[PR ld/22263][PR ld/25056] arm: Avoid dynamic TLS relocs in PIE
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
82704155 2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
54static bfd_reloc_status_type ppc64_elf_prefix_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 56static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 57 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 58static bfd_vma opd_entry_value
aef36ac1 59 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 60
6d00b590 61#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 62#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 63#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
64#define TARGET_BIG_NAME "elf64-powerpc"
65#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 66#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
67#define ELF_MACHINE_CODE EM_PPC64
68#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
69#define ELF_COMMONPAGESIZE 0x1000
70#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
71#define elf_info_to_howto ppc64_elf_info_to_howto
72
73#define elf_backend_want_got_sym 0
74#define elf_backend_want_plt_sym 0
75#define elf_backend_plt_alignment 3
76#define elf_backend_plt_not_loaded 1
ad8e1ba5 77#define elf_backend_got_header_size 8
5474d94f 78#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
79#define elf_backend_can_gc_sections 1
80#define elf_backend_can_refcount 1
81#define elf_backend_rela_normal 1
64f52338 82#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 83#define elf_backend_default_execstack 0
ad8e1ba5 84
e717da7e 85#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 86#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 87#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
88#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
89#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
90#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
91#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 92#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 93#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 94#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
95
96#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
97#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
98#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 99#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 100#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 101#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 102#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 103#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 104#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 105#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 106#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 107#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 108#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 109#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 110#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
111#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
112#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 113#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
114#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
115#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 116#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 117#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 118#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
119#define elf_backend_relocate_section ppc64_elf_relocate_section
120#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
121#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
122#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 123#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 124#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 125#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 126#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 127#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 128
5bd4f169
AM
129/* The name of the dynamic interpreter. This is put in the .interp
130 section. */
131#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
132
133/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 134#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 135#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
136
137/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 138#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 139
a078d95a
AM
140/* Offsets to some stack save slots. */
141#define STK_LR 16
142#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 143/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
144 CR save slot. Used only by optimised __tls_get_addr call stub,
145 relying on __tls_get_addr_opt not saving CR.. */
146#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
147
5bd4f169 148/* TOC base pointers offset from start of TOC. */
411e1bfb 149#define TOC_BASE_OFF 0x8000
a27e685f
AM
150/* TOC base alignment. */
151#define TOC_BASE_ALIGN 256
411e1bfb
AM
152
153/* Offset of tp and dtp pointers from start of TLS block. */
154#define TP_OFFSET 0x7000
155#define DTP_OFFSET 0x8000
5bd4f169 156
ad8e1ba5
AM
157/* .plt call stub instructions. The normal stub is like this, but
158 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 159 insert an addi to adjust r11. */
a078d95a 160#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
161#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
162#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
163#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
164#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
165#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
166#define BCTR 0x4e800420 /* bctr */
167
07d6d2b8 168#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
169#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
170#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
171#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
172#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
173
174#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
175#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
176#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
177#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
178#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
179#define BNECTR 0x4ca20420 /* bnectr+ */
180#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 181
71a39c98 182#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 183#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 184#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 185
07d6d2b8
AM
186#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
187#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
188#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 189
04bdff6a 190#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 191#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 192#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 193#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
194#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
195#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 196#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 197#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 198#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 199#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 200#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 201#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 202#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
203#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
204#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
205#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
206#define PADDI_R12_PC 0x0610000039800000ULL
207#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 208#define PNOP 0x0700000000000000ULL
a345bc8d 209
9e390558
AM
210/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
211#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 212 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
213 /* 0: */
214 /* .quad plt0-1f */
215 /* __glink: */
216#define MFLR_R12 0x7d8802a6 /* mflr %12 */
217#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
218 /* 1: */
219#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 220 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 221#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
222#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
223 /* ld %12,0(%11) */
224 /* ld %2,8(%11) */
225 /* mtctr %12 */
226 /* ld %11,16(%11) */
ee4bf8d2 227 /* bctr */
b9e5796b
AM
228#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
229#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
230#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
231#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
232#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
233
234/* Pad with this. */
235#define NOP 0x60000000
236
721956f4
AM
237/* Some other nops. */
238#define CROR_151515 0x4def7b82
239#define CROR_313131 0x4ffffb82
240
cedb70c5 241/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
242#define LI_R0_0 0x38000000 /* li %r0,0 */
243#define B_DOT 0x48000000 /* b . */
244
245/* After that, we need two instructions to load the index, followed by
246 a branch. */
247#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 248#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 249
deb0e272
AM
250/* Instructions used by the save and restore reg functions. */
251#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
252#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
253#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
254#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
255#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
256#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
257#define LI_R12_0 0x39800000 /* li %r12,0 */
258#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
259#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
260#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
261#define BLR 0x4e800020 /* blr */
262
41bd81ab
AM
263/* Since .opd is an array of descriptors and each entry will end up
264 with identical R_PPC64_RELATIVE relocs, there is really no need to
265 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 266 relocate .opd without reloc entries. */
41bd81ab
AM
267#ifndef NO_OPD_RELOCS
268#define NO_OPD_RELOCS 0
269#endif
810d4e75 270
a4b6fadd
AM
271#ifndef ARRAY_SIZE
272#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
273#endif
274
810d4e75
AM
275static inline int
276abiversion (bfd *abfd)
277{
278 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
279}
280
281static inline void
282set_abiversion (bfd *abfd, int ver)
283{
284 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
285 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
286}
5bd4f169
AM
287\f
288/* Relocation HOWTO's. */
46807bf4
AM
289/* Like other ELF RELA targets that don't apply multiple
290 field-altering relocations to the same localation, src_mask is
291 always zero and pcrel_offset is the same as pc_relative.
292 PowerPC can always use a zero bitpos, even when the field is not at
293 the LSB. For example, a REL24 could use rightshift=2, bisize=24
294 and bitpos=2 which matches the ABI description, or as we do here,
295 rightshift=0, bitsize=26 and bitpos=0. */
296#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
297 complain, special_func) \
298 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
299 complain_overflow_ ## complain, special_func, \
300 #type, FALSE, 0, mask, pc_relative)
301
04c9666a 302static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 303
f3185997
NC
304static reloc_howto_type ppc64_elf_howto_raw[] =
305{
5bd4f169 306 /* This reloc does nothing. */
46807bf4
AM
307 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 32 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* An absolute 26 bit branch; the lower two bits must be zero.
315 FIXME: we don't check that, we just clear them. */
46807bf4
AM
316 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
317 bfd_elf_generic_reloc),
5bd4f169
AM
318
319 /* A standard 16 bit relocation. */
46807bf4
AM
320 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A 16 bit relocation without overflow. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* Bits 16-31 of an address. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
332 bits, treated as a signed number, is negative. */
46807bf4
AM
333 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
334 ppc64_elf_ha_reloc),
5bd4f169
AM
335
336 /* An absolute 16 bit branch; the lower two bits must be zero.
337 FIXME: we don't check that, we just clear them. */
46807bf4
AM
338 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
339 ppc64_elf_branch_reloc),
5bd4f169
AM
340
341 /* An absolute 16 bit branch, for which bit 10 should be set to
342 indicate that the branch is expected to be taken. The lower two
343 bits must be zero. */
46807bf4
AM
344 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
345 ppc64_elf_brtaken_reloc),
5bd4f169
AM
346
347 /* An absolute 16 bit branch, for which bit 10 should be set to
348 indicate that the branch is not expected to be taken. The lower
349 two bits must be zero. */
46807bf4
AM
350 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
351 ppc64_elf_brtaken_reloc),
5bd4f169
AM
352
353 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
355 ppc64_elf_branch_reloc),
5bd4f169 356
05d0e962 357 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
358 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
05d0e962 360
5bd4f169 361 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
362 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
5bd4f169
AM
364
365 /* A relative 16 bit branch. Bit 10 should be set to indicate that
366 the branch is expected to be taken. The lower two bits must be
367 zero. */
46807bf4
AM
368 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
369 ppc64_elf_brtaken_reloc),
5bd4f169
AM
370
371 /* A relative 16 bit branch. Bit 10 should be set to indicate that
372 the branch is not expected to be taken. The lower two bits must
373 be zero. */
46807bf4
AM
374 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
375 ppc64_elf_brtaken_reloc),
5bd4f169
AM
376
377 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
378 symbol. */
46807bf4
AM
379 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
380 ppc64_elf_unhandled_reloc),
5bd4f169
AM
381
382 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
383 the symbol. */
46807bf4
AM
384 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
385 ppc64_elf_unhandled_reloc),
5bd4f169
AM
386
387 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
388 the symbol. */
46807bf4
AM
389 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
390 ppc64_elf_unhandled_reloc),
5bd4f169
AM
391
392 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
393 the symbol. */
46807bf4
AM
394 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
395 ppc64_elf_unhandled_reloc),
5bd4f169
AM
396
397 /* This is used only by the dynamic linker. The symbol should exist
398 both in the object being run and in some shared library. The
399 dynamic linker copies the data addressed by the symbol from the
400 shared library into the object, because the object being
401 run has to have the data at some particular address. */
46807bf4
AM
402 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
403 ppc64_elf_unhandled_reloc),
5bd4f169
AM
404
405 /* Like R_PPC64_ADDR64, but used when setting global offset table
406 entries. */
46807bf4
AM
407 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
408 ppc64_elf_unhandled_reloc),
5bd4f169
AM
409
410 /* Created by the link editor. Marks a procedure linkage table
411 entry for a symbol. */
46807bf4
AM
412 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
413 ppc64_elf_unhandled_reloc),
5bd4f169
AM
414
415 /* Used only by the dynamic linker. When the object is run, this
416 doubleword64 is set to the load address of the object, plus the
417 addend. */
46807bf4
AM
418 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
419 bfd_elf_generic_reloc),
5bd4f169
AM
420
421 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
422 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* 32-bit PC relative. */
46807bf4
AM
430 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 bfd_elf_generic_reloc),
5bd4f169 432
10ed1bba 433 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
434 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
435 ppc64_elf_unhandled_reloc),
5bd4f169
AM
436
437 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
438 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
439 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
440 ppc64_elf_unhandled_reloc),
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
443 the symbol. */
46807bf4
AM
444 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
445 ppc64_elf_unhandled_reloc),
5bd4f169
AM
446
447 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
448 the symbol. */
46807bf4
AM
449 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
450 ppc64_elf_unhandled_reloc),
5bd4f169
AM
451
452 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
453 the symbol. */
46807bf4
AM
454 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
455 ppc64_elf_unhandled_reloc),
5bd4f169 456
c061c2d8 457 /* 16-bit section relative relocation. */
46807bf4
AM
458 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
459 ppc64_elf_sectoff_reloc),
5bd4f169 460
c061c2d8 461 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
463 ppc64_elf_sectoff_reloc),
5bd4f169
AM
464
465 /* 16-bit upper half section relative relocation. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_ha_reloc),
5bd4f169 472
04c9666a 473 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
474 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
475 bfd_elf_generic_reloc),
5bd4f169
AM
476
477 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
478
479 /* A standard 64-bit relocation. */
46807bf4
AM
480 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
481 bfd_elf_generic_reloc),
5bd4f169
AM
482
483 /* The bits 32-47 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* The bits 48-63 of an address. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address, plus 1 if the contents of the low
497 16 bits, treated as a signed number, is negative. */
46807bf4
AM
498 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
499 ppc64_elf_ha_reloc),
5bd4f169
AM
500
501 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
502 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
503 bfd_elf_generic_reloc),
5bd4f169
AM
504
505 /* 64-bit relative relocation. */
46807bf4
AM
506 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
507 bfd_elf_generic_reloc),
5bd4f169 508
cedb70c5 509 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
510 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
511 ppc64_elf_unhandled_reloc),
5bd4f169
AM
512
513 /* 64-bit PC relative relocation to the symbol's procedure linkage
514 table. */
515 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
516 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
517 ppc64_elf_unhandled_reloc),
5bd4f169
AM
518
519 /* 16 bit TOC-relative relocation. */
5bd4f169 520 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
521 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
522 ppc64_elf_toc_reloc),
5bd4f169
AM
523
524 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 525 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
526 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
527 ppc64_elf_toc_reloc),
5bd4f169
AM
528
529 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 530 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
531 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
532 ppc64_elf_toc_reloc),
5bd4f169
AM
533
534 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
535 contents of the low 16 bits, treated as a signed number, is
536 negative. */
5bd4f169 537 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
538 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
539 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
540
541 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 542 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
543 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
544 ppc64_elf_toc64_reloc),
5bd4f169
AM
545
546 /* Like R_PPC64_GOT16, but also informs the link editor that the
547 value to relocate may (!) refer to a PLT entry which the link
548 editor (a) may replace with the symbol value. If the link editor
549 is unable to fully resolve the symbol, it may (b) create a PLT
550 entry and store the address to the new PLT entry in the GOT.
551 This permits lazy resolution of function symbols at run time.
552 The link editor may also skip all of this and just (c) emit a
553 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
554 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
555 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
556 ppc64_elf_unhandled_reloc),
411e1bfb
AM
557
558 /* Like R_PPC64_PLTGOT16, but without overflow. */
559 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
560 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
561 ppc64_elf_unhandled_reloc),
411e1bfb
AM
562
563 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
564 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
565 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
566 ppc64_elf_unhandled_reloc),
411e1bfb
AM
567
568 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
569 1 if the contents of the low 16 bits, treated as a signed number,
570 is negative. */
571 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
572 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
573 ppc64_elf_unhandled_reloc),
411e1bfb
AM
574
575 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
576 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
577 bfd_elf_generic_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
585 ppc64_elf_unhandled_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
597 ppc64_elf_sectoff_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_toc_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
612 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
613 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
614 ppc64_elf_unhandled_reloc),
411e1bfb
AM
615
616 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
617 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
618 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
619 ppc64_elf_unhandled_reloc),
411e1bfb 620
727fc41e 621 /* Marker relocs for TLS. */
46807bf4
AM
622 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
623 bfd_elf_generic_reloc),
624
625 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
727fc41e 630
23cedd1d
AM
631 /* Marker reloc for optimizing r2 save in prologue rather than on
632 each plt call stub. */
46807bf4
AM
633 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
634 bfd_elf_generic_reloc),
3b421ab3 635
23cedd1d 636 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
637 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
23cedd1d 642
411e1bfb
AM
643 /* Computes the load module index of the load module that contains the
644 definition of its TLS sym. */
46807bf4
AM
645 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
646 ppc64_elf_unhandled_reloc),
411e1bfb
AM
647
648 /* Computes a dtv-relative displacement, the difference between the value
649 of sym+add and the base address of the thread-local storage block that
650 contains the definition of sym, minus 0x8000. */
46807bf4
AM
651 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
652 ppc64_elf_unhandled_reloc),
411e1bfb
AM
653
654 /* A 16 bit dtprel reloc. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* Like DTPREL16, but no overflow. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Computes a tp-relative displacement, the difference between the value of
695 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
696 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
697 ppc64_elf_unhandled_reloc),
411e1bfb
AM
698
699 /* A 16 bit tprel reloc. */
46807bf4
AM
700 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* Like TPREL16, but no overflow. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
740 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
741 to the first entry relative to the TOC base (r2). */
46807bf4
AM
742 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
743 ppc64_elf_unhandled_reloc),
5bd4f169 744
411e1bfb 745 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb
AM
757 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
758 with values (sym+add)@dtpmod and zero, and computes the offset to the
759 first entry relative to the TOC base (r2). */
46807bf4
AM
760 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
761 ppc64_elf_unhandled_reloc),
5bd4f169 762
411e1bfb 763 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb
AM
775 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
776 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
777 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
778 ppc64_elf_unhandled_reloc),
5bd4f169 779
411e1bfb 780 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
411e1bfb
AM
791
792 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
793 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
794 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
795 ppc64_elf_unhandled_reloc),
5bd4f169 796
411e1bfb 797 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
813 bfd_elf_generic_reloc),
e054468f 814
25f23106 815 /* A 16 bit relative relocation. */
46807bf4
AM
816 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
817 bfd_elf_generic_reloc),
25f23106
AM
818
819 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
820 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* The high order 16 bits of a relative address. */
46807bf4
AM
824 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address, plus 1 if the contents of
828 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
829 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
830 ppc64_elf_ha_reloc),
25f23106 831
4a969973
AM
832 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
833 bfd_elf_generic_reloc),
834
835 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
836 ppc64_elf_ha_reloc),
837
838 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
839 bfd_elf_generic_reloc),
840
841 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
842 ppc64_elf_ha_reloc),
843
844 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
845 bfd_elf_generic_reloc),
846
847 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
848 ppc64_elf_ha_reloc),
849
a680de9a 850 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
851 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
852 ppc64_elf_ha_reloc),
a680de9a 853
7ba71655 854 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
855 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
856 ppc64_elf_ha_reloc),
7ba71655 857
f9c6b907 858 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
859 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
860 bfd_elf_generic_reloc),
f9c6b907
AM
861
862 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
864 ppc64_elf_ha_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_unhandled_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907 881
006589cf 882 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
883 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
884 bfd_elf_generic_reloc),
006589cf 885
45965137 886 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
887 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
45965137 889
5663e321
AM
890 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
900 ppc64_elf_prefix_reloc),
901
902 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_unhandled_reloc),
916
917 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
c213164a
AM
923 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
924 ppc64_elf_unhandled_reloc),
925
926 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
5663e321
AM
941 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
942 bfd_elf_generic_reloc),
943
944 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
945 ppc64_elf_ha_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
948 bfd_elf_generic_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
951 ppc64_elf_ha_reloc),
952
953 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
954 bfd_elf_generic_reloc),
955
956 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
957 ppc64_elf_ha_reloc),
958
959 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
960 bfd_elf_generic_reloc),
961
962 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
963 ppc64_elf_ha_reloc),
964
965 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
966 ppc64_elf_prefix_reloc),
967
968 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
969 ppc64_elf_prefix_reloc),
970
5bd4f169 971 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
972 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
973 NULL),
5bd4f169
AM
974
975 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978};
979
980\f
981/* Initialize the ppc64_elf_howto_table, so that linear accesses can
982 be done. */
983
984static void
4ce794b7 985ppc_howto_init (void)
5bd4f169
AM
986{
987 unsigned int i, type;
988
a4b6fadd 989 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
990 {
991 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 992 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
993 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
994 }
995}
996
997static reloc_howto_type *
f3185997 998ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 999 bfd_reloc_code_real_type code)
5bd4f169 1000{
411e1bfb 1001 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1002
1003 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1004 /* Initialize howto table if needed. */
1005 ppc_howto_init ();
1006
4ce794b7 1007 switch (code)
5bd4f169
AM
1008 {
1009 default:
f3185997 1010 /* xgettext:c-format */
2cdcc330
AM
1011 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1012 (int) code);
f3185997 1013 bfd_set_error (bfd_error_bad_value);
4ce794b7 1014 return NULL;
5bd4f169 1015
411e1bfb
AM
1016 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1017 break;
1018 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1019 break;
1020 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1021 break;
1022 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1023 break;
1024 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1025 break;
1026 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1027 break;
f9c6b907
AM
1028 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1029 break;
411e1bfb 1030 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1031 break;
f9c6b907
AM
1032 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1033 break;
411e1bfb 1034 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1041 break;
05d0e962
AM
1042 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1043 break;
411e1bfb 1044 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1051 break;
411e1bfb 1052 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1053 break;
411e1bfb 1054 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1055 break;
411e1bfb 1056 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1063 break;
411e1bfb 1064 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1065 break;
411e1bfb 1066 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1067 break;
411e1bfb 1068 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1069 break;
411e1bfb 1070 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1071 break;
411e1bfb 1072 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1073 break;
411e1bfb 1074 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1075 break;
411e1bfb 1076 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1077 break;
411e1bfb 1078 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1079 break;
411e1bfb 1080 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1081 break;
411e1bfb 1082 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1083 break;
411e1bfb 1084 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1085 break;
411e1bfb 1086 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1087 break;
411e1bfb 1088 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1089 break;
411e1bfb 1090 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1091 break;
411e1bfb 1092 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1093 break;
411e1bfb 1094 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1095 break;
411e1bfb 1096 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1097 break;
411e1bfb 1098 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1099 break;
411e1bfb 1100 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1101 break;
