with a shorter stub. */
11608 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11609 /* Fall through. */
11610 case ppc_stub_long_branch:
11611 case ppc_stub_long_branch_r2off:
1aa42141
AM
11612 targ = (stub_entry->target_value
11613 + stub_entry->target_section->output_offset
11614 + stub_entry->target_section->output_section->vma);
f891966f 11615 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11616 off = (stub_entry->stub_offset
11617 + stub_entry->group->stub_sec->output_offset
11618 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11619
ad8e1ba5 11620 size = 4;
f891966f 11621 r2off = 0;
ad8e1ba5
AM
11622 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11623 {
25f53a85 11624 r2off = get_r2off (info, stub_entry);
a7c49797 11625 if (r2off == (bfd_vma) -1)
aa374f67
AM
11626 {
11627 htab->stub_error = TRUE;
11628 return FALSE;
11629 }
a7c49797 11630 size = 8;
ac2df442 11631 if (PPC_HA (r2off) != 0)
a7c49797
AM
11632 size += 4;
11633 if (PPC_LO (r2off) != 0)
11634 size += 4;
1aa42141 11635 off += size - 4;
ad8e1ba5 11636 }
1aa42141 11637 off = targ - off;
ad8e1ba5 11638
f891966f
AM
11639 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11640 Do the same for -R objects without function descriptors. */
11641 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11642 && r2off == 0
11643 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11644 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11645 {
f891966f 11646 struct ppc_branch_hash_entry *br_entry;
df136d64 11647
f891966f
AM
11648 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11649 stub_entry->root.string + 9,
11650 TRUE, FALSE);
11651 if (br_entry == NULL)
721956f4 11652 {
f891966f
AM
11653 _bfd_error_handler (_("can't build branch stub `%s'"),
11654 stub_entry->root.string);
11655 htab->stub_error = TRUE;
11656 return FALSE;
721956f4
AM
11657 }
11658
f891966f 11659 if (br_entry->iter != htab->stub_iteration)
721956f4 11660 {
f891966f
AM
11661 br_entry->iter = htab->stub_iteration;
11662 br_entry->offset = htab->brlt->size;
11663 htab->brlt->size += 8;
63bc6f6c 11664
f891966f
AM
11665 if (htab->relbrlt != NULL)
11666 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11667 else if (info->emitrelocations)
84f5d08e 11668 {
f891966f
AM
11669 htab->brlt->reloc_count += 1;
11670 htab->brlt->flags |= SEC_RELOC;
05d0e962 11671 }
f891966f 11672 }
ac2df442 11673
f891966f
AM
11674 targ = (br_entry->offset
11675 + htab->brlt->output_offset
11676 + htab->brlt->output_section->vma);
11677 off = (elf_gp (info->output_bfd)
11678 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11679 off = targ - off;
176a0d42 11680
f891966f
AM
11681 if (info->emitrelocations)
11682 {
11683 stub_entry->group->stub_sec->reloc_count
11684 += 1 + (PPC_HA (off) != 0);
11685 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11686 }
05d0e962 11687
f891966f
AM
11688 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11689 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11690 {
11691 size = 12;
11692 if (PPC_HA (off) != 0)
11693 size = 16;
ac2df442 11694 }
f891966f 11695 else
ac2df442 11696 {
f891966f
AM
11697 size = 16;
11698 if (PPC_HA (off) != 0)
11699 size += 4;
11700
11701 if (PPC_HA (r2off) != 0)
11702 size += 4;
11703 if (PPC_LO (r2off) != 0)
11704 size += 4;
ac2df442 11705 }
721956f4 11706 }
f891966f
AM
11707 else if (info->emitrelocations)
11708 {
11709 stub_entry->group->stub_sec->reloc_count += 1;
11710 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11711 }
11712 break;
11713
11714 case ppc_stub_plt_branch_notoc:
11715 case ppc_stub_plt_branch_both:
11716 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11717 /* Fall through. */
11718 case ppc_stub_long_branch_notoc:
11719 case ppc_stub_long_branch_both:
11720 off = (stub_entry->stub_offset
11721 + stub_entry->group->stub_sec->output_offset
11722 + stub_entry->group->stub_sec->output_section->vma);
11723 size = 0;
11724 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11725 size = 4;
11726 off += size;
11727 targ = (stub_entry->target_value
11728 + stub_entry->target_section->output_offset
11729 + stub_entry->target_section->output_section->vma);
04bdff6a 11730 odd = off & 4;
f891966f
AM
11731 off = targ - off;
11732
3d58e1fc
AM
11733 if (info->emitrelocations)
11734 {
04bdff6a
AM
11735 unsigned int num_rel;
11736 if (htab->powerxx_stubs)
11737 num_rel = num_relocs_for_powerxx_offset (off, odd);
11738 else
11739 num_rel = num_relocs_for_offset (off - 8);
11740 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11741 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11742 }
11743
04bdff6a
AM
11744 if (htab->powerxx_stubs)
11745 extra = size_powerxx_offset (off, odd);
11746 else
11747 extra = size_offset (off - 8);
f891966f
AM
11748 /* Include branch insn plus those in the offset sequence. */
11749 size += 4 + extra;
11750 /* The branch insn is at the end, or "extra" bytes along. So
11751 its offset will be "extra" bytes less that that already
11752 calculated. */
11753 off -= extra;
11754
04bdff6a
AM
11755 if (!htab->powerxx_stubs)
11756 {
11757 /* After the bcl, lr has been modified so we need to emit
11758 .eh_frame info saying the return address is in r12. */
11759 lr_used = stub_entry->stub_offset + 8;
11760 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11761 lr_used += 4;
11762 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11763 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11764 DW_CFA_restore_extended 65. */
11765 delta = lr_used - stub_entry->group->lr_restore;
11766 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11767 stub_entry->group->lr_restore = lr_used + 8;
11768 }
f891966f
AM
11769
11770 /* If the branch can't reach, use a plt_branch. */
11771 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11772 {
11773 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11774 - ppc_stub_long_branch_notoc);
11775 size += 4;
11776 }
3d58e1fc
AM
11777 else if (info->emitrelocations)
11778 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
11779 break;
11780
11781 case ppc_stub_plt_call_notoc:
11782 case ppc_stub_plt_call_both:
11783 off = (stub_entry->stub_offset
11784 + stub_entry->group->stub_sec->output_offset
11785 + stub_entry->group->stub_sec->output_section->vma);
11786 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11787 off += 4;
11788 targ = stub_entry->plt_ent->plt.offset & ~1;
11789 if (targ >= (bfd_vma) -2)
11790 abort ();
11791
11792 plt = htab->elf.splt;
11793 if (!htab->elf.dynamic_sections_created
11794 || stub_entry->h == NULL
11795 || stub_entry->h->elf.dynindx == -1)
11796 {
11797 if (stub_entry->symtype == STT_GNU_IFUNC)
11798 plt = htab->elf.iplt;
11799 else
11800 plt = htab->pltlocal;
11801 }
11802 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 11803 odd = off & 4;
f891966f
AM
11804 off = targ - off;
11805
11806 if (htab->params->plt_stub_align != 0)
11807 {
11808 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11809
11810 stub_entry->group->stub_sec->size += pad;
11811 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11812 off -= pad;
11813 }
11814
3d58e1fc
AM
11815 if (info->emitrelocations)
11816 {
04bdff6a
AM
11817 unsigned int num_rel;
11818 if (htab->powerxx_stubs)
11819 num_rel = num_relocs_for_powerxx_offset (off, odd);
11820 else
11821 num_rel = num_relocs_for_offset (off - 8);
11822 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11823 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11824 }
11825
f891966f
AM
11826 size = plt_stub_size (htab, stub_entry, off);
11827
04bdff6a
AM
11828 if (!htab->powerxx_stubs)
11829 {
11830 /* After the bcl, lr has been modified so we need to emit
11831 .eh_frame info saying the return address is in r12. */
11832 lr_used = stub_entry->stub_offset + 8;
11833 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11834 lr_used += 4;
11835 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11836 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11837 DW_CFA_restore_extended 65. */
11838 delta = lr_used - stub_entry->group->lr_restore;
11839 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11840 stub_entry->group->lr_restore = lr_used + 8;
11841 }
f891966f
AM
11842 break;
11843
11844 case ppc_stub_plt_call:
11845 case ppc_stub_plt_call_r2save:
11846 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11847 if (targ >= (bfd_vma) -2)
11848 abort ();
11849 plt = htab->elf.splt;
11850 if (!htab->elf.dynamic_sections_created
11851 || stub_entry->h == NULL
11852 || stub_entry->h->elf.dynindx == -1)
11853 {
11854 if (stub_entry->symtype == STT_GNU_IFUNC)
11855 plt = htab->elf.iplt;
11856 else
11857 plt = htab->pltlocal;
11858 }
11859 targ += plt->output_offset + plt->output_section->vma;
11860
11861 off = (elf_gp (info->output_bfd)
11862 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11863 off = targ - off;
11864
11865 if (htab->params->plt_stub_align != 0)
11866 {
11867 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11868
11869 stub_entry->group->stub_sec->size += pad;
11870 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11871 }
11872
11873 if (info->emitrelocations)
11874 {
11875 stub_entry->group->stub_sec->reloc_count
11876 += ((PPC_HA (off) != 0)
11877 + (htab->opd_abi
11878 ? 2 + (htab->params->plt_static_chain
11879 && PPC_HA (off + 16) == PPC_HA (off))
11880 : 1));
11881 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11882 }
11883
11884 size = plt_stub_size (htab, stub_entry, off);
11885
11886 if (stub_entry->h != NULL
11887 && (stub_entry->h == htab->tls_get_addr_fd
11888 || stub_entry->h == htab->tls_get_addr)
11889 && htab->params->tls_get_addr_opt
11890 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11891 {
11892 /* After the bctrl, lr has been modified so we need to
11893 emit .eh_frame info saying the return address is
11894 on the stack. In fact we put the EH info specifying
11895 that the return address is on the stack *at* the
11896 call rather than after it, because the EH info for a
11897 call needs to be specified by that point.
11898 See libgcc/unwind-dw2.c execute_cfa_program. */
11899 lr_used = stub_entry->stub_offset + size - 20;
11900 /* The eh_frame info will consist of a DW_CFA_advance_loc
11901 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11902 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11903 delta = lr_used - stub_entry->group->lr_restore;
11904 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11905 stub_entry->group->lr_restore = size - 4;
11906 }
11907 break;
11908
11909 default:
11910 BFD_FAIL ();
11911 return FALSE;
721956f4
AM
11912 }
11913
6f20ed8a 11914 stub_entry->group->stub_sec->size += size;
b34976b6 11915 return TRUE;
721956f4
AM
11916}
11917
11918/* Set up various things so that we can make a list of input sections
11919 for each output section included in the link. Returns -1 on error,
cedb70c5 11920 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11921
11922int
e7d1c40c 11923ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11924{
6f20ed8a 11925 unsigned int id;
721956f4
AM
11926 bfd_size_type amt;
11927 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11928
4dfe6ac6
NC
11929 if (htab == NULL)
11930 return -1;
4c52953f 11931
7cf7fcc8 11932 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11933 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11934 htab->sec_info = bfd_zmalloc (amt);
11935 if (htab->sec_info == NULL)
721956f4
AM
11936 return -1;
11937
3d6f9012
AM
11938 /* Set toc_off for com, und, abs and ind sections. */
11939 for (id = 0; id < 3; id++)
6f20ed8a 11940 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11941
721956f4
AM
11942 return 1;
11943}
11944
927be08e
AM
11945/* Set up for first pass at multitoc partitioning. */
11946
11947void
11948ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11949{
11950 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11951
1c865ab2 11952 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11953 htab->toc_bfd = NULL;
11954 htab->toc_first_sec = NULL;
11955}
11956
e717da7e
AM
11957/* The linker repeatedly calls this function for each TOC input section
11958 and linker generated GOT section. Group input bfds such that the toc
927be08e 11959 within a group is less than 64k in size. */
ad8e1ba5 11960
927be08e 11961bfd_boolean
4ce794b7 11962ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11963{
11964 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11965 bfd_vma addr, off, limit;
ad8e1ba5 11966
4dfe6ac6
NC
11967 if (htab == NULL)
11968 return FALSE;
11969
927be08e 11970 if (!htab->second_toc_pass)
4c52953f 11971 {
927be08e 11972 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11973 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11974
11975 if (new_bfd)
bf102f86
AM
11976 {
11977 htab->toc_bfd = isec->owner;
11978 htab->toc_first_sec = isec;
11979 }
927be08e 11980
bf102f86
AM
11981 addr = isec->output_offset + isec->output_section->vma;
11982 off = addr - htab->toc_curr;
d77c8a4b
AM
11983 limit = 0x80008000;
11984 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11985 limit = 0x10000;
11986 if (off + isec->size > limit)
bf102f86
AM
11987 {
11988 addr = (htab->toc_first_sec->output_offset
11989 + htab->toc_first_sec->output_section->vma);
11990 htab->toc_curr = addr;
a27e685f 11991 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11992 }
99877b66 11993
927be08e
AM
11994 /* toc_curr is the base address of this toc group. Set elf_gp
11995 for the input section to be the offset relative to the
11996 output toc base plus 0x8000. Making the input elf_gp an
11997 offset allows us to move the toc as a whole without
11998 recalculating input elf_gp. */
06bcf541 11999 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12000 off += TOC_BASE_OFF;
12001
12002 /* Die if someone uses a linker script that doesn't keep input
12003 file .toc and .got together. */
a4fd3de5
AM
12004 if (new_bfd
12005 && elf_gp (isec->owner) != 0
927be08e
AM
12006 && elf_gp (isec->owner) != off)
12007 return FALSE;
12008
12009 elf_gp (isec->owner) = off;
12010 return TRUE;
4c52953f 12011 }
927be08e
AM
12012
12013 /* During the second pass toc_first_sec points to the start of
12014 a toc group, and toc_curr is used to track the old elf_gp.
12015 We use toc_bfd to ensure we only look at each bfd once. */
12016 if (htab->toc_bfd == isec->owner)
12017 return TRUE;
12018 htab->toc_bfd = isec->owner;
12019
12020 if (htab->toc_first_sec == NULL
12021 || htab->toc_curr != elf_gp (isec->owner))
12022 {
12023 htab->toc_curr = elf_gp (isec->owner);
12024 htab->toc_first_sec = isec;
12025 }
12026 addr = (htab->toc_first_sec->output_offset
12027 + htab->toc_first_sec->output_section->vma);
06bcf541 12028 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12029 elf_gp (isec->owner) = off;
12030
12031 return TRUE;
ad8e1ba5
AM
12032}
12033
927be08e
AM
12034/* Called via elf_link_hash_traverse to merge GOT entries for global
12035 symbol H. */
12036
12037static bfd_boolean
12038merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12039{
12040 if (h->root.type == bfd_link_hash_indirect)
12041 return TRUE;
12042
927be08e
AM
12043 merge_got_entries (&h->got.glist);
12044
12045 return TRUE;
12046}
12047
12048/* Called via elf_link_hash_traverse to allocate GOT entries for global
12049 symbol H. */
12050
12051static bfd_boolean
12052reallocate_got (struct elf_link_hash_entry *h, void *inf)
12053{
12054 struct got_entry *gent;
12055
12056 if (h->root.type == bfd_link_hash_indirect)
12057 return TRUE;
12058
927be08e
AM
12059 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12060 if (!gent->is_indirect)
12061 allocate_got (h, (struct bfd_link_info *) inf, gent);
12062 return TRUE;
12063}
12064
12065/* Called on the first multitoc pass after the last call to
12066 ppc64_elf_next_toc_section. This function removes duplicate GOT
12067 entries. */
12068
12069bfd_boolean
12070ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12071{
12072 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12073 struct bfd *ibfd, *ibfd2;
12074 bfd_boolean done_something;
12075
12076 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12077
7865406b
AM
12078 if (!htab->do_multi_toc)
12079 return FALSE;
12080
d0fae19d 12081 /* Merge global sym got entries within a toc group. */
927be08e
AM
12082 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12083
12084 /* And tlsld_got. */
c72f2fb2 12085 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12086 {
12087 struct got_entry *ent, *ent2;
12088
12089 if (!is_ppc64_elf (ibfd))
12090 continue;
12091
12092 ent = ppc64_tlsld_got (ibfd);
12093 if (!ent->is_indirect
12094 && ent->got.offset != (bfd_vma) -1)
12095 {
c72f2fb2 12096 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12097 {
12098 if (!is_ppc64_elf (ibfd2))
12099 continue;
12100
12101 ent2 = ppc64_tlsld_got (ibfd2);
12102 if (!ent2->is_indirect
12103 && ent2->got.offset != (bfd_vma) -1
12104 && elf_gp (ibfd2) == elf_gp (ibfd))
12105 {
12106 ent2->is_indirect = TRUE;
12107 ent2->got.ent = ent;
12108 }
12109 }
12110 }
12111 }
12112
12113 /* Zap sizes of got sections. */
33e44f2e
AM
12114 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12115 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12116 htab->got_reli_size = 0;
12117
c72f2fb2 12118 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12119 {
12120 asection *got, *relgot;
12121
12122 if (!is_ppc64_elf (ibfd))
12123 continue;
12124
12125 got = ppc64_elf_tdata (ibfd)->got;
12126 if (got != NULL)
12127 {
12128 got->rawsize = got->size;
12129 got->size = 0;
12130 relgot = ppc64_elf_tdata (ibfd)->relgot;
12131 relgot->rawsize = relgot->size;
12132 relgot->size = 0;
12133 }
12134 }
12135
12136 /* Now reallocate the got, local syms first. We don't need to
12137 allocate section contents again since we never increase size. */
c72f2fb2 12138 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12139 {
12140 struct got_entry **lgot_ents;
12141 struct got_entry **end_lgot_ents;
12142 struct plt_entry **local_plt;
12143 struct plt_entry **end_local_plt;
f961d9dd 12144 unsigned char *lgot_masks;
927be08e
AM
12145 bfd_size_type locsymcount;
12146 Elf_Internal_Shdr *symtab_hdr;
19e08130 12147 asection *s;
927be08e
AM
12148
12149 if (!is_ppc64_elf (ibfd))
12150 continue;
12151
12152 lgot_ents = elf_local_got_ents (ibfd);
12153 if (!lgot_ents)
12154 continue;
12155
12156 symtab_hdr = &elf_symtab_hdr (ibfd);
12157 locsymcount = symtab_hdr->sh_info;
12158 end_lgot_ents = lgot_ents + locsymcount;
12159 local_plt = (struct plt_entry **) end_lgot_ents;
12160 end_local_plt = local_plt + locsymcount;
f961d9dd 12161 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12162 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12163 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12164 {
12165 struct got_entry *ent;
12166
12167 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12168 {
19e08130
AM
12169 unsigned int ent_size = 8;
12170 unsigned int rel_size = sizeof (Elf64_External_Rela);
12171
d0fae19d
AM
12172 ent->got.offset = s->size;
12173 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12174 {
19e08130
AM
12175 ent_size *= 2;
12176 rel_size *= 2;
12177 }
12178 s->size += ent_size;
37da22e5 12179 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12180 {
33e44f2e 12181 htab->elf.irelplt->size += rel_size;
19e08130
AM
12182 htab->got_reli_size += rel_size;
12183 }
6a3858a6 12184 else if (bfd_link_pic (info)
f749f26e 12185 && !(ent->tls_type != 0
6a3858a6 12186 && bfd_link_executable (info)))
19e08130
AM
12187 {
12188 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12189 srel->size += rel_size;
d0fae19d
AM
12190 }
12191 }
927be08e
AM
12192 }
12193 }
12194
12195 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12196
c72f2fb2 12197 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12198 {
12199 struct got_entry *ent;
12200
12201 if (!is_ppc64_elf (ibfd))
12202 continue;
12203
12204 ent = ppc64_tlsld_got (ibfd);
12205 if (!ent->is_indirect
12206 && ent->got.offset != (bfd_vma) -1)
12207 {
12208 asection *s = ppc64_elf_tdata (ibfd)->got;
12209 ent->got.offset = s->size;
12210 s->size += 16;
f749f26e 12211 if (bfd_link_dll (info))
927be08e
AM
12212 {
12213 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12214 srel->size += sizeof (Elf64_External_Rela);
12215 }
12216 }
12217 }
12218
33e44f2e 12219 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12220 if (!done_something)
c72f2fb2 12221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12222 {
12223 asection *got;
12224
12225 if (!is_ppc64_elf (ibfd))
12226 continue;
12227
12228 got = ppc64_elf_tdata (ibfd)->got;
12229 if (got != NULL)
12230 {
12231 done_something = got->rawsize != got->size;
12232 if (done_something)
12233 break;
12234 }
12235 }
12236
12237 if (done_something)
e7d1c40c 12238 (*htab->params->layout_sections_again) ();
927be08e
AM
12239
12240 /* Set up for second pass over toc sections to recalculate elf_gp
12241 on input sections. */
12242 htab->toc_bfd = NULL;
12243 htab->toc_first_sec = NULL;
12244 htab->second_toc_pass = TRUE;
12245 return done_something;
12246}
12247
12248/* Called after second pass of multitoc partitioning. */
12249
12250void
12251ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12252{
12253 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12254
12255 /* After the second pass, toc_curr tracks the TOC offset used
12256 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12257 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12258}
12259
9b5ecbd0
AM
12260/* No toc references were found in ISEC. If the code in ISEC makes no
12261 calls, then there's no need to use toc adjusting stubs when branching
12262 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12263 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12264 needed, and 2 if a cyclical call-graph was found but no other reason
12265 for a stub was detected. If called from the top level, a return of
12266 2 means the same as a return of 0. */
9b5ecbd0
AM
12267
12268static int
4ce794b7 12269toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12270{
9b5ecbd0 12271 int ret;
70cc837d
AM
12272
12273 /* Mark this section as checked. */
12274 isec->call_check_done = 1;
9b5ecbd0 12275
772119ce
AM
12276 /* We know none of our code bearing sections will need toc stubs. */
12277 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12278 return 0;
12279
eea6121a 12280 if (isec->size == 0)
082c50f8
AM
12281 return 0;
12282
4c52953f
AM
12283 if (isec->output_section == NULL)
12284 return 0;
12285
4c52953f 12286 ret = 0;
70cc837d 12287 if (isec->reloc_count != 0)
9b5ecbd0 12288 {
70cc837d
AM
12289 Elf_Internal_Rela *relstart, *rel;
12290 Elf_Internal_Sym *local_syms;
12291 struct ppc_link_hash_table *htab;
2917689a 12292
70cc837d
AM
12293 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12294 info->keep_memory);
12295 if (relstart == NULL)
12296 return -1;
90aecf7a 12297
70cc837d
AM
12298 /* Look for branches to outside of this section. */
12299 local_syms = NULL;
12300 htab = ppc_hash_table (info);
12301 if (htab == NULL)
12302 return -1;
4c52953f 12303
70cc837d 12304 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12305 {
70cc837d
AM
12306 enum elf_ppc64_reloc_type r_type;
12307 unsigned long r_symndx;
12308 struct elf_link_hash_entry *h;
12309 struct ppc_link_hash_entry *eh;
12310 Elf_Internal_Sym *sym;
12311 asection *sym_sec;
12312 struct _opd_sec_data *opd;
12313 bfd_vma sym_value;
12314 bfd_vma dest;
12315
12316 r_type = ELF64_R_TYPE (rel->r_info);
12317 if (r_type != R_PPC64_REL24
05d0e962 12318 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12319 && r_type != R_PPC64_REL14
12320 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12321 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12322 && r_type != R_PPC64_PLTCALL
12323 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12324 continue;
4c52953f 12325
70cc837d
AM
12326 r_symndx = ELF64_R_SYM (rel->r_info);
12327 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12328 isec->owner))
4c52953f 12329 {
70cc837d
AM
12330 ret = -1;
12331 break;
12332 }
4c52953f 12333
70cc837d
AM
12334 /* Calls to dynamic lib functions go through a plt call stub
12335 that uses r2. */
12336 eh = (struct ppc_link_hash_entry *) h;
12337 if (eh != NULL
12338 && (eh->elf.plt.plist != NULL
12339 || (eh->oh != NULL
12340 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12341 {
12342 ret = 1;
12343 break;
4c52953f
AM
12344 }
12345
70cc837d
AM
12346 if (sym_sec == NULL)
12347 /* Ignore other undefined symbols. */
4c52953f 12348 continue;
4c52953f 12349
70cc837d
AM
12350 /* Assume branches to other sections not included in the
12351 link need stubs too, to cover -R and absolute syms. */
12352 if (sym_sec->output_section == NULL)
12353 {
12354 ret = 1;
12355 break;
12356 }
4c52953f 12357
70cc837d
AM
12358 if (h == NULL)
12359 sym_value = sym->st_value;
12360 else
12361 {
12362 if (h->root.type != bfd_link_hash_defined
12363 && h->root.type != bfd_link_hash_defweak)
12364 abort ();
12365 sym_value = h->root.u.def.value;
12366 }
12367 sym_value += rel->r_addend;
4c52953f 12368
70cc837d
AM
12369 /* If this branch reloc uses an opd sym, find the code section. */
12370 opd = get_opd_info (sym_sec);
12371 if (opd != NULL)
12372 {
12373 if (h == NULL && opd->adjust != NULL)
12374 {
12375 long adjust;
4c52953f 12376
92a9c616 12377 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12378 if (adjust == -1)
12379 /* Assume deleted functions won't ever be called. */
12380 continue;
12381 sym_value += adjust;
12382 }
4c52953f 12383
aef36ac1
AM
12384 dest = opd_entry_value (sym_sec, sym_value,
12385 &sym_sec, NULL, FALSE);
70cc837d
AM
12386 if (dest == (bfd_vma) -1)
12387 continue;
12388 }
12389 else
12390 dest = (sym_value
12391 + sym_sec->output_offset
12392 + sym_sec->output_section->vma);
4c52953f 12393
70cc837d
AM
12394 /* Ignore branch to self. */
12395 if (sym_sec == isec)
12396 continue;
4c52953f 12397
70cc837d
AM
12398 /* If the called function uses the toc, we need a stub. */
12399 if (sym_sec->has_toc_reloc
12400 || sym_sec->makes_toc_func_call)
4c52953f 12401 {
70cc837d 12402 ret = 1;
4c52953f
AM
12403 break;
12404 }
70cc837d
AM
12405
12406 /* Assume any branch that needs a long branch stub might in fact
12407 need a plt_branch stub. A plt_branch stub uses r2. */
12408 else if (dest - (isec->output_offset
12409 + isec->output_section->vma
6911b7dc
AM
12410 + rel->r_offset) + (1 << 25)
12411 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12412 ? h->other
12413 : sym->st_other))
4c52953f 12414 {
70cc837d
AM
12415 ret = 1;
12416 break;
12417 }
12418
12419 /* If calling back to a section in the process of being
12420 tested, we can't say for sure that no toc adjusting stubs
12421 are needed, so don't return zero. */
12422 else if (sym_sec->call_check_in_progress)
12423 ret = 2;
12424
12425 /* Branches to another section that itself doesn't have any TOC
12426 references are OK. Recursively call ourselves to check. */
12427 else if (!sym_sec->call_check_done)
12428 {
12429 int recur;
12430
12431 /* Mark current section as indeterminate, so that other
12432 sections that call back to current won't be marked as
12433 known. */
12434 isec->call_check_in_progress = 1;
12435 recur = toc_adjusting_stub_needed (info, sym_sec);
12436 isec->call_check_in_progress = 0;
12437
4c52953f
AM
12438 if (recur != 0)
12439 {
70cc837d
AM
12440 ret = recur;
12441 if (recur != 2)
12442 break;
4c52953f
AM
12443 }
12444 }
4c52953f 12445 }
70cc837d
AM
12446
12447 if (local_syms != NULL
12448 && (elf_symtab_hdr (isec->owner).contents
12449 != (unsigned char *) local_syms))
12450 free (local_syms);
12451 if (elf_section_data (isec)->relocs != relstart)
12452 free (relstart);
9b5ecbd0
AM
12453 }
12454
70cc837d
AM
12455 if ((ret & 1) == 0
12456 && isec->map_head.s != NULL
12457 && (strcmp (isec->output_section->name, ".init") == 0
12458 || strcmp (isec->output_section->name, ".fini") == 0))
12459 {
12460 if (isec->map_head.s->has_toc_reloc
12461 || isec->map_head.s->makes_toc_func_call)
12462 ret = 1;
12463 else if (!isec->map_head.s->call_check_done)
12464 {
12465 int recur;
12466 isec->call_check_in_progress = 1;
12467 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12468 isec->call_check_in_progress = 0;
12469 if (recur != 0)
12470 ret = recur;
12471 }
12472 }
12473
12474 if (ret == 1)
12475 isec->makes_toc_func_call = 1;
4c52953f 12476
9b5ecbd0
AM
12477 return ret;
12478}
12479
721956f4
AM
12480/* The linker repeatedly calls this function for each input section,
12481 in the order that input sections are linked into output sections.
12482 Build lists of input sections to determine groupings between which
12483 we may insert linker stubs. */
12484
9b5ecbd0 12485bfd_boolean
4ce794b7 12486ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12487{
12488 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12489
4dfe6ac6
NC
12490 if (htab == NULL)
12491 return FALSE;
12492
734b6cf9 12493 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12494 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12495 {
3d6f9012
AM
12496 /* This happens to make the list in reverse order,
12497 which is what we want. */
6f20ed8a
AM
12498 htab->sec_info[isec->id].u.list
12499 = htab->sec_info[isec->output_section->id].u.list;
12500 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12501 }
ad8e1ba5 12502
4c52953f 12503 if (htab->multi_toc_needed)
9b5ecbd0 12504 {
8b974ba3
AM
12505 /* Analyse sections that aren't already flagged as needing a
12506 valid toc pointer. Exclude .fixup for the linux kernel.
12507 .fixup contains branches, but only back to the function that
12508 hit an exception. */
12509 if (!(isec->has_toc_reloc
12510 || (isec->flags & SEC_CODE) == 0
12511 || strcmp (isec->name, ".fixup") == 0
12512 || isec->call_check_done))
12513 {
12514 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12515 return FALSE;
8b974ba3
AM
12516 }
12517 /* Make all sections use the TOC assigned for this object file.
12518 This will be wrong for pasted sections; We fix that in
12519 check_pasted_section(). */
12520 if (elf_gp (isec->owner) != 0)
12521 htab->toc_curr = elf_gp (isec->owner);
12522 }
12523
6f20ed8a 12524 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12525 return TRUE;
721956f4
AM
12526}
12527
70cc837d
AM
12528/* Check that all .init and .fini sections use the same toc, if they
12529 have toc relocs. */
12530
12531static bfd_boolean
12532check_pasted_section (struct bfd_link_info *info, const char *name)
12533{
12534 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12535
12536 if (o != NULL)
12537 {
12538 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12539 bfd_vma toc_off = 0;
12540 asection *i;
12541
12542 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12543 if (i->has_toc_reloc)
12544 {
12545 if (toc_off == 0)
6f20ed8a
AM
12546 toc_off = htab->sec_info[i->id].toc_off;
12547 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12548 return FALSE;
12549 }
6683a28d
AM
12550
12551 if (toc_off == 0)
12552 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12553 if (i->makes_toc_func_call)
12554 {
6f20ed8a 12555 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12556 break;
12557 }
12558
70cc837d
AM
12559 /* Make sure the whole pasted function uses the same toc offset. */
12560 if (toc_off != 0)
12561 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12562 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12563 }
12564 return TRUE;
12565}
12566
12567bfd_boolean
12568ppc64_elf_check_init_fini (struct bfd_link_info *info)
12569{
12570 return (check_pasted_section (info, ".init")
12571 & check_pasted_section (info, ".fini"));
12572}
12573
721956f4
AM
12574/* See whether we can group stub sections together. Grouping stub
12575 sections may result in fewer stubs. More importantly, we need to
12576 put all .init* and .fini* stubs at the beginning of the .init or
12577 .fini output sections respectively, because glibc splits the
12578 _init and _fini functions into multiple parts. Putting a stub in
12579 the middle of a function is not a good idea. */
12580
6f20ed8a
AM
12581static bfd_boolean
12582group_sections (struct bfd_link_info *info,
4ce794b7
AM
12583 bfd_size_type stub_group_size,
12584 bfd_boolean stubs_always_before_branch)
721956f4 12585{
6f20ed8a
AM
12586 struct ppc_link_hash_table *htab;
12587 asection *osec;
7c8fe5c4
AM
12588 bfd_boolean suppress_size_errors;
12589
6f20ed8a
AM
12590 htab = ppc_hash_table (info);
12591 if (htab == NULL)
12592 return FALSE;
12593
7c8fe5c4 12594 suppress_size_errors = FALSE;
7c8fe5c4
AM
12595 if (stub_group_size == 1)
12596 {
12597 /* Default values. */
12598 if (stubs_always_before_branch)
09f92717 12599 stub_group_size = 0x1e00000;
7c8fe5c4 12600 else
09f92717 12601 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12602 suppress_size_errors = TRUE;
12603 }
12604
6f20ed8a 12605 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12606 {
6f20ed8a
AM
12607 asection *tail;
12608
12609 if (osec->id >= htab->sec_info_arr_size)
12610 continue;
12611
12612 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12613 while (tail != NULL)
721956f4 12614 {
734b6cf9
AM
12615 asection *curr;
12616 asection *prev;
12617 bfd_size_type total;
12618 bfd_boolean big_sec;
12619 bfd_vma curr_toc;
6f20ed8a 12620 struct map_stub *group;
09f92717 12621 bfd_size_type group_size;
734b6cf9
AM
12622
12623 curr = tail;
eea6121a 12624 total = tail->size;
09f92717
AM
12625 group_size = (ppc64_elf_section_data (tail) != NULL
12626 && ppc64_elf_section_data (tail)->has_14bit_branch
12627 ? stub_group_size >> 10 : stub_group_size);
12628
12629 big_sec = total > group_size;
7c8fe5c4 12630 if (big_sec && !suppress_size_errors)
695344c0 12631 /* xgettext:c-format */
871b3ab2 12632 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12633 tail->owner, tail);
6f20ed8a 12634 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12635
6f20ed8a 12636 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12637 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12638 < (ppc64_elf_section_data (prev) != NULL
12639 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12640 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12641 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12642 curr = prev;
12643
12644 /* OK, the size from the start of CURR to the end is less
09f92717 12645 than group_size and thus can be handled by one stub
734b6cf9 12646 section. (or the tail section is itself larger than
09f92717
AM
12647 group_size, in which case we may be toast.) We should
12648 really be keeping track of the total size of stubs added
12649 here, as stubs contribute to the final output section
12650 size. That's a little tricky, and this way will only
12651 break if stubs added make the total size more than 2^25,
12652 ie. for the default stub_group_size, if stubs total more
12653 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12654 group = bfd_alloc (curr->owner, sizeof (*group));
12655 if (group == NULL)
12656 return FALSE;
12657 group->link_sec = curr;
12658 group->stub_sec = NULL;
a4b6fadd 12659 group->needs_save_res = 0;
df136d64
AM
12660 group->lr_restore = 0;
12661 group->eh_size = 0;
12662 group->eh_base = 0;
a4b6fadd
AM
12663 group->next = htab->group;
12664 htab->group = group;
734b6cf9 12665 do
721956f4 12666 {
6f20ed8a 12667 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12668 /* Set up this stub group. */
6f20ed8a 12669 htab->sec_info[tail->id].u.group = group;
721956f4 12670 }
734b6cf9
AM
12671 while (tail != curr && (tail = prev) != NULL);
12672
09f92717 12673 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12674 bytes before the stub section can be handled by it too.
12675 Don't do this if we have a really large section after the
12676 stubs, as adding more stubs increases the chance that
12677 branches may not reach into the stub section. */
12678 if (!stubs_always_before_branch && !big_sec)
12679 {
12680 total = 0;
12681 while (prev != NULL
12682 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12683 < (ppc64_elf_section_data (prev) != NULL
12684 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12685 ? (group_size = stub_group_size >> 10)
12686 : group_size))
6f20ed8a 12687 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12688 {
12689 tail = prev;
6f20ed8a
AM
12690 prev = htab->sec_info[tail->id].u.list;
12691 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12692 }
12693 }
12694 tail = prev;
721956f4
AM
12695 }
12696 }
6f20ed8a 12697 return TRUE;
721956f4
AM
12698}
12699
58d180e8
AM
12700static const unsigned char glink_eh_frame_cie[] =
12701{
12702 0, 0, 0, 16, /* length. */
12703 0, 0, 0, 0, /* id. */
12704 1, /* CIE version. */
12705 'z', 'R', 0, /* Augmentation string. */
12706 4, /* Code alignment. */
12707 0x78, /* Data alignment. */
12708 65, /* RA reg. */
12709 1, /* Augmentation size. */
12710 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12711 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12712};
12713
d969d15f
AM
12714/* Stripping output sections is normally done before dynamic section
12715 symbols have been allocated. This function is called later, and
12716 handles cases like htab->brlt which is mapped to its own output
12717 section. */
12718
12719static void
12720maybe_strip_output (struct bfd_link_info *info, asection *isec)
12721{
12722 if (isec->size == 0
12723 && isec->output_section->size == 0
53d8967a 12724 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12725 && !bfd_section_removed_from_list (info->output_bfd,
12726 isec->output_section)
12727 && elf_section_data (isec->output_section)->dynindx == 0)
12728 {
12729 isec->output_section->flags |= SEC_EXCLUDE;
12730 bfd_section_list_remove (info->output_bfd, isec->output_section);
12731 info->output_bfd->section_count--;
12732 }
12733}
12734
721956f4
AM
12735/* Determine and set the size of the stub section for a final link.
12736
12737 The basic idea here is to examine all the relocations looking for
12738 PC-relative calls to a target that is unreachable with a "bl"
12739 instruction. */
12740
b34976b6 12741bfd_boolean
e7d1c40c 12742ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12743{
12744 bfd_size_type stub_group_size;
b34976b6 12745 bfd_boolean stubs_always_before_branch;
721956f4
AM
12746 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12747
4dfe6ac6
NC
12748 if (htab == NULL)
12749 return FALSE;
12750
0e1862bb 12751 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12752 htab->params->plt_thread_safe = 1;
b9e5796b 12753 if (!htab->opd_abi)
e7d1c40c
AM
12754 htab->params->plt_thread_safe = 0;
12755 else if (htab->params->plt_thread_safe == -1)
794e51c0 12756 {
e2458743 12757 static const char *const thread_starter[] =
794e51c0
AM
12758 {
12759 "pthread_create",
12760 /* libstdc++ */
12761 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12762 /* librt */
12763 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12764 "mq_notify", "create_timer",
12765 /* libanl */
12766 "getaddrinfo_a",
12767 /* libgomp */
2300b5a1 12768 "GOMP_parallel",
794e51c0 12769 "GOMP_parallel_start",
2300b5a1 12770 "GOMP_parallel_loop_static",
794e51c0 12771 "GOMP_parallel_loop_static_start",
2300b5a1 12772 "GOMP_parallel_loop_dynamic",
794e51c0 12773 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12774 "GOMP_parallel_loop_guided",
794e51c0 12775 "GOMP_parallel_loop_guided_start",
2300b5a1 12776 "GOMP_parallel_loop_runtime",
794e51c0 12777 "GOMP_parallel_loop_runtime_start",
2300b5a1 12778 "GOMP_parallel_sections",
68ffbac6 12779 "GOMP_parallel_sections_start",
f9dffbf0
AM
12780 /* libgo */
12781 "__go_go",
794e51c0
AM
12782 };
12783 unsigned i;
12784
a4b6fadd 12785 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12786 {
12787 struct elf_link_hash_entry *h;
12788 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12789 FALSE, FALSE, TRUE);
e7d1c40c
AM
12790 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12791 if (htab->params->plt_thread_safe)
794e51c0
AM
12792 break;
12793 }
12794 }
e7d1c40c
AM
12795 stubs_always_before_branch = htab->params->group_size < 0;
12796 if (htab->params->group_size < 0)
12797 stub_group_size = -htab->params->group_size;
721956f4 12798 else
e7d1c40c 12799 stub_group_size = htab->params->group_size;
721956f4 12800
6f20ed8a
AM
12801 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12802 return FALSE;
721956f4 12803
c9301e31
AM
12804#define STUB_SHRINK_ITER 20
12805 /* Loop until no stubs added. After iteration 20 of this loop we may
12806 exit on a stub section shrinking. This is to break out of a
12807 pathological case where adding stubs on one iteration decreases
12808 section gaps (perhaps due to alignment), which then requires
12809 fewer or smaller stubs on the next iteration. */
12810
721956f4
AM
12811 while (1)
12812 {
12813 bfd *input_bfd;
12814 unsigned int bfd_indx;
a4b6fadd 12815 struct map_stub *group;
721956f4
AM
12816
12817 htab->stub_iteration += 1;
721956f4
AM
12818
12819 for (input_bfd = info->input_bfds, bfd_indx = 0;
12820 input_bfd != NULL;
c72f2fb2 12821 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12822 {
12823 Elf_Internal_Shdr *symtab_hdr;
12824 asection *section;
6cdc0ccc 12825 Elf_Internal_Sym *local_syms = NULL;
721956f4 12826
0c8d6e5c 12827 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12828 continue;
12829
721956f4 12830 /* We'll need the symbol table in a second. */
0ffa91dd 12831 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12832 if (symtab_hdr->sh_info == 0)
12833 continue;
12834
721956f4
AM
12835 /* Walk over each section attached to the input bfd. */
12836 for (section = input_bfd->sections;
12837 section != NULL;
12838 section = section->next)
12839 {
721956f4 12840 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12841
12842 /* If there aren't any relocs, then there's nothing more
12843 to do. */
12844 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12845 || (section->flags & SEC_ALLOC) == 0
12846 || (section->flags & SEC_LOAD) == 0
12847 || (section->flags & SEC_CODE) == 0
721956f4
AM
12848 || section->reloc_count == 0)
12849 continue;
12850
12851 /* If this section is a link-once section that will be
12852 discarded, then don't create any stubs. */
12853 if (section->output_section == NULL
927be08e 12854 || section->output_section->owner != info->output_bfd)
721956f4
AM
12855 continue;
12856
1e2f5b6e
AM
12857 /* Get the relocs. */
12858 internal_relocs
4ce794b7 12859 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12860 info->keep_memory);
721956f4 12861 if (internal_relocs == NULL)
1e2f5b6e 12862 goto error_ret_free_local;
721956f4
AM
12863
12864 /* Now examine each relocation. */
12865 irela = internal_relocs;
12866 irelaend = irela + section->reloc_count;
12867 for (; irela < irelaend; irela++)
12868 {
4ce794b7
AM
12869 enum elf_ppc64_reloc_type r_type;
12870 unsigned int r_indx;
721956f4
AM
12871 enum ppc_stub_type stub_type;
12872 struct ppc_stub_hash_entry *stub_entry;
8387904d 12873 asection *sym_sec, *code_sec;
e054468f 12874 bfd_vma sym_value, code_value;
721956f4 12875 bfd_vma destination;
6911b7dc 12876 unsigned long local_off;
8843416a 12877 bfd_boolean ok_dest;
721956f4 12878 struct ppc_link_hash_entry *hash;
8387904d 12879 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12880 struct elf_link_hash_entry *h;
12881 Elf_Internal_Sym *sym;
721956f4
AM
12882 char *stub_name;
12883 const asection *id_sec;
74f0fb50 12884 struct _opd_sec_data *opd;
e054468f 12885 struct plt_entry *plt_ent;
721956f4
AM
12886
12887 r_type = ELF64_R_TYPE (irela->r_info);
12888 r_indx = ELF64_R_SYM (irela->r_info);
12889
4ce794b7 12890 if (r_type >= R_PPC64_max)
721956f4
AM
12891 {
12892 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12893 goto error_ret_free_internal;
721956f4
AM
12894 }
12895
12896 /* Only look for stubs on branch instructions. */
4ce794b7 12897 if (r_type != R_PPC64_REL24
05d0e962 12898 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12899 && r_type != R_PPC64_REL14
12900 && r_type != R_PPC64_REL14_BRTAKEN
12901 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12902 continue;
12903
12904 /* Now determine the call target, its name, value,
12905 section. */
411e1bfb
AM
12906 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12907 r_indx, input_bfd))
12908 goto error_ret_free_internal;
12909 hash = (struct ppc_link_hash_entry *) h;
12910
8843416a 12911 ok_dest = FALSE;
8387904d 12912 fdh = NULL;
7fe2b9a6 12913 sym_value = 0;
411e1bfb 12914 if (hash == NULL)
721956f4 12915 {
411e1bfb 12916 sym_value = sym->st_value;
c27b8c2a
AM
12917 if (sym_sec != NULL
12918 && sym_sec->output_section != NULL)
12919 ok_dest = TRUE;
721956f4 12920 }
7fe2b9a6
AM
12921 else if (hash->elf.root.type == bfd_link_hash_defined
12922 || hash->elf.root.type == bfd_link_hash_defweak)
12923 {
12924 sym_value = hash->elf.root.u.def.value;
12925 if (sym_sec->output_section != NULL)
12926 ok_dest = TRUE;
12927 }
12928 else if (hash->elf.root.type == bfd_link_hash_undefweak
12929 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12930 {
99877b66 12931 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12932 use the func descriptor sym instead if it is
12933 defined. */
ceb1f1ef 12934 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12935 && hash->oh != NULL)
8387904d 12936 {
8c5b4e52 12937 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12938 if (fdh->elf.root.type == bfd_link_hash_defined
12939 || fdh->elf.root.type == bfd_link_hash_defweak)
12940 {
12941 sym_sec = fdh->elf.root.u.def.section;
12942 sym_value = fdh->elf.root.u.def.value;
12943 if (sym_sec->output_section != NULL)
12944 ok_dest = TRUE;
12945 }
99877b66
AM
12946 else
12947 fdh = NULL;
8387904d 12948 }
7fe2b9a6
AM
12949 }
12950 else
12951 {
12952 bfd_set_error (bfd_error_bad_value);
12953 goto error_ret_free_internal;
721956f4
AM
12954 }
12955
8843416a 12956 destination = 0;
6911b7dc 12957 local_off = 0;
8843416a
AM
12958 if (ok_dest)
12959 {
12960 sym_value += irela->r_addend;
12961 destination = (sym_value
12962 + sym_sec->output_offset
12963 + sym_sec->output_section->vma);
6911b7dc
AM
12964 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12965 ? hash->elf.other
12966 : sym->st_other);
8843416a
AM
12967 }
12968
8387904d 12969 code_sec = sym_sec;
e054468f 12970 code_value = sym_value;
74f0fb50
AM
12971 opd = get_opd_info (sym_sec);
12972 if (opd != NULL)
8387904d
AM
12973 {
12974 bfd_vma dest;
12975
74f0fb50 12976 if (hash == NULL && opd->adjust != NULL)
8387904d 12977 {
51aecdc5 12978 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12979 if (adjust == -1)
12980 continue;
e054468f 12981 code_value += adjust;
8387904d
AM
12982 sym_value += adjust;
12983 }
12984 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12985 &code_sec, &code_value, FALSE);
8387904d
AM
12986 if (dest != (bfd_vma) -1)
12987 {
12988 destination = dest;
12989 if (fdh != NULL)
12990 {
12991 /* Fixup old ABI sym to point at code
12992 entry. */
99877b66 12993 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12994 hash->elf.root.u.def.section = code_sec;
e054468f 12995 hash->elf.root.u.def.value = code_value;
8387904d
AM
12996 }
12997 }
12998 }
12999
721956f4 13000 /* Determine what (if any) linker stub is needed. */
e054468f 13001 plt_ent = NULL;
721956f4 13002 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13003 &plt_ent, destination,
13004 local_off);
ad8e1ba5 13005
05d0e962
AM
13006 if (r_type == R_PPC64_REL24_NOTOC)
13007 {
13008 if (stub_type == ppc_stub_plt_call)
13009 stub_type = ppc_stub_plt_call_notoc;
13010 else if (stub_type == ppc_stub_long_branch
13011 || (code_sec != NULL
13012 && code_sec->output_section != NULL
13013 && (((hash ? hash->elf.other : sym->st_other)
13014 & STO_PPC64_LOCAL_MASK)
4a4e7361 13015 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13016 stub_type = ppc_stub_long_branch_notoc;
13017 }
13018 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13019 {
13020 /* Check whether we need a TOC adjusting stub.