411e1bfb 1102 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1103 break;
411e1bfb 1104 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1105 break;
411e1bfb 1106 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1107 break;
411e1bfb 1108 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1109 break;
411e1bfb 1110 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1111 break;
411e1bfb 1112 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1113 break;
411e1bfb 1114 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1115 break;
411e1bfb 1116 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1117 break;
411e1bfb 1118 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1119 break;
411e1bfb 1120 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1121 break;
411e1bfb 1122 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1123 break;
411e1bfb 1124 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1125 break;
411e1bfb 1126 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1127 break;
411e1bfb 1128 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1129 break;
411e1bfb 1130 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1131 break;
411e1bfb 1132 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1133 break;
411e1bfb 1134 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1135 break;
411e1bfb 1136 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1137 break;
411e1bfb 1138 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1139 break;
c213164a 1140 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1141 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1142 break;
727fc41e
AM
1143 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1144 break;
1145 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1146 break;
411e1bfb 1147 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1148 break;
411e1bfb 1149 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1150 break;
411e1bfb 1151 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1152 break;
411e1bfb 1153 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1154 break;
f9c6b907
AM
1155 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1156 break;
411e1bfb 1157 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1158 break;
f9c6b907
AM
1159 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1160 break;
411e1bfb 1161 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1162 break;
411e1bfb
AM
1163 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1164 break;
1165 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1168 break;
f9c6b907
AM
1169 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1170 break;
411e1bfb
AM
1171 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1172 break;
f9c6b907
AM
1173 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1174 break;
411e1bfb
AM
1175 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1176 break;
1177 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1178 break;
1179 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1200 break;
1201 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1202 break;
1203 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1208 break;
1209 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1210 break;
1211 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1220 break;
1221 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1222 break;
1223 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1232 break;
25f23106
AM
1233 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1234 break;
1235 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1236 break;
1237 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1238 break;
1239 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1240 break;
4a969973
AM
1241 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1242 break;
1243 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1252 break;
7ba71655
AM
1253 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1254 break;
a680de9a
PB
1255 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1256 break;
006589cf
AM
1257 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1258 break;
45965137
AM
1259 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1260 break;
5663e321
AM
1261 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1262 break;
1263 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1264 break;
1265 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1266 break;
1267 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1268 break;
1269 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1270 break;
1271 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1272 break;
1273 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1274 break;
c213164a
AM
1275 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1276 break;
1277 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1278 break;
1279 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1280 break;
1281 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1286 break;
5663e321
AM
1287 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1288 break;
1289 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1294 break;
1295 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1296 break;
1297 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1302 break;
1303 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1304 break;
1305 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1306 break;
411e1bfb
AM
1307 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1308 break;
1309 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1310 break;
1311 }
1312
4ce794b7 1313 return ppc64_elf_howto_table[r];
5bd4f169
AM
1314};
1315
157090f7
AM
1316static reloc_howto_type *
1317ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1318 const char *r_name)
1319{
1320 unsigned int i;
1321
a4b6fadd 1322 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1323 if (ppc64_elf_howto_raw[i].name != NULL
1324 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1325 return &ppc64_elf_howto_raw[i];
1326
1327 return NULL;
1328}
1329
5bd4f169
AM
1330/* Set the howto pointer for a PowerPC ELF reloc. */
1331
f3185997 1332static bfd_boolean
4aef7643 1333ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1334 Elf_Internal_Rela *dst)
5bd4f169 1335{
65f38f15
AM
1336 unsigned int type;
1337
ef60b7ff 1338 /* Initialize howto table if needed. */
5bd4f169 1339 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1340 ppc_howto_init ();
1341
65f38f15 1342 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1343 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1344 {
695344c0 1345 /* xgettext:c-format */
0aa13fee 1346 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1347 abfd, type);
f3185997
NC
1348 bfd_set_error (bfd_error_bad_value);
1349 return FALSE;
d0fb9a8d 1350 }
65f38f15 1351 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1352 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1353 {
1354 /* xgettext:c-format */
1355 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1356 abfd, type);
1357 bfd_set_error (bfd_error_bad_value);
1358 return FALSE;
1359 }
2cdcc330 1360
f3185997 1361 return TRUE;
5bd4f169
AM
1362}
1363
04c9666a 1364/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1365
1366static bfd_reloc_status_type
4ce794b7
AM
1367ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1368 void *data, asection *input_section,
1369 bfd *output_bfd, char **error_message)
5bd4f169 1370{
a680de9a
PB
1371 enum elf_ppc64_reloc_type r_type;
1372 long insn;
1373 bfd_size_type octets;
3de43e7b 1374 bfd_vma value;
a680de9a 1375
805fc799
AM
1376 /* If this is a relocatable link (output_bfd test tells us), just
1377 call the generic function. Any adjustment will be done at final
1378 link time. */
1379 if (output_bfd != NULL)
cedb70c5 1380 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1381 input_section, output_bfd, error_message);
1382
5663e321
AM
1383 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1384 We won't actually be using the low bits, so trashing them
805fc799 1385 doesn't matter. */
a680de9a 1386 r_type = reloc_entry->howto->type;
5663e321
AM
1387 if (r_type == R_PPC64_ADDR16_HIGHERA34
1388 || r_type == R_PPC64_ADDR16_HIGHESTA34
1389 || r_type == R_PPC64_REL16_HIGHERA34
1390 || r_type == R_PPC64_REL16_HIGHESTA34)
1391 reloc_entry->addend += 1ULL << 33;
1392 else
1393 reloc_entry->addend += 1U << 15;
a680de9a
PB
1394 if (r_type != R_PPC64_REL16DX_HA)
1395 return bfd_reloc_continue;
1396
1397 value = 0;
1398 if (!bfd_is_com_section (symbol->section))
1399 value = symbol->value;
1400 value += (reloc_entry->addend
1401 + symbol->section->output_offset
1402 + symbol->section->output_section->vma);
1403 value -= (reloc_entry->address
1404 + input_section->output_offset
1405 + input_section->output_section->vma);
3de43e7b 1406 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1407
1408 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1409 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1410 insn &= ~0x1fffc1;
3de43e7b 1411 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1412 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1413 if (value + 0x8000 > 0xffff)
a680de9a
PB
1414 return bfd_reloc_overflow;
1415 return bfd_reloc_ok;
805fc799 1416}
5bd4f169 1417
2441e016
AM
1418static bfd_reloc_status_type
1419ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1420 void *data, asection *input_section,
1421 bfd *output_bfd, char **error_message)
1422{
1423 if (output_bfd != NULL)
1424 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1425 input_section, output_bfd, error_message);
1426
699733f6
AM
1427 if (strcmp (symbol->section->name, ".opd") == 0
1428 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1429 {
1430 bfd_vma dest = opd_entry_value (symbol->section,
1431 symbol->value + reloc_entry->addend,
aef36ac1 1432 NULL, NULL, FALSE);
2441e016
AM
1433 if (dest != (bfd_vma) -1)
1434 reloc_entry->addend = dest - (symbol->value
1435 + symbol->section->output_section->vma
1436 + symbol->section->output_offset);
1437 }
810d4e75
AM
1438 else
1439 {
1440 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1441
1442 if (symbol->section->owner != abfd
9f284bf9 1443 && symbol->section->owner != NULL
810d4e75
AM
1444 && abiversion (symbol->section->owner) >= 2)
1445 {
1446 unsigned int i;
1447
1448 for (i = 0; i < symbol->section->owner->symcount; ++i)
1449 {
1450 asymbol *symdef = symbol->section->owner->outsymbols[i];
1451
1452 if (strcmp (symdef->name, symbol->name) == 0)
1453 {
1454 elfsym = (elf_symbol_type *) symdef;
1455 break;
1456 }
1457 }
1458 }
1459 reloc_entry->addend
1460 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1461 }
2441e016
AM
1462 return bfd_reloc_continue;
1463}
1464
805fc799 1465static bfd_reloc_status_type
4ce794b7
AM
1466ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1467 void *data, asection *input_section,
1468 bfd *output_bfd, char **error_message)
805fc799
AM
1469{
1470 long insn;
04c9666a 1471 enum elf_ppc64_reloc_type r_type;
805fc799 1472 bfd_size_type octets;
794e51c0
AM
1473 /* Assume 'at' branch hints. */
1474 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1475
1476 /* If this is a relocatable link (output_bfd test tells us), just
1477 call the generic function. Any adjustment will be done at final
1478 link time. */
5bd4f169 1479 if (output_bfd != NULL)
cedb70c5 1480 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1481 input_section, output_bfd, error_message);
1482
1483 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1484 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1485 insn &= ~(0x01 << 21);
4ce794b7 1486 r_type = reloc_entry->howto->type;
805fc799
AM
1487 if (r_type == R_PPC64_ADDR14_BRTAKEN
1488 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1489 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1490
794e51c0 1491 if (is_isa_v2)
5bd4f169 1492 {
805fc799
AM
1493 /* Set 'a' bit. This is 0b00010 in BO field for branch
1494 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1495 for branch on CTR insns (BO == 1a00t or 1a01t). */
1496 if ((insn & (0x14 << 21)) == (0x04 << 21))
1497 insn |= 0x02 << 21;
1498 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1499 insn |= 0x08 << 21;
1500 else
2441e016 1501 goto out;
5bd4f169 1502 }
805fc799
AM
1503 else
1504 {
1505 bfd_vma target = 0;
1506 bfd_vma from;
5bd4f169 1507
805fc799
AM
1508 if (!bfd_is_com_section (symbol->section))
1509 target = symbol->value;
1510 target += symbol->section->output_section->vma;
1511 target += symbol->section->output_offset;
1512 target += reloc_entry->addend;
5bd4f169 1513
805fc799
AM
1514 from = (reloc_entry->address
1515 + input_section->output_offset
1516 + input_section->output_section->vma);
5bd4f169 1517
805fc799
AM
1518 /* Invert 'y' bit if not the default. */
1519 if ((bfd_signed_vma) (target - from) < 0)
1520 insn ^= 0x01 << 21;
1521 }
4ce794b7 1522 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1523 out:
1524 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1525 input_section, output_bfd, error_message);
805fc799 1526}
5bd4f169 1527
805fc799 1528static bfd_reloc_status_type
4ce794b7
AM
1529ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1530 void *data, asection *input_section,
1531 bfd *output_bfd, char **error_message)
805fc799
AM
1532{
1533 /* If this is a relocatable link (output_bfd test tells us), just
1534 call the generic function. Any adjustment will be done at final
1535 link time. */
1536 if (output_bfd != NULL)
cedb70c5 1537 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1538 input_section, output_bfd, error_message);
5bd4f169 1539
805fc799
AM
1540 /* Subtract the symbol section base address. */
1541 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1542 return bfd_reloc_continue;
1543}
1544
805fc799 1545static bfd_reloc_status_type
4ce794b7
AM
1546ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1547 void *data, asection *input_section,
1548 bfd *output_bfd, char **error_message)
805fc799
AM
1549{
1550 /* If this is a relocatable link (output_bfd test tells us), just
1551 call the generic function. Any adjustment will be done at final
1552 link time. */
1553 if (output_bfd != NULL)
cedb70c5 1554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1555 input_section, output_bfd, error_message);
1556
1557 /* Subtract the symbol section base address. */
1558 reloc_entry->addend -= symbol->section->output_section->vma;
1559
1560 /* Adjust the addend for sign extension of the low 16 bits. */
1561 reloc_entry->addend += 0x8000;
1562 return bfd_reloc_continue;
1563}
1564
1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 bfd_vma TOCstart;
1571
1572 /* If this is a relocatable link (output_bfd test tells us), just
1573 call the generic function. Any adjustment will be done at final
1574 link time. */
1575 if (output_bfd != NULL)
cedb70c5 1576 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1577 input_section, output_bfd, error_message);
1578
1579 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1580 if (TOCstart == 0)
1c865ab2 1581 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1582
1583 /* Subtract the TOC base address. */
1584 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1585 return bfd_reloc_continue;
1586}
1587
1588static bfd_reloc_status_type
4ce794b7
AM
1589ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1590 void *data, asection *input_section,
1591 bfd *output_bfd, char **error_message)
805fc799
AM
1592{
1593 bfd_vma TOCstart;
1594
1595 /* If this is a relocatable link (output_bfd test tells us), just
1596 call the generic function. Any adjustment will be done at final
1597 link time. */
1598 if (output_bfd != NULL)
cedb70c5 1599 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1600 input_section, output_bfd, error_message);
1601
1602 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1603 if (TOCstart == 0)
1c865ab2 1604 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1605
1606 /* Subtract the TOC base address. */
1607 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1608
1609 /* Adjust the addend for sign extension of the low 16 bits. */
1610 reloc_entry->addend += 0x8000;
1611 return bfd_reloc_continue;
1612}
1613
1614static bfd_reloc_status_type
4ce794b7
AM
1615ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1616 void *data, asection *input_section,
1617 bfd *output_bfd, char **error_message)
805fc799
AM
1618{
1619 bfd_vma TOCstart;
1620 bfd_size_type octets;
1621
1622 /* If this is a relocatable link (output_bfd test tells us), just
1623 call the generic function. Any adjustment will be done at final
1624 link time. */
1625 if (output_bfd != NULL)
cedb70c5 1626 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1627 input_section, output_bfd, error_message);
1628
1629 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1630 if (TOCstart == 0)
1c865ab2 1631 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1632
1633 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1634 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1635 return bfd_reloc_ok;
1636}
1637
5663e321
AM
1638static bfd_reloc_status_type
1639ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1640 void *data, asection *input_section,
1641 bfd *output_bfd, char **error_message)
1642{
1643 uint64_t insn;
1644 bfd_vma targ;
1645
1646 if (output_bfd != NULL)
1647 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1648 input_section, output_bfd, error_message);
1649
1650 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1651 insn <<= 32;
1652 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1653
1654 targ = (symbol->section->output_section->vma
1655 + symbol->section->output_offset
1656 + reloc_entry->addend);
1657 if (!bfd_is_com_section (symbol->section))
1658 targ += symbol->value;
1659 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1660 targ += 1ULL << 33;
1661 if (reloc_entry->howto->pc_relative)
1662 {
1663 bfd_vma from = (reloc_entry->address
1664 + input_section->output_offset
1665 + input_section->output_section->vma);
1666 targ -=from;
1667 }
1668 targ >>= reloc_entry->howto->rightshift;
1669 insn &= ~reloc_entry->howto->dst_mask;
1670 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1671 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1672 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1673 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1674 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1675 >= 1ULL << reloc_entry->howto->bitsize))
1676 return bfd_reloc_overflow;
1677 return bfd_reloc_ok;
1678}
1679
805fc799 1680static bfd_reloc_status_type
4ce794b7
AM
1681ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1682 void *data, asection *input_section,
1683 bfd *output_bfd, char **error_message)
805fc799
AM
1684{
1685 /* If this is a relocatable link (output_bfd test tells us), just
1686 call the generic function. Any adjustment will be done at final
1687 link time. */
1688 if (output_bfd != NULL)
cedb70c5 1689 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1690 input_section, output_bfd, error_message);
1691
1692 if (error_message != NULL)
1693 {
1694 static char buf[60];
1695 sprintf (buf, "generic linker can't handle %s",
1696 reloc_entry->howto->name);
1697 *error_message = buf;
1698 }
1699 return bfd_reloc_dangerous;
1700}
1701
927be08e
AM
1702/* Track GOT entries needed for a given symbol. We might need more
1703 than one got entry per symbol. */
1704struct got_entry
1705{
1706 struct got_entry *next;
1707
1708 /* The symbol addend that we'll be placing in the GOT. */
1709 bfd_vma addend;
1710
1711 /* Unlike other ELF targets, we use separate GOT entries for the same
1712 symbol referenced from different input files. This is to support
1713 automatic multiple TOC/GOT sections, where the TOC base can vary
1714 from one input file to another. After partitioning into TOC groups
1715 we merge entries within the group.
1716
1717 Point to the BFD owning this GOT entry. */
1718 bfd *owner;
1719
1720 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1721 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1722 unsigned char tls_type;
927be08e
AM
1723
1724 /* Non-zero if got.ent points to real entry. */
f961d9dd 1725 unsigned char is_indirect;
927be08e
AM
1726
1727 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1728 union
2cdcc330
AM
1729 {
1730 bfd_signed_vma refcount;
1731 bfd_vma offset;
1732 struct got_entry *ent;
1733 } got;
927be08e
AM
1734};
1735
1736/* The same for PLT. */
1737struct plt_entry
1738{
1739 struct plt_entry *next;
1740
1741 bfd_vma addend;
1742
1743 union
2cdcc330
AM
1744 {
1745 bfd_signed_vma refcount;
1746 bfd_vma offset;
1747 } plt;
927be08e
AM
1748};
1749
e717da7e
AM
1750struct ppc64_elf_obj_tdata
1751{
1752 struct elf_obj_tdata elf;
1753
1754 /* Shortcuts to dynamic linker sections. */
1755 asection *got;
1756 asection *relgot;
1757
b3fac117
AM
1758 /* Used during garbage collection. We attach global symbols defined
1759 on removed .opd entries to this section so that the sym is removed. */
1760 asection *deleted_section;
81688140 1761
927be08e 1762 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1763 sections means we potentially need one of these for each input bfd. */
927be08e 1764 struct got_entry tlsld_got;
8860955f 1765
2cdcc330
AM
1766 union
1767 {
729eabd5
AM
1768 /* A copy of relocs before they are modified for --emit-relocs. */
1769 Elf_Internal_Rela *relocs;
1770
1771 /* Section contents. */
1772 bfd_byte *contents;
1773 } opd;
d77c8a4b
AM
1774
1775 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1776 the reloc to be in the range -32768 to 32767. */
98528052
AM
1777 unsigned int has_small_toc_reloc : 1;
1778
560c8763
AM
1779 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1780 instruction not one we handle. */
1781 unsigned int unexpected_toc_insn : 1;
066f4018 1782
903b777d
AM
1783 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1784 this file. */
1785 unsigned int has_optrel : 1;
e717da7e
AM
1786};
1787
1788#define ppc64_elf_tdata(bfd) \
1789 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1790
1791#define ppc64_tlsld_got(bfd) \
1792 (&ppc64_elf_tdata (bfd)->tlsld_got)
1793
0c8d6e5c
AM
1794#define is_ppc64_elf(bfd) \
1795 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1796 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1797
e717da7e
AM
1798/* Override the generic function because we store some extras. */
1799
1800static bfd_boolean
1801ppc64_elf_mkobject (bfd *abfd)
1802{
0ffa91dd 1803 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1804 PPC64_ELF_DATA);
e717da7e
AM
1805}
1806
feee612b 1807/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1808 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1809
b34976b6 1810static bfd_boolean
4ce794b7 1811ppc64_elf_object_p (bfd *abfd)
feee612b 1812{
14b57c7c
AM
1813 if (!abfd->arch_info->the_default)
1814 return TRUE;
1815
1816 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1817 {
1818 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1819
1820 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1821 {
1822 /* Relies on arch after 32 bit default being 64 bit default. */
1823 abfd->arch_info = abfd->arch_info->next;
1824 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1825 }
1826 }
14b57c7c 1827 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1828}
1829
d37c89e5
AM
1830/* Support for core dump NOTE sections. */
1831
1832static bfd_boolean
1833ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1834{
eea6121a 1835 size_t offset, size;
d37c89e5
AM
1836
1837 if (note->descsz != 504)
1838 return FALSE;
1839
1840 /* pr_cursig */
228e534f 1841 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1842
1843 /* pr_pid */
228e534f 1844 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1845
1846 /* pr_reg */
1847 offset = 112;
eea6121a 1848 size = 384;
d37c89e5
AM
1849
1850 /* Make a ".reg/999" section. */
1851 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1852 size, note->descpos + offset);
d37c89e5
AM
1853}
1854
1855static bfd_boolean
1856ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1857{
1858 if (note->descsz != 136)
1859 return FALSE;
1860
228e534f 1861 elf_tdata (abfd)->core->pid
bc989cdc 1862 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1863 elf_tdata (abfd)->core->program
d37c89e5 1864 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1865 elf_tdata (abfd)->core->command
d37c89e5
AM
1866 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1867
1868 return TRUE;
1869}
1870
183e98be
AM
1871static char *
1872ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1873 ...)
1874{
1875 switch (note_type)
1876 {
1877 default:
1878 return NULL;
1879
1880 case NT_PRPSINFO:
1881 {
9ef6d1e3 1882 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1883 va_list ap;
1884
1885 va_start (ap, note_type);
75cd47ed 1886 memset (data, 0, sizeof (data));
183e98be 1887 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1888#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1889 DIAGNOSTIC_PUSH;
be3e27bb 1890 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1891 -Wstringop-truncation:
1892 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1893 */
95da9854
L
1894 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1895#endif
183e98be 1896 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1897#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1898 DIAGNOSTIC_POP;
fe75810f 1899#endif
183e98be
AM
1900 va_end (ap);
1901 return elfcore_write_note (abfd, buf, bufsiz,
1902 "CORE", note_type, data, sizeof (data));
1903 }
1904
1905 case NT_PRSTATUS:
1906 {
1907 char data[504];
1908 va_list ap;
1909 long pid;
1910 int cursig;
1911 const void *greg;
1912
1913 va_start (ap, note_type);
1914 memset (data, 0, 112);
1915 pid = va_arg (ap, long);
1916 bfd_put_32 (abfd, pid, data + 32);
1917 cursig = va_arg (ap, int);
1918 bfd_put_16 (abfd, cursig, data + 12);
1919 greg = va_arg (ap, const void *);
1920 memcpy (data + 112, greg, 384);
1921 memset (data + 496, 0, 8);
1922 va_end (ap);
1923 return elfcore_write_note (abfd, buf, bufsiz,
1924 "CORE", note_type, data, sizeof (data));
1925 }
1926 }
1927}
1928
5d35169e
AM
1929/* Add extra PPC sections. */
1930
2cdcc330 1931static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1932{
07d6d2b8
AM
1933 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1934 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1935 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1936 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1937 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1938 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1939 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1940};
1941
7c8fe5c4
AM
1942enum _ppc64_sec_type {
1943 sec_normal = 0,
1944 sec_opd = 1,
1945 sec_toc = 2
1946};
1947
f0abc2a1
AM
1948struct _ppc64_elf_section_data
1949{
1950 struct bfd_elf_section_data elf;
411e1bfb 1951
f0abc2a1
AM
1952 union
1953 {
51aecdc5
AM
1954 /* An array with one entry for each opd function descriptor,
1955 and some spares since opd entries may be either 16 or 24 bytes. */
1956#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1957 struct _opd_sec_data
1958 {
1959 /* Points to the function code section for local opd entries. */
1960 asection **func_sec;
1961
1962 /* After editing .opd, adjust references to opd local syms. */
1963 long *adjust;
1964 } opd;
7c8fe5c4 1965
3a71aa26
AM
1966 /* An array for toc sections, indexed by offset/8. */
1967 struct _toc_sec_data
1968 {
1969 /* Specifies the relocation symbol index used at a given toc offset. */
1970 unsigned *symndx;
1971
1972 /* And the relocation addend. */
1973 bfd_vma *add;
1974 } toc;
7c8fe5c4
AM
1975 } u;
1976
1977 enum _ppc64_sec_type sec_type:2;
411e1bfb 1978
7c8fe5c4
AM
1979 /* Flag set when small branches are detected. Used to
1980 select suitable defaults for the stub group size. */
1981 unsigned int has_14bit_branch:1;
3e04d765
AM
1982
1983 /* Flag set when PLTCALL relocs are detected. */
1984 unsigned int has_pltcall:1;
066f4018 1985
903b777d
AM
1986 /* Flag set when section has PLT/GOT/TOC relocations that can be
1987 optimised. */
1988 unsigned int has_optrel:1;
f0abc2a1
AM
1989};
1990
1991#define ppc64_elf_section_data(sec) \
411e1bfb 1992 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1993
1994static bfd_boolean
4ce794b7 1995ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1996{
f592407e
AM
1997 if (!sec->used_by_bfd)
1998 {
1999 struct _ppc64_elf_section_data *sdata;
2000 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 2001
f592407e
AM
2002 sdata = bfd_zalloc (abfd, amt);
2003 if (sdata == NULL)
2004 return FALSE;
2005 sec->used_by_bfd = sdata;
2006 }
f0abc2a1
AM
2007
2008 return _bfd_elf_new_section_hook (abfd, sec);
2009}
4025353c 2010
74f0fb50 2011static struct _opd_sec_data *
4025353c
AM
2012get_opd_info (asection * sec)
2013{
2014 if (sec != NULL
2015 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2016 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2017 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2018 return NULL;
2019}
90e3cdf2
JJ
2020\f
2021/* Parameters for the qsort hook. */
90e3cdf2 2022static bfd_boolean synthetic_relocatable;
cd285db5 2023static asection *synthetic_opd;
90e3cdf2 2024
699733f6 2025/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2026
2027static int
2028compare_symbols (const void *ap, const void *bp)
2029{
2cdcc330
AM
2030 const asymbol *a = *(const asymbol **) ap;
2031 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2032
699733f6
AM
2033 /* Section symbols first. */
2034 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2035 return -1;
699733f6 2036 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2037 return 1;
2038
699733f6 2039 /* then .opd symbols. */
cd285db5
AM
2040 if (synthetic_opd != NULL)
2041 {
2042 if (strcmp (a->section->name, ".opd") == 0
2043 && strcmp (b->section->name, ".opd") != 0)
2044 return -1;
2045 if (strcmp (a->section->name, ".opd") != 0
2046 && strcmp (b->section->name, ".opd") == 0)
2047 return 1;
2048 }
90e3cdf2 2049
699733f6 2050 /* then other code symbols. */
2cdcc330
AM
2051 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2052 == (SEC_CODE | SEC_ALLOC))
2053 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2054 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2055 return -1;
2056
2cdcc330
AM
2057 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2058 != (SEC_CODE | SEC_ALLOC))
2059 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2060 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2061 return 1;
2062
2063 if (synthetic_relocatable)
2064 {
2065 if (a->section->id < b->section->id)
2066 return -1;
2067
2068 if (a->section->id > b->section->id)
2069 return 1;
2070 }
2071
2072 if (a->value + a->section->vma < b->value + b->section->vma)
2073 return -1;
2074
2075 if (a->value + a->section->vma > b->value + b->section->vma)
2076 return 1;
2077
4d35a0aa
AM
2078 /* For syms with the same value, prefer strong dynamic global function
2079 syms over other syms. */
2080 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2081 return -1;
2082
2083 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2084 return 1;
2085
2086 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2087 return -1;
2088
2089 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2090 return 1;
2091
2092 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2093 return -1;
2094
2095 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2096 return 1;
2097
2098 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2099 return -1;
2100
2101 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2102 return 1;
2103
aaed6f5b 2104 return a > b;
90e3cdf2
JJ
2105}
2106
699733f6 2107/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2108
699733f6 2109static asymbol *
7292b3ac 2110sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 2111{
699733f6 2112 long mid;
90e3cdf2 2113
7292b3ac 2114 if (id == (unsigned) -1)
699733f6
AM
2115 {
2116 while (lo < hi)
2117 {
2118 mid = (lo + hi) >> 1;
2119 if (syms[mid]->value + syms[mid]->section->vma < value)
2120 lo = mid + 1;
2121 else if (syms[mid]->value + syms[mid]->section->vma > value)
2122 hi = mid;
2123 else
2124 return syms[mid];
2125 }
2126 }
2127 else
2128 {
2129 while (lo < hi)
2130 {
2131 mid = (lo + hi) >> 1;
2132 if (syms[mid]->section->id < id)
2133 lo = mid + 1;
2134 else if (syms[mid]->section->id > id)
2135 hi = mid;
2136 else if (syms[mid]->value < value)
2137 lo = mid + 1;
2138 else if (syms[mid]->value > value)
2139 hi = mid;
2140 else
2141 return syms[mid];
2142 }
2143 }
2144 return NULL;
90e3cdf2
JJ
2145}
2146
468392fb
AM
2147static bfd_boolean
2148section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2149{
2150 bfd_vma vma = *(bfd_vma *) ptr;
2151 return ((section->flags & SEC_ALLOC) != 0
2152 && section->vma <= vma
2153 && vma < section->vma + section->size);
2154}
2155
699733f6 2156/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2157 entry syms. Also generate @plt symbols for the glink branch table.