13021 Since the linker pastes together pieces from
13022 different object files when creating the
13023 _init and _fini functions, it may be that a
13024 call to what looks like a local sym is in
13025 fact a call needing a TOC adjustment. */
33cb30a1
AM
13026 if ((code_sec != NULL
13027 && code_sec->output_section != NULL
13028 && (htab->sec_info[code_sec->id].toc_off
13029 != htab->sec_info[section->id].toc_off)
13030 && (code_sec->has_toc_reloc
13031 || code_sec->makes_toc_func_call))
13032 || (((hash ? hash->elf.other : sym->st_other)
13033 & STO_PPC64_LOCAL_MASK)
13034 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13035 stub_type = ppc_stub_long_branch_r2off;
13036 }
13037
721956f4
AM
13038 if (stub_type == ppc_stub_none)
13039 continue;
13040
411e1bfb
AM
13041 /* __tls_get_addr calls might be eliminated. */
13042 if (stub_type != ppc_stub_plt_call
05d0e962 13043 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13044 && hash != NULL
8387904d
AM
13045 && (hash == htab->tls_get_addr
13046 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
13047 && section->has_tls_reloc
13048 && irela != internal_relocs)
13049 {
13050 /* Get tls info. */
f961d9dd 13051 unsigned char *tls_mask;
411e1bfb 13052
3a71aa26 13053 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13054 irela - 1, input_bfd))
13055 goto error_ret_free_internal;
37da22e5 13056 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
13057 continue;
13058 }
13059
f378ab09 13060 if (stub_type == ppc_stub_plt_call)
794e51c0 13061 {
6e1816be
AM
13062 if (!htab->opd_abi
13063 && htab->params->plt_localentry0 != 0
13064 && is_elfv2_localentry0 (&hash->elf))
13065 htab->has_plt_localentry0 = 1;
13066 else if (irela + 1 < irelaend
13067 && irela[1].r_offset == irela->r_offset + 4
13068 && (ELF64_R_TYPE (irela[1].r_info)
13069 == R_PPC64_TOCSAVE))
f378ab09
AM
13070 {
13071 if (!tocsave_find (htab, INSERT,
13072 &local_syms, irela + 1, input_bfd))
13073 goto error_ret_free_internal;
13074 }
f378ab09
AM
13075 else
13076 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13077 }
3b421ab3 13078
721956f4 13079 /* Support for grouping stub sections. */
6f20ed8a 13080 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13081
13082 /* Get the name of this stub. */
13083 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13084 if (!stub_name)
13085 goto error_ret_free_internal;
13086
13087 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13088 stub_name, FALSE, FALSE);
721956f4
AM
13089 if (stub_entry != NULL)
13090 {
05d0e962
AM
13091 enum ppc_stub_type old_type;
13092 /* A stub has already been created, but it may
13093 not be the required type. We shouldn't be
13094 transitioning from plt_call to long_branch
13095 stubs or vice versa, but we might be
13096 upgrading from plt_call to plt_call_r2save or
13097 from long_branch to long_branch_r2off. */
721956f4 13098 free (stub_name);
05d0e962
AM
13099 old_type = stub_entry->stub_type;
13100 switch (old_type)
13101 {
13102 default:
13103 abort ();
13104
13105 case ppc_stub_save_res:
13106 continue;
13107
13108 case ppc_stub_plt_call:
13109 case ppc_stub_plt_call_r2save:
13110 case ppc_stub_plt_call_notoc:
13111 case ppc_stub_plt_call_both:
13112 if (stub_type == ppc_stub_plt_call)
13113 continue;
13114 else if (stub_type == ppc_stub_plt_call_r2save)
13115 {
13116 if (old_type == ppc_stub_plt_call_notoc)
13117 stub_type = ppc_stub_plt_call_both;
13118 }
13119 else if (stub_type == ppc_stub_plt_call_notoc)
13120 {
13121 if (old_type == ppc_stub_plt_call_r2save)
13122 stub_type = ppc_stub_plt_call_both;
13123 }
13124 else
13125 abort ();
13126 break;
13127
13128 case ppc_stub_plt_branch:
13129 case ppc_stub_plt_branch_r2off:
13130 case ppc_stub_plt_branch_notoc:
13131 case ppc_stub_plt_branch_both:
13132 old_type += (ppc_stub_long_branch
13133 - ppc_stub_plt_branch);
13134 /* Fall through. */
13135 case ppc_stub_long_branch:
13136 case ppc_stub_long_branch_r2off:
13137 case ppc_stub_long_branch_notoc:
13138 case ppc_stub_long_branch_both:
13139 if (stub_type == ppc_stub_long_branch)
13140 continue;
13141 else if (stub_type == ppc_stub_long_branch_r2off)
13142 {
13143 if (old_type == ppc_stub_long_branch_notoc)
13144 stub_type = ppc_stub_long_branch_both;
13145 }
13146 else if (stub_type == ppc_stub_long_branch_notoc)
13147 {
13148 if (old_type == ppc_stub_long_branch_r2off)
13149 stub_type = ppc_stub_long_branch_both;
13150 }
13151 else
13152 abort ();
13153 break;
13154 }
13155 if (old_type < stub_type)
794e51c0 13156 stub_entry->stub_type = stub_type;
721956f4
AM
13157 continue;
13158 }
13159
25f53a85 13160 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13161 if (stub_entry == NULL)
13162 {
13163 free (stub_name);
6cdc0ccc
AM
13164 error_ret_free_internal:
13165 if (elf_section_data (section)->relocs == NULL)
13166 free (internal_relocs);
13167 error_ret_free_local:
13168 if (local_syms != NULL
13169 && (symtab_hdr->contents
13170 != (unsigned char *) local_syms))
13171 free (local_syms);
b34976b6 13172 return FALSE;
721956f4
AM
13173 }
13174
ad8e1ba5 13175 stub_entry->stub_type = stub_type;
05d0e962
AM
13176 if (stub_type >= ppc_stub_plt_call
13177 && stub_type <= ppc_stub_plt_call_both)
e054468f 13178 {
05d0e962
AM
13179 stub_entry->target_value = sym_value;
13180 stub_entry->target_section = sym_sec;
e054468f
AM
13181 }
13182 else
13183 {
05d0e962
AM
13184 stub_entry->target_value = code_value;
13185 stub_entry->target_section = code_sec;
e054468f 13186 }
721956f4 13187 stub_entry->h = hash;
e054468f 13188 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13189 stub_entry->symtype
13190 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13191 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13192
3d58e1fc
AM
13193 if (hash != NULL
13194 && (hash->elf.root.type == bfd_link_hash_defined
13195 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13196 htab->stub_globals += 1;
721956f4
AM
13197 }
13198
13199 /* We're done with the internal relocs, free them. */
6cdc0ccc 13200 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13201 free (internal_relocs);
721956f4 13202 }
6cdc0ccc
AM
13203
13204 if (local_syms != NULL
13205 && symtab_hdr->contents != (unsigned char *) local_syms)
13206 {
13207 if (!info->keep_memory)
13208 free (local_syms);
13209 else
13210 symtab_hdr->contents = (unsigned char *) local_syms;
13211 }
721956f4
AM
13212 }
13213
5c3dead3 13214 /* We may have added some stubs. Find out the new size of the
721956f4 13215 stub sections. */
d4aaa2a0 13216 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13217 {
13218 group->lr_restore = 0;
13219 group->eh_size = 0;
13220 if (group->stub_sec != NULL)
13221 {
13222 asection *stub_sec = group->stub_sec;
13223
13224 if (htab->stub_iteration <= STUB_SHRINK_ITER
13225 || stub_sec->rawsize < stub_sec->size)
13226 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13227 stub_sec->rawsize = stub_sec->size;
13228 stub_sec->size = 0;
13229 stub_sec->reloc_count = 0;
13230 stub_sec->flags &= ~SEC_RELOC;
13231 }
13232 }
eea6121a 13233
ba21f564
AM
13234 if (htab->stub_iteration <= STUB_SHRINK_ITER
13235 || htab->brlt->rawsize < htab->brlt->size)
13236 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13237 htab->brlt->size = 0;
84f5d08e
AM
13238 htab->brlt->reloc_count = 0;
13239 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13240 if (htab->relbrlt != NULL)
eea6121a 13241 htab->relbrlt->size = 0;
721956f4 13242
63bc6f6c 13243 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13244
a4b6fadd
AM
13245 for (group = htab->group; group != NULL; group = group->next)
13246 if (group->needs_save_res)
13247 group->stub_sec->size += htab->sfpr->size;
13248
176a0d42
AM
13249 if (info->emitrelocations
13250 && htab->glink != NULL && htab->glink->size != 0)
13251 {
13252 htab->glink->reloc_count = 1;
13253 htab->glink->flags |= SEC_RELOC;
13254 }
13255
58d180e8
AM
13256 if (htab->glink_eh_frame != NULL
13257 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13258 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13259 {
2e0ce1c8 13260 size_t size = 0, align = 4;
58d180e8 13261
d4aaa2a0 13262 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13263 if (group->eh_size != 0)
13264 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13265 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13266 size += (24 + align - 1) & -align;
58d180e8 13267 if (size != 0)
2e0ce1c8
AM
13268 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13269 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13270 size = (size + align - 1) & -align;
58d180e8
AM
13271 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13272 htab->glink_eh_frame->size = size;
13273 }
13274
e7d1c40c 13275 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13276 for (group = htab->group; group != NULL; group = group->next)
13277 if (group->stub_sec != NULL)
691d2e9a
AM
13278 {
13279 int align = abs (htab->params->plt_stub_align);
13280 group->stub_sec->size
13281 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13282 }
d4aaa2a0
AM
13283
13284 for (group = htab->group; group != NULL; group = group->next)
13285 if (group->stub_sec != NULL
13286 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13287 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13288 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13289 break;
13290
d4aaa2a0 13291 if (group == NULL
ba21f564
AM
13292 && (htab->brlt->rawsize == htab->brlt->size
13293 || (htab->stub_iteration > STUB_SHRINK_ITER
13294 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13295 && (htab->glink_eh_frame == NULL
13296 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13297 break;
13298
721956f4 13299 /* Ask the linker to do its stuff. */
e7d1c40c 13300 (*htab->params->layout_sections_again) ();
721956f4
AM
13301 }
13302
da44f4e5
AM
13303 if (htab->glink_eh_frame != NULL
13304 && htab->glink_eh_frame->size != 0)
13305 {
13306 bfd_vma val;
13307 bfd_byte *p, *last_fde;
13308 size_t last_fde_len, size, align, pad;
d4aaa2a0 13309 struct map_stub *group;
da44f4e5 13310
df136d64
AM
13311 /* It is necessary to at least have a rough outline of the
13312 linker generated CIEs and FDEs written before
13313 bfd_elf_discard_info is run, in order for these FDEs to be
13314 indexed in .eh_frame_hdr. */
da44f4e5
AM
13315 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13316 if (p == NULL)
13317 return FALSE;
13318 htab->glink_eh_frame->contents = p;
13319 last_fde = p;
2e0ce1c8 13320 align = 4;
da44f4e5
AM
13321
13322 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13323 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13324 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13325 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13326 p += last_fde_len + 4;
da44f4e5 13327
d4aaa2a0 13328 for (group = htab->group; group != NULL; group = group->next)
df136d64 13329 if (group->eh_size != 0)
da44f4e5 13330 {
df136d64 13331 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13332 last_fde = p;
df136d64 13333 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13334 /* FDE length. */
2e0ce1c8 13335 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13336 p += 4;
13337 /* CIE pointer. */
13338 val = p - htab->glink_eh_frame->contents;
13339 bfd_put_32 (htab->elf.dynobj, val, p);
13340 p += 4;
13341 /* Offset to stub section, written later. */
13342 p += 4;
13343 /* stub section size. */
d4aaa2a0 13344 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13345 p += 4;
13346 /* Augmentation. */
13347 p += 1;
df136d64
AM
13348 /* Make sure we don't have all nops. This is enough for
13349 elf-eh-frame.c to detect the last non-nop opcode. */
13350 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13351 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13352 }
13353 if (htab->glink != NULL && htab->glink->size != 0)
13354 {
13355 last_fde = p;
2e0ce1c8 13356 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13357 /* FDE length. */
2e0ce1c8 13358 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13359 p += 4;
13360 /* CIE pointer. */
13361 val = p - htab->glink_eh_frame->contents;
13362 bfd_put_32 (htab->elf.dynobj, val, p);
13363 p += 4;
13364 /* Offset to .glink, written later. */
13365 p += 4;
13366 /* .glink size. */
13367 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13368 p += 4;
13369 /* Augmentation. */
13370 p += 1;
13371
13372 *p++ = DW_CFA_advance_loc + 1;
13373 *p++ = DW_CFA_register;
13374 *p++ = 65;
9f08fa5c 13375 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13376 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13377 *p++ = DW_CFA_restore_extended;
13378 *p++ = 65;
2e0ce1c8 13379 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13380 }
13381 /* Subsume any padding into the last FDE if user .eh_frame
13382 sections are aligned more than glink_eh_frame. Otherwise any
13383 zero padding will be seen as a terminator. */
2e0ce1c8 13384 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13385 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13386 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13387 htab->glink_eh_frame->size = size + pad;
13388 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13389 }
13390
d969d15f
AM
13391 maybe_strip_output (info, htab->brlt);
13392 if (htab->glink_eh_frame != NULL)
13393 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13394
b34976b6 13395 return TRUE;
721956f4
AM
13396}
13397
13398/* Called after we have determined section placement. If sections
805fc799 13399 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13400
805fc799 13401bfd_vma
1c865ab2 13402ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13403{
805fc799 13404 asection *s;
a27e685f 13405 bfd_vma TOCstart, adjust;
721956f4 13406
43417696
AM
13407 if (info != NULL)
13408 {
13409 struct elf_link_hash_entry *h;
13410 struct elf_link_hash_table *htab = elf_hash_table (info);
13411
13412 if (is_elf_hash_table (htab)
13413 && htab->hgot != NULL)
13414 h = htab->hgot;
13415 else
13416 {
13417 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13418 if (is_elf_hash_table (htab))
13419 htab->hgot = h;
13420 }
13421 if (h != NULL
13422 && h->root.type == bfd_link_hash_defined
13423 && !h->root.linker_def
13424 && (!is_elf_hash_table (htab)
13425 || h->def_regular))
13426 {
13427 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13428 + h->root.u.def.section->output_offset
13429 + h->root.u.def.section->output_section->vma);
13430 _bfd_set_gp_value (obfd, TOCstart);
13431 return TOCstart;
13432 }
13433 }
13434
805fc799
AM
13435 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13436 order. The TOC starts where the first of these sections starts. */
13437 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13438 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13439 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13440 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13441 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13442 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13443 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13444 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13445 {
13446 /* This may happen for
13447 o references to TOC base (SYM@toc / TOC[tc0]) without a
13448 .toc directive
13449 o bad linker script
13450 o --gc-sections and empty TOC sections
13451
13452 FIXME: Warn user? */
13453
13454 /* Look for a likely section. We probably won't even be
13455 using TOCstart. */
13456 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13457 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13458 | SEC_EXCLUDE))
805fc799
AM
13459 == (SEC_ALLOC | SEC_SMALL_DATA))
13460 break;
721956f4 13461 if (s == NULL)
805fc799 13462 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13463 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13464 == (SEC_ALLOC | SEC_SMALL_DATA))
13465 break;
721956f4 13466 if (s == NULL)
805fc799 13467 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13468 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13469 == SEC_ALLOC)
805fc799 13470 break;
721956f4 13471 if (s == NULL)
805fc799 13472 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13473 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13474 break;
13475 }
721956f4 13476
805fc799
AM
13477 TOCstart = 0;
13478 if (s != NULL)
13479 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13480
a27e685f
AM
13481 /* Force alignment. */
13482 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13483 TOCstart -= adjust;
1c865ab2
AM
13484 _bfd_set_gp_value (obfd, TOCstart);
13485
810d4e75 13486 if (info != NULL && s != NULL)
1c865ab2
AM
13487 {
13488 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13489
810d4e75
AM
13490 if (htab != NULL)
13491 {
13492 if (htab->elf.hgot != NULL)
13493 {
a27e685f 13494 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13495 htab->elf.hgot->root.u.def.section = s;
13496 }
13497 }
13498 else
1c865ab2 13499 {
810d4e75
AM
13500 struct bfd_link_hash_entry *bh = NULL;
13501 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13502 s, TOC_BASE_OFF - adjust,
13503 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13504 }
13505 }
805fc799 13506 return TOCstart;
721956f4
AM
13507}
13508
a345bc8d 13509/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13510 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13511
13512static bfd_boolean
49c09209 13513build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13514{
13515 struct bfd_link_info *info;
13516 struct ppc_link_hash_table *htab;
49c09209 13517 struct plt_entry *ent;
a345bc8d
AM
13518 asection *s;
13519
13520 if (h->root.type == bfd_link_hash_indirect)
13521 return TRUE;
13522
49c09209
AM
13523 info = inf;
13524 htab = ppc_hash_table (info);
13525 if (htab == NULL)
13526 return FALSE;
13527
13528 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13529 if (ent->plt.offset != (bfd_vma) -1)
13530 {
13531 /* This symbol has an entry in the procedure linkage
13532 table. Set it up. */
13533 Elf_Internal_Rela rela;
2d7ad24e 13534 asection *plt, *relplt;
49c09209
AM
13535 bfd_byte *loc;
13536
13537 if (!htab->elf.dynamic_sections_created
13538 || h->dynindx == -1)
13539 {
13540 if (!(h->def_regular
13541 && (h->root.type == bfd_link_hash_defined
13542 || h->root.type == bfd_link_hash_defweak)))
13543 continue;
2d7ad24e
AM
13544 if (h->type == STT_GNU_IFUNC)
13545 {
13546 plt = htab->elf.iplt;
13547 relplt = htab->elf.irelplt;
13548 htab->local_ifunc_resolver = 1;
13549 if (htab->opd_abi)
13550 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13551 else
13552 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13553 }
49c09209 13554 else
2d7ad24e
AM
13555 {
13556 plt = htab->pltlocal;
13557 if (bfd_link_pic (info))
13558 {
13559 relplt = htab->relpltlocal;
13560 if (htab->opd_abi)
13561 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13562 else
13563 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13564 }
13565 else
13566 relplt = NULL;
13567 }
49c09209
AM
13568 rela.r_addend = (h->root.u.def.value
13569 + h->root.u.def.section->output_offset
13570 + h->root.u.def.section->output_section->vma
13571 + ent->addend);
2d7ad24e
AM
13572
13573 if (relplt == NULL)
13574 {
13575 loc = plt->contents + ent->plt.offset;
13576 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13577 if (htab->opd_abi)
13578 {
13579 bfd_vma toc = elf_gp (info->output_bfd);
13580 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13581 bfd_put_64 (info->output_bfd, toc, loc + 8);
13582 }
13583 }
13584 else
13585 {
13586 rela.r_offset = (plt->output_section->vma
13587 + plt->output_offset
13588 + ent->plt.offset);
13589 loc = relplt->contents + (relplt->reloc_count++
13590 * sizeof (Elf64_External_Rela));
13591 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13592 }
49c09209
AM
13593 }
13594 else
13595 {
13596 rela.r_offset = (htab->elf.splt->output_section->vma
13597 + htab->elf.splt->output_offset
13598 + ent->plt.offset);
13599 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13600 rela.r_addend = ent->addend;
13601 loc = (htab->elf.srelplt->contents
13602 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13603 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13604 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13605 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13606 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13607 }
49c09209
AM
13608 }
13609
a345bc8d
AM
13610 if (!h->pointer_equality_needed)
13611 return TRUE;
13612
13613 if (h->def_regular)
13614 return TRUE;
13615
9e390558 13616 s = htab->global_entry;
49c09209
AM
13617 if (s == NULL || s->size == 0)
13618 return TRUE;
13619
13620 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13621 if (ent->plt.offset != (bfd_vma) -1
13622 && ent->addend == 0)
a345bc8d
AM
13623 {
13624 bfd_byte *p;
13625 asection *plt;
13626 bfd_vma off;
13627
a345bc8d 13628 p = s->contents + h->root.u.def.value;
33e44f2e 13629 plt = htab->elf.splt;
a345bc8d
AM
13630 if (!htab->elf.dynamic_sections_created
13631 || h->dynindx == -1)
2d7ad24e
AM
13632 {
13633 if (h->type == STT_GNU_IFUNC)
13634 plt = htab->elf.iplt;
13635 else
13636 plt = htab->pltlocal;
13637 }
49c09209 13638 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13639 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13640
13641 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13642 {
13643 info->callbacks->einfo
c1c8c1ef 13644 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13645 h->root.root.string);
13646 bfd_set_error (bfd_error_bad_value);
13647 htab->stub_error = TRUE;
13648 }
13649
7341d5e2
AM
13650 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13651 if (htab->params->emit_stub_syms)
13652 {
13653 size_t len = strlen (h->root.root.string);
13654 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13655
13656 if (name == NULL)
13657 return FALSE;
13658
13659 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13660 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13661 if (h == NULL)
13662 return FALSE;
13663 if (h->root.type == bfd_link_hash_new)
13664 {
13665 h->root.type = bfd_link_hash_defined;
13666 h->root.u.def.section = s;
13667 h->root.u.def.value = p - s->contents;
13668 h->ref_regular = 1;
13669 h->def_regular = 1;
13670 h->ref_regular_nonweak = 1;
13671 h->forced_local = 1;
13672 h->non_elf = 0;
2ec55de3 13673 h->root.linker_def = 1;
7341d5e2
AM
13674 }
13675 }
13676
a345bc8d
AM
13677 if (PPC_HA (off) != 0)
13678 {
13679 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13680 p += 4;
13681 }
13682 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13683 p += 4;
13684 bfd_put_32 (s->owner, MTCTR_R12, p);
13685 p += 4;
407aa07c 13686 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13687 break;
13688 }
13689 return TRUE;
13690}
13691
49c09209
AM
13692/* Write PLT relocs for locals. */
13693
13694static bfd_boolean
13695write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13696{
13697 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13698 bfd *ibfd;
13699
13700 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13701 {
13702 struct got_entry **lgot_ents, **end_lgot_ents;
13703 struct plt_entry **local_plt, **lplt, **end_local_plt;
13704 Elf_Internal_Shdr *symtab_hdr;
13705 bfd_size_type locsymcount;
13706 Elf_Internal_Sym *local_syms = NULL;
13707 struct plt_entry *ent;
13708
13709 if (!is_ppc64_elf (ibfd))
13710 continue;
13711
13712 lgot_ents = elf_local_got_ents (ibfd);
13713 if (!lgot_ents)
13714 continue;
13715
13716 symtab_hdr = &elf_symtab_hdr (ibfd);
13717 locsymcount = symtab_hdr->sh_info;
13718 end_lgot_ents = lgot_ents + locsymcount;
13719 local_plt = (struct plt_entry **) end_lgot_ents;
13720 end_local_plt = local_plt + locsymcount;
13721 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13722 for (ent = *lplt; ent != NULL; ent = ent->next)
13723 if (ent->plt.offset != (bfd_vma) -1)
13724 {
13725 Elf_Internal_Sym *sym;
13726 asection *sym_sec;
13727 asection *plt, *relplt;
13728 bfd_byte *loc;
13729 bfd_vma val;
49c09209
AM
13730
13731 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13732 lplt - local_plt, ibfd))
13733 {
13734 if (local_syms != NULL
13735 && symtab_hdr->contents != (unsigned char *) local_syms)
13736 free (local_syms);
13737 return FALSE;
13738 }
13739
13740 val = sym->st_value + ent->addend;
ba85c15d
AM
13741 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13742 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
13743 if (sym_sec != NULL && sym_sec->output_section != NULL)
13744 val += sym_sec->output_offset + sym_sec->output_section->vma;
13745
2d7ad24e
AM
13746 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13747 {
13748 htab->local_ifunc_resolver = 1;
13749 plt = htab->elf.iplt;
13750 relplt = htab->elf.irelplt;
13751 }
13752 else
13753 {
13754 plt = htab->pltlocal;
13755 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13756 }
49c09209 13757
2d7ad24e
AM
13758 if (relplt == NULL)
13759 {
13760 loc = plt->contents + ent->plt.offset;
13761 bfd_put_64 (info->output_bfd, val, loc);
13762 if (htab->opd_abi)
13763 {
13764 bfd_vma toc = elf_gp (ibfd);
13765 bfd_put_64 (info->output_bfd, toc, loc + 8);
13766 }
13767 }
49c09209 13768 else
2d7ad24e
AM
13769 {
13770 Elf_Internal_Rela rela;
13771 rela.r_offset = (ent->plt.offset
13772 + plt->output_offset
13773 + plt->output_section->vma);
13774 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13775 {
13776 if (htab->opd_abi)
13777 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13778 else
13779 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13780 }
13781 else
13782 {
13783 if (htab->opd_abi)
13784 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13785 else
13786 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13787 }
13788 rela.r_addend = val;
13789 loc = relplt->contents + (relplt->reloc_count++
13790 * sizeof (Elf64_External_Rela));
13791 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13792 }
49c09209
AM
13793 }
13794
13795 if (local_syms != NULL
13796 && symtab_hdr->contents != (unsigned char *) local_syms)
13797 {
13798 if (!info->keep_memory)
13799 free (local_syms);
13800 else
13801 symtab_hdr->contents = (unsigned char *) local_syms;
13802 }
13803 }
13804 return TRUE;
13805}
13806
721956f4
AM
13807/* Build all the stubs associated with the current output file.
13808 The stubs are kept in a hash table attached to the main linker
13809 hash table. This function is called via gldelf64ppc_finish. */
13810
b34976b6 13811bfd_boolean
e7d1c40c 13812ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13813 char **stats)
5d1634d7
AM
13814{
13815 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13816 struct map_stub *group;
721956f4 13817 asection *stub_sec;
5d1634d7 13818 bfd_byte *p;
e717da7e 13819 int stub_sec_count = 0;
5d1634d7 13820
4dfe6ac6
NC
13821 if (htab == NULL)
13822 return FALSE;
13823
eea6121a 13824 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 13825 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13826 {
13827 group->eh_size = 0;
13828 group->lr_restore = 0;
13829 if ((stub_sec = group->stub_sec) != NULL
13830 && stub_sec->size != 0)
13831 {
13832 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13833 stub_sec->size);
13834 if (stub_sec->contents == NULL)
13835 return FALSE;
13836 stub_sec->size = 0;
13837 }
13838 }
5d1634d7 13839
23eb7e01 13840 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13841 {
9f951329 13842 unsigned int indx;
ad8e1ba5 13843 bfd_vma plt0;
9f951329 13844
721956f4 13845 /* Build the .glink plt call stub. */
e7d1c40c 13846 if (htab->params->emit_stub_syms)
97b639ba
AM
13847 {
13848 struct elf_link_hash_entry *h;
468392fb
AM
13849 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13850 TRUE, FALSE, FALSE);
97b639ba
AM
13851 if (h == NULL)
13852 return FALSE;
13853 if (h->root.type == bfd_link_hash_new)
13854 {
13855 h->root.type = bfd_link_hash_defined;
13856 h->root.u.def.section = htab->glink;
ee4bf8d2 13857 h->root.u.def.value = 8;
f5385ebf
AM
13858 h->ref_regular = 1;
13859 h->def_regular = 1;
13860 h->ref_regular_nonweak = 1;
13861 h->forced_local = 1;
13862 h->non_elf = 0;
2ec55de3 13863 h->root.linker_def = 1;
97b639ba
AM
13864 }
13865 }
33e44f2e
AM
13866 plt0 = (htab->elf.splt->output_section->vma
13867 + htab->elf.splt->output_offset
13868 - 16);
176a0d42
AM
13869 if (info->emitrelocations)
13870 {
13871 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13872 if (r == NULL)
13873 return FALSE;
13874 r->r_offset = (htab->glink->output_offset
13875 + htab->glink->output_section->vma);
13876 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13877 r->r_addend = plt0;
13878 }
4ce794b7 13879 p = htab->glink->contents;
176a0d42 13880 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13881 bfd_put_64 (htab->glink->owner, plt0, p);
13882 p += 8;
b9e5796b
AM
13883 if (htab->opd_abi)
13884 {
13885 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13886 p += 4;
13887 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13888 p += 4;
13889 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13890 p += 4;
13891 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13892 p += 4;
13893 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13894 p += 4;
13895 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13896 p += 4;
13897 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13898 p += 4;
13899 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13900 p += 4;
13901 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13902 p += 4;
13903 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13904 p += 4;
13905 }
13906 else
13907 {
13908 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13909 p += 4;
13910 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13911 p += 4;
13912 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13913 p += 4;
f378ab09
AM
13914 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13915 p += 4;
b9e5796b
AM
13916 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13917 p += 4;
13918 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13919 p += 4;
13920 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13921 p += 4;
13922 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13923 p += 4;
13924 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13925 p += 4;
13926 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13927 p += 4;
13928 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13929 p += 4;
13930 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13931 p += 4;
13932 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13933 p += 4;
13934 }
407aa07c
AM
13935 bfd_put_32 (htab->glink->owner, BCTR, p);
13936 p += 4;
c75bc4f7 13937 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13938
9f951329
AM
13939 /* Build the .glink lazy link call stubs. */
13940 indx = 0;
9e390558 13941 while (p < htab->glink->contents + htab->glink->size)
9f951329 13942 {
b9e5796b 13943 if (htab->opd_abi)
9f951329 13944 {
b9e5796b
AM
13945 if (indx < 0x8000)
13946 {
13947 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13948 p += 4;
13949 }
13950 else
13951 {
13952 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13953 p += 4;
13954 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13955 p);
13956 p += 4;
13957 }
9f951329 13958 }
4ce794b7 13959 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13960 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13961 indx++;
9f951329
AM
13962 p += 4;
13963 }
5d1634d7 13964 }
5d1634d7 13965
49c09209
AM
13966 /* Build .glink global entry stubs, and PLT relocs for globals. */
13967 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13968
13969 if (!write_plt_relocs_for_local_syms (info))
13970 return FALSE;
9e390558 13971
7341d5e2 13972 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13973 {
4ce794b7 13974 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13975 htab->brlt->size);
4ce794b7 13976 if (htab->brlt->contents == NULL)
b34976b6 13977 return FALSE;
721956f4 13978 }
ee75fd95 13979 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13980 {
13981 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13982 htab->relbrlt->size);
63bc6f6c
AM
13983 if (htab->relbrlt->contents == NULL)
13984 return FALSE;
13985 }
5d1634d7 13986
721956f4
AM
13987 /* Build the stubs as directed by the stub hash table. */
13988 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13989
a4b6fadd
AM
13990 for (group = htab->group; group != NULL; group = group->next)
13991 if (group->needs_save_res)
7dda8d3c 13992 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13993
aa8a7074
AM
13994 if (htab->relbrlt != NULL)
13995 htab->relbrlt->reloc_count = 0;
13996
e7d1c40c 13997 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13998 for (group = htab->group; group != NULL; group = group->next)
13999 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14000 {
14001 int align = abs (htab->params->plt_stub_align);
14002 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14003 }
794e51c0 14004
7dda8d3c
AM
14005 for (group = htab->group; group != NULL; group = group->next)
14006 if (group->needs_save_res)
14007 {
14008 stub_sec = group->stub_sec;
14009 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14010 htab->sfpr->contents, htab->sfpr->size);
14011 if (htab->params->emit_stub_syms)
14012 {
14013 unsigned int i;
14014
14015 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14016 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14017 return FALSE;
14018 }
14019 }
14020
df136d64
AM
14021 if (htab->glink_eh_frame != NULL
14022 && htab->glink_eh_frame->size != 0)
14023 {
14024 bfd_vma val;
14025 size_t align = 4;
14026
14027 p = htab->glink_eh_frame->contents;
14028 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14029
14030 for (group = htab->group; group != NULL; group = group->next)
14031 if (group->eh_size != 0)
14032 {
14033 /* Offset to stub section. */
14034 val = (group->stub_sec->output_section->vma
14035 + group->stub_sec->output_offset);
14036 val -= (htab->glink_eh_frame->output_section->vma
14037 + htab->glink_eh_frame->output_offset
14038 + (p + 8 - htab->glink_eh_frame->contents));
14039 if (val + 0x80000000 > 0xffffffff)
14040 {
14041 _bfd_error_handler
14042 (_("%s offset too large for .eh_frame sdata4 encoding"),
14043 group->stub_sec->name);
14044 return FALSE;
14045 }
14046 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14047 p += (group->eh_size + 17 + 3) & -4;
14048 }
14049 if (htab->glink != NULL && htab->glink->size != 0)
14050 {
14051 /* Offset to .glink. */
14052 val = (htab->glink->output_section->vma
14053 + htab->glink->output_offset
14054 + 8);
14055 val -= (htab->glink_eh_frame->output_section->vma
14056 + htab->glink_eh_frame->output_offset
14057 + (p + 8 - htab->glink_eh_frame->contents));
14058 if (val + 0x80000000 > 0xffffffff)
14059 {
14060 _bfd_error_handler
14061 (_("%s offset too large for .eh_frame sdata4 encoding"),
14062 htab->glink->name);
14063 return FALSE;
14064 }
14065 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14066 p += (24 + align - 1) & -align;
14067 }
14068 }
14069
d4aaa2a0
AM
14070 for (group = htab->group; group != NULL; group = group->next)
14071 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14072 {
14073 stub_sec_count += 1;
c9301e31
AM
14074 if (stub_sec->rawsize != stub_sec->size
14075 && (htab->stub_iteration <= STUB_SHRINK_ITER
14076 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14077 break;
14078 }
5d1634d7 14079
25516cc5 14080 if (group != NULL)
5d1634d7 14081 {
b34976b6 14082 htab->stub_error = TRUE;
cf97bcb0 14083 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14084 }
721956f4 14085
d2a300cf
AM
14086 if (htab->stub_error)
14087 return FALSE;
14088
14089 if (stats != NULL)
14090 {
db84fff3 14091 size_t len;
d2a300cf
AM
14092 *stats = bfd_malloc (500);
14093 if (*stats == NULL)
14094 return FALSE;
14095
db84fff3
AM
14096 len = sprintf (*stats,
14097 ngettext ("linker stubs in %u group\n",
14098 "linker stubs in %u groups\n",
14099 stub_sec_count),
14100 stub_sec_count);
05d0e962
AM
14101 sprintf (*stats + len, _(" branch %lu\n"
14102 " branch toc adj %lu\n"
14103 " branch notoc %lu\n"
14104 " branch both %lu\n"
14105 " long branch %lu\n"
14106 " long toc adj %lu\n"
14107 " long notoc %lu\n"
14108 " long both %lu\n"
14109 " plt call %lu\n"
14110 " plt call save %lu\n"
14111 " plt call notoc %lu\n"
14112 " plt call both %lu\n"
14113 " global entry %lu"),
4ce794b7
AM
14114 htab->stub_count[ppc_stub_long_branch - 1],
14115 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14116 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14117 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14118 htab->stub_count[ppc_stub_plt_branch - 1],
14119 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14120 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14121 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14122 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14123 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14124 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14125 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14126 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14127 }
14128 return TRUE;
5bd4f169
AM
14129}
14130
60124e18
AM
14131/* What to do when ld finds relocations against symbols defined in
14132 discarded sections. */
14133
14134static unsigned int
14135ppc64_elf_action_discarded (asection *sec)
14136{
14137 if (strcmp (".opd", sec->name) == 0)
14138 return 0;
14139
14140 if (strcmp (".toc", sec->name) == 0)
14141 return 0;
14142
bce50a28
JJ
14143 if (strcmp (".toc1", sec->name) == 0)
14144 return 0;
14145
60124e18
AM
14146 return _bfd_elf_default_action_discarded (sec);
14147}
14148
e59a1001
AM
14149/* These are the dynamic relocations supported by glibc. */
14150
14151static bfd_boolean
14152ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14153{
14154 switch (r_type)
14155 {
14156 case R_PPC64_RELATIVE:
14157 case R_PPC64_NONE:
14158 case R_PPC64_ADDR64:
14159 case R_PPC64_GLOB_DAT:
14160 case R_PPC64_IRELATIVE:
14161 case R_PPC64_JMP_IREL:
14162 case R_PPC64_JMP_SLOT:
14163 case R_PPC64_DTPMOD64:
14164 case R_PPC64_DTPREL64:
14165 case R_PPC64_TPREL64:
14166 case R_PPC64_TPREL16_LO_DS:
14167 case R_PPC64_TPREL16_DS:
14168 case R_PPC64_TPREL16:
14169 case R_PPC64_TPREL16_LO:
14170 case R_PPC64_TPREL16_HI:
14171 case R_PPC64_TPREL16_HIGH:
14172 case R_PPC64_TPREL16_HA:
14173 case R_PPC64_TPREL16_HIGHA:
14174 case R_PPC64_TPREL16_HIGHER:
14175 case R_PPC64_TPREL16_HIGHEST:
14176 case R_PPC64_TPREL16_HIGHERA:
14177 case R_PPC64_TPREL16_HIGHESTA:
14178 case R_PPC64_ADDR16_LO_DS:
14179 case R_PPC64_ADDR16_LO:
14180 case R_PPC64_ADDR16_HI:
14181 case R_PPC64_ADDR16_HIGH:
14182 case R_PPC64_ADDR16_HA:
14183 case R_PPC64_ADDR16_HIGHA:
14184 case R_PPC64_REL30:
14185 case R_PPC64_COPY:
14186 case R_PPC64_UADDR64:
14187 case R_PPC64_UADDR32:
14188 case R_PPC64_ADDR32:
14189 case R_PPC64_ADDR24:
14190 case R_PPC64_ADDR16:
14191 case R_PPC64_UADDR16:
14192 case R_PPC64_ADDR16_DS:
14193 case R_PPC64_ADDR16_HIGHER:
14194 case R_PPC64_ADDR16_HIGHEST:
14195 case R_PPC64_ADDR16_HIGHERA:
14196 case R_PPC64_ADDR16_HIGHESTA:
14197 case R_PPC64_ADDR14:
14198 case R_PPC64_ADDR14_BRTAKEN:
14199 case R_PPC64_ADDR14_BRNTAKEN:
14200 case R_PPC64_REL32:
14201 case R_PPC64_REL64:
14202 return TRUE;
14203
14204 default:
14205 return FALSE;
14206 }
14207}
14208
5bd4f169
AM
14209/* The RELOCATE_SECTION function is called by the ELF backend linker
14210 to handle the relocations for a section.
14211
14212 The relocs are always passed as Rela structures; if the section
14213 actually uses Rel structures, the r_addend field will always be
14214 zero.
14215
14216 This function is responsible for adjust the section contents as
14217 necessary, and (if using Rela relocs and generating a
1049f94e 14218 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14219 necessary.
14220
14221 This function does not have to worry about setting the reloc
14222 address or the reloc symbol index.
14223
14224 LOCAL_SYMS is a pointer to the swapped in local symbols.
14225
14226 LOCAL_SECTIONS is an array giving the section in the input file
14227 corresponding to the st_shndx field of each local symbol.
14228
14229 The global hash table entry for the global symbols can be found
14230 via elf_sym_hashes (input_bfd).
14231
1049f94e 14232 When generating relocatable output, this function must handle
5bd4f169
AM
14233 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14234 going to be the section symbol corresponding to the output
14235 section, which means that the addend must be adjusted
14236 accordingly. */
14237
b34976b6 14238static bfd_boolean
4ce794b7
AM
14239ppc64_elf_relocate_section (bfd *output_bfd,
14240 struct bfd_link_info *info,
14241 bfd *input_bfd,
14242 asection *input_section,
14243 bfd_byte *contents,
14244 Elf_Internal_Rela *relocs,
14245 Elf_Internal_Sym *local_syms,
14246 asection **local_sections)
5bd4f169 14247{
65f38f15 14248 struct ppc_link_hash_table *htab;
5bd4f169
AM
14249 Elf_Internal_Shdr *symtab_hdr;
14250 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14251 Elf_Internal_Rela *rel;
c316a17c 14252 Elf_Internal_Rela *wrel;
5bd4f169 14253 Elf_Internal_Rela *relend;
411e1bfb
AM
14254 Elf_Internal_Rela outrel;
14255 bfd_byte *loc;
411e1bfb 14256 struct got_entry **local_got_ents;
5bd4f169 14257 bfd_vma TOCstart;
b34976b6
AM
14258 bfd_boolean ret = TRUE;
14259 bfd_boolean is_opd;
794e51c0
AM
14260 /* Assume 'at' branch hints. */
14261 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14262 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14263 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14264
65f38f15 14265 /* Initialize howto table if needed. */
5bd4f169 14266 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14267 ppc_howto_init ();
14268
65f38f15 14269 htab = ppc_hash_table (info);
4dfe6ac6
NC
14270 if (htab == NULL)
14271 return FALSE;
ee75fd95
AM
14272
14273 /* Don't relocate stub sections. */
e7d1c40c 14274 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14275 return TRUE;
14276
7af5d5c4
AM
14277 if (!is_ppc64_elf (input_bfd))
14278 {
14279 bfd_set_error (bfd_error_wrong_format);
14280 return FALSE;
14281 }
0ffa91dd 14282
411e1bfb 14283 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14284 TOCstart = elf_gp (output_bfd);
0ffa91dd 14285 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14286 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14287 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14288
c316a17c 14289 rel = wrel = relocs;
5bd4f169 14290 relend = relocs + input_section->reloc_count;
c316a17c 14291 for (; rel < relend; wrel++, rel++)
5bd4f169 14292 {
04c9666a 14293 enum elf_ppc64_reloc_type r_type;
31c76678 14294 bfd_vma addend;
5bd4f169
AM
14295 bfd_reloc_status_type r;
14296 Elf_Internal_Sym *sym;
14297 asection *sec;
039b3fef
AM
14298 struct elf_link_hash_entry *h_elf;
14299 struct ppc_link_hash_entry *h;
14300 struct ppc_link_hash_entry *fdh;
5bd4f169 14301 const char *sym_name;
0d4792f7 14302 unsigned long r_symndx, toc_symndx;
3a71aa26 14303 bfd_vma toc_addend;
f961d9dd
AM
14304 unsigned char tls_mask, tls_gd, tls_type;
14305 unsigned char sym_type;
5bd4f169 14306 bfd_vma relocation;
23cedd1d 14307 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14308 bfd_boolean warned;
bc30df16 14309 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14310 unsigned int insn;
e11840f9 14311 unsigned int mask;
721956f4
AM
14312 struct ppc_stub_hash_entry *stub_entry;
14313 bfd_vma max_br_offset;
14314 bfd_vma from;
c316a17c 14315 Elf_Internal_Rela orig_rel;
b80eed39
AM
14316 reloc_howto_type *howto;
14317 struct reloc_howto_struct alt_howto;
4a421c53
AM
14318 uint64_t pinsn;
14319 bfd_vma offset;
5bd4f169 14320
c316a17c
AM
14321 again:
14322 orig_rel = *rel;
14323
4ce794b7 14324 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14325 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14326
14327 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14328 symbol of the previous ADDR64 reloc. The symbol gives us the
14329 proper TOC base to use. */
14330 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14331 && wrel != relocs
14332 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14333 && is_opd)
c316a17c 14334 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14335
4ce794b7
AM
14336 sym = NULL;
14337 sec = NULL;
039b3fef 14338 h_elf = NULL;
4ce794b7 14339 sym_name = NULL;
b34976b6
AM
14340 unresolved_reloc = FALSE;
14341 warned = FALSE;
65f38f15 14342
0b13192e 14343 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14344 {
14345 /* It's a local symbol. */
74f0fb50 14346 struct _opd_sec_data *opd;
4025353c 14347
5bd4f169
AM
14348 sym = local_syms + r_symndx;
14349 sec = local_sections[r_symndx];
26c61ae5 14350 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14351 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14352 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14353 opd = get_opd_info (sec);
14354 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14355 {
51aecdc5
AM
14356 long adjust = opd->adjust[OPD_NDX (sym->st_value
14357 + rel->r_addend)];
4025353c
AM
14358 if (adjust == -1)
14359 relocation = 0;
14360 else
4cc603a5
AM
14361 {
14362 /* If this is a relocation against the opd section sym
14363 and we have edited .opd, adjust the reloc addend so
14364 that ld -r and ld --emit-relocs output is correct.