2158 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2159
2160static long
a7535cf3
AM
2161ppc64_elf_get_synthetic_symtab (bfd *abfd,
2162 long static_count, asymbol **static_syms,
2163 long dyn_count, asymbol **dyn_syms,
c9727e01 2164 asymbol **ret)
90e3cdf2
JJ
2165{
2166 asymbol *s;
0ccf57bd 2167 size_t i, j, count;
90e3cdf2 2168 char *names;
0ccf57bd 2169 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2170 asection *opd = NULL;
90e3cdf2 2171 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2172 asymbol **syms;
ee67d69a 2173 int abi = abiversion (abfd);
90e3cdf2
JJ
2174
2175 *ret = NULL;
2176
ee67d69a
AM
2177 if (abi < 2)
2178 {
2179 opd = bfd_get_section_by_name (abfd, ".opd");
2180 if (opd == NULL && abi == 1)
2181 return 0;
2182 }
90e3cdf2 2183
a5259595
AM
2184 syms = NULL;
2185 codesecsym = 0;
2186 codesecsymend = 0;
2187 secsymend = 0;
2188 opdsymend = 0;
2189 symcount = 0;
2190 if (opd != NULL)
c9727e01 2191 {
a5259595
AM
2192 symcount = static_count;
2193 if (!relocatable)
2194 symcount += dyn_count;
2195 if (symcount == 0)
2196 return 0;
c9727e01 2197
a5259595
AM
2198 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2199 if (syms == NULL)
2200 return -1;
90e3cdf2 2201
a5259595
AM
2202 if (!relocatable && static_count != 0 && dyn_count != 0)
2203 {
2204 /* Use both symbol tables. */
2205 memcpy (syms, static_syms, static_count * sizeof (*syms));
2206 memcpy (syms + static_count, dyn_syms,
2207 (dyn_count + 1) * sizeof (*syms));
2208 }
2209 else if (!relocatable && static_count == 0)
2210 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2211 else
2212 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2213
0ccf57bd
AM
2214 /* Trim uninteresting symbols. Interesting symbols are section,
2215 function, and notype symbols. */
2216 for (i = 0, j = 0; i < symcount; ++i)
2217 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2218 | BSF_RELC | BSF_SRELC)) == 0)
2219 syms[j++] = syms[i];
2220 symcount = j;
2221
a5259595
AM
2222 synthetic_relocatable = relocatable;
2223 synthetic_opd = opd;
2224 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2225
a5259595
AM
2226 if (!relocatable && symcount > 1)
2227 {
bfa5bd2a
PA
2228 /* Trim duplicate syms, since we may have merged the normal
2229 and dynamic symbols. Actually, we only care about syms
2230 that have different values, so trim any with the same
2231 value. Don't consider ifunc and ifunc resolver symbols
2232 duplicates however, because GDB wants to know whether a
2233 text symbol is an ifunc resolver. */
a5259595 2234 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2235 {
2236 const asymbol *s0 = syms[i - 1];
2237 const asymbol *s1 = syms[i];
2238
2239 if ((s0->value + s0->section->vma
2240 != s1->value + s1->section->vma)
2241 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2242 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2243 syms[j++] = syms[i];
2244 }
a5259595
AM
2245 symcount = j;
2246 }
699733f6 2247
a5259595
AM
2248 i = 0;
2249 /* Note that here and in compare_symbols we can't compare opd and
2250 sym->section directly. With separate debug info files, the
2251 symbols will be extracted from the debug file while abfd passed
2252 to this function is the real binary. */
0ccf57bd 2253 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2254 ++i;
2255 codesecsym = i;
2256
2257 for (; i < symcount; ++i)
2258 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2259 | SEC_THREAD_LOCAL))
2260 != (SEC_CODE | SEC_ALLOC))
2261 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2262 break;
2263 codesecsymend = i;
2264
2265 for (; i < symcount; ++i)
2266 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2267 break;
2268 secsymend = i;
2269
2270 for (; i < symcount; ++i)
2271 if (strcmp (syms[i]->section->name, ".opd") != 0)
2272 break;
2273 opdsymend = i;
2274
2275 for (; i < symcount; ++i)
2cdcc330
AM
2276 if (((syms[i]->section->flags
2277 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2278 != (SEC_CODE | SEC_ALLOC))
2279 break;
2280 symcount = i;
2281 }
c9727e01 2282 count = 0;
90e3cdf2 2283
699733f6 2284 if (relocatable)
90e3cdf2 2285 {
699733f6
AM
2286 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2287 arelent *r;
2288 size_t size;
0ccf57bd 2289 size_t relcount;
90e3cdf2 2290
468392fb
AM
2291 if (opdsymend == secsymend)
2292 goto done;
2293
699733f6 2294 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2295 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2296 if (relcount == 0)
c9727e01 2297 goto done;
90e3cdf2 2298
7356fed5
AM
2299 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2300 {
2301 count = -1;
2302 goto done;
2303 }
2304
699733f6 2305 size = 0;
595da8c5 2306 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2307 {
2308 asymbol *sym;
90e3cdf2 2309
595da8c5 2310 while (r < opd->relocation + relcount
699733f6
AM
2311 && r->address < syms[i]->value + opd->vma)
2312 ++r;
90e3cdf2 2313
595da8c5 2314 if (r == opd->relocation + relcount)
699733f6 2315 break;
90e3cdf2 2316
699733f6
AM
2317 if (r->address != syms[i]->value + opd->vma)
2318 continue;
90e3cdf2 2319
699733f6
AM
2320 if (r->howto->type != R_PPC64_ADDR64)
2321 continue;
90e3cdf2 2322
699733f6
AM
2323 sym = *r->sym_ptr_ptr;
2324 if (!sym_exists_at (syms, opdsymend, symcount,
2325 sym->section->id, sym->value + r->addend))
2326 {
2327 ++count;
2328 size += sizeof (asymbol);
2329 size += strlen (syms[i]->name) + 2;
2330 }
2331 }
90e3cdf2 2332
c4b0b099
AM
2333 if (size == 0)
2334 goto done;
699733f6
AM
2335 s = *ret = bfd_malloc (size);
2336 if (s == NULL)
2337 {
7356fed5 2338 count = -1;
c9727e01 2339 goto done;
699733f6 2340 }
90e3cdf2 2341
699733f6 2342 names = (char *) (s + count);
90e3cdf2 2343
595da8c5 2344 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2345 {
699733f6 2346 asymbol *sym;
90e3cdf2 2347
595da8c5 2348 while (r < opd->relocation + relcount
699733f6
AM
2349 && r->address < syms[i]->value + opd->vma)
2350 ++r;
90e3cdf2 2351
595da8c5 2352 if (r == opd->relocation + relcount)
699733f6
AM
2353 break;
2354
2355 if (r->address != syms[i]->value + opd->vma)
2356 continue;
2357
2358 if (r->howto->type != R_PPC64_ADDR64)
2359 continue;
90e3cdf2 2360
699733f6
AM
2361 sym = *r->sym_ptr_ptr;
2362 if (!sym_exists_at (syms, opdsymend, symcount,
2363 sym->section->id, sym->value + r->addend))
2364 {
2365 size_t len;
2366
2367 *s = *syms[i];
6ba2a415 2368 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2369 s->section = sym->section;
2370 s->value = sym->value + r->addend;
2371 s->name = names;
2372 *names++ = '.';
2373 len = strlen (syms[i]->name);
2374 memcpy (names, syms[i]->name, len + 1);
2375 names += len + 1;
6f610d07
UW
2376 /* Have udata.p point back to the original symbol this
2377 synthetic symbol was derived from. */
2378 s->udata.p = syms[i];
699733f6
AM
2379 s++;
2380 }
2381 }
2382 }
2383 else
90e3cdf2 2384 {
468392fb 2385 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2386 bfd_byte *contents = NULL;
699733f6 2387 size_t size;
0ccf57bd 2388 size_t plt_count = 0;
468392fb
AM
2389 bfd_vma glink_vma = 0, resolv_vma = 0;
2390 asection *dynamic, *glink = NULL, *relplt = NULL;
2391 arelent *p;
90e3cdf2 2392
ee67d69a 2393 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2394 {
c4b0b099
AM
2395 free_contents_and_exit_err:
2396 count = -1;
ee67d69a 2397 free_contents_and_exit:
699733f6 2398 if (contents)
ee67d69a 2399 free (contents);
c9727e01 2400 goto done;
699733f6 2401 }
90e3cdf2 2402
699733f6
AM
2403 size = 0;
2404 for (i = secsymend; i < opdsymend; ++i)
2405 {
2406 bfd_vma ent;
90e3cdf2 2407
5ef11c02
AM
2408 /* Ignore bogus symbols. */
2409 if (syms[i]->value > opd->size - 8)
2410 continue;
2411
699733f6
AM
2412 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2413 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2414 {
2415 ++count;
2416 size += sizeof (asymbol);
2417 size += strlen (syms[i]->name) + 2;
2418 }
2419 }
90e3cdf2 2420
468392fb 2421 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2422 if (dyn_count != 0
2423 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2424 {
2425 bfd_byte *dynbuf, *extdyn, *extdynend;
2426 size_t extdynsize;
2427 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2428
2429 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2430 goto free_contents_and_exit_err;
468392fb
AM
2431
2432 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2433 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2434
2435 extdyn = dynbuf;
2436 extdynend = extdyn + dynamic->size;
2437 for (; extdyn < extdynend; extdyn += extdynsize)
2438 {
2439 Elf_Internal_Dyn dyn;
2440 (*swap_dyn_in) (abfd, extdyn, &dyn);
2441
2442 if (dyn.d_tag == DT_NULL)
2443 break;
2444
2445 if (dyn.d_tag == DT_PPC64_GLINK)
2446 {
9e390558
AM
2447 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2448 See comment in ppc64_elf_finish_dynamic_sections. */
2449 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2450 /* The .glink section usually does not survive the final
2451 link; search for the section (usually .text) where the
2452 glink stubs now reside. */
2453 glink = bfd_sections_find_if (abfd, section_covers_vma,
2454 &glink_vma);
2455 break;
2456 }
2457 }
2458
2459 free (dynbuf);
2460 }
2461
2462 if (glink != NULL)
2463 {
2464 /* Determine __glink trampoline by reading the relative branch
2465 from the first glink stub. */
2466 bfd_byte buf[4];
b9e5796b
AM
2467 unsigned int off = 0;
2468
2469 while (bfd_get_section_contents (abfd, glink, buf,
2470 glink_vma + off - glink->vma, 4))
468392fb
AM
2471 {
2472 unsigned int insn = bfd_get_32 (abfd, buf);
2473 insn ^= B_DOT;
2474 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2475 {
2cdcc330
AM
2476 resolv_vma
2477 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2478 break;
2479 }
2480 off += 4;
2481 if (off > 4)
2482 break;
468392fb
AM
2483 }
2484
2485 if (resolv_vma)
2486 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2487
066ee829
AM
2488 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2489 if (relplt != NULL)
2490 {
2491 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2492 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2493 goto free_contents_and_exit_err;
68ffbac6 2494
066ee829
AM
2495 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2496 size += plt_count * sizeof (asymbol);
468392fb 2497
066ee829
AM
2498 p = relplt->relocation;
2499 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2500 {
2501 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2502 if (p->addend != 0)
2503 size += sizeof ("+0x") - 1 + 16;
2504 }
066ee829 2505 }
468392fb
AM
2506 }
2507
c4b0b099
AM
2508 if (size == 0)
2509 goto free_contents_and_exit;
699733f6
AM
2510 s = *ret = bfd_malloc (size);
2511 if (s == NULL)
c4b0b099 2512 goto free_contents_and_exit_err;
90e3cdf2 2513
468392fb 2514 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2515
699733f6 2516 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2517 {
699733f6 2518 bfd_vma ent;
90e3cdf2 2519
5ef11c02
AM
2520 if (syms[i]->value > opd->size - 8)
2521 continue;
2522
699733f6
AM
2523 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2524 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2525 {
0ccf57bd 2526 size_t lo, hi;
699733f6 2527 size_t len;
c9727e01 2528 asection *sec = abfd->sections;
90e3cdf2 2529
699733f6
AM
2530 *s = *syms[i];
2531 lo = codesecsym;
2532 hi = codesecsymend;
2533 while (lo < hi)
2534 {
0ccf57bd 2535 size_t mid = (lo + hi) >> 1;
699733f6
AM
2536 if (syms[mid]->section->vma < ent)
2537 lo = mid + 1;
2538 else if (syms[mid]->section->vma > ent)
2539 hi = mid;
2540 else
c9727e01
AM
2541 {
2542 sec = syms[mid]->section;
2543 break;
2544 }
699733f6
AM
2545 }
2546
c9727e01 2547 if (lo >= hi && lo > codesecsym)
699733f6 2548 sec = syms[lo - 1]->section;
699733f6
AM
2549
2550 for (; sec != NULL; sec = sec->next)
2551 {
2552 if (sec->vma > ent)
2553 break;
63524580
JK
2554 /* SEC_LOAD may not be set if SEC is from a separate debug
2555 info file. */
2556 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2557 break;
2558 if ((sec->flags & SEC_CODE) != 0)
2559 s->section = sec;
2560 }
6ba2a415 2561 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2562 s->value = ent - s->section->vma;
2563 s->name = names;
2564 *names++ = '.';
2565 len = strlen (syms[i]->name);
2566 memcpy (names, syms[i]->name, len + 1);
2567 names += len + 1;
6f610d07
UW
2568 /* Have udata.p point back to the original symbol this
2569 synthetic symbol was derived from. */
2570 s->udata.p = syms[i];
699733f6 2571 s++;
90e3cdf2 2572 }
90e3cdf2 2573 }
699733f6 2574 free (contents);
468392fb
AM
2575
2576 if (glink != NULL && relplt != NULL)
2577 {
2578 if (resolv_vma)
2579 {
2580 /* Add a symbol for the main glink trampoline. */
86a4952b 2581 memset (s, 0, sizeof *s);
468392fb 2582 s->the_bfd = abfd;
6ba2a415 2583 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2584 s->section = glink;
2585 s->value = resolv_vma - glink->vma;
2586 s->name = names;
2cdcc330
AM
2587 memcpy (names, "__glink_PLTresolve",
2588 sizeof ("__glink_PLTresolve"));
468392fb
AM
2589 names += sizeof ("__glink_PLTresolve");
2590 s++;
2591 count++;
2592 }
2593
2594 /* FIXME: It would be very much nicer to put sym@plt on the
2595 stub rather than on the glink branch table entry. The
2596 objdump disassembler would then use a sensible symbol
2597 name on plt calls. The difficulty in doing so is
2598 a) finding the stubs, and,
2599 b) matching stubs against plt entries, and,
2600 c) there can be multiple stubs for a given plt entry.
2601
2602 Solving (a) could be done by code scanning, but older
2603 ppc64 binaries used different stubs to current code.
2604 (b) is the tricky one since you need to known the toc
2605 pointer for at least one function that uses a pic stub to
2606 be able to calculate the plt address referenced.
2607 (c) means gdb would need to set multiple breakpoints (or
2608 find the glink branch itself) when setting breakpoints
2609 for pending shared library loads. */
2610 p = relplt->relocation;
2611 for (i = 0; i < plt_count; i++, p++)
2612 {
2613 size_t len;
2614
2615 *s = **p->sym_ptr_ptr;
2616 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2617 we are defining a symbol, ensure one of them is set. */
2618 if ((s->flags & BSF_LOCAL) == 0)
2619 s->flags |= BSF_GLOBAL;
6ba2a415 2620 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2621 s->section = glink;
2622 s->value = glink_vma - glink->vma;
2623 s->name = names;
2624 s->udata.p = NULL;
2625 len = strlen ((*p->sym_ptr_ptr)->name);
2626 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2627 names += len;
e054468f
AM
2628 if (p->addend != 0)
2629 {
2630 memcpy (names, "+0x", sizeof ("+0x") - 1);
2631 names += sizeof ("+0x") - 1;
2632 bfd_sprintf_vma (abfd, names, p->addend);
2633 names += strlen (names);
2634 }
468392fb
AM
2635 memcpy (names, "@plt", sizeof ("@plt"));
2636 names += sizeof ("@plt");
2637 s++;
b9e5796b
AM
2638 if (abi < 2)
2639 {
2640 glink_vma += 8;
2641 if (i >= 0x8000)
2642 glink_vma += 4;
2643 }
2644 else
468392fb
AM
2645 glink_vma += 4;
2646 }
2647 count += plt_count;
2648 }
90e3cdf2
JJ
2649 }
2650
c9727e01 2651 done:
a7535cf3 2652 free (syms);
90e3cdf2
JJ
2653 return count;
2654}
5bd4f169 2655\f
65f38f15
AM
2656/* The following functions are specific to the ELF linker, while
2657 functions above are used generally. Those named ppc64_elf_* are
2658 called by the main ELF linker code. They appear in this file more
2659 or less in the order in which they are called. eg.
2660 ppc64_elf_check_relocs is called early in the link process,
2661 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2662 called.
2663
2664 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2665 functions have both a function code symbol and a function descriptor
2666 symbol. A call to foo in a relocatable object file looks like:
2667
2668 . .text
2669 . x:
2670 . bl .foo
2671 . nop
2672
2673 The function definition in another object file might be:
2674
2675 . .section .opd
2676 . foo: .quad .foo
2677 . .quad .TOC.@tocbase
2678 . .quad 0
2679 .
2680 . .text
2681 . .foo: blr
2682
2683 When the linker resolves the call during a static link, the branch
2684 unsurprisingly just goes to .foo and the .opd information is unused.
2685 If the function definition is in a shared library, things are a little
2686 different: The call goes via a plt call stub, the opd information gets
2687 copied to the plt, and the linker patches the nop.
2688
2689 . x:
2690 . bl .foo_stub
2691 . ld 2,40(1)
2692 .
2693 .
2694 . .foo_stub:
71a39c98
AM
2695 . std 2,40(1) # in practice, the call stub
2696 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2697 . addi 11,11,Lfoo@toc@l # this is the general idea
2698 . ld 12,0(11)
2699 . ld 2,8(11)
2700 . mtctr 12
2701 . ld 11,16(11)
e86ce104
AM
2702 . bctr
2703 .
2704 . .section .plt
2705 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2706
2707 The "reloc ()" notation is supposed to indicate that the linker emits
2708 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2709 copying.
2710
2711 What are the difficulties here? Well, firstly, the relocations
2712 examined by the linker in check_relocs are against the function code
2713 sym .foo, while the dynamic relocation in the plt is emitted against
2714 the function descriptor symbol, foo. Somewhere along the line, we need
2715 to carefully copy dynamic link information from one symbol to the other.
2716 Secondly, the generic part of the elf linker will make .foo a dynamic
2717 symbol as is normal for most other backends. We need foo dynamic
2718 instead, at least for an application final link. However, when
2719 creating a shared library containing foo, we need to have both symbols
2720 dynamic so that references to .foo are satisfied during the early
2721 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2722 definition from some other object, eg. a static library.