14365 If it is a reloc against some other .opd symbol,
14366 then the symbol value will be adjusted later. */
14367 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14368 rel->r_addend += adjust;
14369 else
14370 relocation += adjust;
14371 }
1e2f5b6e 14372 }
5bd4f169
AM
14373 }
14374 else
14375 {
62d887d4
L
14376 bfd_boolean ignored;
14377
b2a8e766
AM
14378 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14379 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14380 h_elf, sec, relocation,
62d887d4 14381 unresolved_reloc, warned, ignored);
039b3fef
AM
14382 sym_name = h_elf->root.root.string;
14383 sym_type = h_elf->type;
b69fdb4e
AM
14384 if (sec != NULL
14385 && sec->owner == output_bfd
14386 && strcmp (sec->name, ".opd") == 0)
14387 {
14388 /* This is a symbol defined in a linker script. All
14389 such are defined in output sections, even those
14390 defined by simple assignment from a symbol defined in
14391 an input section. Transfer the symbol to an
14392 appropriate input .opd section, so that a branch to
14393 this symbol will be mapped to the location specified
14394 by the opd entry. */
14395 struct bfd_link_order *lo;
14396 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14397 if (lo->type == bfd_indirect_link_order)
14398 {
14399 asection *isec = lo->u.indirect.section;
14400 if (h_elf->root.u.def.value >= isec->output_offset
14401 && h_elf->root.u.def.value < (isec->output_offset
14402 + isec->size))
14403 {
14404 h_elf->root.u.def.value -= isec->output_offset;
14405 h_elf->root.u.def.section = isec;
14406 sec = isec;
14407 break;
14408 }
14409 }
14410 }
5bd4f169 14411 }
039b3fef 14412 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14413
dbaa2011 14414 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14415 {
14416 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14417 input_bfd, input_section,
0930cb30 14418 contents, rel->r_offset);
c316a17c
AM
14419 wrel->r_offset = rel->r_offset;
14420 wrel->r_info = 0;
14421 wrel->r_addend = 0;
14422
14423 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14424 symbols defined in discarded sections. Not done for
c316a17c
AM
14425 non-debug to preserve relocs in .eh_frame which the
14426 eh_frame editing code expects to be present. */
14427 if (bfd_link_relocatable (info)
14428 && (input_section->flags & SEC_DEBUGGING))
14429 wrel--;
14430
14431 continue;
14432 }
ab96bf03 14433
0e1862bb 14434 if (bfd_link_relocatable (info))
c316a17c 14435 goto copy_reloc;
ab96bf03 14436
f40da81b
AM
14437 if (h != NULL && &h->elf == htab->elf.hgot)
14438 {
6f20ed8a 14439 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14440 sec = bfd_abs_section_ptr;
14441 unresolved_reloc = FALSE;
14442 }
14443
951fd09b
AM
14444 /* TLS optimizations. Replace instruction sequences and relocs
14445 based on information we collected in tls_optimize. We edit
14446 RELOCS so that --emit-relocs will output something sensible
14447 for the final instruction stream. */
14448 tls_mask = 0;
14449 tls_gd = 0;
0d4792f7 14450 toc_symndx = 0;
727fc41e
AM
14451 if (h != NULL)
14452 tls_mask = h->tls_mask;
14453 else if (local_got_ents != NULL)
411e1bfb 14454 {
e054468f
AM
14455 struct plt_entry **local_plt = (struct plt_entry **)
14456 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14457 unsigned char *lgot_masks = (unsigned char *)
e054468f 14458 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14459 tls_mask = lgot_masks[r_symndx];
14460 }
37da22e5 14461 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14462 && (r_type == R_PPC64_TLS
14463 || r_type == R_PPC64_TLSGD
14464 || r_type == R_PPC64_TLSLD))
14465 {
14466 /* Check for toc tls entries. */
f961d9dd 14467 unsigned char *toc_tls;
0d4792f7 14468
727fc41e
AM
14469 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14470 &local_syms, rel, input_bfd))
14471 return FALSE;
0d4792f7 14472
727fc41e
AM
14473 if (toc_tls)
14474 tls_mask = *toc_tls;
0d4792f7
AM
14475 }
14476
14477 /* Check that tls relocs are used with tls syms, and non-tls
14478 relocs are used with non-tls syms. */
cf35638d 14479 if (r_symndx != STN_UNDEF
0d4792f7
AM
14480 && r_type != R_PPC64_NONE
14481 && (h == NULL
039b3fef
AM
14482 || h->elf.root.type == bfd_link_hash_defined
14483 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14484 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14485 {
37da22e5 14486 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14487 && (r_type == R_PPC64_TLS
14488 || r_type == R_PPC64_TLSGD
14489 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14490 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14491 ;
14492 else
25f53a85 14493 info->callbacks->einfo
1d483afe 14494 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14495 /* xgettext:c-format */
c1c8c1ef 14496 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14497 /* xgettext:c-format */
c1c8c1ef 14498 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14499 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14500 ppc64_elf_howto_table[r_type]->name,
14501 sym_name);
411e1bfb
AM
14502 }
14503
14504 /* Ensure reloc mapping code below stays sane. */
14505 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14506 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14507 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14508 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14509 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14510 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14511 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14512 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14513 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14514 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14515 abort ();
0d4792f7 14516
411e1bfb
AM
14517 switch (r_type)
14518 {
14519 default:
411e1bfb
AM
14520 break;
14521
ba761f19 14522 case R_PPC64_LO_DS_OPT:
95f0d0d2 14523 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
14524 if ((insn & (0x3f << 26)) != 58u << 26)
14525 abort ();
14526 insn += (14u << 26) - (58u << 26);
95f0d0d2 14527 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14528 r_type = R_PPC64_TOC16_LO;
14529 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14530 break;
14531
411e1bfb
AM
14532 case R_PPC64_TOC16:
14533 case R_PPC64_TOC16_LO:
14534 case R_PPC64_TOC16_DS:
14535 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14536 {
14537 /* Check for toc tls entries. */
f961d9dd 14538 unsigned char *toc_tls;
951fd09b 14539 int retval;
411e1bfb 14540
3a71aa26
AM
14541 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14542 &local_syms, rel, input_bfd);
951fd09b 14543 if (retval == 0)
411e1bfb
AM
14544 return FALSE;
14545
14546 if (toc_tls)
14547 {
951fd09b 14548 tls_mask = *toc_tls;
411e1bfb
AM
14549 if (r_type == R_PPC64_TOC16_DS
14550 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14551 {
37da22e5 14552 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14553 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14554 goto toctprel;
14555 }
411e1bfb 14556 else
951fd09b
AM
14557 {
14558 /* If we found a GD reloc pair, then we might be
14559 doing a GD->IE transition. */
14560 if (retval == 2)
14561 {
b00a0a86 14562 tls_gd = TLS_GDIE;
37da22e5
AM
14563 if ((tls_mask & TLS_TLS) != 0
14564 && (tls_mask & TLS_GD) == 0)
102890f0 14565 goto tls_ldgd_opt;
951fd09b
AM
14566 }
14567 else if (retval == 3)
14568 {
37da22e5
AM
14569 if ((tls_mask & TLS_TLS) != 0
14570 && (tls_mask & TLS_LD) == 0)
102890f0 14571 goto tls_ldgd_opt;
951fd09b
AM
14572 }
14573 }
411e1bfb
AM
14574 }
14575 }
14576 break;
14577
9d6ded02
AM
14578 case R_PPC64_GOT_TPREL16_HI:
14579 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14580 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14581 && (tls_mask & TLS_TPREL) == 0)
14582 {
14583 rel->r_offset -= d_offset;
95f0d0d2 14584 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14585 r_type = R_PPC64_NONE;
14586 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14587 }
14588 break;
14589
411e1bfb
AM
14590 case R_PPC64_GOT_TPREL16_DS:
14591 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14592 if ((tls_mask & TLS_TLS) != 0
951fd09b 14593 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14594 {
81407a69 14595 toctprel:
95f0d0d2 14596 insn = bfd_get_32 (input_bfd,
c316a17c 14597 contents + rel->r_offset - d_offset);
411e1bfb
AM
14598 insn &= 31 << 21;
14599 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14600 bfd_put_32 (input_bfd, insn,
c316a17c 14601 contents + rel->r_offset - d_offset);
411e1bfb 14602 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14603 if (toc_symndx != 0)
14604 {
14605 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14606 rel->r_addend = toc_addend;
0d4792f7
AM
14607 /* We changed the symbol. Start over in order to
14608 get h, sym, sec etc. right. */
c316a17c 14609 goto again;
0d4792f7
AM
14610 }
14611 else
14612 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14613 }
14614 break;
14615
c213164a
AM
14616 case R_PPC64_GOT_TPREL34:
14617 if ((tls_mask & TLS_TLS) != 0
14618 && (tls_mask & TLS_TPREL) == 0)
14619 {
14620 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14621 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14622 pinsn <<= 32;
14623 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14624 pinsn += ((2ULL << 56) + (-1ULL << 52)
14625 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14626 bfd_put_32 (input_bfd, pinsn >> 32,
14627 contents + rel->r_offset);
14628 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14629 contents + rel->r_offset + 4);
14630 r_type = R_PPC64_TPREL34;
14631 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14632 }
14633 break;
14634
411e1bfb 14635 case R_PPC64_TLS:
37da22e5 14636 if ((tls_mask & TLS_TLS) != 0
951fd09b 14637 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14638 {
c213164a 14639 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
14640 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14641 if (insn == 0)
c213164a
AM
14642 break;
14643 if ((rel->r_offset & 3) == 0)
0d4792f7 14644 {
c213164a
AM
14645 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14646 /* Was PPC64_TLS which sits on insn boundary, now
14647 PPC64_TPREL16_LO which is at low-order half-word. */
14648 rel->r_offset += d_offset;
14649 r_type = R_PPC64_TPREL16_LO;
14650 if (toc_symndx != 0)
14651 {
14652 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14653 rel->r_addend = toc_addend;
14654 /* We changed the symbol. Start over in order to
14655 get h, sym, sec etc. right. */
14656 goto again;
14657 }
14658 else
14659 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14660 }
14661 else if ((rel->r_offset & 3) == 1)
14662 {
14663 /* For pcrel IE to LE we already have the full
14664 offset and thus don't need an addi here. A nop
14665 or mr will do. */
14666 if ((insn & (0x3f << 26)) == 14 << 26)
14667 {
14668 /* Extract regs from addi rt,ra,si. */
14669 unsigned int rt = (insn >> 21) & 0x1f;
14670 unsigned int ra = (insn >> 16) & 0x1f;
14671 if (rt == ra)
14672 insn = NOP;
14673 else
14674 {
14675 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14676 insn = (rt << 16) | (ra << 21) | (ra << 11);
14677 insn |= (31u << 26) | (444u << 1);
14678 }
14679 }
14680 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 14681 }
411e1bfb
AM
14682 }
14683 break;
14684
411e1bfb
AM
14685 case R_PPC64_GOT_TLSGD16_HI:
14686 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 14687 tls_gd = TLS_GDIE;
37da22e5 14688 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14689 goto tls_gdld_hi;
14690 break;
14691
411e1bfb
AM
14692 case R_PPC64_GOT_TLSLD16_HI:
14693 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14694 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14695 {
951fd09b
AM
14696 tls_gdld_hi:
14697 if ((tls_mask & tls_gd) != 0)
14698 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14699 + R_PPC64_GOT_TPREL16_DS);
14700 else
411e1bfb 14701 {
4fe5ca5b 14702 rel->r_offset -= d_offset;
95f0d0d2 14703 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14704 r_type = R_PPC64_NONE;
411e1bfb 14705 }
951fd09b 14706 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14707 }
14708 break;
14709
951fd09b
AM
14710 case R_PPC64_GOT_TLSGD16:
14711 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 14712 tls_gd = TLS_GDIE;
37da22e5 14713 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14714 goto tls_ldgd_opt;
951fd09b 14715 break;
411e1bfb 14716
951fd09b
AM
14717 case R_PPC64_GOT_TLSLD16:
14718 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14719 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14720 {
b9f04fe0 14721 unsigned int insn1, insn2;
102890f0
AM
14722
14723 tls_ldgd_opt:
727fc41e
AM
14724 offset = (bfd_vma) -1;
14725 /* If not using the newer R_PPC64_TLSGD/LD to mark
14726 __tls_get_addr calls, we must trust that the call
14727 stays with its arg setup insns, ie. that the next
14728 reloc is the __tls_get_addr call associated with
14729 the current reloc. Edit both insns. */
9737e8af 14730 if (input_section->nomark_tls_get_addr
727fc41e
AM
14731 && rel + 1 < relend
14732 && branch_reloc_hash_match (input_bfd, rel + 1,
14733 htab->tls_get_addr,
14734 htab->tls_get_addr_fd))
14735 offset = rel[1].r_offset;
b86ac8e3
AM
14736 /* We read the low GOT_TLS (or TOC16) insn because we
14737 need to keep the destination reg. It may be
14738 something other than the usual r3, and moved to r3
14739 before the call by intervening code. */
95f0d0d2 14740 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14741 contents + rel->r_offset - d_offset);
102890f0 14742 if ((tls_mask & tls_gd) != 0)
411e1bfb 14743 {
102890f0 14744 /* IE */
b86ac8e3 14745 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
14746 insn1 |= 58 << 26; /* ld */
14747 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14748 if (offset != (bfd_vma) -1)
f58d5a2d 14749 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
14750 if (r_type == R_PPC64_TOC16
14751 || r_type == R_PPC64_TOC16_LO)
102890f0 14752 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
14753 else
14754 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14755 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
14756 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14757 }
14758 else
14759 {
14760 /* LE */
b86ac8e3
AM
14761 insn1 &= 0x1f << 21;
14762 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14763 insn2 = 0x38630000; /* addi 3,3,0 */
14764 if (tls_gd == 0)
951fd09b 14765 {
102890f0 14766 /* Was an LD reloc. */
71c4e95a 14767 r_symndx = STN_UNDEF;
102890f0 14768 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 14769 }
102890f0 14770 else if (toc_symndx != 0)
3a71aa26
AM
14771 {
14772 r_symndx = toc_symndx;
14773 rel->r_addend = toc_addend;
14774 }
102890f0
AM
14775 r_type = R_PPC64_TPREL16_HA;
14776 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14777 if (offset != (bfd_vma) -1)
14778 {
14779 rel[1].r_info = ELF64_R_INFO (r_symndx,
14780 R_PPC64_TPREL16_LO);
14781 rel[1].r_offset = offset + d_offset;
14782 rel[1].r_addend = rel->r_addend;
14783 }
102890f0 14784 }
95f0d0d2 14785 bfd_put_32 (input_bfd, insn1,
3a71aa26 14786 contents + rel->r_offset - d_offset);
727fc41e 14787 if (offset != (bfd_vma) -1)
c96e0573
AM
14788 {
14789 bfd_put_32 (input_bfd, insn2, contents + offset);
14790 if (offset + 8 <= input_section->size)
14791 {
14792 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14793 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14794 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14795 }
14796 }
727fc41e
AM
14797 if ((tls_mask & tls_gd) == 0
14798 && (tls_gd == 0 || toc_symndx != 0))
14799 {
14800 /* We changed the symbol. Start over in order
14801 to get h, sym, sec etc. right. */
c316a17c 14802 goto again;
727fc41e
AM
14803 }
14804 }
14805 break;
14806
c213164a
AM
14807 case R_PPC64_GOT_TLSGD34:
14808 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14809 {
14810 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14811 pinsn <<= 32;
14812 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14813 if ((tls_mask & TLS_GDIE) != 0)
14814 {
14815 /* IE, pla -> pld */
14816 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14817 r_type = R_PPC64_GOT_TPREL34;
14818 }
14819 else
14820 {
14821 /* LE, pla pcrel -> paddi r13 */
14822 pinsn += (-1ULL << 52) + (13ULL << 16);
14823 r_type = R_PPC64_TPREL34;
14824 }
14825 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14826 bfd_put_32 (input_bfd, pinsn >> 32,
14827 contents + rel->r_offset);
14828 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14829 contents + rel->r_offset + 4);
14830 }
14831 break;
14832
14833 case R_PPC64_GOT_TLSLD34:
14834 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14835 {
14836 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14837 pinsn <<= 32;
14838 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14839 pinsn += (-1ULL << 52) + (13ULL << 16);
14840 bfd_put_32 (input_bfd, pinsn >> 32,
14841 contents + rel->r_offset);
14842 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14843 contents + rel->r_offset + 4);
14844 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14845 r_symndx = STN_UNDEF;
14846 r_type = R_PPC64_TPREL34;
14847 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14848 goto again;
14849 }
14850 break;
14851
727fc41e 14852 case R_PPC64_TLSGD:
37da22e5 14853 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14854 && rel + 1 < relend)
727fc41e 14855 {
b9f04fe0 14856 unsigned int insn2;
5663e321 14857 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14858
4a421c53 14859 offset = rel->r_offset;
5663e321 14860 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14861 {
14862 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14863 if (r_type1 == R_PPC64_PLT_PCREL34
14864 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14865 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14866 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14867 break;
14868 }
14869
14870 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14871 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14872
b00a0a86 14873 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
14874 {
14875 /* IE */
14876 r_type = R_PPC64_NONE;
14877 insn2 = 0x7c636a14; /* add 3,3,13 */
14878 }
14879 else
14880 {
14881 /* LE */
14882 if (toc_symndx != 0)
14883 {
14884 r_symndx = toc_symndx;
14885 rel->r_addend = toc_addend;
14886 }
c213164a
AM
14887 if (r_type1 == R_PPC64_REL24_NOTOC
14888 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14889 {
14890 r_type = R_PPC64_NONE;
14891 insn2 = NOP;
14892 }
14893 else
14894 {
14895 rel->r_offset = offset + d_offset;
14896 r_type = R_PPC64_TPREL16_LO;
14897 insn2 = 0x38630000; /* addi 3,3,0 */
14898 }
727fc41e
AM
14899 }
14900 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14901 /* Zap the reloc on the _tls_get_addr call too. */
14902 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14903 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14904 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14905 if ((tls_mask & TLS_GDIE) == 0
14906 && toc_symndx != 0
14907 && r_type != R_PPC64_NONE)
c316a17c 14908 goto again;
411e1bfb 14909 }
411e1bfb
AM
14910 break;
14911
727fc41e 14912 case R_PPC64_TLSLD:
37da22e5 14913 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14914 && rel + 1 < relend)
727fc41e 14915 {
b9f04fe0 14916 unsigned int insn2;
5663e321 14917 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14918
4a421c53 14919 offset = rel->r_offset;
5663e321 14920 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14921 {
14922 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14923 if (r_type1 == R_PPC64_PLT_PCREL34
14924 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14925 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14926 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14927 break;
14928 }
14929
14930 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14931 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14932
c213164a
AM
14933 if (r_type1 == R_PPC64_REL24_NOTOC
14934 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14935 {
14936 r_type = R_PPC64_NONE;
14937 insn2 = NOP;
14938 }
14939 else
14940 {
14941 rel->r_offset = offset + d_offset;
14942 r_symndx = STN_UNDEF;
14943 r_type = R_PPC64_TPREL16_LO;
14944 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14945 insn2 = 0x38630000; /* addi 3,3,0 */
14946 }
727fc41e 14947 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14948 /* Zap the reloc on the _tls_get_addr call too. */
14949 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14950 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14951 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14952 if (r_type != R_PPC64_NONE)
14953 goto again;
727fc41e
AM
14954 }
14955 break;
14956
411e1bfb 14957 case R_PPC64_DTPMOD64:
951fd09b
AM
14958 if (rel + 1 < relend
14959 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14960 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14961 {
951fd09b
AM
14962 if ((tls_mask & TLS_GD) == 0)
14963 {
14964 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 14965 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
14966 r_type = R_PPC64_TPREL64;
14967 else
14968 {
4ce794b7 14969 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14970 r_type = R_PPC64_NONE;
14971 }
14972 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14973 }
14974 }
14975 else
14976 {
14977 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14978 {
4ce794b7 14979 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14980 r_type = R_PPC64_NONE;
951fd09b 14981 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14982 }
411e1bfb
AM
14983 }
14984 break;
14985
14986 case R_PPC64_TPREL64:
951fd09b 14987 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14988 {
14989 r_type = R_PPC64_NONE;
14990 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14991 }
14992 break;
52a82034 14993
006589cf
AM
14994 case R_PPC64_ENTRY:
14995 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14996 if (!bfd_link_pic (info)
14997 && !info->traditional_format
14998 && relocation + 0x80008000 <= 0xffffffff)
14999 {
15000 unsigned int insn1, insn2;
15001
15002 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15003 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15004 if ((insn1 & ~0xfffc) == LD_R2_0R12
15005 && insn2 == ADD_R2_R2_R12)
15006 {
95f0d0d2 15007 bfd_put_32 (input_bfd,
006589cf
AM
15008 LIS_R2 + PPC_HA (relocation),
15009 contents + rel->r_offset);
95f0d0d2 15010 bfd_put_32 (input_bfd,
006589cf
AM
15011 ADDI_R2_R2 + PPC_LO (relocation),
15012 contents + rel->r_offset + 4);
15013 }
15014 }
15015 else
15016 {
15017 relocation -= (rel->r_offset
15018 + input_section->output_offset
15019 + input_section->output_section->vma);
15020 if (relocation + 0x80008000 <= 0xffffffff)
15021 {
15022 unsigned int insn1, insn2;
15023
15024 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15025 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15026 if ((insn1 & ~0xfffc) == LD_R2_0R12
15027 && insn2 == ADD_R2_R2_R12)
15028 {
95f0d0d2 15029 bfd_put_32 (input_bfd,
006589cf
AM
15030 ADDIS_R2_R12 + PPC_HA (relocation),
15031 contents + rel->r_offset);
95f0d0d2 15032 bfd_put_32 (input_bfd,
006589cf
AM
15033 ADDI_R2_R2 + PPC_LO (relocation),
15034 contents + rel->r_offset + 4);
15035 }
15036 }
15037 }
15038 break;
15039
52a82034
AM
15040 case R_PPC64_REL16_HA:
15041 /* If we are generating a non-PIC executable, edit
15042 . 0: addis 2,12,.TOC.-0b@ha
15043 . addi 2,2,.TOC.-0b@l
15044 used by ELFv2 global entry points to set up r2, to
15045 . lis 2,.TOC.@ha
15046 . addi 2,2,.TOC.@l
15047 if .TOC. is in range. */
0e1862bb 15048 if (!bfd_link_pic (info)
810d4e75 15049 && !info->traditional_format
006589cf 15050 && !htab->opd_abi
4f038ee5 15051 && rel->r_addend == d_offset
52a82034
AM
15052 && h != NULL && &h->elf == htab->elf.hgot
15053 && rel + 1 < relend
15054 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15055 && rel[1].r_offset == rel->r_offset + 4
15056 && rel[1].r_addend == rel->r_addend + 4
15057 && relocation + 0x80008000 <= 0xffffffff)
15058 {
15059 unsigned int insn1, insn2;
4a421c53 15060 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15061 insn1 = bfd_get_32 (input_bfd, contents + offset);
15062 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15063 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15064 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15065 {
15066 r_type = R_PPC64_ADDR16_HA;
15067 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15068 rel->r_addend -= d_offset;
15069 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15070 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15071 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15072 }
15073 }
15074 break;
411e1bfb
AM
15075 }
15076
15077 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15078 insn = 0;
b25116a9
AM
15079 max_br_offset = 1 << 25;
15080 addend = rel->r_addend;
bc30df16 15081 reloc_dest = DEST_NORMAL;
65f38f15 15082 switch (r_type)
5bd4f169
AM
15083 {
15084 default:
65f38f15 15085 break;
5bd4f169 15086
3b421ab3
AM
15087 case R_PPC64_TOCSAVE:
15088 if (relocation + addend == (rel->r_offset
15089 + input_section->output_offset
15090 + input_section->output_section->vma)
15091 && tocsave_find (htab, NO_INSERT,
15092 &local_syms, rel, input_bfd))
15093 {
15094 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15095 if (insn == NOP
15096 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15097 bfd_put_32 (input_bfd,
15098 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15099 contents + rel->r_offset);
15100 }
15101 break;
15102
65f38f15
AM
15103 /* Branch taken prediction relocations. */
15104 case R_PPC64_ADDR14_BRTAKEN:
15105 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15106 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15107 /* Fall through. */
65f38f15 15108
86c76c7b 15109 /* Branch not taken prediction relocations. */
65f38f15
AM
15110 case R_PPC64_ADDR14_BRNTAKEN:
15111 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15112 insn |= bfd_get_32 (input_bfd,
411e1bfb 15113 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15114 /* Fall through. */
86c76c7b 15115
b25116a9
AM
15116 case R_PPC64_REL14:
15117 max_br_offset = 1 << 15;
1a0670f3 15118 /* Fall through. */
5bd4f169 15119
65f38f15 15120 case R_PPC64_REL24:
05d0e962 15121 case R_PPC64_REL24_NOTOC:
23cedd1d 15122 case R_PPC64_PLTCALL:
5663e321 15123 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15124 /* Calls to functions with a different TOC, such as calls to
15125 shared objects, need to alter the TOC pointer. This is
15126 done using a linkage stub. A REL24 branching to these
15127 linkage stubs needs to be followed by a nop, as the nop
15128 will be replaced with an instruction to restore the TOC
15129 base pointer. */
8387904d 15130 fdh = h;
b31867b6
AM
15131 if (h != NULL
15132 && h->oh != NULL
15133 && h->oh->is_func_descriptor)
15134 fdh = ppc_follow_link (h->oh);
31c76678
DK
15135 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15136 htab);
5663e321
AM
15137 if ((r_type == R_PPC64_PLTCALL
15138 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15139 && stub_entry != NULL
05d0e962
AM
15140 && stub_entry->stub_type >= ppc_stub_plt_call
15141 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15142 stub_entry = NULL;
15143
6abec6bc 15144 if (stub_entry != NULL
d0abeec8
AM
15145 && ((stub_entry->stub_type >= ppc_stub_plt_call
15146 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15147 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15148 || stub_entry->stub_type == ppc_stub_plt_branch_both
15149 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15150 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15151 {
b25116a9 15152 bfd_boolean can_plt_call = FALSE;
721956f4 15153
6e1816be
AM
15154 if (stub_entry->stub_type == ppc_stub_plt_call
15155 && !htab->opd_abi
15156 && htab->params->plt_localentry0 != 0
15157 && is_elfv2_localentry0 (&h->elf))
15158 {
15159 /* The function doesn't use or change r2. */
15160 can_plt_call = TRUE;
15161 }
05d0e962
AM
15162 else if (r_type == R_PPC64_REL24_NOTOC)
15163 {
15164 /* NOTOC calls don't need to restore r2. */
15165 can_plt_call = TRUE;
15166 }
6e1816be 15167
f378ab09 15168 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15169 branch and link followed by a nop. The nop is
15170 replaced by an insn to restore r2. */
6e1816be 15171 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15172 {
ba8ca3e7
AM
15173 unsigned long br;
15174
15175 br = bfd_get_32 (input_bfd,
15176 contents + rel->r_offset);
15177 if ((br & 1) != 0)
41bd81ab 15178 {
ba8ca3e7
AM
15179 unsigned long nop;
15180
15181 nop = bfd_get_32 (input_bfd,
15182 contents + rel->r_offset + 4);
23cedd1d
AM
15183 if (nop == LD_R2_0R1 + STK_TOC (htab))
15184 can_plt_call = TRUE;
15185 else if (nop == NOP
15186 || nop == CROR_151515
15187 || nop == CROR_313131)
a7f2871e 15188 {
ba8ca3e7
AM
15189 if (h != NULL
15190 && (h == htab->tls_get_addr_fd
15191 || h == htab->tls_get_addr)
7c9cf415 15192 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15193 {
15194 /* Special stub used, leave nop alone. */
15195 }
15196 else
a078d95a
AM
15197 bfd_put_32 (input_bfd,
15198 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15199 contents + rel->r_offset + 4);
15200 can_plt_call = TRUE;
a7f2871e 15201 }
41bd81ab 15202 }
5bd4f169 15203 }
721956f4 15204
ba8ca3e7 15205 if (!can_plt_call && h != NULL)
721956f4 15206 {
ba8ca3e7
AM
15207 const char *name = h->elf.root.root.string;
15208
15209 if (*name == '.')
15210 ++name;
15211
15212 if (strncmp (name, "__libc_start_main", 17) == 0
15213 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15214 {
ba8ca3e7
AM
15215 /* Allow crt1 branch to go via a toc adjusting
15216 stub. Other calls that never return could do
15217 the same, if we could detect such. */
b25116a9 15218 can_plt_call = TRUE;
6ab189d5 15219 }
ba8ca3e7
AM
15220 }
15221
15222 if (!can_plt_call)
15223 {
15224 /* g++ as of 20130507 emits self-calls without a
15225 following nop. This is arguably wrong since we
15226 have conflicting information. On the one hand a
15227 global symbol and on the other a local call
15228 sequence, but don't error for this special case.
15229 It isn't possible to cheaply verify we have
15230 exactly such a call. Allow all calls to the same
15231 section. */
15232 asection *code_sec = sec;
15233
15234 if (get_opd_info (sec) != NULL)
ad8e1ba5 15235 {
ba8ca3e7
AM
15236 bfd_vma off = (relocation + addend
15237 - sec->output_section->vma
15238 - sec->output_offset);
bc30df16 15239
ba8ca3e7 15240 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15241 }
ba8ca3e7
AM
15242 if (code_sec == input_section)
15243 can_plt_call = TRUE;
15244 }
15245
15246 if (!can_plt_call)
15247 {
05d0e962
AM
15248 if (stub_entry->stub_type >= ppc_stub_plt_call
15249 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15250 info->callbacks->einfo
695344c0 15251 /* xgettext:c-format */
c1c8c1ef 15252 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15253 "(plt call stub)\n"),
4805fc55
AM
15254 input_bfd, input_section, rel->r_offset, sym_name);
15255 else
15256 info->callbacks->einfo
695344c0 15257 /* xgettext:c-format */
c1c8c1ef 15258 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15259 "(toc save/adjust stub)\n"),
4805fc55 15260 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15261
15262 bfd_set_error (bfd_error_bad_value);
15263 ret = FALSE;
721956f4
AM
15264 }
15265
b25116a9 15266 if (can_plt_call
05d0e962
AM
15267 && stub_entry->stub_type >= ppc_stub_plt_call
15268 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15269 unresolved_reloc = FALSE;
15270 }
15271
6abec6bc
AM
15272 if ((stub_entry == NULL
15273 || stub_entry->stub_type == ppc_stub_long_branch
15274 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15275 && get_opd_info (sec) != NULL)
15276 {
15277 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15278 bfd_vma off = (relocation + addend
15279 - sec->output_section->vma
15280 - sec->output_offset);
aef36ac1 15281 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15282 if (dest != (bfd_vma) -1)
15283 {
15284 relocation = dest;
15285 addend = 0;
bc30df16 15286 reloc_dest = DEST_OPD;
8387904d
AM
15287 }
15288 }
15289
b25116a9
AM
15290 /* If the branch is out of reach we ought to have a long
15291 branch stub. */
15292 from = (rel->r_offset
15293 + input_section->output_offset
15294 + input_section->output_section->vma);
15295
6911b7dc
AM
15296 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15297 ? fdh->elf.other
15298 : sym->st_other);
15299
6abec6bc
AM
15300 if (stub_entry != NULL
15301 && (stub_entry->stub_type == ppc_stub_long_branch
15302 || stub_entry->stub_type == ppc_stub_plt_branch)
15303 && (r_type == R_PPC64_ADDR14_BRTAKEN
15304 || r_type == R_PPC64_ADDR14_BRNTAKEN
15305 || (relocation + addend - from + max_br_offset
15306 < 2 * max_br_offset)))
15307 /* Don't use the stub if this branch is in range. */
15308 stub_entry = NULL;
b25116a9 15309
05d0e962
AM
15310 if (stub_entry != NULL
15311 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15312 || stub_entry->stub_type == ppc_stub_long_branch_both
15313 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15314 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15315 && (r_type != R_PPC64_REL24_NOTOC
15316 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15317 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15318 && (relocation + addend - from + max_br_offset
15319 < 2 * max_br_offset))
15320 stub_entry = NULL;
15321
15322 if (stub_entry != NULL
15323 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15324 || stub_entry->stub_type == ppc_stub_long_branch_both
15325 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15326 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15327 && r_type == R_PPC64_REL24_NOTOC
15328 && (relocation + addend - from + max_br_offset
15329 < 2 * max_br_offset))
15330 stub_entry = NULL;
15331
b25116a9
AM
15332 if (stub_entry != NULL)
15333 {
15334 /* Munge up the value and addend so that we call the stub
15335 rather than the procedure directly. */
a4b6fadd
AM
15336 asection *stub_sec = stub_entry->group->stub_sec;
15337
15338 if (stub_entry->stub_type == ppc_stub_save_res)
15339 relocation += (stub_sec->output_offset
15340 + stub_sec->output_section->vma
15341 + stub_sec->size - htab->sfpr->size
15342 - htab->sfpr->output_offset
15343 - htab->sfpr->output_section->vma);
15344 else
15345 relocation = (stub_entry->stub_offset
15346 + stub_sec->output_offset
15347 + stub_sec->output_section->vma);
b25116a9 15348 addend = 0;
bc30df16 15349 reloc_dest = DEST_STUB;
3b421ab3 15350
05d0e962
AM
15351 if (((stub_entry->stub_type == ppc_stub_plt_call
15352 && ALWAYS_EMIT_R2SAVE)
15353 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15354 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
15355 && !(h != NULL
15356 && (h == htab->tls_get_addr_fd
15357 || h == htab->tls_get_addr)
15358 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15359 && rel + 1 < relend
15360 && rel[1].r_offset == rel->r_offset + 4
15361 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15362 relocation += 4;
05d0e962
AM
15363 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15364 || stub_entry->stub_type == ppc_stub_plt_branch_both
15365 || stub_entry->stub_type == ppc_stub_plt_call_both)
15366 && r_type == R_PPC64_REL24_NOTOC)
15367 relocation += 4;
5663e321
AM
15368
15369 if (r_type == R_PPC64_REL24_NOTOC
15370 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15371 || stub_entry->stub_type == ppc_stub_plt_call_both))
15372 htab->notoc_plt = 1;
b25116a9
AM
15373 }
15374
15375 if (insn != 0)
15376 {
794e51c0 15377 if (is_isa_v2)
721956f4 15378 {
b25116a9
AM
15379 /* Set 'a' bit. This is 0b00010 in BO field for branch
15380 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15381 for branch on CTR insns (BO == 1a00t or 1a01t). */
15382 if ((insn & (0x14 << 21)) == (0x04 << 21))
15383 insn |= 0x02 << 21;
15384 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15385 insn |= 0x08 << 21;
15386 else
15387 break;
15388 }
15389 else
15390 {
15391 /* Invert 'y' bit if not the default. */
4cc603a5 15392 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15393 insn ^= 0x01 << 21;
721956f4 15394 }
b25116a9 15395
95f0d0d2 15396 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15397 }
e86ce104 15398
06da1e8e
AM
15399 /* NOP out calls to undefined weak functions.
15400 We can thus call a weak function without first
15401 checking whether the function is defined. */
b25116a9 15402 else if (h != NULL
039b3fef 15403 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15404 && h->elf.dynindx == -1
05d0e962
AM
15405 && (r_type == R_PPC64_REL24
15406 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15407 && relocation == 0
4cc603a5 15408 && addend == 0)
e86ce104 15409 {
95f0d0d2 15410 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15411 goto copy_reloc;
e86ce104 15412 }
65f38f15 15413 break;
066f4018
AM
15414
15415 case R_PPC64_GOT16_DS:
15416 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15417 if (relocation + addend - from + 0x8000 < 0x10000
15418 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15419 {
15420 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15421 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15422 {
15423 insn += (14u << 26) - (58u << 26);
15424 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15425 r_type = R_PPC64_TOC16;
15426 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15427 }
15428 }
15429 break;
15430
15431 case R_PPC64_GOT16_LO_DS:
15432 case R_PPC64_GOT16_HA:
15433 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15434 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15435 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15436 {
15437 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15438 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15439 {
15440 insn += (14u << 26) - (58u << 26);
15441 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15442 r_type = R_PPC64_TOC16_LO;
15443 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15444 }
15445 else if ((insn & (0x3f << 26)) == 15u << 26 /* addis */)
15446 {
15447 r_type = R_PPC64_TOC16_HA;
15448 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15449 }
15450 }
15451 break;
4a421c53
AM
15452
15453 case R_PPC64_GOT_PCREL34:
15454 from = (rel->r_offset
15455 + input_section->output_section->vma
15456 + input_section->output_offset);
15457 if (relocation - from + (1ULL << 33) < 1ULL << 34
15458 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15459 {
15460 offset = rel->r_offset;
15461 pinsn = bfd_get_32 (input_bfd, contents + offset);
15462 pinsn <<= 32;
15463 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15464 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15465 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15466 {
15467 /* Replace with paddi. */
15468 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15469 r_type = R_PPC64_PCREL34;
15470 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15471 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15472 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15473 goto pcrelopt;
15474 }
15475 }
15476 break;
15477
15478 case R_PPC64_PCREL34:
15479 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15480 {
15481 offset = rel->r_offset;
15482 pinsn = bfd_get_32 (input_bfd, contents + offset);
15483 pinsn <<= 32;
15484 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15485 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15486 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15487 | (14ULL << 26) /* paddi */))
15488 {
15489 pcrelopt:
15490 if (rel + 1 < relend
15491 && rel[1].r_offset == offset
15492 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15493 {
15494 bfd_vma off2 = rel[1].r_addend;
15495 if (off2 == 0)
15496 /* zero means next insn. */
15497 off2 = 8;
15498 off2 += offset;
15499 if (off2 + 4 <= input_section->size)
15500 {
15501 uint64_t pinsn2;
dd9b12c2 15502 bfd_signed_vma addend_off;
4a421c53
AM
15503 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15504 pinsn2 <<= 32;
15505 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15506 {
15507 if (off2 + 8 > input_section->size)
15508 break;
15509 pinsn2 |= bfd_get_32 (input_bfd,
15510 contents + off2 + 4);
15511 }
dd9b12c2 15512 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15513 {
dd9b12c2
AM
15514 addend += addend_off;
15515 rel->r_addend = addend;
4a421c53
AM
15516 bfd_put_32 (input_bfd, pinsn >> 32,
15517 contents + offset);
15518 bfd_put_32 (input_bfd, pinsn,
15519 contents + offset + 4);
15520 bfd_put_32 (input_bfd, pinsn2 >> 32,
15521 contents + off2);
77486630
AM
15522 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15523 bfd_put_32 (input_bfd, pinsn2,
15524 contents + off2 + 4);
4a421c53
AM
15525 }
15526 }
15527 }
15528 }
15529 }
15530 break;
65f38f15 15531 }
5bd4f169 15532
411e1bfb 15533 tls_type = 0;
23cedd1d 15534 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15535 switch (r_type)
15536 {
15537 default:
cf97bcb0
AM
15538 /* xgettext:c-format */
15539 _bfd_error_handler (_("%pB: %s unsupported"),
15540 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15541
65f38f15 15542 bfd_set_error (bfd_error_bad_value);
b34976b6 15543 ret = FALSE;
c316a17c 15544 goto copy_reloc;
5bd4f169 15545
65f38f15 15546 case R_PPC64_NONE:
411e1bfb 15547 case R_PPC64_TLS:
727fc41e
AM
15548 case R_PPC64_TLSGD:
15549 case R_PPC64_TLSLD:
3b421ab3 15550 case R_PPC64_TOCSAVE:
04c9666a
AM
15551 case R_PPC64_GNU_VTINHERIT:
15552 case R_PPC64_GNU_VTENTRY:
006589cf 15553 case R_PPC64_ENTRY:
4a421c53 15554 case R_PPC64_PCREL_OPT:
c316a17c 15555 goto copy_reloc;
5bd4f169
AM
15556
15557 /* GOT16 relocations. Like an ADDR16 using the symbol's
15558 address in the GOT as relocation value instead of the
411e1bfb 15559 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15560 symbol and put the symbol value there. */
411e1bfb
AM
15561 case R_PPC64_GOT_TLSGD16:
15562 case R_PPC64_GOT_TLSGD16_LO:
15563 case R_PPC64_GOT_TLSGD16_HI:
15564 case R_PPC64_GOT_TLSGD16_HA:
c213164a 15565 case R_PPC64_GOT_TLSGD34:
951fd09b 15566 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15567 goto dogot;
15568
15569 case R_PPC64_GOT_TLSLD16:
15570 case R_PPC64_GOT_TLSLD16_LO:
15571 case R_PPC64_GOT_TLSLD16_HI:
15572 case R_PPC64_GOT_TLSLD16_HA:
c213164a 15573 case R_PPC64_GOT_TLSLD34:
951fd09b 15574 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15575 goto dogot;
15576
15577 case R_PPC64_GOT_TPREL16_DS:
15578 case R_PPC64_GOT_TPREL16_LO_DS:
15579 case R_PPC64_GOT_TPREL16_HI:
15580 case R_PPC64_GOT_TPREL16_HA:
c213164a 15581 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
15582 tls_type = TLS_TLS | TLS_TPREL;
15583 goto dogot;
15584
15585 case R_PPC64_GOT_DTPREL16_DS:
15586 case R_PPC64_GOT_DTPREL16_LO_DS:
15587 case R_PPC64_GOT_DTPREL16_HI:
15588 case R_PPC64_GOT_DTPREL16_HA:
c213164a 15589 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
15590 tls_type = TLS_TLS | TLS_DTPREL;
15591 goto dogot;
15592
65f38f15
AM
15593 case R_PPC64_GOT16:
15594 case R_PPC64_GOT16_LO:
15595 case R_PPC64_GOT16_HI:
15596 case R_PPC64_GOT16_HA:
15597 case R_PPC64_GOT16_DS:
15598 case R_PPC64_GOT16_LO_DS:
5663e321 15599 case R_PPC64_GOT_PCREL34:
411e1bfb 15600 dogot:
5bd4f169
AM
15601 {
15602 /* Relocation is to the entry for this symbol in the global
15603 offset table. */
e717da7e 15604 asection *got;
d881513a 15605 bfd_vma *offp;
5bd4f169 15606 bfd_vma off;
d881513a 15607 unsigned long indx = 0;
927be08e 15608 struct got_entry *ent;
65f38f15 15609
d881513a 15610 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 15611 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 15612 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15613 else
5bd4f169 15614 {
d881513a
AM
15615 if (h != NULL)
15616 {
f0158f44
AM
15617 if (!htab->elf.dynamic_sections_created
15618 || h->elf.dynindx == -1
15619 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15620 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15621 /* This is actually a static link, or it is a
15622 -Bsymbolic link and the symbol is defined
15623 locally, or the symbol was forced to be local
15624 because of a version file. */
15625 ;
15626 else
15627 {
039b3fef 15628 indx = h->elf.dynindx;
d881513a
AM
15629 unresolved_reloc = FALSE;
15630 }
039b3fef 15631 ent = h->elf.got.glist;
d881513a 15632 }
411e1bfb 15633 else
5bd4f169 15634 {
d881513a
AM
15635 if (local_got_ents == NULL)
15636 abort ();
15637 ent = local_got_ents[r_symndx];
5bd4f169 15638 }
d881513a
AM
15639
15640 for (; ent != NULL; ent = ent->next)
133a1f60 15641 if (ent->addend == orig_rel.r_addend
e717da7e 15642 && ent->owner == input_bfd
d881513a
AM
15643 && ent->tls_type == tls_type)
15644 break;
5bd4f169 15645 }
411e1bfb 15646
927be08e
AM
15647 if (ent == NULL)
15648 abort ();
15649 if (ent->is_indirect)
15650 ent = ent->got.ent;
15651 offp = &ent->got.offset;
15652 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15653 if (got == NULL)
15654 abort ();
15655
411e1bfb
AM
15656 /* The offset must always be a multiple of 8. We use the
15657 least significant bit to record whether we have already
15658 processed this entry. */
d881513a 15659 off = *offp;
411e1bfb
AM
15660 if ((off & 1) != 0)
15661 off &= ~1;
5bd4f169
AM
15662 else
15663 {
411e1bfb
AM
15664 /* Generate relocs for the dynamic linker, except in
15665 the case of TLSLD where we'll use one entry per
15666 module. */
25f23106
AM
15667 asection *relgot;
15668 bfd_boolean ifunc;
e717da7e 15669
d881513a 15670 *offp = off | 1;
25f23106
AM
15671 relgot = NULL;
15672 ifunc = (h != NULL
15673 ? h->elf.type == STT_GNU_IFUNC
15674 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15675 if (ifunc)
82e66161
AM
15676 {
15677 relgot = htab->elf.irelplt;
15678 if (indx == 0)
15679 htab->local_ifunc_resolver = 1;
15680 else if (is_static_defined (&h->elf))
15681 htab->maybe_local_ifunc_resolver = 1;
15682 }
f0158f44
AM
15683 else if (indx != 0
15684 || (bfd_link_pic (info)
15685 && (h == NULL
f749f26e
AM
15686 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15687 && !(tls_type != 0
f15d0b54
AM
15688 && bfd_link_executable (info)
15689 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15690 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15691 if (relgot != NULL)
5bd4f169 15692 {
e717da7e
AM
15693 outrel.r_offset = (got->output_section->vma
15694 + got->output_offset
411e1bfb 15695 + off);
133a1f60 15696 outrel.r_addend = orig_rel.r_addend;
d881513a 15697 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15698 {
411e1bfb 15699 outrel.r_addend = 0;
e515b051 15700 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15701 if (tls_type == (TLS_TLS | TLS_GD))
15702 {
e717da7e
AM
15703 loc = relgot->contents;
15704 loc += (relgot->reloc_count++
d881513a
AM
15705 * sizeof (Elf64_External_Rela));
15706 bfd_elf64_swap_reloca_out (output_bfd,
15707 &outrel, loc);
e515b051 15708 outrel.r_offset += 8;
133a1f60 15709 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
15710 outrel.r_info
15711 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15712 }
411e1bfb 15713 }
951fd09b 15714 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15715 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15716 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15717 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15718 else if (indx != 0)
15719 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15720 else
81407a69 15721 {
25f23106
AM
15722 if (ifunc)
15723 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15724 else
15725 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15726
15727 /* Write the .got section contents for the sake
15728 of prelink. */
e717da7e 15729 loc = got->contents + off;
23fbd6fa
JJ
15730 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15731 loc);
81407a69 15732 }
81407a69
AM
15733
15734 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15735 {
15736 outrel.r_addend += relocation;
15737 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15738 {
15739 if (htab->elf.tls_sec == NULL)
15740 outrel.r_addend = 0;
15741 else
15742 outrel.r_addend -= htab->elf.tls_sec->vma;
15743 }
e515b051 15744 }
e717da7e
AM
15745 loc = relgot->contents;
15746 loc += (relgot->reloc_count++
411e1bfb
AM
15747 * sizeof (Elf64_External_Rela));
15748 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15749 }
15750
ad8e1ba5 15751 /* Init the .got section contents here if we're not
81407a69 15752 emitting a reloc. */
d881513a 15753 else
411e1bfb 15754 {
133a1f60 15755 relocation += orig_rel.r_addend;
f0158f44 15756 if (tls_type != 0)
411e1bfb 15757 {
989f9879
AM
15758 if (htab->elf.tls_sec == NULL)
15759 relocation = 0;
15760 else
15761 {
f0158f44
AM
15762 if (tls_type & TLS_LD)
15763 relocation = 0;
15764 else
15765 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15766 if (tls_type & TLS_TPREL)
989f9879
AM
15767 relocation += DTP_OFFSET - TP_OFFSET;
15768 }
5bd4f169 15769
f0158f44 15770 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15771 {
15772 bfd_put_64 (output_bfd, relocation,
e717da7e 15773 got->contents + off + 8);
676ee2b5 15774 relocation = 1;
7b609f53 15775 }
411e1bfb
AM
15776 }
15777 bfd_put_64 (output_bfd, relocation,
e717da7e 15778 got->contents + off);
5bd4f169
AM
15779 }
15780 }
15781
65f38f15
AM
15782 if (off >= (bfd_vma) -2)
15783 abort ();
15784
bf102f86 15785 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 15786 addend = 0;
c213164a
AM
15787 if (!(r_type == R_PPC64_GOT_PCREL34
15788 || r_type == R_PPC64_GOT_TLSGD34
15789 || r_type == R_PPC64_GOT_TLSLD34
15790 || r_type == R_PPC64_GOT_TPREL34
15791 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 15792 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15793 }
65f38f15
AM
15794 break;
15795
15796 case R_PPC64_PLT16_HA:
15797 case R_PPC64_PLT16_HI:
15798 case R_PPC64_PLT16_LO:
08be3224 15799 case R_PPC64_PLT16_LO_DS:
5663e321
AM
15800 case R_PPC64_PLT_PCREL34:
15801 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
15802 case R_PPC64_PLT32:
15803 case R_PPC64_PLT64:
23cedd1d 15804 case R_PPC64_PLTSEQ:
5663e321 15805 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 15806 case R_PPC64_PLTCALL:
5663e321 15807 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
15808 /* Relocation is to the entry for this symbol in the
15809 procedure linkage table. */
23cedd1d 15810 unresolved_reloc = TRUE;
cbf95972
AM
15811 {
15812 struct plt_entry **plt_list = NULL;
15813 if (h != NULL)
15814 plt_list = &h->elf.plt.plist;
15815 else if (local_got_ents != NULL)
15816 {
15817 struct plt_entry **local_plt = (struct plt_entry **)
15818 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15819 plt_list = local_plt + r_symndx;
cbf95972
AM
15820 }
15821 if (plt_list)
15822 {
15823 struct plt_entry *ent;
65f38f15 15824
cbf95972
AM
15825 for (ent = *plt_list; ent != NULL; ent = ent->next)
15826 if (ent->plt.offset != (bfd_vma) -1
133a1f60 15827 && ent->addend == orig_rel.r_addend)
cbf95972
AM
15828 {
15829 asection *plt;
08be3224 15830 bfd_vma got;
cbf95972
AM
15831
15832 plt = htab->elf.splt;
15833 if (!htab->elf.dynamic_sections_created
15834 || h == NULL
15835 || h->elf.dynindx == -1)
2d7ad24e
AM
15836 {
15837 if (h != NULL
15838 ? h->elf.type == STT_GNU_IFUNC
15839 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15840 plt = htab->elf.iplt;
15841 else
15842 plt = htab->pltlocal;
15843 }
15844 relocation = (plt->output_section->vma
15845 + plt->output_offset
15846 + ent->plt.offset);
08be3224 15847 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
15848 || r_type == R_PPC64_PLT16_HI
15849 || r_type == R_PPC64_PLT16_LO
15850 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
15851 {
15852 got = (elf_gp (output_bfd)
15853 + htab->sec_info[input_section->id].toc_off);
15854 relocation -= got;
15855 }
133a1f60 15856 addend = 0;
cbf95972
AM
15857 unresolved_reloc = FALSE;
15858 break;
15859 }
15860 }
15861 }
65f38f15 15862 break;
5bd4f169 15863
0b13192e
AM
15864 case R_PPC64_TOC:
15865 /* Relocation value is TOC base. */
15866 relocation = TOCstart;
cf35638d 15867 if (r_symndx == STN_UNDEF)
6f20ed8a 15868 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15869 else if (unresolved_reloc)
15870 ;
6f20ed8a
AM
15871 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15872 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15873 else
15874 unresolved_reloc = TRUE;
ab96bf03 15875 goto dodyn;
0b13192e 15876
5bd4f169
AM
15877 /* TOC16 relocs. We want the offset relative to the TOC base,
15878 which is the address of the start of the TOC plus 0x8000.