2723
2724 Update: As of August 2004, we support a new convention. Function
2725 calls may use the function descriptor symbol, ie. "bl foo". This
2726 behaves exactly as "bl .foo". */
65f38f15 2727
7c8bbca5
AM
2728/* Of those relocs that might be copied as dynamic relocs, this
2729 function selects those that must be copied when linking a shared
2730 library or PIE, even when the symbol is local. */
65f38f15 2731
1d483afe
AM
2732static int
2733must_be_dyn_reloc (struct bfd_link_info *info,
2734 enum elf_ppc64_reloc_type r_type)
2735{
2736 switch (r_type)
2737 {
2738 default:
7c8bbca5
AM
2739 /* Only relative relocs can be resolved when the object load
2740 address isn't fixed. DTPREL64 is excluded because the
2741 dynamic linker needs to differentiate global dynamic from
2742 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2743 return 1;
2744
2745 case R_PPC64_REL32:
2746 case R_PPC64_REL64:
2747 case R_PPC64_REL30:
1bdd8fac
AM
2748 case R_PPC64_TOC16:
2749 case R_PPC64_TOC16_DS:
2750 case R_PPC64_TOC16_LO:
2751 case R_PPC64_TOC16_HI:
2752 case R_PPC64_TOC16_HA:
2753 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2754 return 0;
2755
2756 case R_PPC64_TPREL16:
2757 case R_PPC64_TPREL16_LO:
2758 case R_PPC64_TPREL16_HI:
2759 case R_PPC64_TPREL16_HA:
2760 case R_PPC64_TPREL16_DS:
2761 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2762 case R_PPC64_TPREL16_HIGH:
2763 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2764 case R_PPC64_TPREL16_HIGHER:
2765 case R_PPC64_TPREL16_HIGHERA:
2766 case R_PPC64_TPREL16_HIGHEST:
2767 case R_PPC64_TPREL16_HIGHESTA:
2768 case R_PPC64_TPREL64:
c213164a 2769 case R_PPC64_TPREL34:
7c8bbca5
AM
2770 /* These relocations are relative but in a shared library the
2771 linker doesn't know the thread pointer base. */
2772 return bfd_link_dll (info);
1d483afe
AM
2773 }
2774}
65f38f15 2775
f4656909
AM
2776/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2777 copying dynamic variables from a shared lib into an app's dynbss
2778 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2779 shared lib. With code that gcc generates, it's vital that this be
2780 enabled; In the PowerPC64 ABI, the address of a function is actually
2781 the address of a function descriptor, which resides in the .opd
2782 section. gcc uses the descriptor directly rather than going via the
2783 GOT as some other ABI's do, which means that initialized function
2784 pointers must reference the descriptor. Thus, a function pointer
2785 initialized to the address of a function in a shared library will
2786 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2787 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2788 presents a problem as a plt entry for that function is also
2789 initialized from the function descriptor symbol and the copy reloc
2790 may not be initialized first. */
a23b6845 2791#define ELIMINATE_COPY_RELOCS 1
f4656909 2792
721956f4 2793/* Section name for stubs is the associated section name plus this
29942be8
NC
2794 string. */
2795#define STUB_SUFFIX ".stub"
721956f4
AM
2796
2797/* Linker stubs.
2798 ppc_stub_long_branch:
2799 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2800 destination, but a 24 bit branch in a stub section will reach.
2801 . b dest
2802
2803 ppc_stub_plt_branch:
2804 Similar to the above, but a 24 bit branch in the stub section won't
2805 reach its destination.
71a39c98
AM
2806 . addis %r11,%r2,xxx@toc@ha
2807 . ld %r12,xxx@toc@l(%r11)
2808 . mtctr %r12
721956f4
AM
2809 . bctr
2810
2811 ppc_stub_plt_call:
2c66dc6c
AM
2812 Used to call a function in a shared library. If it so happens that
2813 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2814 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2815 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2816 . addis %r11,%r2,xxx@toc@ha
2817 . ld %r12,xxx+0@toc@l(%r11)
2818 . mtctr %r12
2819 . ld %r2,xxx+8@toc@l(%r11)
2820 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2821 . bctr
ad8e1ba5
AM
2822
2823 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2824 code to adjust the value and save r2 to support multiple toc sections.
2825 A ppc_stub_long_branch with an r2 offset looks like:
2826 . std %r2,40(%r1)
2827 . addis %r2,%r2,off@ha
2828 . addi %r2,%r2,off@l
2829 . b dest
2830
2831 A ppc_stub_plt_branch with an r2 offset looks like:
2832 . std %r2,40(%r1)
71a39c98
AM
2833 . addis %r11,%r2,xxx@toc@ha
2834 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2835 . addis %r2,%r2,off@ha
2836 . addi %r2,%r2,off@l
71a39c98 2837 . mtctr %r12
ad8e1ba5 2838 . bctr
ac2df442 2839
05d0e962
AM
2840 All of the above stubs are shown as their ELFv1 variants. ELFv2
2841 variants exist too, simpler for plt calls since a new toc pointer
2842 and static chain are not loaded by the stub. In addition, ELFv2
2843 has some more complex stubs to handle calls marked with NOTOC
2844 relocs from functions where r2 is not a valid toc pointer. These
2845 come in two flavours, the ones shown below, and _both variants that
2846 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2847 one call is from a function where r2 is used as the toc pointer but
2848 needs a toc adjusting stub for small-model multi-toc, and another
2849 call is from a function where r2 is not valid.
2850 ppc_stub_long_branch_notoc:
2851 . mflr %r12
2852 . bcl 20,31,1f
2853 . 1:
2854 . mflr %r11
2855 . mtlr %r12
2cdcc330
AM
2856 . addis %r12,%r11,dest-1b@ha
2857 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2858 . b dest
2859
2860 ppc_stub_plt_branch_notoc:
2861 . mflr %r12
2862 . bcl 20,31,1f
2863 . 1:
2864 . mflr %r11
2865 . mtlr %r12
2866 . lis %r12,xxx-1b@highest
f891966f 2867 . ori %r12,%r12,xxx-1b@higher
05d0e962 2868 . sldi %r12,%r12,32
f891966f 2869 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2870 . ori %r12,%r12,xxx-1b@l
2871 . add %r12,%r11,%r12
2872 . mtctr %r12
2873 . bctr
2874
2875 ppc_stub_plt_call_notoc:
2876 . mflr %r12
2877 . bcl 20,31,1f
2878 . 1:
2879 . mflr %r11
2880 . mtlr %r12
2881 . lis %r12,xxx-1b@highest
f891966f 2882 . ori %r12,%r12,xxx-1b@higher
05d0e962 2883 . sldi %r12,%r12,32
f891966f 2884 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2885 . ori %r12,%r12,xxx-1b@l
2886 . ldx %r12,%r11,%r12
2887 . mtctr %r12
2888 . bctr
2889
04bdff6a
AM
2890 There are also ELFv1 powerxx variants of these stubs.
2891 ppc_stub_long_branch_notoc:
d4b87b1e 2892 . pla %r12,dest@pcrel
04bdff6a
AM
2893 . b dest
2894 ppc_stub_plt_branch_notoc:
2895 . lis %r11,(dest-1f)@highesta34
2896 . ori %r11,%r11,(dest-1f)@highera34
2897 . sldi %r11,%r11,34
d4b87b1e 2898 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2899 . add %r12,%r11,%r12
2900 . mtctr %r12
2901 . bctr
2902 ppc_stub_plt_call_notoc:
2903 . lis %r11,(xxx-1f)@highesta34
2904 . ori %r11,%r11,(xxx-1f)@highera34
2905 . sldi %r11,%r11,34
d4b87b1e 2906 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2907 . ldx %r12,%r11,%r12
2908 . mtctr %r12
2909 . bctr
2910
05d0e962
AM
2911 In cases where the high instructions would add zero, they are
2912 omitted and following instructions modified in some cases.
04bdff6a
AM
2913 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2914 to
2915 . pld %r12,xxx@pcrel
2916 . mtctr %r12
2917 . bctr
05d0e962
AM
2918
2919 For a given stub group (a set of sections all using the same toc
2920 pointer value) there will be just one stub type used for any
2921 particular function symbol. For example, if printf is called from
2922 code with the tocsave optimization (ie. r2 saved in function
2923 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2924 and from other code without the tocsave optimization requiring a
2925 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2926 type will be created. Calls with the tocsave optimization will
2927 enter this stub after the instruction saving r2. A similar
2928 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2929 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2930 to call an external function like printf. If other calls to printf
2931 require a ppc_stub_plt_call linkage stub then a single
2932 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2933 call. If other calls to printf require a ppc_stub_plt_call_r2save
2934 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2935 be created and calls not requiring r2 to be saved will enter the
2936 stub after the r2 save instruction. There is an analogous
2937 hierarchy of long branch and plt branch stubs for local call
2938 linkage. */
721956f4 2939
2cdcc330
AM
2940enum ppc_stub_type
2941{
721956f4
AM
2942 ppc_stub_none,
2943 ppc_stub_long_branch,
ad8e1ba5 2944 ppc_stub_long_branch_r2off,
05d0e962
AM
2945 ppc_stub_long_branch_notoc,
2946 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2947 ppc_stub_plt_branch,
ad8e1ba5 2948 ppc_stub_plt_branch_r2off,
05d0e962
AM
2949 ppc_stub_plt_branch_notoc,
2950 ppc_stub_plt_branch_both,
794e51c0 2951 ppc_stub_plt_call,
7341d5e2 2952 ppc_stub_plt_call_r2save,
05d0e962
AM
2953 ppc_stub_plt_call_notoc,
2954 ppc_stub_plt_call_both,
a4b6fadd
AM
2955 ppc_stub_global_entry,
2956 ppc_stub_save_res
721956f4
AM
2957};
2958
6f20ed8a
AM
2959/* Information on stub grouping. */
2960struct map_stub
2961{
2962 /* The stub section. */
2963 asection *stub_sec;
2964 /* This is the section to which stubs in the group will be attached. */
2965 asection *link_sec;
a4b6fadd
AM
2966 /* Next group. */
2967 struct map_stub *next;
2968 /* Whether to emit a copy of register save/restore functions in this
2969 group. */
2970 int needs_save_res;
df136d64
AM
2971 /* Current offset within stubs after the insn restoring lr in a
2972 _notoc or _both stub using bcl for pc-relative addressing, or
2973 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2974 unsigned int lr_restore;
2975 /* Accumulated size of EH info emitted to describe return address
2976 if stubs modify lr. Does not include 17 byte FDE header. */
2977 unsigned int eh_size;
2978 /* Offset in glink_eh_frame to the start of EH info for this group. */
2979 unsigned int eh_base;
6f20ed8a
AM
2980};
2981
2cdcc330
AM
2982struct ppc_stub_hash_entry
2983{
721956f4
AM
2984 /* Base hash table entry structure. */
2985 struct bfd_hash_entry root;
2986
ad8e1ba5
AM
2987 enum ppc_stub_type stub_type;
2988
6f20ed8a
AM
2989 /* Group information. */
2990 struct map_stub *group;
721956f4
AM
2991
2992 /* Offset within stub_sec of the beginning of this stub. */
2993 bfd_vma stub_offset;
2994
2995 /* Given the symbol's value and its section we can determine its final
2996 value when building the stubs (so the stub knows where to jump. */
2997 bfd_vma target_value;
2998 asection *target_section;
2999
721956f4
AM
3000 /* The symbol table entry, if any, that this was derived from. */
3001 struct ppc_link_hash_entry *h;
e054468f 3002 struct plt_entry *plt_ent;
721956f4 3003
2d7ad24e
AM
3004 /* Symbol type. */
3005 unsigned char symtype;
3006
6911b7dc
AM
3007 /* Symbol st_other. */
3008 unsigned char other;
721956f4
AM
3009};
3010
2cdcc330
AM
3011struct ppc_branch_hash_entry
3012{
721956f4
AM
3013 /* Base hash table entry structure. */
3014 struct bfd_hash_entry root;
3015
c456f082 3016 /* Offset within branch lookup table. */
721956f4
AM
3017 unsigned int offset;
3018
3019 /* Generation marker. */
3020 unsigned int iter;
3021};
65f38f15 3022
19e08130
AM
3023/* Used to track dynamic relocations for local symbols. */
3024struct ppc_dyn_relocs
3025{
3026 struct ppc_dyn_relocs *next;
3027
3028 /* The input section of the reloc. */
3029 asection *sec;
3030
3031 /* Total number of relocs copied for the input section. */
3032 unsigned int count : 31;
3033
3034 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3035 unsigned int ifunc : 1;
3036};
3037
65f38f15
AM
3038struct ppc_link_hash_entry
3039{
3040 struct elf_link_hash_entry elf;
3041
2cdcc330
AM
3042 union
3043 {
b3fac117
AM
3044 /* A pointer to the most recently used stub hash entry against this
3045 symbol. */
3046 struct ppc_stub_hash_entry *stub_cache;
3047
3048 /* A pointer to the next symbol starting with a '.' */
3049 struct ppc_link_hash_entry *next_dot_sym;
3050 } u;
721956f4 3051
65f38f15 3052 /* Track dynamic relocs copied for this symbol. */
6061a67d 3053 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3054
721956f4 3055 /* Link between function code and descriptor symbols. */
34814b9f 3056 struct ppc_link_hash_entry *oh;
721956f4 3057
e86ce104
AM
3058 /* Flag function code and descriptor symbols. */
3059 unsigned int is_func:1;
3060 unsigned int is_func_descriptor:1;
908b32fc 3061 unsigned int fake:1;
411e1bfb 3062
c5614fa4
AM
3063 /* Whether global opd/toc sym has been adjusted or not.
3064 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3065 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3066 unsigned int adjust_done:1;
3067
a4b6fadd
AM
3068 /* Set if this is an out-of-line register save/restore function,
3069 with non-standard calling convention. */
3070 unsigned int save_res:1;
3071
8b5f1ed8
AM
3072 /* Set if a duplicate symbol with non-zero localentry is detected,
3073 even when the duplicate symbol does not provide a definition. */
3074 unsigned int non_zero_localentry:1;
3075
411e1bfb 3076 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3077 Bits are or'd into the mask as the corresponding relocs are
3078 encountered during check_relocs, with TLS_TLS being set when any
3079 of the other TLS bits are set. tls_optimize clears bits when
3080 optimizing to indicate the corresponding GOT entry type is not
3081 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3082 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3083 These flags are also kept for local symbols. */
3084#define TLS_TLS 1 /* Any TLS reloc. */
3085#define TLS_GD 2 /* GD reloc. */
3086#define TLS_LD 4 /* LD reloc. */
3087#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3088#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3089#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3090#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3091#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3092 unsigned char tls_mask;
37da22e5
AM
3093
3094 /* The above field is also used to mark function symbols. In which
3095 case TLS_TLS will be 0. */
3096#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3097#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3098#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3099};
3100
3101/* ppc64 ELF linker hash table. */
3102
3103struct ppc_link_hash_table
3104{
3105 struct elf_link_hash_table elf;
3106
721956f4
AM
3107 /* The stub hash table. */
3108 struct bfd_hash_table stub_hash_table;
3109
3110 /* Another hash table for plt_branch stubs. */
3111 struct bfd_hash_table branch_hash_table;
3112
3b421ab3
AM
3113 /* Hash table for function prologue tocsave. */
3114 htab_t tocsave_htab;
3115
e7d1c40c
AM
3116 /* Various options and other info passed from the linker. */
3117 struct ppc64_elf_params *params;
721956f4 3118
6f20ed8a
AM
3119 /* The size of sec_info below. */
3120 unsigned int sec_info_arr_size;
3121
3122 /* Per-section array of extra section info. Done this way rather
3123 than as part of ppc64_elf_section_data so we have the info for
3124 non-ppc64 sections. */
3125 struct
3126 {
3127 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3128 bfd_vma toc_off;
6f20ed8a
AM
3129
3130 union
3131 {
3132 /* The section group that this section belongs to. */
3133 struct map_stub *group;
3134 /* A temp section list pointer. */
3135 asection *list;
3136 } u;
3137 } *sec_info;
721956f4 3138
a4b6fadd
AM
3139 /* Linked list of groups. */
3140 struct map_stub *group;
3141
ad8e1ba5
AM
3142 /* Temp used when calculating TOC pointers. */
3143 bfd_vma toc_curr;
bf102f86
AM
3144 bfd *toc_bfd;
3145 asection *toc_first_sec;
ad8e1ba5 3146
b3fac117
AM
3147 /* Used when adding symbols. */
3148 struct ppc_link_hash_entry *dot_syms;
3149
33e44f2e 3150 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3151 asection *glink;
9e390558 3152 asection *global_entry;
82bd7b59 3153 asection *sfpr;
2d7ad24e
AM
3154 asection *pltlocal;
3155 asection *relpltlocal;
4ce794b7
AM
3156 asection *brlt;
3157 asection *relbrlt;
58d180e8 3158 asection *glink_eh_frame;
ec338859 3159
8387904d
AM
3160 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3161 struct ppc_link_hash_entry *tls_get_addr;
3162 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3163
927be08e
AM
3164 /* The size of reliplt used by got entry relocs. */
3165 bfd_size_type got_reli_size;
3166
9b5ecbd0 3167 /* Statistics. */
7341d5e2 3168 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3169
ee75fd95
AM
3170 /* Number of stubs against global syms. */
3171 unsigned long stub_globals;
3172
ee67d69a
AM
3173 /* Set if we're linking code with function descriptors. */
3174 unsigned int opd_abi:1;
3175
4c52953f 3176 /* Support for multiple toc sections. */
33c0ec9d 3177 unsigned int do_multi_toc:1;
4c52953f 3178 unsigned int multi_toc_needed:1;
927be08e 3179 unsigned int second_toc_pass:1;
67f0cbdb 3180 unsigned int do_toc_opt:1;
4c52953f 3181
9a23f96e
AM
3182 /* Set if tls optimization is enabled. */
3183 unsigned int do_tls_opt:1;
3184
3e04d765
AM
3185 /* Set if inline plt calls should be converted to direct calls. */
3186 unsigned int can_convert_all_inline_plt:1;
3187
5d1634d7 3188 /* Set on error. */
99877b66 3189 unsigned int stub_error:1;
721956f4 3190
8c5b4e52
AM
3191 /* Whether func_desc_adjust needs to be run over symbols. */
3192 unsigned int need_func_desc_adj:1;
721956f4 3193
82e66161
AM
3194 /* Whether there exist local gnu indirect function resolvers,
3195 referenced by dynamic relocations. */
3196 unsigned int local_ifunc_resolver:1;
3197 unsigned int maybe_local_ifunc_resolver:1;
3198
f378ab09
AM
3199 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3200 unsigned int has_plt_localentry0:1;
3201
5663e321
AM
3202 /* Whether calls are made via the PLT from NOTOC functions. */
3203 unsigned int notoc_plt:1;
3204
04bdff6a
AM
3205 /* Whether to use powerxx instructions in linkage stubs. */
3206 unsigned int powerxx_stubs:1;
3207
721956f4
AM
3208 /* Incremented every time we size stubs. */
3209 unsigned int stub_iteration;
5d1634d7 3210
87d72d41
AM
3211 /* Small local sym cache. */
3212 struct sym_cache sym_cache;
65f38f15
AM
3213};
3214
4c52953f
AM
3215/* Rename some of the generic section flags to better document how they
3216 are used here. */
b0dddeec
AM
3217
3218/* Nonzero if this section has TLS related relocations. */
3219#define has_tls_reloc sec_flg0
3220
23cedd1d 3221/* Nonzero if this section has an old-style call to __tls_get_addr. */
b0dddeec
AM
3222#define has_tls_get_addr_call sec_flg1
3223
3224/* Nonzero if this section has any toc or got relocs. */
3225#define has_toc_reloc sec_flg2
3226
3227/* Nonzero if this section has a call to another section that uses
3228 the toc or got. */
d77c8a4b 3229#define makes_toc_func_call sec_flg3
b0dddeec
AM
3230
3231/* Recursion protection when determining above flag. */
d77c8a4b 3232#define call_check_in_progress sec_flg4
70cc837d 3233#define call_check_done sec_flg5
4c52953f 3234
65f38f15
AM
3235/* Get the ppc64 ELF linker hash table from a link_info structure. */
3236
3237#define ppc_hash_table(p) \
4dfe6ac6
NC
3238 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3239 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3240
721956f4
AM
3241#define ppc_stub_hash_lookup(table, string, create, copy) \
3242 ((struct ppc_stub_hash_entry *) \
3243 bfd_hash_lookup ((table), (string), (create), (copy)))
3244
3245#define ppc_branch_hash_lookup(table, string, create, copy) \
3246 ((struct ppc_branch_hash_entry *) \
3247 bfd_hash_lookup ((table), (string), (create), (copy)))
3248
3249/* Create an entry in the stub hash table. */
3250
3251static struct bfd_hash_entry *
4ce794b7
AM
3252stub_hash_newfunc (struct bfd_hash_entry *entry,
3253 struct bfd_hash_table *table,
3254 const char *string)
721956f4
AM
3255{
3256 /* Allocate the structure if it has not already been allocated by a
3257 subclass. */
3258 if (entry == NULL)
3259 {
3260 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3261 if (entry == NULL)
3262 return entry;
3263 }
3264
3265 /* Call the allocation method of the superclass. */
3266 entry = bfd_hash_newfunc (entry, table, string);
3267 if (entry != NULL)
3268 {
3269 struct ppc_stub_hash_entry *eh;
3270
3271 /* Initialize the local fields. */
3272 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3273 eh->stub_type = ppc_stub_none;
6f20ed8a 3274 eh->group = NULL;
721956f4
AM
3275 eh->stub_offset = 0;
3276 eh->target_value = 0;
3277 eh->target_section = NULL;
721956f4 3278 eh->h = NULL;
6911b7dc 3279 eh->plt_ent = NULL;
6911b7dc 3280 eh->other = 0;
721956f4
AM
3281 }
3282
3283 return entry;
3284}
3285
3286/* Create an entry in the branch hash table. */
3287
3288static struct bfd_hash_entry *
4ce794b7
AM
3289branch_hash_newfunc (struct bfd_hash_entry *entry,
3290 struct bfd_hash_table *table,
3291 const char *string)
721956f4
AM
3292{
3293 /* Allocate the structure if it has not already been allocated by a
3294 subclass. */
3295 if (entry == NULL)
3296 {
3297 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3298 if (entry == NULL)
3299 return entry;
3300 }
3301
3302 /* Call the allocation method of the superclass. */
3303 entry = bfd_hash_newfunc (entry, table, string);
3304 if (entry != NULL)
3305 {
3306 struct ppc_branch_hash_entry *eh;
3307
3308 /* Initialize the local fields. */
3309 eh = (struct ppc_branch_hash_entry *) entry;
3310 eh->offset = 0;
3311 eh->iter = 0;
3312 }
3313
3314 return entry;
3315}
3316
65f38f15
AM
3317/* Create an entry in a ppc64 ELF linker hash table. */
3318
3319static struct bfd_hash_entry *
4ce794b7
AM
3320link_hash_newfunc (struct bfd_hash_entry *entry,
3321 struct bfd_hash_table *table,
3322 const char *string)
65f38f15
AM
3323{
3324 /* Allocate the structure if it has not already been allocated by a
3325 subclass. */
3326 if (entry == NULL)
3327 {
3328 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3329 if (entry == NULL)
3330 return entry;
3331 }
3332
3333 /* Call the allocation method of the superclass. */
3334 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3335 if (entry != NULL)
3336 {
3337 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3338
b3fac117 3339 memset (&eh->u.stub_cache, 0,
908b32fc 3340 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3341 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3342
3343 /* When making function calls, old ABI code references function entry
3344 points (dot symbols), while new ABI code references the function
3345 descriptor symbol. We need to make any combination of reference and
3346 definition work together, without breaking archive linking.
3347
3348 For a defined function "foo" and an undefined call to "bar":
3349 An old object defines "foo" and ".foo", references ".bar" (possibly
3350 "bar" too).
3351 A new object defines "foo" and references "bar".
3352
3353 A new object thus has no problem with its undefined symbols being
3354 satisfied by definitions in an old object. On the other hand, the
3355 old object won't have ".bar" satisfied by a new object.
3356
3357 Keep a list of newly added dot-symbols. */
3358
3359 if (string[0] == '.')
3360 {
3361 struct ppc_link_hash_table *htab;
3362
3363 htab = (struct ppc_link_hash_table *) table;
3364 eh->u.next_dot_sym = htab->dot_syms;
3365 htab->dot_syms = eh;
3366 }
65f38f15
AM
3367 }
3368
3369 return entry;
3370}
3371
2cdcc330
AM
3372struct tocsave_entry
3373{
3b421ab3
AM
3374 asection *sec;
3375 bfd_vma offset;
3376};
3377
3378static hashval_t
3379tocsave_htab_hash (const void *p)
3380{
3381 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3382 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3383}
3384
3385static int
3386tocsave_htab_eq (const void *p1, const void *p2)
3387{
3388 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3389 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3390 return e1->sec == e2->sec && e1->offset == e2->offset;
3391}
3392
68faa637
AM
3393/* Destroy a ppc64 ELF linker hash table. */
3394
3395static void
d495ab0d 3396ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3397{
d495ab0d 3398 struct ppc_link_hash_table *htab;
68faa637 3399
d495ab0d 3400 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3401 if (htab->tocsave_htab)
3402 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3403 bfd_hash_table_free (&htab->branch_hash_table);
3404 bfd_hash_table_free (&htab->stub_hash_table);
3405 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3406}
3407
65f38f15
AM
3408/* Create a ppc64 ELF linker hash table. */
3409
3410static struct bfd_link_hash_table *
4ce794b7 3411ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3412{
3413 struct ppc_link_hash_table *htab;
3414 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3415
4ce794b7 3416 htab = bfd_zmalloc (amt);
65f38f15
AM
3417 if (htab == NULL)
3418 return NULL;
3419
66eb6687 3420 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3421 sizeof (struct ppc_link_hash_entry),
3422 PPC64_ELF_DATA))
65f38f15 3423 {
e2d34d7d 3424 free (htab);
65f38f15
AM
3425 return NULL;
3426 }
3427
721956f4 3428 /* Init the stub hash table too. */
66eb6687
AM
3429 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3430 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3431 {
d495ab0d 3432 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3433 return NULL;
3434 }
721956f4
AM
3435
3436 /* And the branch hash table. */
66eb6687
AM
3437 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3438 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3439 {
3440 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3441 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3442 return NULL;
3443 }
721956f4 3444
3b421ab3
AM
3445 htab->tocsave_htab = htab_try_create (1024,
3446 tocsave_htab_hash,
3447 tocsave_htab_eq,
3448 NULL);
3449 if (htab->tocsave_htab == NULL)
2915c55b 3450 {
d495ab0d 3451 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3452 return NULL;
3453 }
d495ab0d 3454 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3455
3254fd24
AM
3456 /* Initializing two fields of the union is just cosmetic. We really
3457 only care about glist, but when compiled on a 32-bit host the
3458 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3459 debugger inspection of these fields look nicer. */
a6aa5195
AM
3460 htab->elf.init_got_refcount.refcount = 0;
3461 htab->elf.init_got_refcount.glist = NULL;
3462 htab->elf.init_plt_refcount.refcount = 0;
3463 htab->elf.init_plt_refcount.glist = NULL;
3464 htab->elf.init_got_offset.offset = 0;
3465 htab->elf.init_got_offset.glist = NULL;
3466 htab->elf.init_plt_offset.offset = 0;
3467 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3468
65f38f15
AM
3469 return &htab->elf.root;
3470}
3471
bfeb4a28
AM
3472/* Create sections for linker generated code. */
3473
3474static bfd_boolean
3475create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3476{
3477 struct ppc_link_hash_table *htab;
3478 flagword flags;
3479
3480 htab = ppc_hash_table (info);
3481
bfeb4a28
AM
3482 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3483 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3484 if (htab->params->save_restore_funcs)
3485 {
3486 /* Create .sfpr for code to save and restore fp regs. */
3487 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3488 flags);
3489 if (htab->sfpr == NULL
fd361982 3490 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3491 return FALSE;
3492 }
3493
3494 if (bfd_link_relocatable (info))
3495 return TRUE;
bfeb4a28
AM
3496
3497 /* Create .glink for lazy dynamic linking support. */
3498 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3499 flags);
3500 if (htab->glink == NULL
fd361982 3501 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3502 return FALSE;
3503
9e390558
AM
3504 /* The part of .glink used by global entry stubs, separate so that
3505 it can be aligned appropriately without affecting htab->glink. */
3506 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3507 flags);
3508 if (htab->global_entry == NULL
fd361982 3509 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3510 return FALSE;
3511
bfeb4a28
AM
3512 if (!info->no_ld_generated_unwind_info)
3513 {
3514 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3515 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3516 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3517 ".eh_frame",
3518 flags);
3519 if (htab->glink_eh_frame == NULL
fd361982 3520 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3521 return FALSE;
3522 }
3523
3524 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3525 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3526 if (htab->elf.iplt == NULL
fd361982 3527 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3528 return FALSE;
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3531 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3532 htab->elf.irelplt
3533 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3534 if (htab->elf.irelplt == NULL
fd361982 3535 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3536 return FALSE;
3537
3538 /* Create branch lookup table for plt_branch stubs. */
3539 flags = (SEC_ALLOC | SEC_LOAD
3540 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3541 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3542 flags);
3543 if (htab->brlt == NULL
fd361982 3544 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3545 return FALSE;
3546
2d7ad24e
AM
3547 /* Local plt entries, put in .branch_lt but a separate section for
3548 convenience. */
3549 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3550 flags);
3551 if (htab->pltlocal == NULL
fd361982 3552 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3553 return FALSE;
3554
0e1862bb 3555 if (!bfd_link_pic (info))
bfeb4a28
AM
3556 return TRUE;
3557
3558 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3559 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3560 htab->relbrlt
3561 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3562 if (htab->relbrlt == NULL
fd361982 3563 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3564 return FALSE;
3565
2d7ad24e
AM
3566 htab->relpltlocal
3567 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3568 if (htab->relpltlocal == NULL
fd361982 3569 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3570 return FALSE;
3571
bfeb4a28
AM
3572 return TRUE;
3573}
3574
e717da7e
AM
3575/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3576
bfeb4a28 3577bfd_boolean
e7d1c40c
AM
3578ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3579 struct ppc64_elf_params *params)
e717da7e
AM
3580{
3581 struct ppc_link_hash_table *htab;
3582
e7d1c40c 3583 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3584
3585/* Always hook our dynamic sections into the first bfd, which is the
3586 linker created stub bfd. This ensures that the GOT header is at
3587 the start of the output TOC section. */
3588 htab = ppc_hash_table (info);
e7d1c40c
AM
3589 htab->elf.dynobj = params->stub_bfd;
3590 htab->params = params;
bfeb4a28 3591
bfeb4a28 3592 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3593}
3594
721956f4
AM
3595/* Build a name for an entry in the stub hash table. */
3596
3597static char *
4ce794b7
AM
3598ppc_stub_name (const asection *input_section,
3599 const asection *sym_sec,
3600 const struct ppc_link_hash_entry *h,
3601 const Elf_Internal_Rela *rel)
721956f4
AM
3602{
3603 char *stub_name;
bcaa2f82 3604 ssize_t len;
721956f4
AM
3605
3606 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3607 offsets from a sym as a branch target? In fact, we could
3608 probably assume the addend is always zero. */
3609 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3610
3611 if (h)
3612 {
3613 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3614 stub_name = bfd_malloc (len);
46de2a7c
AM
3615 if (stub_name == NULL)
3616 return stub_name;
3617
bcaa2f82
AM
3618 len = sprintf (stub_name, "%08x.%s+%x",
3619 input_section->id & 0xffffffff,
3620 h->elf.root.root.string,
3621 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3622 }
3623 else
3624 {
ad8e1ba5 3625 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3626 stub_name = bfd_malloc (len);
46de2a7c
AM
3627 if (stub_name == NULL)
3628 return stub_name;
3629
bcaa2f82
AM
3630 len = sprintf (stub_name, "%08x.%x:%x+%x",
3631 input_section->id & 0xffffffff,
3632 sym_sec->id & 0xffffffff,
3633 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3634 (int) rel->r_addend & 0xffffffff);
721956f4 3635 }
bcaa2f82 3636 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3637 stub_name[len - 2] = 0;
721956f4
AM
3638 return stub_name;
3639}
3640
3641/* Look up an entry in the stub hash. Stub entries are cached because
3642 creating the stub name takes a bit of time. */
3643
3644static struct ppc_stub_hash_entry *
4ce794b7
AM
3645ppc_get_stub_entry (const asection *input_section,
3646 const asection *sym_sec,
039b3fef 3647 struct ppc_link_hash_entry *h,
4ce794b7
AM
3648 const Elf_Internal_Rela *rel,
3649 struct ppc_link_hash_table *htab)
721956f4
AM
3650{
3651 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3652 struct map_stub *group;
721956f4
AM
3653
3654 /* If this input section is part of a group of sections sharing one
3655 stub section, then use the id of the first section in the group.
3656 Stub names need to include a section id, as there may well be
3657 more than one stub used to reach say, printf, and we need to
3658 distinguish between them. */
6f20ed8a 3659 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3660 if (group == NULL)
3661 return NULL;
721956f4 3662
b3fac117
AM
3663 if (h != NULL && h->u.stub_cache != NULL
3664 && h->u.stub_cache->h == h
6f20ed8a 3665 && h->u.stub_cache->group == group)
721956f4 3666 {
b3fac117 3667 stub_entry = h->u.stub_cache;
721956f4
AM
3668 }
3669 else
3670 {
3671 char *stub_name;
3672
6f20ed8a 3673 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3674 if (stub_name == NULL)
3675 return NULL;
3676
3677 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3678 stub_name, FALSE, FALSE);
721956f4 3679 if (h != NULL)
b3fac117 3680 h->u.stub_cache = stub_entry;
721956f4
AM
3681
3682 free (stub_name);
3683 }
3684
3685 return stub_entry;
3686}
3687
3688/* Add a new stub entry to the stub hash. Not all fields of the new
3689 stub entry are initialised. */
3690
3691static struct ppc_stub_hash_entry *
4ce794b7
AM
3692ppc_add_stub (const char *stub_name,
3693 asection *section,
25f53a85 3694 struct bfd_link_info *info)
721956f4 3695{
25f53a85 3696 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3697 struct map_stub *group;
721956f4
AM
3698 asection *link_sec;
3699 asection *stub_sec;
3700 struct ppc_stub_hash_entry *stub_entry;
3701
6f20ed8a
AM
3702 group = htab->sec_info[section->id].u.group;
3703 link_sec = group->link_sec;
3704 stub_sec = group->stub_sec;
721956f4
AM
3705 if (stub_sec == NULL)
3706 {
6f20ed8a
AM
3707 size_t namelen;
3708 bfd_size_type len;
3709 char *s_name;
721956f4 3710
6f20ed8a
AM
3711 namelen = strlen (link_sec->name);
3712 len = namelen + sizeof (STUB_SUFFIX);
3713 s_name = bfd_alloc (htab->params->stub_bfd, len);
3714 if (s_name == NULL)
3715 return NULL;
721956f4 3716
6f20ed8a
AM
3717 memcpy (s_name, link_sec->name, namelen);
3718 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3719 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3720 if (stub_sec == NULL)
3721 return NULL;
3722 group->stub_sec = stub_sec;
721956f4
AM
3723 }
3724
3725 /* Enter this entry into the linker stub hash table. */
3726 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3727 TRUE, FALSE);
721956f4
AM
3728 if (stub_entry == NULL)
3729 {
695344c0 3730 /* xgettext:c-format */
cf97bcb0
AM
3731 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3732 section->owner, stub_name);
721956f4
AM
3733 return NULL;
3734 }
3735
6f20ed8a 3736 stub_entry->group = group;
721956f4 3737 stub_entry->stub_offset = 0;
721956f4
AM
3738 return stub_entry;
3739}
3740
e717da7e
AM
3741/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3742 not already done. */
65f38f15 3743
b34976b6 3744static bfd_boolean
e717da7e 3745create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3746{
e717da7e
AM
3747 asection *got, *relgot;
3748 flagword flags;
3749 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3750
0c8d6e5c 3751 if (!is_ppc64_elf (abfd))
0ffa91dd 3752 return FALSE;
4dfe6ac6
NC
3753 if (htab == NULL)
3754 return FALSE;
0ffa91dd 3755
33e44f2e
AM
3756 if (!htab->elf.sgot
3757 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3758 return FALSE;
e717da7e
AM
3759
3760 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3761 | SEC_LINKER_CREATED);
3762
c456f082 3763 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3764 if (!got
fd361982 3765 || !bfd_set_section_alignment (got, 3))
e717da7e 3766 return FALSE;
65f38f15 3767
c456f082
AM
3768 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3769 flags | SEC_READONLY);
e717da7e 3770 if (!relgot
fd361982 3771 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3772 return FALSE;
e717da7e
AM
3773
3774 ppc64_elf_tdata (abfd)->got = got;
3775 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3776 return TRUE;
65f38f15 3777}
5bd4f169 3778
b31867b6
AM
3779/* Follow indirect and warning symbol links. */
3780
3781static inline struct bfd_link_hash_entry *
3782follow_link (struct bfd_link_hash_entry *h)
3783{
3784 while (h->type == bfd_link_hash_indirect
3785 || h->type == bfd_link_hash_warning)
3786 h = h->u.i.link;
3787 return h;
3788}
3789
3790static inline struct elf_link_hash_entry *
3791elf_follow_link (struct elf_link_hash_entry *h)
3792{
3793 return (struct elf_link_hash_entry *) follow_link (&h->root);
3794}
3795
3796static inline struct ppc_link_hash_entry *
3797ppc_follow_link (struct ppc_link_hash_entry *h)
3798{
3799 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3800}
3801
40d16e0b
AM
3802/* Merge PLT info on FROM with that on TO. */
3803
3804static void
3805move_plt_plist (struct ppc_link_hash_entry *from,
3806 struct ppc_link_hash_entry *to)
3807{
3808 if (from->elf.plt.plist != NULL)
3809 {
3810 if (to->elf.plt.plist != NULL)
3811 {
3812 struct plt_entry **entp;
3813 struct plt_entry *ent;
3814
3815 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3816 {
3817 struct plt_entry *dent;
3818
3819 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3820 if (dent->addend == ent->addend)
3821 {
3822 dent->plt.refcount += ent->plt.refcount;
3823 *entp = ent->next;
3824 break;
3825 }
3826 if (dent == NULL)
3827 entp = &ent->next;
3828 }
3829 *entp = to->elf.plt.plist;
3830 }
3831
3832 to->elf.plt.plist = from->elf.plt.plist;
3833 from->elf.plt.plist = NULL;
3834 }
3835}
3836
65f38f15
AM
3837/* Copy the extra info we tack onto an elf_link_hash_entry. */
3838
3839static void
fcfa13d2
AM
3840ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3841 struct elf_link_hash_entry *dir,
3842 struct elf_link_hash_entry *ind)
65f38f15
AM
3843{
3844 struct ppc_link_hash_entry *edir, *eind;
3845
3846 edir = (struct ppc_link_hash_entry *) dir;
3847 eind = (struct ppc_link_hash_entry *) ind;
3848
c79d6685
AM
3849 edir->is_func |= eind->is_func;
3850 edir->is_func_descriptor |= eind->is_func_descriptor;
3851 edir->tls_mask |= eind->tls_mask;
3852 if (eind->oh != NULL)
3853 edir->oh = ppc_follow_link (eind->oh);
3854
474436e6 3855 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3856 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3857 edir->elf.ref_regular |= eind->elf.ref_regular;
3858 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3859 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3860 edir->elf.needs_plt |= eind->elf.needs_plt;
3861 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3862
d311bc8b
AM
3863 /* If we were called to copy over info for a weak sym, don't copy
3864 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3865 in order to simplify readonly_dynrelocs and save a field in the
3866 symbol hash entry, but that means dyn_relocs can't be used in any
3867 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3868 are then tested. */
d311bc8b 3869 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3870 return;
d311bc8b 3871
411e1bfb 3872 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3873 if (eind->dyn_relocs != NULL)
65f38f15 3874 {
bbd7ec4a
AM
3875 if (edir->dyn_relocs != NULL)
3876 {
6061a67d
AM
3877 struct elf_dyn_relocs **pp;
3878 struct elf_dyn_relocs *p;
bbd7ec4a 3879
fcfa13d2 3880 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3881 list. Merge any entries against the same section. */
3882 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3883 {
6061a67d 3884 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3885
3886 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3887 if (q->sec == p->sec)
3888 {
3889 q->pc_count += p->pc_count;
3890 q->count += p->count;
3891 *pp = p->next;
3892 break;
3893 }
3894 if (q == NULL)
3895 pp = &p->next;
3896 }
3897 *pp = edir->dyn_relocs;
3898 }
3899
65f38f15
AM
3900 edir->dyn_relocs = eind->dyn_relocs;
3901 eind->dyn_relocs = NULL;
3902 }
65f38f15 3903
81848ca0
AM
3904 /* Copy over got entries that we may have already seen to the
3905 symbol which just became indirect. */
411e1bfb
AM
3906 if (eind->elf.got.glist != NULL)
3907 {
3908 if (edir->elf.got.glist != NULL)
3909 {
3910 struct got_entry **entp;
3911 struct got_entry *ent;
3912
3913 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3914 {
3915 struct got_entry *dent;
3916
3917 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3918 if (dent->addend == ent->addend
e717da7e 3919 && dent->owner == ent->owner
411e1bfb
AM
3920 && dent->tls_type == ent->tls_type)
3921 {
3922 dent->got.refcount += ent->got.refcount;
3923 *entp = ent->next;
3924 break;
3925 }
3926 if (dent == NULL)
3927 entp = &ent->next;
3928 }
3929 *entp = edir->elf.got.glist;
3930 }
3931
3932 edir->elf.got.glist = eind->elf.got.glist;
3933 eind->elf.got.glist = NULL;
3934 }
3935
3936 /* And plt entries. */
40d16e0b 3937 move_plt_plist (eind, edir);
411e1bfb 3938
fcfa13d2 3939 if (eind->elf.dynindx != -1)
411e1bfb 3940 {
fcfa13d2
AM
3941 if (edir->elf.dynindx != -1)
3942 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3943 edir->elf.dynstr_index);
411e1bfb
AM
3944 edir->elf.dynindx = eind->elf.dynindx;
3945 edir->elf.dynstr_index = eind->elf.dynstr_index;
3946 eind->elf.dynindx = -1;
3947 eind->elf.dynstr_index = 0;
3948 }
411e1bfb
AM
3949}
3950
8387904d
AM
3951/* Find the function descriptor hash entry from the given function code
3952 hash entry FH. Link the entries via their OH fields. */
3953
3954static struct ppc_link_hash_entry *
b31867b6 3955lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3956{
3957 struct ppc_link_hash_entry *fdh = fh->oh;
3958
3959 if (fdh == NULL)
3960 {
3961 const char *fd_name = fh->elf.root.root.string + 1;
3962
3963 fdh = (struct ppc_link_hash_entry *)
3964 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3965 if (fdh == NULL)
3966 return fdh;
3967
3968 fdh->is_func_descriptor = 1;
3969 fdh->oh = fh;
3970 fh->is_func = 1;
3971 fh->oh = fdh;
8387904d
AM
3972 }
3973
8c5b4e52
AM
3974 fdh = ppc_follow_link (fdh);
3975 fdh->is_func_descriptor = 1;
3976 fdh->oh = fh;
3977 return fdh;
8387904d
AM
3978}
3979
8c5b4e52 3980/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3981
3982static struct ppc_link_hash_entry *
3983make_fdh (struct bfd_link_info *info,
908b32fc 3984 struct ppc_link_hash_entry *fh)
bb700d78 3985{
8c5b4e52
AM
3986 bfd *abfd = fh->elf.root.u.undef.abfd;
3987 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3988 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3989 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3990 ? BSF_WEAK
3991 : BSF_GLOBAL);
3992
3993 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3994 fh->elf.root.root.string + 1,
3995 flags, bfd_und_section_ptr, 0,
3996 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3997 return NULL;
3998
3999 fdh = (struct ppc_link_hash_entry *) bh;
4000 fdh->elf.non_elf = 0;
908b32fc
AM
4001 fdh->fake = 1;
4002 fdh->is_func_descriptor = 1;
4003 fdh->oh = fh;
4004 fh->is_func = 1;
4005 fh->oh = fdh;
bb700d78
AM
4006 return fdh;
4007}
4008
8387904d
AM
4009/* Fix function descriptor symbols defined in .opd sections to be
4010 function type. */
555cd476
AM
4011
4012static bfd_boolean
c16153ae 4013ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4014 struct bfd_link_info *info,
555cd476 4015 Elf_Internal_Sym *isym,
6911b7dc 4016 const char **name,
555cd476
AM
4017 flagword *flags ATTRIBUTE_UNUSED,
4018 asection **sec,
b53dfeb2 4019 bfd_vma *value)
555cd476 4020{
b53dfeb2 4021 if (*sec != NULL
f1885d1e 4022 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4023 {
4024 asection *code_sec;
4025
4026 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4027 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4028 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4029
4030 /* If the symbol is a function defined in .opd, and the function
4031 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4032 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4033 && (*sec)->reloc_count != 0
4034 && opd_entry_value (*sec, *value, &code_sec, NULL,
4035 FALSE) != (bfd_vma) -1
4036 && discarded_section (code_sec))
4037 {
4038 *sec = bfd_und_section_ptr;
4039 isym->st_shndx = SHN_UNDEF;
4040 }
4041 }
dbd1e97e
AM
4042 else if (*sec != NULL
4043 && strcmp ((*sec)->name, ".toc") == 0
4044 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4045 {
4046 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4047 if (htab != NULL)
4048 htab->params->object_in_toc = 1;
4049 }
433817dd 4050
6911b7dc
AM
4051 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4052 {
4053 if (abiversion (ibfd) == 0)
4054 set_abiversion (ibfd, 2);
4055 else if (abiversion (ibfd) == 1)
4056 {
cf97bcb0
AM
4057 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4058 " for ABI version 1"), *name);
6911b7dc
AM
4059 bfd_set_error (bfd_error_bad_value);
4060 return FALSE;
4061 }
4062 }
4063
555cd476
AM
4064 return TRUE;
4065}
4066
6911b7dc
AM
4067/* Merge non-visibility st_other attributes: local entry point. */
4068
4069static void
4070ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4071 const Elf_Internal_Sym *isym,
4072 bfd_boolean definition,
4073 bfd_boolean dynamic)
4074{
f378ab09 4075 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4076 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4077 | ELF_ST_VISIBILITY (h->other));
4078}
4079
8c5b4e52
AM
4080/* Hook called on merging a symbol. We use this to clear "fake" since
4081 we now have a real symbol. */
4082
4083static bfd_boolean
4084ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4085 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4086 asection **psec ATTRIBUTE_UNUSED,
4087 bfd_boolean newdef ATTRIBUTE_UNUSED,
4088 bfd_boolean olddef ATTRIBUTE_UNUSED,
4089 bfd *oldbfd ATTRIBUTE_UNUSED,
4090 const asection *oldsec ATTRIBUTE_UNUSED)
4091{
4092 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
4093 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4094 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
4095 return TRUE;
4096}
4097
8387904d 4098/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4099 inclusion of a new ABI object archive that defines "bar".