15879 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15880 in this order. */
65f38f15
AM
15881 case R_PPC64_TOC16:
15882 case R_PPC64_TOC16_LO:
15883 case R_PPC64_TOC16_HI:
15884 case R_PPC64_TOC16_DS:
15885 case R_PPC64_TOC16_LO_DS:
15886 case R_PPC64_TOC16_HA:
6f20ed8a 15887 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
15888 if (h != NULL)
15889 goto dodyn;
5bd4f169
AM
15890 break;
15891
15892 /* Relocate against the beginning of the section. */
65f38f15
AM
15893 case R_PPC64_SECTOFF:
15894 case R_PPC64_SECTOFF_LO:
15895 case R_PPC64_SECTOFF_HI:
15896 case R_PPC64_SECTOFF_DS:
15897 case R_PPC64_SECTOFF_LO_DS:
15898 case R_PPC64_SECTOFF_HA:
4ce794b7 15899 if (sec != NULL)
65f38f15 15900 addend -= sec->output_section->vma;
5bd4f169
AM
15901 break;
15902
25f23106
AM
15903 case R_PPC64_REL16:
15904 case R_PPC64_REL16_LO:
15905 case R_PPC64_REL16_HI:
15906 case R_PPC64_REL16_HA:
4a969973
AM
15907 case R_PPC64_REL16_HIGH:
15908 case R_PPC64_REL16_HIGHA:
15909 case R_PPC64_REL16_HIGHER:
15910 case R_PPC64_REL16_HIGHERA:
15911 case R_PPC64_REL16_HIGHEST:
15912 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
15913 case R_PPC64_REL16_HIGHER34:
15914 case R_PPC64_REL16_HIGHERA34:
15915 case R_PPC64_REL16_HIGHEST34:
15916 case R_PPC64_REL16_HIGHESTA34:
a680de9a 15917 case R_PPC64_REL16DX_HA:
721956f4
AM
15918 case R_PPC64_REL14:
15919 case R_PPC64_REL14_BRNTAKEN:
15920 case R_PPC64_REL14_BRTAKEN:
5d1634d7 15921 case R_PPC64_REL24:
05d0e962 15922 case R_PPC64_REL24_NOTOC:
5663e321
AM
15923 case R_PPC64_PCREL34:
15924 case R_PPC64_PCREL28:
5d1634d7
AM
15925 break;
15926
411e1bfb
AM
15927 case R_PPC64_TPREL16:
15928 case R_PPC64_TPREL16_LO:
15929 case R_PPC64_TPREL16_HI:
15930 case R_PPC64_TPREL16_HA:
15931 case R_PPC64_TPREL16_DS:
15932 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15933 case R_PPC64_TPREL16_HIGH:
15934 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15935 case R_PPC64_TPREL16_HIGHER:
15936 case R_PPC64_TPREL16_HIGHERA:
15937 case R_PPC64_TPREL16_HIGHEST:
15938 case R_PPC64_TPREL16_HIGHESTA:
c213164a 15939 case R_PPC64_TPREL34:
766bc656
AM
15940 if (h != NULL
15941 && h->elf.root.type == bfd_link_hash_undefweak
15942 && h->elf.dynindx == -1)
15943 {
15944 /* Make this relocation against an undefined weak symbol
15945 resolve to zero. This is really just a tweak, since
15946 code using weak externs ought to check that they are
15947 defined before using them. */
15948 bfd_byte *p = contents + rel->r_offset - d_offset;
15949
95f0d0d2 15950 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15951 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15952 if (insn != 0)
95f0d0d2 15953 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15954 break;
15955 }
989f9879
AM
15956 if (htab->elf.tls_sec != NULL)
15957 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15958 /* The TPREL16 relocs shouldn't really be used in shared
15959 libs or with non-local symbols as that will result in
15960 DT_TEXTREL being set, but support them anyway. */
15961 goto dodyn;
411e1bfb
AM
15962
15963 case R_PPC64_DTPREL16:
15964 case R_PPC64_DTPREL16_LO:
15965 case R_PPC64_DTPREL16_HI:
15966 case R_PPC64_DTPREL16_HA:
15967 case R_PPC64_DTPREL16_DS:
15968 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15969 case R_PPC64_DTPREL16_HIGH:
15970 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15971 case R_PPC64_DTPREL16_HIGHER:
15972 case R_PPC64_DTPREL16_HIGHERA:
15973 case R_PPC64_DTPREL16_HIGHEST:
15974 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 15975 case R_PPC64_DTPREL34:
989f9879
AM
15976 if (htab->elf.tls_sec != NULL)
15977 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15978 break;
15979
45965137
AM
15980 case R_PPC64_ADDR64_LOCAL:
15981 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15982 ? h->elf.other
15983 : sym->st_other);
15984 break;
15985
e515b051
AM
15986 case R_PPC64_DTPMOD64:
15987 relocation = 1;
15988 addend = 0;
15989 goto dodyn;
15990
411e1bfb 15991 case R_PPC64_TPREL64:
989f9879
AM
15992 if (htab->elf.tls_sec != NULL)
15993 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
15994 goto dodyn;
15995
15996 case R_PPC64_DTPREL64:
989f9879
AM
15997 if (htab->elf.tls_sec != NULL)
15998 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 15999 /* Fall through. */
411e1bfb 16000
65f38f15
AM
16001 /* Relocations that may need to be propagated if this is a
16002 dynamic object. */
04c9666a 16003 case R_PPC64_REL30:
65f38f15
AM
16004 case R_PPC64_REL32:
16005 case R_PPC64_REL64:
16006 case R_PPC64_ADDR14:
16007 case R_PPC64_ADDR14_BRNTAKEN:
16008 case R_PPC64_ADDR14_BRTAKEN:
16009 case R_PPC64_ADDR16:
16010 case R_PPC64_ADDR16_DS:
16011 case R_PPC64_ADDR16_HA:
16012 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16013 case R_PPC64_ADDR16_HIGH:
16014 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16015 case R_PPC64_ADDR16_HIGHER:
16016 case R_PPC64_ADDR16_HIGHERA:
16017 case R_PPC64_ADDR16_HIGHEST:
16018 case R_PPC64_ADDR16_HIGHESTA:
16019 case R_PPC64_ADDR16_LO:
16020 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16021 case R_PPC64_ADDR16_HIGHER34:
16022 case R_PPC64_ADDR16_HIGHERA34:
16023 case R_PPC64_ADDR16_HIGHEST34:
16024 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16025 case R_PPC64_ADDR24:
65f38f15
AM
16026 case R_PPC64_ADDR32:
16027 case R_PPC64_ADDR64:
16028 case R_PPC64_UADDR16:
16029 case R_PPC64_UADDR32:
16030 case R_PPC64_UADDR64:
5663e321
AM
16031 case R_PPC64_D34:
16032 case R_PPC64_D34_LO:
16033 case R_PPC64_D34_HI30:
16034 case R_PPC64_D34_HA30:
16035 case R_PPC64_D28:
411e1bfb 16036 dodyn:
5d1634d7 16037 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16038 break;
16039
41bd81ab
AM
16040 if (NO_OPD_RELOCS && is_opd)
16041 break;
16042
8a9e8e72 16043 if (bfd_link_pic (info)
b1b07054
AM
16044 ? ((h == NULL
16045 || h->dyn_relocs != NULL)
16046 && ((h != NULL && pc_dynrelocs (h))
16047 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16048 : (h != NULL
16049 ? h->dyn_relocs != NULL
d311bc8b 16050 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16051 {
b34976b6 16052 bfd_boolean skip, relocate;
65f38f15 16053 asection *sreloc;
1cf1f670 16054 bfd_vma out_off;
82e66161 16055 long indx = 0;
65f38f15
AM
16056
16057 /* When generating a dynamic object, these relocations
16058 are copied into the output file to be resolved at run
16059 time. */
16060
b34976b6
AM
16061 skip = FALSE;
16062 relocate = FALSE;
65f38f15 16063
1cf1f670
AM
16064 out_off = _bfd_elf_section_offset (output_bfd, info,
16065 input_section, rel->r_offset);
16066 if (out_off == (bfd_vma) -1)
b34976b6 16067 skip = TRUE;
1cf1f670 16068 else if (out_off == (bfd_vma) -2)
b34976b6 16069 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16070 out_off += (input_section->output_section->vma
16071 + input_section->output_offset);
16072 outrel.r_offset = out_off;
411e1bfb 16073 outrel.r_addend = rel->r_addend;
65f38f15 16074
1cf1f670
AM
16075 /* Optimize unaligned reloc use. */
16076 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16077 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16078 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16079 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16080 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16081 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16082 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16083 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16084 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16085
65f38f15 16086 if (skip)
0bb2d96a 16087 memset (&outrel, 0, sizeof outrel);
afe397ea 16088 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16089 && !is_opd
16090 && r_type != R_PPC64_TOC)
14acf4dc 16091 {
82e66161
AM
16092 indx = h->elf.dynindx;
16093 BFD_ASSERT (indx != -1);
16094 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16095 }
65f38f15
AM
16096 else
16097 {
41bd81ab
AM
16098 /* This symbol is local, or marked to become local,
16099 or this is an opd section reloc which must point
16100 at a local function. */
65f38f15 16101 outrel.r_addend += relocation;
e86ce104 16102 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16103 {
3fad3c7c 16104 if (is_opd && h != NULL)
afbe61cf
AM
16105 {
16106 /* Lie about opd entries. This case occurs
16107 when building shared libraries and we
16108 reference a function in another shared
3fad3c7c
AM
16109 lib. The same thing happens for a weak
16110 definition in an application that's
16111 overridden by a strong definition in a
16112 shared lib. (I believe this is a generic
16113 bug in binutils handling of weak syms.)
16114 In these cases we won't use the opd
1e2f5b6e 16115 entry in this lib. */
b34976b6 16116 unresolved_reloc = FALSE;
afbe61cf 16117 }
25f23106
AM
16118 if (!is_opd
16119 && r_type == R_PPC64_ADDR64
16120 && (h != NULL
16121 ? h->elf.type == STT_GNU_IFUNC
16122 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16123 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16124 else
16125 {
16126 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16127
25f23106
AM
16128 /* We need to relocate .opd contents for ld.so.
16129 Prelink also wants simple and consistent rules
16130 for relocs. This make all RELATIVE relocs have
16131 *r_offset equal to r_addend. */
16132 relocate = TRUE;
16133 }
65f38f15
AM
16134 }
16135 else
16136 {
25f23106
AM
16137 if (h != NULL
16138 ? h->elf.type == STT_GNU_IFUNC
16139 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16140 {
25f53a85 16141 info->callbacks->einfo
695344c0 16142 /* xgettext:c-format */
174d0a74 16143 (_("%H: %s for indirect "
c1c8c1ef 16144 "function `%pT' unsupported\n"),
25f53a85 16145 input_bfd, input_section, rel->r_offset,
25f23106
AM
16146 ppc64_elf_howto_table[r_type]->name,
16147 sym_name);
16148 ret = FALSE;
16149 }
cf35638d 16150 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16151 ;
16152 else if (sec == NULL || sec->owner == NULL)
16153 {
16154 bfd_set_error (bfd_error_bad_value);
b34976b6 16155 return FALSE;
65f38f15
AM
16156 }
16157 else
16158 {
f26a3287 16159 asection *osec = sec->output_section;
65f38f15 16160
f26a3287
AM
16161 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16162 {
16163 /* TLS symbol values are relative to the
16164 TLS segment. Dynamic relocations for
16165 local TLS symbols therefore can't be
16166 reduced to a relocation against their
16167 section symbol because it holds the
16168 address of the section, not a value
16169 relative to the TLS segment. We could
16170 change the .tdata dynamic section symbol
16171 to be zero value but STN_UNDEF works
16172 and is used elsewhere, eg. for TPREL64
16173 GOT relocs against local TLS symbols. */
16174 osec = htab->elf.tls_sec;
16175 indx = 0;
16176 }
16177 else
74541ad4 16178 {
74541ad4 16179 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16180 if (indx == 0)
16181 {
16182 if ((osec->flags & SEC_READONLY) == 0
16183 && htab->elf.data_index_section != NULL)
16184 osec = htab->elf.data_index_section;
16185 else
16186 osec = htab->elf.text_index_section;
16187 indx = elf_section_data (osec)->dynindx;
16188 }
16189 BFD_ASSERT (indx != 0);
74541ad4 16190 }
74541ad4 16191
65f38f15
AM
16192 /* We are turning this relocation into one
16193 against a section symbol, so subtract out
16194 the output section's address but not the
16195 offset of the input section in the output
16196 section. */
16197 outrel.r_addend -= osec->vma;
16198 }
16199
16200 outrel.r_info = ELF64_R_INFO (indx, r_type);
16201 }
16202 }
16203
16204 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16205 if (h != NULL
16206 ? h->elf.type == STT_GNU_IFUNC
16207 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16208 {
16209 sreloc = htab->elf.irelplt;
16210 if (indx == 0)
16211 htab->local_ifunc_resolver = 1;
16212 else if (is_static_defined (&h->elf))
16213 htab->maybe_local_ifunc_resolver = 1;
16214 }
65f38f15
AM
16215 if (sreloc == NULL)
16216 abort ();
16217
dfbb6ac9
AM
16218 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16219 >= sreloc->size)
16220 abort ();
947216bf
AM
16221 loc = sreloc->contents;
16222 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16223 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16224
e59a1001
AM
16225 if (!warned_dynamic
16226 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16227 {
16228 info->callbacks->einfo
16229 /* xgettext:c-format */
16230 (_("%X%P: %pB: %s against %pT "
16231 "is not supported by glibc as a dynamic relocation\n"),
16232 input_bfd,
16233 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16234 sym_name);
16235 warned_dynamic = TRUE;
16236 }
16237
65f38f15
AM
16238 /* If this reloc is against an external symbol, it will
16239 be computed at runtime, so there's no need to do
81407a69
AM
16240 anything now. However, for the sake of prelink ensure
16241 that the section contents are a known value. */
2cdcc330 16242 if (!relocate)
81407a69
AM
16243 {
16244 unresolved_reloc = FALSE;
16245 /* The value chosen here is quite arbitrary as ld.so
16246 ignores section contents except for the special
16247 case of .opd where the contents might be accessed
16248 before relocation. Choose zero, as that won't
16249 cause reloc overflow. */
16250 relocation = 0;
16251 addend = 0;
16252 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16253 to improve backward compatibility with older
16254 versions of ld. */
16255 if (r_type == R_PPC64_ADDR64)
16256 addend = outrel.r_addend;
16257 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16258 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16259 addend = outrel.r_offset;
81407a69 16260 }
65f38f15 16261 }
5bd4f169
AM
16262 break;
16263
65f38f15
AM
16264 case R_PPC64_COPY:
16265 case R_PPC64_GLOB_DAT:
16266 case R_PPC64_JMP_SLOT:
25f23106 16267 case R_PPC64_JMP_IREL:
65f38f15
AM
16268 case R_PPC64_RELATIVE:
16269 /* We shouldn't ever see these dynamic relocs in relocatable
16270 files. */
ae9a127f 16271 /* Fall through. */
65f38f15
AM
16272
16273 case R_PPC64_PLTGOT16:
16274 case R_PPC64_PLTGOT16_DS:
16275 case R_PPC64_PLTGOT16_HA:
16276 case R_PPC64_PLTGOT16_HI:
16277 case R_PPC64_PLTGOT16_LO:
16278 case R_PPC64_PLTGOT16_LO_DS:
16279 case R_PPC64_PLTREL32:
16280 case R_PPC64_PLTREL64:
16281 /* These ones haven't been implemented yet. */
16282
25f53a85 16283 info->callbacks->einfo
695344c0 16284 /* xgettext:c-format */
c1c8c1ef 16285 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16286 input_bfd,
4ce794b7 16287 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16288
16289 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16290 ret = FALSE;
c316a17c 16291 goto copy_reloc;
65f38f15 16292 }
5bd4f169 16293
67f0cbdb
AM
16294 /* Multi-instruction sequences that access the TOC can be
16295 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16296 to nop; addi rb,r2,x; */
67f0cbdb
AM
16297 switch (r_type)
16298 {
16299 default:
16300 break;
16301
16302 case R_PPC64_GOT_TLSLD16_HI:
16303 case R_PPC64_GOT_TLSGD16_HI:
16304 case R_PPC64_GOT_TPREL16_HI:
16305 case R_PPC64_GOT_DTPREL16_HI:
16306 case R_PPC64_GOT16_HI:
16307 case R_PPC64_TOC16_HI:
16308 /* These relocs would only be useful if building up an
16309 offset to later add to r2, perhaps in an indexed
16310 addressing mode instruction. Don't try to optimize.
16311 Unfortunately, the possibility of someone building up an
16312 offset like this or even with the HA relocs, means that
16313 we need to check the high insn when optimizing the low
16314 insn. */
16315 break;
16316
5663e321
AM
16317 case R_PPC64_PLTCALL_NOTOC:
16318 if (!unresolved_reloc)
16319 htab->notoc_plt = 1;
16320 /* Fall through. */
23cedd1d
AM
16321 case R_PPC64_PLTCALL:
16322 if (unresolved_reloc)
16323 {
16324 /* No plt entry. Make this into a direct call. */
16325 bfd_byte *p = contents + rel->r_offset;
16326 insn = bfd_get_32 (input_bfd, p);
16327 insn &= 1;
16328 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16329 if (r_type == R_PPC64_PLTCALL)
16330 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16331 unresolved_reloc = save_unresolved_reloc;
16332 r_type = R_PPC64_REL24;
16333 }
16334 break;
16335
5663e321 16336 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16337 case R_PPC64_PLTSEQ:
16338 if (unresolved_reloc)
16339 {
16340 unresolved_reloc = FALSE;
16341 goto nop_it;
16342 }
16343 break;
16344
5663e321
AM
16345 case R_PPC64_PLT_PCREL34_NOTOC:
16346 if (!unresolved_reloc)
16347 htab->notoc_plt = 1;
16348 /* Fall through. */
16349 case R_PPC64_PLT_PCREL34:
16350 if (unresolved_reloc)
16351 {
16352 bfd_byte *p = contents + rel->r_offset;
16353 bfd_put_32 (input_bfd, PNOP >> 32, p);
16354 bfd_put_32 (input_bfd, PNOP, p + 4);
16355 unresolved_reloc = FALSE;
16356 goto copy_reloc;
16357 }
16358 break;
16359
23cedd1d
AM
16360 case R_PPC64_PLT16_HA:
16361 if (unresolved_reloc)
16362 {
16363 unresolved_reloc = FALSE;
16364 goto nop_it;
16365 }
16366 /* Fall through. */
67f0cbdb
AM
16367 case R_PPC64_GOT_TLSLD16_HA:
16368 case R_PPC64_GOT_TLSGD16_HA:
16369 case R_PPC64_GOT_TPREL16_HA:
16370 case R_PPC64_GOT_DTPREL16_HA:
16371 case R_PPC64_GOT16_HA:
16372 case R_PPC64_TOC16_HA:
98528052 16373 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16374 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16375 {
23cedd1d
AM
16376 bfd_byte *p;
16377 nop_it:
16378 p = contents + (rel->r_offset & ~3);
98528052 16379 bfd_put_32 (input_bfd, NOP, p);
d830549d 16380 goto copy_reloc;
98528052 16381 }
67f0cbdb
AM
16382 break;
16383
23cedd1d
AM
16384 case R_PPC64_PLT16_LO:
16385 case R_PPC64_PLT16_LO_DS:
16386 if (unresolved_reloc)
16387 {
16388 unresolved_reloc = FALSE;
16389 goto nop_it;
16390 }
16391 /* Fall through. */
67f0cbdb
AM
16392 case R_PPC64_GOT_TLSLD16_LO:
16393 case R_PPC64_GOT_TLSGD16_LO:
16394 case R_PPC64_GOT_TPREL16_LO_DS:
16395 case R_PPC64_GOT_DTPREL16_LO_DS:
16396 case R_PPC64_GOT16_LO:
16397 case R_PPC64_GOT16_LO_DS:
16398 case R_PPC64_TOC16_LO:
16399 case R_PPC64_TOC16_LO_DS:
98528052 16400 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16401 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16402 {
16403 bfd_byte *p = contents + (rel->r_offset & ~3);
16404 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
16405 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
16406 {
16407 /* Transform addic to addi when we change reg. */
16408 insn &= ~((0x3f << 26) | (0x1f << 16));
16409 insn |= (14u << 26) | (2 << 16);
16410 }
16411 else
67f0cbdb 16412 {
98528052
AM
16413 insn &= ~(0x1f << 16);
16414 insn |= 2 << 16;
67f0cbdb 16415 }
560c8763 16416 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16417 }
16418 break;
9a23f96e
AM
16419
16420 case R_PPC64_TPREL16_HA:
16421 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16422 {
16423 bfd_byte *p = contents + (rel->r_offset & ~3);
16424 insn = bfd_get_32 (input_bfd, p);
16425 if ((insn & ((0x3f << 26) | 0x1f << 16))
16426 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16427 /* xgettext:c-format */
16428 info->callbacks->minfo
16429 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16430 input_bfd, input_section, rel->r_offset,
16431 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16432 else
d830549d
AM
16433 {
16434 bfd_put_32 (input_bfd, NOP, p);
16435 goto copy_reloc;
16436 }
9a23f96e
AM
16437 }
16438 break;
16439
16440 case R_PPC64_TPREL16_LO:
16441 case R_PPC64_TPREL16_LO_DS:
16442 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16443 {
16444 bfd_byte *p = contents + (rel->r_offset & ~3);
16445 insn = bfd_get_32 (input_bfd, p);
16446 insn &= ~(0x1f << 16);
16447 insn |= 13 << 16;
16448 bfd_put_32 (input_bfd, insn, p);
16449 }
16450 break;
67f0cbdb
AM
16451 }
16452
65f38f15
AM
16453 /* Do any further special processing. */
16454 switch (r_type)
16455 {
16456 default:
16457 break;
16458
25f23106 16459 case R_PPC64_REL16_HA:
4a969973
AM
16460 case R_PPC64_REL16_HIGHA:
16461 case R_PPC64_REL16_HIGHERA:
16462 case R_PPC64_REL16_HIGHESTA:
a680de9a 16463 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16464 case R_PPC64_ADDR16_HA:
16465 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16466 case R_PPC64_ADDR16_HIGHERA:
16467 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16468 case R_PPC64_TOC16_HA:
16469 case R_PPC64_SECTOFF_HA:
411e1bfb 16470 case R_PPC64_TPREL16_HA:
f9c6b907 16471 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16472 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16473 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16474 case R_PPC64_DTPREL16_HA:
16475 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16476 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16477 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16478 /* It's just possible that this symbol is a weak symbol
16479 that's not actually defined anywhere. In that case,
16480 'sec' would be NULL, and we should leave the symbol
16481 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16482 if (sec == NULL)
16483 break;
1a0670f3 16484 /* Fall through. */
5c5f6e17
AM
16485
16486 case R_PPC64_GOT16_HA:
16487 case R_PPC64_PLTGOT16_HA:
16488 case R_PPC64_PLT16_HA:
16489 case R_PPC64_GOT_TLSGD16_HA:
16490 case R_PPC64_GOT_TLSLD16_HA:
16491 case R_PPC64_GOT_TPREL16_HA:
16492 case R_PPC64_GOT_DTPREL16_HA:
16493 /* Add 0x10000 if sign bit in 0:15 is set.