4100 NAME is a symbol defined in an archive. Return a symbol in the hash
4101 table that might be satisfied by the archive symbols. */
8387904d
AM
4102
4103static struct elf_link_hash_entry *
4104ppc64_elf_archive_symbol_lookup (bfd *abfd,
4105 struct bfd_link_info *info,
4106 const char *name)
4107{
4108 struct elf_link_hash_entry *h;
4109 char *dot_name;
4110 size_t len;
4111
4112 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4113 if (h != NULL
4114 /* Don't return this sym if it is a fake function descriptor
4115 created by add_symbol_adjust. */
8c5b4e52 4116 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
4117 return h;
4118
4119 if (name[0] == '.')
4120 return h;
4121
4122 len = strlen (name);
4123 dot_name = bfd_alloc (abfd, len + 2);
4124 if (dot_name == NULL)
e99955cd 4125 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4126 dot_name[0] = '.';
4127 memcpy (dot_name + 1, name, len + 1);
4128 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4129 bfd_release (abfd, dot_name);
4130 return h;
4131}
4132
4133/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4134 new ABI object defines "bar". Well, at least, undefined dot symbols
4135 are made weak. This stops later archive searches from including an
4136 object if we already have a function descriptor definition. It also
35b0ce59
AM
4137 prevents the linker complaining about undefined symbols.
4138 We also check and correct mismatched symbol visibility here. The
4139 most restrictive visibility of the function descriptor and the
4140 function entry symbol is used. */
8387904d
AM
4141
4142static bfd_boolean
b3fac117 4143add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4144{
8387904d
AM
4145 struct ppc_link_hash_table *htab;
4146 struct ppc_link_hash_entry *fdh;
4147
b3fac117
AM
4148 if (eh->elf.root.type == bfd_link_hash_warning)
4149 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4150
8400d40d
AM
4151 if (eh->elf.root.type == bfd_link_hash_indirect)
4152 return TRUE;
4153
b3fac117
AM
4154 if (eh->elf.root.root.string[0] != '.')
4155 abort ();
8387904d 4156
b3fac117 4157 htab = ppc_hash_table (info);
4dfe6ac6
NC
4158 if (htab == NULL)
4159 return FALSE;
4160
b31867b6 4161 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4162 if (fdh == NULL
4163 && !bfd_link_relocatable (info)
4164 && (eh->elf.root.type == bfd_link_hash_undefined
4165 || eh->elf.root.type == bfd_link_hash_undefweak)
4166 && eh->elf.ref_regular)
4167 {
4168 /* Make an undefined function descriptor sym, in order to
4169 pull in an --as-needed shared lib. Archives are handled
4170 elsewhere. */
4171 fdh = make_fdh (info, eh);
4172 if (fdh == NULL)
4173 return FALSE;
bb700d78 4174 }
8c5b4e52
AM
4175
4176 if (fdh != NULL)
8387904d 4177 {
35b0ce59
AM
4178 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4179 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4180
4181 /* Make both descriptor and entry symbol have the most
4182 constraining visibility of either symbol. */
35b0ce59
AM
4183 if (entry_vis < descr_vis)
4184 fdh->elf.other += entry_vis - descr_vis;
4185 else if (entry_vis > descr_vis)
4186 eh->elf.other += descr_vis - entry_vis;
4187
8c5b4e52
AM
4188 /* Propagate reference flags from entry symbol to function
4189 descriptor symbol. */
bc4e12de 4190 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4191 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4192 fdh->elf.ref_regular |= eh->elf.ref_regular;
4193 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4194
4195 if (!fdh->elf.forced_local
4196 && fdh->elf.dynindx == -1
4197 && fdh->elf.versioned != versioned_hidden
4198 && (bfd_link_dll (info)
4199 || fdh->elf.def_dynamic
4200 || fdh->elf.ref_dynamic)
4201 && (eh->elf.ref_regular
4202 || eh->elf.def_regular))
4203 {
2cdcc330 4204 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4205 return FALSE;
35b0ce59 4206 }
8387904d 4207 }
99877b66 4208
8387904d
AM
4209 return TRUE;
4210}
4211
f6c7c3e8
AM
4212/* Set up opd section info and abiversion for IBFD, and process list
4213 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4214
8387904d 4215static bfd_boolean
f6c7c3e8 4216ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4217{
99877b66 4218 struct ppc_link_hash_table *htab;
b3fac117 4219 struct ppc_link_hash_entry **p, *eh;
459609d6 4220 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4221
459609d6 4222 if (opd != NULL && opd->size != 0)
b3fac117 4223 {
b9399fcf
AM
4224 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4225 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4226
459609d6
AM
4227 if (abiversion (ibfd) == 0)
4228 set_abiversion (ibfd, 1);
8a2058b5 4229 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4230 {
695344c0 4231 /* xgettext:c-format */
cf97bcb0
AM
4232 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4233 ibfd, abiversion (ibfd));
459609d6
AM
4234 bfd_set_error (bfd_error_bad_value);
4235 return FALSE;
f6c7c3e8 4236 }
b9399fcf 4237 }
f6c7c3e8 4238
b9399fcf
AM
4239 if (is_ppc64_elf (info->output_bfd))
4240 {
4241 /* For input files without an explicit abiversion in e_flags
4242 we should have flagged any with symbol st_other bits set
4243 as ELFv1 and above flagged those with .opd as ELFv2.
4244 Set the output abiversion if not yet set, and for any input
4245 still ambiguous, take its abiversion from the output.
4246 Differences in ABI are reported later. */
4247 if (abiversion (info->output_bfd) == 0)
4248 set_abiversion (info->output_bfd, abiversion (ibfd));
4249 else if (abiversion (ibfd) == 0)
4250 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4251 }
4252
459609d6
AM
4253 htab = ppc_hash_table (info);
4254 if (htab == NULL)
b9399fcf 4255 return TRUE;
459609d6 4256
b9399fcf
AM
4257 if (opd != NULL && opd->size != 0
4258 && (ibfd->flags & DYNAMIC) == 0
4259 && (opd->flags & SEC_RELOC) != 0
4260 && opd->reloc_count != 0
4261 && !bfd_is_abs_section (opd->output_section)
4262 && info->gc_sections)
4263 {
4264 /* Garbage collection needs some extra help with .opd sections.
4265 We don't want to necessarily keep everything referenced by
4266 relocs in .opd, as that would keep all functions. Instead,
4267 if we reference an .opd symbol (a function descriptor), we
4268 want to keep the function code symbol's section. This is
4269 easy for global symbols, but for local syms we need to keep
4270 information about the associated function section. */
4271 bfd_size_type amt;
4272 asection **opd_sym_map;
4273 Elf_Internal_Shdr *symtab_hdr;
4274 Elf_Internal_Rela *relocs, *rel_end, *rel;
4275
4276 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4277 opd_sym_map = bfd_zalloc (ibfd, amt);
4278 if (opd_sym_map == NULL)
4279 return FALSE;
4280 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4281 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4282 info->keep_memory);
4283 if (relocs == NULL)
4284 return FALSE;
4285 symtab_hdr = &elf_symtab_hdr (ibfd);
4286 rel_end = relocs + opd->reloc_count - 1;
4287 for (rel = relocs; rel < rel_end; rel++)
4288 {
4289 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4290 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4291
4292 if (r_type == R_PPC64_ADDR64
4293 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4294 && r_symndx < symtab_hdr->sh_info)
4295 {
4296 Elf_Internal_Sym *isym;
4297 asection *s;
4298
4299 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4300 if (isym == NULL)
4301 {
4302 if (elf_section_data (opd)->relocs != relocs)
4303 free (relocs);
4304 return FALSE;
4305 }
4306
4307 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4308 if (s != NULL && s != opd)
4309 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4310 }
4311 }
4312 if (elf_section_data (opd)->relocs != relocs)
4313 free (relocs);
4314 }
459609d6
AM
4315
4316 p = &htab->dot_syms;
4317 while ((eh = *p) != NULL)
4318 {
4319 *p = NULL;
4320 if (&eh->elf == htab->elf.hgot)
4321 ;
4322 else if (htab->elf.hgot == NULL
4323 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4324 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4325 else if (abiversion (ibfd) <= 1)
4326 {
4327 htab->need_func_desc_adj = 1;
4328 if (!add_symbol_adjust (eh, info))
4329 return FALSE;
4330 }
459609d6
AM
4331 p = &eh->u.next_dot_sym;
4332 }
b3fac117 4333 return TRUE;
8387904d
AM
4334}
4335
97fed1c9
JJ
4336/* Undo hash table changes when an --as-needed input file is determined
4337 not to be needed. */
4338
4339static bfd_boolean
e5034e59
AM
4340ppc64_elf_notice_as_needed (bfd *ibfd,
4341 struct bfd_link_info *info,
4342 enum notice_asneeded_action act)
97fed1c9 4343{
e5034e59
AM
4344 if (act == notice_not_needed)
4345 {
4346 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4347
e5034e59
AM
4348 if (htab == NULL)
4349 return FALSE;
4dfe6ac6 4350
e5034e59
AM
4351 htab->dot_syms = NULL;
4352 }
4353 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4354}
4355
aa374f67
AM
4356/* If --just-symbols against a final linked binary, then assume we need
4357 toc adjusting stubs when calling functions defined there. */
4358
4359static void
4360ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4361{
4362 if ((sec->flags & SEC_CODE) != 0
4363 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4364 && is_ppc64_elf (sec->owner))
4365 {
2c3f079f
AM
4366 if (abiversion (sec->owner) >= 2
4367 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4368 sec->has_toc_reloc = 1;
4369 }
4370 _bfd_elf_link_just_syms (sec, info);
4371}
4372
e054468f 4373static struct plt_entry **
4ce794b7
AM
4374update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4375 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4376{
4377 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4378 struct plt_entry **local_plt;
f961d9dd 4379 unsigned char *local_got_tls_masks;
411e1bfb
AM
4380
4381 if (local_got_ents == NULL)
4382 {
4383 bfd_size_type size = symtab_hdr->sh_info;
4384
e054468f
AM
4385 size *= (sizeof (*local_got_ents)
4386 + sizeof (*local_plt)
4387 + sizeof (*local_got_tls_masks));
4ce794b7 4388 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4389 if (local_got_ents == NULL)
e054468f 4390 return NULL;
411e1bfb
AM
4391 elf_local_got_ents (abfd) = local_got_ents;
4392 }
4393
37da22e5 4394 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4395 {
4396 struct got_entry *ent;
4397
4398 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4399 if (ent->addend == r_addend
4400 && ent->owner == abfd
4401 && ent->tls_type == tls_type)
411e1bfb
AM
4402 break;
4403 if (ent == NULL)
4404 {
4405 bfd_size_type amt = sizeof (*ent);
4ce794b7 4406 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4407 if (ent == NULL)
4408 return FALSE;
4409 ent->next = local_got_ents[r_symndx];
4410 ent->addend = r_addend;
e717da7e 4411 ent->owner = abfd;
411e1bfb 4412 ent->tls_type = tls_type;
927be08e 4413 ent->is_indirect = FALSE;
411e1bfb
AM
4414 ent->got.refcount = 0;
4415 local_got_ents[r_symndx] = ent;
4416 }
4417 ent->got.refcount += 1;
4418 }
4419
e054468f 4420 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4421 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4422 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4423
4424 return local_plt + r_symndx;
65f38f15
AM
4425}
4426
411e1bfb 4427static bfd_boolean
e054468f 4428update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4429{
411e1bfb 4430 struct plt_entry *ent;
1e2f5b6e 4431
e054468f 4432 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4433 if (ent->addend == addend)
4434 break;
4435 if (ent == NULL)
1e2f5b6e 4436 {
411e1bfb 4437 bfd_size_type amt = sizeof (*ent);
4ce794b7 4438 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4439 if (ent == NULL)
4440 return FALSE;
e054468f 4441 ent->next = *plist;
411e1bfb
AM
4442 ent->addend = addend;
4443 ent->plt.refcount = 0;
e054468f 4444 *plist = ent;
1e2f5b6e 4445 }
411e1bfb 4446 ent->plt.refcount += 1;
b34976b6 4447 return TRUE;
1e2f5b6e
AM
4448}
4449
e054468f
AM
4450static bfd_boolean
4451is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4452{
4453 return (r_type == R_PPC64_REL24
05d0e962 4454 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4455 || r_type == R_PPC64_REL14
4456 || r_type == R_PPC64_REL14_BRTAKEN
4457 || r_type == R_PPC64_REL14_BRNTAKEN
4458 || r_type == R_PPC64_ADDR24
4459 || r_type == R_PPC64_ADDR14
4460 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4461 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4462 || r_type == R_PPC64_PLTCALL
4463 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4464}
4465
4466/* Relocs on inline plt call sequence insns prior to the call. */
4467
4468static bfd_boolean
4469is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4470{
4471 return (r_type == R_PPC64_PLT16_HA
4472 || r_type == R_PPC64_PLT16_HI
4473 || r_type == R_PPC64_PLT16_LO
4474 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4475 || r_type == R_PPC64_PLT_PCREL34
4476 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4477 || r_type == R_PPC64_PLTSEQ
4478 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4479}
4480
5bd4f169 4481/* Look through the relocs for a section during the first phase, and
65f38f15 4482 calculate needed space in the global offset table, procedure
5d1634d7 4483 linkage table, and dynamic reloc sections. */
5bd4f169 4484
b34976b6 4485static bfd_boolean
4ce794b7
AM
4486ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4487 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4488{
65f38f15 4489 struct ppc_link_hash_table *htab;
5bd4f169 4490 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4491 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4492 const Elf_Internal_Rela *rel;
4493 const Elf_Internal_Rela *rel_end;
5bd4f169 4494 asection *sreloc;
3a71aa26 4495 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4496 bfd_boolean is_opd;
5bd4f169 4497
0e1862bb 4498 if (bfd_link_relocatable (info))
b34976b6 4499 return TRUE;
5bd4f169 4500
680a3378
AM
4501 /* Don't do anything special with non-loaded, non-alloced sections.
4502 In particular, any relocs in such sections should not affect GOT
4503 and PLT reference counting (ie. we don't allow them to create GOT
4504 or PLT entries), there's no possibility or desire to optimize TLS
4505 relocs, and there's not much point in propagating relocs to shared
4506 libs that the dynamic linker won't relocate. */
4507 if ((sec->flags & SEC_ALLOC) == 0)
4508 return TRUE;
4509
0c8d6e5c 4510 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4511
65f38f15 4512 htab = ppc_hash_table (info);
4dfe6ac6
NC
4513 if (htab == NULL)
4514 return FALSE;
4515
3a71aa26
AM
4516 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4517 FALSE, FALSE, TRUE);
4518 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4519 FALSE, FALSE, TRUE);
0ffa91dd 4520 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4521 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4522 sreloc = NULL;
b9399fcf 4523 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4524 rel_end = relocs + sec->reloc_count;
4525 for (rel = relocs; rel < rel_end; rel++)
4526 {
4527 unsigned long r_symndx;
4528 struct elf_link_hash_entry *h;
04c9666a 4529 enum elf_ppc64_reloc_type r_type;
727fc41e 4530 int tls_type;
7c8fe5c4 4531 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4532 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4533
4534 r_symndx = ELF64_R_SYM (rel->r_info);
4535 if (r_symndx < symtab_hdr->sh_info)
4536 h = NULL;
4537 else
973a3492
L
4538 {
4539 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4540 h = elf_follow_link (h);
1c865ab2
AM
4541
4542 if (h == htab->elf.hgot)
4543 sec->has_toc_reloc = 1;
973a3492 4544 }
5bd4f169 4545
727fc41e 4546 tls_type = 0;
e054468f 4547 ifunc = NULL;
5663e321
AM
4548 r_type = ELF64_R_TYPE (rel->r_info);
4549 switch (r_type)
4550 {
04bdff6a
AM
4551 case R_PPC64_D34:
4552 case R_PPC64_D34_LO:
4553 case R_PPC64_D34_HI30:
4554 case R_PPC64_D34_HA30:
4555 case R_PPC64_D28:
c213164a
AM
4556 case R_PPC64_TPREL34:
4557 case R_PPC64_DTPREL34:
04bdff6a 4558 case R_PPC64_PCREL34:
5663e321 4559 case R_PPC64_GOT_PCREL34:
c213164a
AM
4560 case R_PPC64_GOT_TLSGD34:
4561 case R_PPC64_GOT_TLSLD34:
4562 case R_PPC64_GOT_TPREL34:
4563 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4564 case R_PPC64_PLT_PCREL34:
4565 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4566 case R_PPC64_PCREL28:
4567 htab->powerxx_stubs = 1;
133a1f60
AM
4568 break;
4569 default:
5663e321
AM
4570 break;
4571 }
903b777d
AM
4572
4573 switch (r_type)
4574 {
4575 case R_PPC64_PLT16_HA:
4576 case R_PPC64_GOT_TLSLD16_HA:
4577 case R_PPC64_GOT_TLSGD16_HA:
4578 case R_PPC64_GOT_TPREL16_HA:
4579 case R_PPC64_GOT_DTPREL16_HA:
4580 case R_PPC64_GOT16_HA:
4581 case R_PPC64_TOC16_HA:
4582 case R_PPC64_PLT16_LO:
4583 case R_PPC64_PLT16_LO_DS:
4584 case R_PPC64_GOT_TLSLD16_LO:
4585 case R_PPC64_GOT_TLSGD16_LO:
4586 case R_PPC64_GOT_TPREL16_LO_DS:
4587 case R_PPC64_GOT_DTPREL16_LO_DS:
4588 case R_PPC64_GOT16_LO:
4589 case R_PPC64_GOT16_LO_DS:
4590 case R_PPC64_TOC16_LO:
4591 case R_PPC64_TOC16_LO_DS:
4592 case R_PPC64_GOT_PCREL34:
4593 ppc64_elf_tdata (abfd)->has_optrel = 1;
4594 ppc64_elf_section_data (sec)->has_optrel = 1;
4595 break;
4596 default:
4597 break;
4598 }
4599
25f23106
AM
4600 if (h != NULL)
4601 {
4602 if (h->type == STT_GNU_IFUNC)
4603 {
4604 h->needs_plt = 1;
4605 ifunc = &h->plt.plist;
4606 }
4607 }
4608 else
4609 {
4610 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4611 abfd, r_symndx);
4612 if (isym == NULL)
4613 return FALSE;
4614
4615 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4616 {
4617 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4618 rel->r_addend,
37da22e5 4619 NON_GOT | PLT_IFUNC);
25f23106
AM
4620 if (ifunc == NULL)
4621 return FALSE;
4622 }
4623 }
727fc41e 4624
a33d1f77 4625 switch (r_type)
5bd4f169 4626 {
727fc41e
AM
4627 case R_PPC64_TLSGD:
4628 case R_PPC64_TLSLD:
4629 /* These special tls relocs tie a call to __tls_get_addr with
4630 its parameter symbol. */
37da22e5
AM
4631 if (h != NULL)
4632 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4633 else
4634 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4635 rel->r_addend,
37da22e5
AM
4636 NON_GOT | TLS_TLS | TLS_MARK))
4637 return FALSE;
4638 sec->has_tls_reloc = 1;
727fc41e
AM
4639 break;
4640
411e1bfb
AM
4641 case R_PPC64_GOT_TLSLD16:
4642 case R_PPC64_GOT_TLSLD16_LO:
4643 case R_PPC64_GOT_TLSLD16_HI:
4644 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4645 case R_PPC64_GOT_TLSLD34:
951fd09b 4646 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4647 goto dogottls;
4648
4649 case R_PPC64_GOT_TLSGD16:
4650 case R_PPC64_GOT_TLSGD16_LO:
4651 case R_PPC64_GOT_TLSGD16_HI:
4652 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4653 case R_PPC64_GOT_TLSGD34:
951fd09b 4654 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4655 goto dogottls;
4656
4657 case R_PPC64_GOT_TPREL16_DS:
4658 case R_PPC64_GOT_TPREL16_LO_DS:
4659 case R_PPC64_GOT_TPREL16_HI:
4660 case R_PPC64_GOT_TPREL16_HA:
c213164a 4661 case R_PPC64_GOT_TPREL34:
7c8bbca5 4662 if (bfd_link_dll (info))
411e1bfb
AM
4663 info->flags |= DF_STATIC_TLS;
4664 tls_type = TLS_TLS | TLS_TPREL;
4665 goto dogottls;
4666
4667 case R_PPC64_GOT_DTPREL16_DS:
4668 case R_PPC64_GOT_DTPREL16_LO_DS:
4669 case R_PPC64_GOT_DTPREL16_HI:
4670 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4671 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4672 tls_type = TLS_TLS | TLS_DTPREL;
4673 dogottls:
4674 sec->has_tls_reloc = 1;
066f4018 4675 goto dogot;
411e1bfb 4676
903b777d
AM
4677 case R_PPC64_GOT16:
4678 case R_PPC64_GOT16_LO:
4679 case R_PPC64_GOT16_HI:
65f38f15 4680 case R_PPC64_GOT16_HA:
903b777d 4681 case R_PPC64_GOT16_DS:
066f4018 4682 case R_PPC64_GOT16_LO_DS:
4a421c53 4683 case R_PPC64_GOT_PCREL34:
066f4018 4684 dogot:
65f38f15 4685 /* This symbol requires a global offset table entry. */
4c52953f 4686 sec->has_toc_reloc = 1;
33c0ec9d
AM
4687 if (r_type == R_PPC64_GOT_TLSLD16
4688 || r_type == R_PPC64_GOT_TLSGD16
4689 || r_type == R_PPC64_GOT_TPREL16_DS
4690 || r_type == R_PPC64_GOT_DTPREL16_DS
4691 || r_type == R_PPC64_GOT16
4692 || r_type == R_PPC64_GOT16_DS)
4693 {
4694 htab->do_multi_toc = 1;
d77c8a4b 4695 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4696 }
4697
e717da7e
AM
4698 if (ppc64_elf_tdata (abfd)->got == NULL
4699 && !create_got_section (abfd, info))
b34976b6 4700 return FALSE;
5bd4f169
AM
4701
4702 if (h != NULL)
4703 {
411e1bfb
AM
4704 struct ppc_link_hash_entry *eh;
4705 struct got_entry *ent;
65f38f15 4706
411e1bfb
AM
4707 eh = (struct ppc_link_hash_entry *) h;
4708 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4709 if (ent->addend == rel->r_addend
e717da7e 4710 && ent->owner == abfd
411e1bfb
AM
4711 && ent->tls_type == tls_type)
4712 break;
4713 if (ent == NULL)
5bd4f169 4714 {
411e1bfb 4715 bfd_size_type amt = sizeof (*ent);
4ce794b7 4716 ent = bfd_alloc (abfd, amt);
411e1bfb 4717 if (ent == NULL)
b34976b6 4718 return FALSE;
411e1bfb 4719 ent->next = eh->elf.got.glist;
133a1f60 4720 ent->addend = rel->r_addend;
e717da7e 4721 ent->owner = abfd;
411e1bfb 4722 ent->tls_type = tls_type;
927be08e 4723 ent->is_indirect = FALSE;
411e1bfb
AM
4724 ent->got.refcount = 0;
4725 eh->elf.got.glist = ent;
5bd4f169 4726 }
411e1bfb 4727 ent->got.refcount += 1;
e7b938ca 4728 eh->tls_mask |= tls_type;
5bd4f169 4729 }
411e1bfb
AM
4730 else
4731 /* This is a global offset table entry for a local symbol. */
4732 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4733 rel->r_addend, tls_type))
411e1bfb 4734 return FALSE;
a345bc8d
AM
4735
4736 /* We may also need a plt entry if the symbol turns out to be
4737 an ifunc. */
0e1862bb 4738 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4739 {
133a1f60 4740 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
a345bc8d
AM
4741 return FALSE;
4742 }
5bd4f169
AM
4743 break;
4744
5bd4f169 4745 case R_PPC64_PLT16_HA:
65f38f15
AM
4746 case R_PPC64_PLT16_HI:
4747 case R_PPC64_PLT16_LO:
08be3224 4748 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4749 case R_PPC64_PLT_PCREL34:
4750 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4751 case R_PPC64_PLT32:
4752 case R_PPC64_PLT64:
cbf95972
AM
4753 /* This symbol requires a procedure linkage table entry. */
4754 plt_list = ifunc;
4755 if (h != NULL)
e054468f 4756 {
e054468f
AM
4757 h->needs_plt = 1;
4758 if (h->root.root.string[0] == '.'
4759 && h->root.root.string[1] != '\0')
4760 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4761 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4762 plt_list = &h->plt.plist;
4763 }
4764 if (plt_list == NULL)
2d7ad24e 4765 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4766 rel->r_addend,
2d7ad24e 4767 NON_GOT | PLT_KEEP);
133a1f60 4768 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4769 return FALSE;
5bd4f169
AM
4770 break;
4771
4772 /* The following relocations don't need to propagate the
4773 relocation if linking a shared object since they are
4774 section relative. */
4775 case R_PPC64_SECTOFF:
4776 case R_PPC64_SECTOFF_LO:
4777 case R_PPC64_SECTOFF_HI:
4778 case R_PPC64_SECTOFF_HA:
4779 case R_PPC64_SECTOFF_DS:
4780 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4781 case R_PPC64_DTPREL16:
4782 case R_PPC64_DTPREL16_LO:
4783 case R_PPC64_DTPREL16_HI:
4784 case R_PPC64_DTPREL16_HA:
4785 case R_PPC64_DTPREL16_DS:
4786 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4787 case R_PPC64_DTPREL16_HIGH:
4788 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4789 case R_PPC64_DTPREL16_HIGHER:
4790 case R_PPC64_DTPREL16_HIGHERA:
4791 case R_PPC64_DTPREL16_HIGHEST:
4792 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4793 break;
4794
ad8e1ba5 4795 /* Nor do these. */
25f23106
AM
4796 case R_PPC64_REL16:
4797 case R_PPC64_REL16_LO:
4798 case R_PPC64_REL16_HI:
4799 case R_PPC64_REL16_HA:
4a969973
AM
4800 case R_PPC64_REL16_HIGH:
4801 case R_PPC64_REL16_HIGHA:
4802 case R_PPC64_REL16_HIGHER:
4803 case R_PPC64_REL16_HIGHERA:
4804 case R_PPC64_REL16_HIGHEST:
4805 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4806 case R_PPC64_REL16_HIGHER34:
4807 case R_PPC64_REL16_HIGHERA34:
4808 case R_PPC64_REL16_HIGHEST34:
4809 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4810 case R_PPC64_REL16DX_HA:
25f23106
AM
4811 break;
4812
45965137
AM
4813 /* Not supported as a dynamic relocation. */
4814 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4815 if (bfd_link_pic (info))
45965137
AM
4816 {
4817 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4818 ppc_howto_init ();
695344c0 4819 /* xgettext:c-format */
174d0a74 4820 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4821 "in shared libraries and PIEs\n"),
45965137
AM
4822 abfd, sec, rel->r_offset,
4823 ppc64_elf_howto_table[r_type]->name);
4824 bfd_set_error (bfd_error_bad_value);
4825 return FALSE;
4826 }
4827 break;
4828
ad8e1ba5 4829 case R_PPC64_TOC16:
33c0ec9d
AM
4830 case R_PPC64_TOC16_DS:
4831 htab->do_multi_toc = 1;
d77c8a4b 4832 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4833 /* Fall through. */
ad8e1ba5
AM
4834 case R_PPC64_TOC16_LO:
4835 case R_PPC64_TOC16_HI:
4836 case R_PPC64_TOC16_HA:
ad8e1ba5 4837 case R_PPC64_TOC16_LO_DS:
4c52953f 4838 sec->has_toc_reloc = 1;
ec73ddcd 4839 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4840 {
4841 /* We may need a copy reloc. */
4842 h->non_got_ref = 1;
4843 /* Strongly prefer a copy reloc over a dynamic reloc.
4844 glibc ld.so as of 2019-08 will error out if one of
4845 these relocations is emitted. */
4846 h->needs_copy = 1;
4847 goto dodyn;
4848 }
ad8e1ba5
AM
4849 break;
4850
006589cf
AM
4851 /* Marker reloc. */
4852 case R_PPC64_ENTRY:
4853 break;
4854
5bd4f169
AM
4855 /* This relocation describes the C++ object vtable hierarchy.
4856 Reconstruct it for later use during GC. */
4857 case R_PPC64_GNU_VTINHERIT:
c152c796 4858 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4859 return FALSE;
5bd4f169
AM
4860 break;
4861
4862 /* This relocation describes which C++ vtable entries are actually
4863 used. Record for later use during GC. */
4864 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4865 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4866 return FALSE;
5bd4f169
AM
4867 break;
4868
721956f4
AM
4869 case R_PPC64_REL14:
4870 case R_PPC64_REL14_BRTAKEN:
4871 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4872 {
4873 asection *dest = NULL;
4874
4875 /* Heuristic: If jumping outside our section, chances are
4876 we are going to need a stub. */
4877 if (h != NULL)
4878 {
4879 /* If the sym is weak it may be overridden later, so
4880 don't assume we know where a weak sym lives. */
4881 if (h->root.type == bfd_link_hash_defined)
4882 dest = h->root.u.def.section;
4883 }
4884 else
87d72d41
AM
4885 {
4886 Elf_Internal_Sym *isym;
4887
4888 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4889 abfd, r_symndx);
4890 if (isym == NULL)
4891 return FALSE;
4892
4893 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4894 }
4895
220c76dd 4896 if (dest != sec)
7c8fe5c4 4897 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4898 }
3e04d765
AM
4899 goto rel24;
4900
4901 case R_PPC64_PLTCALL:
5663e321 4902 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4903 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4904 /* Fall through. */
4905
5d1634d7 4906 case R_PPC64_REL24:
05d0e962 4907 case R_PPC64_REL24_NOTOC:
3e04d765 4908 rel24:
cbf95972
AM
4909 plt_list = ifunc;
4910 if (h != NULL)
5d1634d7 4911 {
e054468f
AM
4912 h->needs_plt = 1;
4913 if (h->root.root.string[0] == '.'
4914 && h->root.root.string[1] != '\0')
4915 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4916
3a71aa26 4917 if (h == tga || h == dottga)
cbf95972
AM
4918 {
4919 sec->has_tls_reloc = 1;
4920 if (rel != relocs
4921 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4922 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4923 /* We have a new-style __tls_get_addr call with
4924 a marker reloc. */
4925 ;
4926 else
4927 /* Mark this section as having an old-style call. */
4928 sec->has_tls_get_addr_call = 1;
4929 }
4930 plt_list = &h->plt.plist;
411e1bfb 4931 }
cbf95972
AM
4932
4933 /* We may need a .plt entry if the function this reloc
4934 refers to is in a shared lib. */
4935 if (plt_list
133a1f60 4936 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4937 return FALSE;
411e1bfb
AM
4938 break;
4939
cbf95972
AM
4940 case R_PPC64_ADDR14:
4941 case R_PPC64_ADDR14_BRNTAKEN:
4942 case R_PPC64_ADDR14_BRTAKEN:
4943 case R_PPC64_ADDR24:
4944 goto dodyn;
4945
411e1bfb
AM
4946 case R_PPC64_TPREL64:
4947 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4948 if (bfd_link_dll (info))
411e1bfb
AM
4949 info->flags |= DF_STATIC_TLS;
4950 goto dotlstoc;
4951
4952 case R_PPC64_DTPMOD64:
4953 if (rel + 1 < rel_end
4954 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4955 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4956 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4957 else
951fd09b 4958 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4959 goto dotlstoc;
4960
4961 case R_PPC64_DTPREL64:
4962 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4963 if (rel != relocs
4964 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4965 && rel[-1].r_offset == rel->r_offset - 8)
4966 /* This is the second reloc of a dtpmod, dtprel pair.
4967 Don't mark with TLS_DTPREL. */
4968 goto dodyn;
4969
4970 dotlstoc:
4971 sec->has_tls_reloc = 1;
4972 if (h != NULL)
4973 {
4974 struct ppc_link_hash_entry *eh;
4975 eh = (struct ppc_link_hash_entry *) h;
46e9995a 4976 eh->tls_mask |= tls_type & 0xff;
411e1bfb
AM
4977 }
4978 else
4979 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4980 rel->r_addend, tls_type))
411e1bfb
AM
4981 return FALSE;
4982
7c8fe5c4
AM
4983 ppc64_sec = ppc64_elf_section_data (sec);
4984 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4985 {
3a71aa26
AM
4986 bfd_size_type amt;
4987
e7b938ca 4988 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4989 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4990 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4991 if (ppc64_sec->u.toc.symndx == NULL)
4992 return FALSE;
4993 amt = sec->size * sizeof (bfd_vma) / 8;
4994 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4995 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4996 return FALSE;
7c8fe5c4
AM
4997 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4998 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
4999 }
5000 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5001 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5002 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5003
5004 /* Mark the second slot of a GD or LD entry.
5005 -1 to indicate GD and -2 to indicate LD. */
5006 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5007 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5008 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5009 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5010 goto dodyn;
5011
5012 case R_PPC64_TPREL16:
5013 case R_PPC64_TPREL16_LO:
5014 case R_PPC64_TPREL16_HI:
5015 case R_PPC64_TPREL16_HA:
5016 case R_PPC64_TPREL16_DS:
5017 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5018 case R_PPC64_TPREL16_HIGH:
5019 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5020 case R_PPC64_TPREL16_HIGHER:
5021 case R_PPC64_TPREL16_HIGHERA:
5022 case R_PPC64_TPREL16_HIGHEST:
5023 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5024 case R_PPC64_TPREL34:
7c8bbca5
AM
5025 if (bfd_link_dll (info))
5026 info->flags |= DF_STATIC_TLS;
5027 goto dodyn;
5d1634d7 5028
e86ce104 5029 case R_PPC64_ADDR64:
b9399fcf 5030 if (is_opd
1e2f5b6e 5031 && rel + 1 < rel_end
4ce794b7 5032 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5033 {
8387904d 5034 if (h != NULL)
8c5b4e52 5035 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 5036 }
e86ce104
AM
5037 /* Fall through. */
5038
65f38f15
AM
5039 case R_PPC64_ADDR16:
5040 case R_PPC64_ADDR16_DS:
5041 case R_PPC64_ADDR16_HA:
5042 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5043 case R_PPC64_ADDR16_HIGH:
5044 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5045 case R_PPC64_ADDR16_HIGHER:
5046 case R_PPC64_ADDR16_HIGHERA:
5047 case R_PPC64_ADDR16_HIGHEST:
5048 case R_PPC64_ADDR16_HIGHESTA:
5049 case R_PPC64_ADDR16_LO:
5050 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5051 case R_PPC64_D34:
5052 case R_PPC64_D34_LO:
5053 case R_PPC64_D34_HI30:
5054 case R_PPC64_D34_HA30:
5055 case R_PPC64_ADDR16_HIGHER34:
5056 case R_PPC64_ADDR16_HIGHERA34:
5057 case R_PPC64_ADDR16_HIGHEST34:
5058 case R_PPC64_ADDR16_HIGHESTA34:
5059 case R_PPC64_D28:
0e1862bb 5060 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5061 && rel->r_addend == 0)
5062 {
5063 /* We may need a .plt entry if this reloc refers to a
5064 function in a shared lib. */
5663e321 5065 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5066 return FALSE;
5067 h->pointer_equality_needed = 1;
5068 }
5069 /* Fall through. */
5070
5071 case R_PPC64_REL30:
5072 case R_PPC64_REL32:
5073 case R_PPC64_REL64:
65f38f15 5074 case R_PPC64_ADDR32:
65f38f15
AM
5075 case R_PPC64_UADDR16:
5076 case R_PPC64_UADDR32:
5077 case R_PPC64_UADDR64:
5bd4f169 5078 case R_PPC64_TOC:
ec73ddcd 5079 if (h != NULL && bfd_link_executable (info))
81848ca0 5080 /* We may need a copy reloc. */
f5385ebf 5081 h->non_got_ref = 1;
81848ca0 5082
41bd81ab 5083 /* Don't propagate .opd relocs. */
b9399fcf 5084 if (NO_OPD_RELOCS && is_opd)
e86ce104 5085 break;
e86ce104 5086
65f38f15
AM
5087 /* If we are creating a shared library, and this is a reloc
5088 against a global symbol, or a non PC relative reloc
5089 against a local symbol, then we need to copy the reloc
5090 into the shared library. However, if we are linking with
5091 -Bsymbolic, we do not need to copy a reloc against a
5092 global symbol which is defined in an object we are
5093 including in the link (i.e., DEF_REGULAR is set). At
5094 this point we have not seen all the input files, so it is
5095 possible that DEF_REGULAR is not set now but will be set
5096 later (it is never cleared). In case of a weak definition,
5097 DEF_REGULAR may be cleared later by a strong definition in
5098 a shared library. We account for that possibility below by
f4656909 5099 storing information in the dyn_relocs field of the hash
65f38f15
AM
5100 table entry. A similar situation occurs when creating
5101 shared libraries and symbol visibility changes render the
5102 symbol local.
5103
5104 If on the other hand, we are creating an executable, we
5105 may need to keep relocations for symbols satisfied by a
5106 dynamic library if we manage to avoid copy relocs for the
5107 symbol. */
411e1bfb 5108 dodyn:
ec73ddcd
AM
5109 if ((h != NULL
5110 && (h->root.type == bfd_link_hash_defweak
5111 || !h->def_regular))
5112 || (h != NULL
5113 && !bfd_link_executable (info)
5114 && !SYMBOLIC_BIND (info, h))
5115 || (bfd_link_pic (info)
5116 && must_be_dyn_reloc (info, r_type))
0e1862bb 5117 || (!bfd_link_pic (info)
25f23106 5118 && ifunc != NULL))
5bd4f169 5119 {
65f38f15
AM
5120 /* We must copy these reloc types into the output file.
5121 Create a reloc section in dynobj and make room for
5122 this reloc. */
5bd4f169
AM
5123 if (sreloc == NULL)
5124 {
83bac4b0
NC
5125 sreloc = _bfd_elf_make_dynamic_reloc_section
5126 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5127
5bd4f169 5128 if (sreloc == NULL)
83bac4b0 5129 return FALSE;
5bd4f169
AM
5130 }
5131
65f38f15
AM
5132 /* If this is a global symbol, we count the number of
5133 relocations we need for this symbol. */
5134 if (h != NULL)
5135 {
19e08130
AM
5136 struct elf_dyn_relocs *p;
5137 struct elf_dyn_relocs **head;
5138
ec338859 5139 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5140 p = *head;
5141 if (p == NULL || p->sec != sec)
5142 {
5143 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5144 if (p == NULL)
5145 return FALSE;
5146 p->next = *head;
5147 *head = p;
5148 p->sec = sec;
5149 p->count = 0;
5150 p->pc_count = 0;
5151 }
5152 p->count += 1;
5153 if (!must_be_dyn_reloc (info, r_type))
5154 p->pc_count += 1;
65f38f15
AM
5155 }
5156 else
5157 {
ec338859
AM
5158 /* Track dynamic relocs needed for local syms too.
5159 We really need local syms available to do this
5160 easily. Oh well. */
19e08130
AM
5161 struct ppc_dyn_relocs *p;
5162 struct ppc_dyn_relocs **head;
5163 bfd_boolean is_ifunc;
ec338859 5164 asection *s;
6edfbbad 5165 void *vpp;
87d72d41 5166 Elf_Internal_Sym *isym;
6edfbbad 5167
87d72d41
AM
5168 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5169 abfd, r_symndx);
5170 if (isym == NULL)
b34976b6 5171 return FALSE;
ec338859 5172
87d72d41
AM
5173 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5174 if (s == NULL)
5175 s = sec;
5176
6edfbbad 5177 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5178 head = (struct ppc_dyn_relocs **) vpp;
5179 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5180 p = *head;
5181 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5182 p = p->next;
5183 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5184 {
5185 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5186 if (p == NULL)
5187 return FALSE;
5188 p->next = *head;
5189 *head = p;
5190 p->sec = sec;
5191 p->ifunc = is_ifunc;
5192 p->count = 0;
5193 }
5194 p->count += 1;
ec338859 5195 }
65f38f15 5196 }
5bd4f169 5197 break;
65f38f15
AM
5198
5199 default:
96e0dda4 5200 break;
5bd4f169
AM
5201 }
5202 }
5203
b34976b6 5204 return TRUE;
5bd4f169
AM
5205}
5206
ee67d69a
AM
5207/* Merge backend specific data from an object file to the output
5208 object file when linking. */
5209
5210static bfd_boolean
50e03d47 5211ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5212{
50e03d47 5213 bfd *obfd = info->output_bfd;
ee67d69a
AM
5214 unsigned long iflags, oflags;
5215
5216 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5217 return TRUE;
5218
5219 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5220 return TRUE;
5221
50e03d47 5222 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5223 return FALSE;
5224
5225 iflags = elf_elfheader (ibfd)->e_flags;
5226 oflags = elf_elfheader (obfd)->e_flags;
5227
f6c7c3e8 5228 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5229 {
4eca0228 5230 _bfd_error_handler
695344c0 5231 /* xgettext:c-format */
871b3ab2 5232 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5233 bfd_set_error (bfd_error_bad_value);
5234 return FALSE;
5235 }
f6c7c3e8 5236 else if (iflags != oflags && iflags != 0)
ee67d69a 5237 {
4eca0228 5238 _bfd_error_handler
695344c0 5239 /* xgettext:c-format */
871b3ab2 5240 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5241 ibfd, iflags, oflags);
5242 bfd_set_error (bfd_error_bad_value);
5243 return FALSE;
5244 }
5245
4a91d0ba
AM
5246 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5247 return FALSE;
005d79fd 5248
ee67d69a 5249 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5250 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5251}
5252
5253static bfd_boolean
5254ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5255{
5256 /* Print normal ELF private data. */
5257 _bfd_elf_print_private_bfd_data (abfd, ptr);
5258
5259 if (elf_elfheader (abfd)->e_flags != 0)
5260 {
5261 FILE *file = ptr;
5262
ee67d69a
AM
5263 fprintf (file, _("private flags = 0x%lx:"),
5264 elf_elfheader (abfd)->e_flags);
5265
5266 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5267 fprintf (file, _(" [abiv%ld]"),
5268 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5269 fputc ('\n', file);
5270 }
5271
5272 return TRUE;
5273}
5274
8387904d 5275/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5276 of the code entry point, and its section, which must be in the same
5277 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5278
5279static bfd_vma
5280opd_entry_value (asection *opd_sec,
5281 bfd_vma offset,
5282 asection **code_sec,
aef36ac1
AM
5283 bfd_vma *code_off,
5284 bfd_boolean in_code_sec)
8387904d
AM
5285{
5286 bfd *opd_bfd = opd_sec->owner;
8860955f 5287 Elf_Internal_Rela *relocs;
8387904d 5288 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5289 bfd_vma val;
8387904d 5290
9f296da3
AM
5291 /* No relocs implies we are linking a --just-symbols object, or looking
5292 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5293 if (opd_sec->reloc_count == 0)
5294 {
729eabd5 5295 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5296
729eabd5
AM
5297 if (contents == NULL)
5298 {
5299 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5300 return (bfd_vma) -1;
5301 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5302 }
ee1e4ede 5303
dbb3fbbb 5304 /* PR 17512: file: 64b9dfbb. */
451dfd38 5305 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5306 return (bfd_vma) -1;
5307
729eabd5 5308 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5309 if (code_sec != NULL)
5310 {
5311 asection *sec, *likely = NULL;
ee1e4ede 5312
aef36ac1 5313 if (in_code_sec)
4b85d634 5314 {
aef36ac1
AM
5315 sec = *code_sec;
5316 if (sec->vma <= val
5317 && val < sec->vma + sec->size)
5318 likely = sec;
5319 else
5320 val = -1;
5321 }
5322 else
5323 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5324 if (sec->vma <= val
5325 && (sec->flags & SEC_LOAD) != 0
5326 && (sec->flags & SEC_ALLOC) != 0)
5327 likely = sec;
5328 if (likely != NULL)
5329 {
5330 *code_sec = likely;
5331 if (code_off != NULL)
5332 *code_off = val - likely->vma;
4b85d634
AM
5333 }
5334 }
aef36ac1 5335 return val;
4b85d634
AM
5336 }
5337
0c8d6e5c 5338 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5339
729eabd5 5340 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5341 if (relocs == NULL)
5342 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5343 /* PR 17512: file: df8e1fd6. */
5344 if (relocs == NULL)
5345 return (bfd_vma) -1;
645ea6a9 5346
8387904d 5347 /* Go find the opd reloc at the sym address. */
8860955f 5348 lo = relocs;
8387904d 5349 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5350 val = (bfd_vma) -1;
8387904d
AM
5351 while (lo < hi)
5352 {
5353 look = lo + (hi - lo) / 2;
5354 if (look->r_offset < offset)
5355 lo = look + 1;
5356 else if (look->r_offset > offset)
5357 hi = look;
5358 else
5359 {
0ffa91dd
NC
5360 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5361
8387904d
AM
5362 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5363 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5364 {
5365 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5366 asection *sec = NULL;
8387904d 5367
b53dfeb2
AM
5368 if (symndx >= symtab_hdr->sh_info
5369 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5370 {
5371 struct elf_link_hash_entry **sym_hashes;
5372 struct elf_link_hash_entry *rh;
5373
5374 sym_hashes = elf_sym_hashes (opd_bfd);
5375 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5376 if (rh != NULL)
5377 {
5378 rh = elf_follow_link (rh);
bb854a36
AM
5379 if (rh->root.type != bfd_link_hash_defined
5380 && rh->root.type != bfd_link_hash_defweak)
5381 break;
5382 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5383 {
bb854a36
AM
5384 val = rh->root.u.def.value;
5385 sec = rh->root.u.def.section;
b53dfeb2
AM
5386 }
5387 }
5388 }
5389
5390 if (sec == NULL)
5391 {
5392 Elf_Internal_Sym *sym;
5393
5394 if (symndx < symtab_hdr->sh_info)
5395 {
5396 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5397 if (sym == NULL)
5398 {
5399 size_t symcnt = symtab_hdr->sh_info;
5400 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5401 symcnt, 0,
5402 NULL, NULL, NULL);
5403 if (sym == NULL)
5404 break;
5405 symtab_hdr->contents = (bfd_byte *) sym;
5406 }
5407 sym += symndx;
128205bb
AM
5408 }
5409 else
5410 {
b53dfeb2
AM
5411 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5412 1, symndx,
5413 NULL, NULL, NULL);
128205bb
AM
5414 if (sym == NULL)
5415 break;
128205bb 5416 }
b53dfeb2
AM
5417 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5418 if (sec == NULL)
5419 break;
5420 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5421 val = sym->st_value;
8387904d 5422 }
b53dfeb2 5423
8387904d
AM
5424 val += look->r_addend;
5425 if (code_off != NULL)
5426 *code_off = val;
5427 if (code_sec != NULL)
aef36ac1
AM
5428 {
5429 if (in_code_sec && *code_sec != sec)
5430 return -1;
5431 else
5432 *code_sec = sec;
5433 }
b53dfeb2 5434 if (sec->output_section != NULL)
8387904d 5435 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5436 }
5437 break;
5438 }
5439 }
645ea6a9 5440
645ea6a9 5441 return val;
8387904d
AM
5442}
5443
aef36ac1
AM
5444/* If the ELF symbol SYM might be a function in SEC, return the
5445 function size and set *CODE_OFF to the function's entry point,
5446 otherwise return zero. */
9f296da3 5447
aef36ac1
AM
5448static bfd_size_type
5449ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5450 bfd_vma *code_off)
9f296da3 5451{
aef36ac1
AM
5452 bfd_size_type size;
5453
5454 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5455 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5456 return 0;
5457
5458 size = 0;
5459 if (!(sym->flags & BSF_SYNTHETIC))
5460 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5461
5462 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5463 {
b07bca4e
AM
5464 struct _opd_sec_data *opd = get_opd_info (sym->section);
5465 bfd_vma symval = sym->value;
5466
5467 if (opd != NULL
5468 && opd->adjust != NULL
5469 && elf_section_data (sym->section)->relocs != NULL)
5470 {
5471 /* opd_entry_value will use cached relocs that have been
5472 adjusted, but with raw symbols. That means both local
5473 and global symbols need adjusting. */
5474 long adjust = opd->adjust[OPD_NDX (symval)];
5475 if (adjust == -1)
5476 return 0;
5477 symval += adjust;
5478 }
5479
5480 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5481 &sec, code_off, TRUE) == (bfd_vma) -1)
5482 return 0;
5483 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5484 symbol. This size has nothing to do with the code size of the
5485 function, which is what we're supposed to return, but the
5486 code size isn't available without looking up the dot-sym.