16494 Bits 0:15 are not used. */
16495 addend += 0x8000;
65f38f15
AM
16496 break;
16497
5663e321
AM
16498 case R_PPC64_D34_HA30:
16499 case R_PPC64_ADDR16_HIGHERA34:
16500 case R_PPC64_ADDR16_HIGHESTA34:
16501 case R_PPC64_REL16_HIGHERA34:
16502 case R_PPC64_REL16_HIGHESTA34:
16503 if (sec != NULL)
16504 addend += 1ULL << 33;
16505 break;
16506
65f38f15
AM
16507 case R_PPC64_ADDR16_DS:
16508 case R_PPC64_ADDR16_LO_DS:
16509 case R_PPC64_GOT16_DS:
16510 case R_PPC64_GOT16_LO_DS:
16511 case R_PPC64_PLT16_LO_DS:
16512 case R_PPC64_SECTOFF_DS:
16513 case R_PPC64_SECTOFF_LO_DS:
16514 case R_PPC64_TOC16_DS:
16515 case R_PPC64_TOC16_LO_DS:
16516 case R_PPC64_PLTGOT16_DS:
16517 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16518 case R_PPC64_GOT_TPREL16_DS:
16519 case R_PPC64_GOT_TPREL16_LO_DS:
16520 case R_PPC64_GOT_DTPREL16_DS:
16521 case R_PPC64_GOT_DTPREL16_LO_DS:
16522 case R_PPC64_TPREL16_DS:
16523 case R_PPC64_TPREL16_LO_DS:
16524 case R_PPC64_DTPREL16_DS:
16525 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16526 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16527 mask = 3;
a680de9a
PB
16528 /* If this reloc is against an lq, lxv, or stxv insn, then
16529 the value must be a multiple of 16. This is somewhat of
16530 a hack, but the "correct" way to do this by defining _DQ
16531 forms of all the _DS relocs bloats all reloc switches in
16532 this file. It doesn't make much sense to use these
16533 relocs in data, so testing the insn should be safe. */
16534 if ((insn & (0x3f << 26)) == (56u << 26)
16535 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16536 mask = 15;
a680de9a
PB
16537 relocation += addend;
16538 addend = insn & (mask ^ 3);
16539 if ((relocation & mask) != 0)
65f38f15 16540 {
a680de9a 16541 relocation ^= relocation & mask;
25f53a85 16542 info->callbacks->einfo
695344c0 16543 /* xgettext:c-format */
174d0a74 16544 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16545 input_bfd, input_section, rel->r_offset,
d830549d 16546 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16547 mask + 1);
65f38f15 16548 bfd_set_error (bfd_error_bad_value);
b34976b6 16549 ret = FALSE;
c316a17c 16550 goto copy_reloc;
65f38f15
AM
16551 }
16552 break;
5bd4f169
AM
16553 }
16554
239e1f3a
AM
16555 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16556 because such sections are not SEC_ALLOC and thus ld.so will
16557 not process them. */
d830549d 16558 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16559 if (unresolved_reloc
239e1f3a 16560 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16561 && h->elf.def_dynamic)
16562 && _bfd_elf_section_offset (output_bfd, info, input_section,
16563 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16564 {
25f53a85 16565 info->callbacks->einfo
695344c0 16566 /* xgettext:c-format */
c1c8c1ef 16567 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16568 input_bfd, input_section, rel->r_offset,
b80eed39 16569 howto->name,
039b3fef 16570 h->elf.root.root.string);
b34976b6 16571 ret = FALSE;
9c07fe7c 16572 }
5bd4f169 16573
b80eed39
AM
16574 /* 16-bit fields in insns mostly have signed values, but a
16575 few insns have 16-bit unsigned values. Really, we should
16576 have different reloc types. */
16577 if (howto->complain_on_overflow != complain_overflow_dont
16578 && howto->dst_mask == 0xffff
16579 && (input_section->flags & SEC_CODE) != 0)
16580 {
16581 enum complain_overflow complain = complain_overflow_signed;
16582
16583 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
16584 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
16585 complain = complain_overflow_bitfield;
16586 else if (howto->rightshift == 0
16587 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
16588 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
16589 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
16590 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
16591 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
16592 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
16593 complain = complain_overflow_unsigned;
16594 if (howto->complain_on_overflow != complain)
16595 {
16596 alt_howto = *howto;
16597 alt_howto.complain_on_overflow = complain;
16598 howto = &alt_howto;
16599 }
16600 }
16601
5663e321 16602 switch (r_type)
a680de9a 16603 {
5663e321
AM
16604 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16605 case R_PPC64_D34:
16606 case R_PPC64_D34_LO:
16607 case R_PPC64_D34_HI30:
16608 case R_PPC64_D34_HA30:
16609 case R_PPC64_PCREL34:
16610 case R_PPC64_GOT_PCREL34:
c213164a
AM
16611 case R_PPC64_TPREL34:
16612 case R_PPC64_DTPREL34:
16613 case R_PPC64_GOT_TLSGD34:
16614 case R_PPC64_GOT_TLSLD34:
16615 case R_PPC64_GOT_TPREL34:
16616 case R_PPC64_GOT_DTPREL34:
5663e321
AM
16617 case R_PPC64_PLT_PCREL34:
16618 case R_PPC64_PLT_PCREL34_NOTOC:
16619 case R_PPC64_D28:
16620 case R_PPC64_PCREL28:
16621 if (rel->r_offset + 8 > input_section->size)
16622 r = bfd_reloc_outofrange;
16623 else
16624 {
5663e321
AM
16625 relocation += addend;
16626 if (howto->pc_relative)
16627 relocation -= (rel->r_offset
16628 + input_section->output_offset
16629 + input_section->output_section->vma);
16630 relocation >>= howto->rightshift;
16631
16632 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16633 pinsn <<= 32;
16634 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16635
16636 pinsn &= ~howto->dst_mask;
16637 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16638 & howto->dst_mask);
16639 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16640 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16641 r = bfd_reloc_ok;
16642 if (howto->complain_on_overflow == complain_overflow_signed
16643 && (relocation + (1ULL << (howto->bitsize - 1))
16644 >= 1ULL << howto->bitsize))
16645 r = bfd_reloc_overflow;
16646 }
16647 break;
16648
16649 case R_PPC64_REL16DX_HA:
a680de9a
PB
16650 if (rel->r_offset + 4 > input_section->size)
16651 r = bfd_reloc_outofrange;
16652 else
16653 {
16654 relocation += addend;
16655 relocation -= (rel->r_offset
16656 + input_section->output_offset
16657 + input_section->output_section->vma);
3de43e7b 16658 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
16659 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16660 insn &= ~0x1fffc1;
3de43e7b 16661 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
16662 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16663 r = bfd_reloc_ok;
3de43e7b 16664 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
16665 r = bfd_reloc_overflow;
16666 }
5663e321
AM
16667 break;
16668
16669 default:
16670 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16671 contents, rel->r_offset,
16672 relocation, addend);
a680de9a 16673 }
5bd4f169 16674
ef60b7ff 16675 if (r != bfd_reloc_ok)
5bd4f169 16676 {
bc30df16 16677 char *more_info = NULL;
b80eed39 16678 const char *reloc_name = howto->name;
bc30df16
AM
16679
16680 if (reloc_dest != DEST_NORMAL)
16681 {
16682 more_info = bfd_malloc (strlen (reloc_name) + 8);
16683 if (more_info != NULL)
16684 {
16685 strcpy (more_info, reloc_name);
16686 strcat (more_info, (reloc_dest == DEST_OPD
16687 ? " (OPD)" : " (stub)"));
16688 reloc_name = more_info;
16689 }
16690 }
16691
cd27b276 16692 if (r == bfd_reloc_overflow)
5bd4f169 16693 {
8131c122
AM
16694 /* On code like "if (foo) foo();" don't report overflow
16695 on a branch to zero when foo is undefined. */
16696 if (!warned
16697 && (reloc_dest == DEST_STUB
16698 || !(h != NULL
16699 && (h->elf.root.type == bfd_link_hash_undefweak
16700 || h->elf.root.type == bfd_link_hash_undefined)
16701 && is_branch_reloc (r_type))))
1a72702b
AM
16702 info->callbacks->reloc_overflow (info, &h->elf.root,
16703 sym_name, reloc_name,
16704 orig_rel.r_addend,
16705 input_bfd, input_section,
16706 rel->r_offset);
ef60b7ff
AM
16707 }
16708 else
16709 {
25f53a85 16710 info->callbacks->einfo
695344c0 16711 /* xgettext:c-format */
c1c8c1ef 16712 (_("%H: %s against `%pT': error %d\n"),
25f53a85 16713 input_bfd, input_section, rel->r_offset,
bc30df16 16714 reloc_name, sym_name, (int) r);
b34976b6 16715 ret = FALSE;
ef60b7ff 16716 }
bc30df16
AM
16717 if (more_info != NULL)
16718 free (more_info);
5bd4f169 16719 }
c316a17c
AM
16720 copy_reloc:
16721 if (wrel != rel)
16722 *wrel = *rel;
16723 }
16724
16725 if (wrel != rel)
16726 {
16727 Elf_Internal_Shdr *rel_hdr;
16728 size_t deleted = rel - wrel;
16729
16730 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16731 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16732 if (rel_hdr->sh_size == 0)
16733 {
16734 /* It is too late to remove an empty reloc section. Leave
16735 one NONE reloc.
16736 ??? What is wrong with an empty section??? */
16737 rel_hdr->sh_size = rel_hdr->sh_entsize;
16738 deleted -= 1;
16739 }
16740 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16741 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16742 input_section->reloc_count -= deleted;
5bd4f169
AM
16743 }
16744
645ea6a9
AM
16745 /* If we're emitting relocations, then shortly after this function
16746 returns, reloc offsets and addends for this section will be
16747 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
16748 file rather than the input. Save a copy of the relocs for
16749 opd_entry_value. */
0e1862bb 16750 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16751 {
16752 bfd_size_type amt;
16753 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16754 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16755 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16756 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16757 if (rel == NULL)
16758 return FALSE;
16759 memcpy (rel, relocs, amt);
16760 }
5bd4f169
AM
16761 return ret;
16762}
16763
754021d0
AM
16764/* Adjust the value of any local symbols in opd sections. */
16765
6e0b88f1 16766static int
754021d0
AM
16767ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16768 const char *name ATTRIBUTE_UNUSED,
16769 Elf_Internal_Sym *elfsym,
16770 asection *input_sec,
16771 struct elf_link_hash_entry *h)
16772{
74f0fb50
AM
16773 struct _opd_sec_data *opd;
16774 long adjust;
754021d0
AM
16775 bfd_vma value;
16776
4025353c 16777 if (h != NULL)
6e0b88f1 16778 return 1;
4025353c 16779
74f0fb50
AM
16780 opd = get_opd_info (input_sec);
16781 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16782 return 1;
754021d0
AM
16783
16784 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16785 if (!bfd_link_relocatable (info))
754021d0
AM
16786 value -= input_sec->output_section->vma;
16787
51aecdc5 16788 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16789 if (adjust == -1)
6e0b88f1
AM
16790 return 2;
16791
16792 elfsym->st_value += adjust;
16793 return 1;
754021d0
AM
16794}
16795
5bd4f169
AM
16796/* Finish up dynamic symbol handling. We set the contents of various
16797 dynamic sections here. */
16798
b34976b6 16799static bfd_boolean
4ce794b7
AM
16800ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16801 struct bfd_link_info *info,
16802 struct elf_link_hash_entry *h,
4aef7643 16803 Elf_Internal_Sym *sym)
5bd4f169 16804{
65f38f15 16805 struct ppc_link_hash_table *htab;
8387904d 16806 struct plt_entry *ent;
5bd4f169 16807
65f38f15 16808 htab = ppc_hash_table (info);
4dfe6ac6
NC
16809 if (htab == NULL)
16810 return FALSE;
5bd4f169 16811
49c09209
AM
16812 if (!htab->opd_abi && !h->def_regular)
16813 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16814 if (ent->plt.offset != (bfd_vma) -1)
16815 {
16816 /* Mark the symbol as undefined, rather than as
16817 defined in glink. Leave the value if there were
16818 any relocations where pointer equality matters
16819 (this is a clue for the dynamic linker, to make
16820 function pointer comparisons work between an
16821 application and shared library), otherwise set it
16822 to zero. */
16823 sym->st_shndx = SHN_UNDEF;
16824 if (!h->pointer_equality_needed)
16825 sym->st_value = 0;
16826 else if (!h->ref_regular_nonweak)
16827 {
16828 /* This breaks function pointer comparisons, but
16829 that is better than breaking tests for a NULL
16830 function pointer. */
16831 sym->st_value = 0;
16832 }
16833 break;
16834 }
5bd4f169 16835
1bdd8fac
AM
16836 if (h->needs_copy
16837 && (h->root.type == bfd_link_hash_defined
16838 || h->root.type == bfd_link_hash_defweak)
16839 && (h->root.u.def.section == htab->elf.sdynbss
16840 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 16841 {
65f38f15 16842 /* This symbol needs a copy reloc. Set it up. */
49c09209 16843 Elf_Internal_Rela rela;
5474d94f 16844 asection *srel;
49c09209 16845 bfd_byte *loc;
5bd4f169 16846
1bdd8fac 16847 if (h->dynindx == -1)
65f38f15 16848 abort ();
5bd4f169
AM
16849
16850 rela.r_offset = (h->root.u.def.value
16851 + h->root.u.def.section->output_section->vma
16852 + h->root.u.def.section->output_offset);
16853 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16854 rela.r_addend = 0;
afbf7e8e 16855 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16856 srel = htab->elf.sreldynrelro;
16857 else
16858 srel = htab->elf.srelbss;
16859 loc = srel->contents;
16860 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16861 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16862 }
16863
b34976b6 16864 return TRUE;
5bd4f169
AM
16865}
16866
65f38f15
AM
16867/* Used to decide how to sort relocs in an optimal manner for the
16868 dynamic linker, before writing them out. */
16869
16870static enum elf_reloc_type_class
7e612e98
AM
16871ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16872 const asection *rel_sec,
16873 const Elf_Internal_Rela *rela)
65f38f15 16874{
04c9666a 16875 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16876 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16877
33e44f2e 16878 if (rel_sec == htab->elf.irelplt)
7e612e98 16879 return reloc_class_ifunc;
a33d1f77 16880
4ce794b7 16881 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16882 switch (r_type)
65f38f15
AM
16883 {
16884 case R_PPC64_RELATIVE:
16885 return reloc_class_relative;
16886 case R_PPC64_JMP_SLOT:
16887 return reloc_class_plt;
16888 case R_PPC64_COPY:
16889 return reloc_class_copy;
16890 default:
16891 return reloc_class_normal;
16892 }
16893}
16894
5bd4f169
AM
16895/* Finish up the dynamic sections. */
16896
b34976b6 16897static bfd_boolean
4ce794b7
AM
16898ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16899 struct bfd_link_info *info)
5bd4f169 16900{
65f38f15
AM
16901 struct ppc_link_hash_table *htab;
16902 bfd *dynobj;
5bd4f169 16903 asection *sdyn;
5bd4f169 16904
65f38f15 16905 htab = ppc_hash_table (info);
4dfe6ac6
NC
16906 if (htab == NULL)
16907 return FALSE;
16908
65f38f15 16909 dynobj = htab->elf.dynobj;
3d4d4302 16910 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16911
65f38f15 16912 if (htab->elf.dynamic_sections_created)
5bd4f169 16913 {
5bd4f169
AM
16914 Elf64_External_Dyn *dyncon, *dynconend;
16915
33e44f2e 16916 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16917 abort ();
5bd4f169
AM
16918
16919 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16920 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16921 for (; dyncon < dynconend; dyncon++)
16922 {
16923 Elf_Internal_Dyn dyn;
19397422 16924 asection *s;
5bd4f169
AM
16925
16926 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16927
16928 switch (dyn.d_tag)
16929 {
65f38f15
AM
16930 default:
16931 continue;
5bd4f169 16932
5d1634d7 16933 case DT_PPC64_GLINK:
4ce794b7 16934 s = htab->glink;
6348e046 16935 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16936 /* We stupidly defined DT_PPC64_GLINK to be the start
16937 of glink rather than the first entry point, which is
16938 what ld.so needs, and now have a bigger stub to
16939 support automatic multiple TOCs. */
9e390558 16940 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16941 break;
16942
19397422
AM
16943 case DT_PPC64_OPD:
16944 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16945 if (s == NULL)
16946 continue;
16947 dyn.d_un.d_ptr = s->vma;
19397422
AM
16948 break;
16949
e8910a83 16950 case DT_PPC64_OPT:
5663e321
AM
16951 if ((htab->do_multi_toc && htab->multi_toc_needed)
16952 || htab->notoc_plt)
e8910a83 16953 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16954 if (htab->has_plt_localentry0)
16955 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16956 break;
16957
19397422
AM
16958 case DT_PPC64_OPDSZ:
16959 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16960 if (s == NULL)
16961 continue;
eea6121a 16962 dyn.d_un.d_val = s->size;
19397422
AM
16963 break;
16964
65f38f15 16965 case DT_PLTGOT:
33e44f2e 16966 s = htab->elf.splt;
6348e046 16967 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16968 break;
16969
16970 case DT_JMPREL:
33e44f2e 16971 s = htab->elf.srelplt;
6348e046 16972 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16973 break;
5bd4f169 16974
65f38f15 16975 case DT_PLTRELSZ:
33e44f2e 16976 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16977 break;
82e66161
AM
16978
16979 case DT_TEXTREL:
16980 if (htab->local_ifunc_resolver)
16981 info->callbacks->einfo
16982 (_("%X%P: text relocations and GNU indirect "
16983 "functions will result in a segfault at runtime\n"));
16984 else if (htab->maybe_local_ifunc_resolver)
16985 info->callbacks->einfo
16986 (_("%P: warning: text relocations and GNU indirect "
16987 "functions may result in a segfault at runtime\n"));
16988 continue;
5bd4f169 16989 }
5bd4f169 16990
65f38f15 16991 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 16992 }
5bd4f169
AM
16993 }
16994
6528b6eb
AM
16995 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
16996 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
16997 {
16998 /* Fill in the first entry in the global offset table.
16999 We use it to hold the link-time TOCbase. */
17000 bfd_put_64 (output_bfd,
60ee0d4a 17001 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17002 htab->elf.sgot->contents);
5d1634d7
AM
17003
17004 /* Set .got entry size. */
2cdcc330
AM
17005 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17006 = 8;
5d1634d7
AM
17007 }
17008
6528b6eb
AM
17009 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17010 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17011 {
17012 /* Set .plt entry size. */
33e44f2e 17013 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17014 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17015 }
17016
84f5d08e
AM
17017 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17018 brlt ourselves if emitrelocations. */
17019 if (htab->brlt != NULL
17020 && htab->brlt->reloc_count != 0
17021 && !_bfd_elf_link_output_relocs (output_bfd,
17022 htab->brlt,
d4730f92 17023 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17024 elf_section_data (htab->brlt)->relocs,
17025 NULL))
17026 return FALSE;
17027
176a0d42
AM
17028 if (htab->glink != NULL
17029 && htab->glink->reloc_count != 0
17030 && !_bfd_elf_link_output_relocs (output_bfd,
17031 htab->glink,
d4730f92 17032 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17033 elf_section_data (htab->glink)->relocs,
17034 NULL))
17035 return FALSE;
17036
da44f4e5 17037
df136d64
AM
17038 if (htab->glink_eh_frame != NULL
17039 && htab->glink_eh_frame->size != 0
17040 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17041 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17042 htab->glink_eh_frame,
17043 htab->glink_eh_frame->contents))
17044 return FALSE;
58d180e8 17045
e717da7e 17046 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17047 since we didn't add them to DYNOBJ. We know dynobj is the first
17048 bfd. */
c72f2fb2 17049 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17050 {
17051 asection *s;
7b53ace3 17052
0c8d6e5c 17053 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17054 continue;
17055
e717da7e
AM
17056 s = ppc64_elf_tdata (dynobj)->got;
17057 if (s != NULL
eea6121a 17058 && s->size != 0
e717da7e
AM
17059 && s->output_section != bfd_abs_section_ptr
17060 && !bfd_set_section_contents (output_bfd, s->output_section,
17061 s->contents, s->output_offset,
eea6121a 17062 s->size))
e717da7e
AM
17063 return FALSE;
17064 s = ppc64_elf_tdata (dynobj)->relgot;
17065 if (s != NULL
eea6121a 17066 && s->size != 0
e717da7e
AM
17067 && s->output_section != bfd_abs_section_ptr
17068 && !bfd_set_section_contents (output_bfd, s->output_section,
17069 s->contents, s->output_offset,
eea6121a 17070 s->size))
e717da7e
AM
17071 return FALSE;
17072 }
f6c52c13 17073
b34976b6 17074 return TRUE;
5bd4f169
AM
17075}
17076
5bd4f169 17077#include "elf64-target.h"
7b8e7dad
AM
17078
17079/* FreeBSD support */
17080
17081#undef TARGET_LITTLE_SYM
17082#undef TARGET_LITTLE_NAME
17083
17084#undef TARGET_BIG_SYM
6d00b590 17085#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17086#undef TARGET_BIG_NAME
17087#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17088
17089#undef ELF_OSABI
17090#define ELF_OSABI ELFOSABI_FREEBSD
17091
17092#undef elf64_bed
17093#define elf64_bed elf64_powerpc_fbsd_bed
17094
17095#include "elf64-target.h"
This page took 2.751959 seconds and 4 git commands to generate.