5487 However, doing that would be a waste of time particularly
5488 since elf_find_function will look at the dot-sym anyway.
5489 Now, elf_find_function will keep the largest size of any
5490 function sym found at the code address of interest, so return
5491 1 here to avoid it incorrectly caching a larger function size
5492 for a small function. This does mean we return the wrong
5493 size for a new-ABI function of size 24, but all that does is
5494 disable caching for such functions. */
5495 if (size == 24)
5496 size = 1;
9f296da3 5497 }
aef36ac1
AM
5498 else
5499 {
5500 if (sym->section != sec)
5501 return 0;
5502 *code_off = sym->value;
5503 }
5504 if (size == 0)
5505 size = 1;
5506 return size;
9f296da3
AM
5507}
5508
f378ab09
AM
5509/* Return true if symbol is a strong function defined in an ELFv2
5510 object with st_other localentry bits of zero, ie. its local entry
5511 point coincides with its global entry point. */
5512
5513static bfd_boolean
5514is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5515{
5516 return (h != NULL
5517 && h->type == STT_FUNC
5518 && h->root.type == bfd_link_hash_defined
5519 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5520 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5521 && is_ppc64_elf (h->root.u.def.section->owner)
5522 && abiversion (h->root.u.def.section->owner) >= 2);
5523}
5524
854b41e7
AM
5525/* Return true if symbol is defined in a regular object file. */
5526
5527static bfd_boolean
5528is_static_defined (struct elf_link_hash_entry *h)
5529{
5530 return ((h->root.type == bfd_link_hash_defined
5531 || h->root.type == bfd_link_hash_defweak)
5532 && h->root.u.def.section != NULL
5533 && h->root.u.def.section->output_section != NULL);
5534}
5535
b31867b6
AM
5536/* If FDH is a function descriptor symbol, return the associated code
5537 entry symbol if it is defined. Return NULL otherwise. */
5538
5539static struct ppc_link_hash_entry *
5540defined_code_entry (struct ppc_link_hash_entry *fdh)
5541{
5542 if (fdh->is_func_descriptor)
5543 {
5544 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5545 if (fh->elf.root.type == bfd_link_hash_defined
5546 || fh->elf.root.type == bfd_link_hash_defweak)
5547 return fh;
5548 }
5549 return NULL;
5550}
5551
5552/* If FH is a function code entry symbol, return the associated
5553 function descriptor symbol if it is defined. Return NULL otherwise. */
5554
5555static struct ppc_link_hash_entry *
5556defined_func_desc (struct ppc_link_hash_entry *fh)
5557{
5558 if (fh->oh != NULL
5559 && fh->oh->is_func_descriptor)
5560 {
5561 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5562 if (fdh->elf.root.type == bfd_link_hash_defined
5563 || fdh->elf.root.type == bfd_link_hash_defweak)
5564 return fdh;
5565 }
5566 return NULL;
5567}
5568
8c5b4e52
AM
5569static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5570
5571/* Garbage collect sections, after first dealing with dot-symbols. */
5572
5573static bfd_boolean
5574ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5575{
5576 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5577
5578 if (htab != NULL && htab->need_func_desc_adj)
5579 {
5580 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5581 htab->need_func_desc_adj = 0;
5582 }
5583 return bfd_elf_gc_sections (abfd, info);
5584}
5585
74f0fb50
AM
5586/* Mark all our entry sym sections, both opd and code section. */
5587
5588static void
5589ppc64_elf_gc_keep (struct bfd_link_info *info)
5590{
5591 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5592 struct bfd_sym_chain *sym;
5593
4dfe6ac6
NC
5594 if (htab == NULL)
5595 return;
5596
74f0fb50
AM
5597 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5598 {
b31867b6 5599 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5600 asection *sec;
5601
5602 eh = (struct ppc_link_hash_entry *)
b31867b6 5603 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5604 if (eh == NULL)
5605 continue;
5606 if (eh->elf.root.type != bfd_link_hash_defined
5607 && eh->elf.root.type != bfd_link_hash_defweak)
5608 continue;
5609
b31867b6
AM
5610 fh = defined_code_entry (eh);
5611 if (fh != NULL)
74f0fb50 5612 {
b31867b6 5613 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5614 sec->flags |= SEC_KEEP;
5615 }
5616 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5617 && opd_entry_value (eh->elf.root.u.def.section,
5618 eh->elf.root.u.def.value,
aef36ac1 5619 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5620 sec->flags |= SEC_KEEP;
5621
5622 sec = eh->elf.root.u.def.section;
5623 sec->flags |= SEC_KEEP;
5624 }
5625}
5626
64d03ab5
AM
5627/* Mark sections containing dynamically referenced symbols. When
5628 building shared libraries, we must assume that any visible symbol is
5629 referenced. */
5630
5631static bfd_boolean
5632ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5633{
5634 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5635 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5636 struct ppc_link_hash_entry *fdh;
b407645f 5637 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5638
64d03ab5 5639 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5640 fdh = defined_func_desc (eh);
5641 if (fdh != NULL)
5642 eh = fdh;
64d03ab5
AM
5643
5644 if ((eh->elf.root.type == bfd_link_hash_defined
5645 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5646 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5647 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5648 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5649 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5650 && (!bfd_link_executable (info)
e278ae05 5651 || info->gc_keep_exported
b407645f
AM
5652 || info->export_dynamic
5653 || (eh->elf.dynamic
5654 && d != NULL
2cdcc330
AM
5655 && (*d->match) (&d->head, NULL,
5656 eh->elf.root.root.string)))
e278ae05 5657 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5658 || !bfd_hide_sym_by_version (info->version_info,
5659 eh->elf.root.root.string)))))
64d03ab5
AM
5660 {
5661 asection *code_sec;
b31867b6 5662 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5663
5664 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5665
5666 /* Function descriptor syms cause the associated
5667 function code sym section to be marked. */
b31867b6
AM
5668 fh = defined_code_entry (eh);
5669 if (fh != NULL)
5670 {
5671 code_sec = fh->elf.root.u.def.section;
5672 code_sec->flags |= SEC_KEEP;
5673 }
64d03ab5
AM
5674 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5675 && opd_entry_value (eh->elf.root.u.def.section,
5676 eh->elf.root.u.def.value,
aef36ac1 5677 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5678 code_sec->flags |= SEC_KEEP;
5679 }
5680
5681 return TRUE;
5682}
5683
5bd4f169
AM
5684/* Return the section that should be marked against GC for a given
5685 relocation. */
5686
5687static asection *
4ce794b7 5688ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5689 struct bfd_link_info *info,
4ce794b7
AM
5690 Elf_Internal_Rela *rel,
5691 struct elf_link_hash_entry *h,
5692 Elf_Internal_Sym *sym)
5bd4f169 5693{
ccfa59ea
AM
5694 asection *rsec;
5695
ccfa59ea
AM
5696 /* Syms return NULL if we're marking .opd, so we avoid marking all
5697 function sections, as all functions are referenced in .opd. */
5698 rsec = NULL;
5699 if (get_opd_info (sec) != NULL)
5700 return rsec;
1e2f5b6e 5701
5bd4f169
AM
5702 if (h != NULL)
5703 {
04c9666a 5704 enum elf_ppc64_reloc_type r_type;
b31867b6 5705 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5706
4ce794b7 5707 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5708 switch (r_type)
5bd4f169
AM
5709 {
5710 case R_PPC64_GNU_VTINHERIT:
5711 case R_PPC64_GNU_VTENTRY:
5712 break;
5713
5714 default:
5715 switch (h->root.type)
5716 {
5717 case bfd_link_hash_defined:
5718 case bfd_link_hash_defweak:
ccfa59ea 5719 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5720 fdh = defined_func_desc (eh);
5721 if (fdh != NULL)
8c5b4e52
AM
5722 {
5723 /* -mcall-aixdesc code references the dot-symbol on
5724 a call reloc. Mark the function descriptor too
5725 against garbage collection. */
5726 fdh->elf.mark = 1;
60d67dc8
AM
5727 if (fdh->elf.is_weakalias)
5728 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5729 eh = fdh;
5730 }
1e2f5b6e
AM
5731
5732 /* Function descriptor syms cause the associated
5733 function code sym section to be marked. */
b31867b6
AM
5734 fh = defined_code_entry (eh);
5735 if (fh != NULL)
ccfa59ea
AM
5736 {
5737 /* They also mark their opd section. */
74f0fb50 5738 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5739
b31867b6 5740 rsec = fh->elf.root.u.def.section;
ccfa59ea 5741 }
8387904d
AM
5742 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5743 && opd_entry_value (eh->elf.root.u.def.section,
5744 eh->elf.root.u.def.value,
aef36ac1 5745 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5746 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5747 else
1e2f5b6e
AM
5748 rsec = h->root.u.def.section;
5749 break;
5bd4f169
AM
5750
5751 case bfd_link_hash_common:
1e2f5b6e
AM
5752 rsec = h->root.u.c.p->section;
5753 break;
5bd4f169
AM
5754
5755 default:
fb34365b 5756 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5757 }
5758 }
5759 }
5760 else
5761 {
74f0fb50 5762 struct _opd_sec_data *opd;
1e2f5b6e
AM
5763
5764 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5765 opd = get_opd_info (rsec);
5766 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5767 {
74f0fb50 5768 rsec->gc_mark = 1;
ccfa59ea 5769
51aecdc5 5770 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5771 }
5bd4f169
AM
5772 }
5773
1e2f5b6e 5774 return rsec;
5bd4f169
AM
5775}
5776
deb0e272
AM
5777/* The maximum size of .sfpr. */
5778#define SFPR_MAX (218*4)
5779
5780struct sfpr_def_parms
5781{
699733f6
AM
5782 const char name[12];
5783 unsigned char lo, hi;
2cdcc330
AM
5784 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5785 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5786};
5787
a4b6fadd
AM
5788/* Auto-generate _save*, _rest* functions in .sfpr.
5789 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5790 instead. */
deb0e272 5791
4dfe6ac6 5792static bfd_boolean
a4b6fadd
AM
5793sfpr_define (struct bfd_link_info *info,
5794 const struct sfpr_def_parms *parm,
5795 asection *stub_sec)
deb0e272
AM
5796{
5797 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5798 unsigned int i;
5799 size_t len = strlen (parm->name);
5800 bfd_boolean writing = FALSE;
699733f6 5801 char sym[16];
deb0e272 5802
4dfe6ac6
NC
5803 if (htab == NULL)
5804 return FALSE;
5805
deb0e272
AM
5806 memcpy (sym, parm->name, len);
5807 sym[len + 2] = 0;
5808
5809 for (i = parm->lo; i <= parm->hi; i++)
5810 {
a4b6fadd 5811 struct ppc_link_hash_entry *h;
deb0e272
AM
5812
5813 sym[len + 0] = i / 10 + '0';
5814 sym[len + 1] = i % 10 + '0';
a4b6fadd 5815 h = (struct ppc_link_hash_entry *)
b32547cd 5816 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5817 if (stub_sec != NULL)
deb0e272 5818 {
a4b6fadd
AM
5819 if (h != NULL
5820 && h->elf.root.type == bfd_link_hash_defined
5821 && h->elf.root.u.def.section == htab->sfpr)
5822 {
5823 struct elf_link_hash_entry *s;
5824 char buf[32];
5825 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5826 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5827 if (s == NULL)
5828 return FALSE;
5829 if (s->root.type == bfd_link_hash_new
5830 || (s->root.type = bfd_link_hash_defined
5831 && s->root.u.def.section == stub_sec))
5832 {
5833 s->root.type = bfd_link_hash_defined;
5834 s->root.u.def.section = stub_sec;
7dda8d3c 5835 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5836 + h->elf.root.u.def.value);
5837 s->ref_regular = 1;
5838 s->def_regular = 1;
5839 s->ref_regular_nonweak = 1;
5840 s->forced_local = 1;
5841 s->non_elf = 0;
5842 s->root.linker_def = 1;
5843 }
5844 }
5845 continue;
5846 }
5847 if (h != NULL)
5848 {
5849 h->save_res = 1;
5850 if (!h->elf.def_regular)
deb0e272 5851 {
a4b6fadd
AM
5852 h->elf.root.type = bfd_link_hash_defined;
5853 h->elf.root.u.def.section = htab->sfpr;
5854 h->elf.root.u.def.value = htab->sfpr->size;
5855 h->elf.type = STT_FUNC;
5856 h->elf.def_regular = 1;
b32547cd 5857 h->elf.non_elf = 0;
a4b6fadd
AM
5858 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5859 writing = TRUE;
deb0e272 5860 if (htab->sfpr->contents == NULL)
a4b6fadd 5861 {
2cdcc330
AM
5862 htab->sfpr->contents
5863 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5864 if (htab->sfpr->contents == NULL)
5865 return FALSE;
5866 }
deb0e272
AM
5867 }
5868 }
5869 if (writing)
5870 {
5871 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5872 if (i != parm->hi)
5873 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5874 else
5875 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5876 htab->sfpr->size = p - htab->sfpr->contents;
5877 }
5878 }
5879
5880 return TRUE;
5881}
5882
5883static bfd_byte *
5884savegpr0 (bfd *abfd, bfd_byte *p, int r)
5885{
5886 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5887 return p + 4;
5888}
5889
5890static bfd_byte *
5891savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5892{
5893 p = savegpr0 (abfd, p, r);
a078d95a 5894 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5895 p = p + 4;
5896 bfd_put_32 (abfd, BLR, p);
5897 return p + 4;
5898}
5899
5900static bfd_byte *
5901restgpr0 (bfd *abfd, bfd_byte *p, int r)
5902{
5903 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5904 return p + 4;
5905}
5906
5907static bfd_byte *
5908restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5909{
a078d95a 5910 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5911 p = p + 4;
5912 p = restgpr0 (abfd, p, r);
5913 bfd_put_32 (abfd, MTLR_R0, p);
5914 p = p + 4;
5915 if (r == 29)
5916 {
5917 p = restgpr0 (abfd, p, 30);
5918 p = restgpr0 (abfd, p, 31);
5919 }
5920 bfd_put_32 (abfd, BLR, p);
5921 return p + 4;
5922}
5923
5924static bfd_byte *
5925savegpr1 (bfd *abfd, bfd_byte *p, int r)
5926{
5927 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5928 return p + 4;
5929}
5930
5931static bfd_byte *
5932savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5933{
5934 p = savegpr1 (abfd, p, r);
5935 bfd_put_32 (abfd, BLR, p);
5936 return p + 4;
5937}
5938
5939static bfd_byte *
5940restgpr1 (bfd *abfd, bfd_byte *p, int r)
5941{
5942 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5943 return p + 4;
5944}
5945
5946static bfd_byte *
5947restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5948{
5949 p = restgpr1 (abfd, p, r);
5950 bfd_put_32 (abfd, BLR, p);
5951 return p + 4;
5952}
5953
5954static bfd_byte *
5955savefpr (bfd *abfd, bfd_byte *p, int r)
5956{
5957 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5958 return p + 4;
5959}
5960
5961static bfd_byte *
5962savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5963{
5964 p = savefpr (abfd, p, r);
a078d95a 5965 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5966 p = p + 4;
5967 bfd_put_32 (abfd, BLR, p);
5968 return p + 4;
5969}
5970
5971static bfd_byte *
5972restfpr (bfd *abfd, bfd_byte *p, int r)
5973{
5974 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5975 return p + 4;
5976}
5977
5978static bfd_byte *
5979restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5980{
a078d95a 5981 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5982 p = p + 4;
5983 p = restfpr (abfd, p, r);
5984 bfd_put_32 (abfd, MTLR_R0, p);
5985 p = p + 4;
5986 if (r == 29)
5987 {
5988 p = restfpr (abfd, p, 30);
5989 p = restfpr (abfd, p, 31);
5990 }
5991 bfd_put_32 (abfd, BLR, p);
5992 return p + 4;
5993}
5994
5995static bfd_byte *
5996savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5997{
5998 p = savefpr (abfd, p, r);
5999 bfd_put_32 (abfd, BLR, p);
6000 return p + 4;
6001}
6002
6003static bfd_byte *
6004restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6005{
6006 p = restfpr (abfd, p, r);
6007 bfd_put_32 (abfd, BLR, p);
6008 return p + 4;
6009}
6010
6011static bfd_byte *
6012savevr (bfd *abfd, bfd_byte *p, int r)
6013{
6014 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6015 p = p + 4;
6016 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6017 return p + 4;
6018}
6019
6020static bfd_byte *
6021savevr_tail (bfd *abfd, bfd_byte *p, int r)
6022{
6023 p = savevr (abfd, p, r);
6024 bfd_put_32 (abfd, BLR, p);
6025 return p + 4;
6026}
6027
6028static bfd_byte *
6029restvr (bfd *abfd, bfd_byte *p, int r)
6030{
6031 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6032 p = p + 4;
6033 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6034 return p + 4;
6035}
6036
6037static bfd_byte *
6038restvr_tail (bfd *abfd, bfd_byte *p, int r)
6039{
6040 p = restvr (abfd, p, r);
6041 bfd_put_32 (abfd, BLR, p);
6042 return p + 4;
6043}
6044
e86ce104
AM
6045/* Called via elf_link_hash_traverse to transfer dynamic linking
6046 information on function code symbol entries to their corresponding
6047 function descriptor symbol entries. */
deb0e272 6048
b34976b6 6049static bfd_boolean
4ce794b7 6050func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6051{
e86ce104 6052 struct bfd_link_info *info;
65f38f15 6053 struct ppc_link_hash_table *htab;
50bc7936
AM
6054 struct ppc_link_hash_entry *fh;
6055 struct ppc_link_hash_entry *fdh;
6056 bfd_boolean force_local;
5bd4f169 6057
50bc7936
AM
6058 fh = (struct ppc_link_hash_entry *) h;
6059 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6060 return TRUE;
e86ce104 6061
8c5b4e52
AM
6062 if (!fh->is_func)
6063 return TRUE;
6064
6065 if (fh->elf.root.root.string[0] != '.'
6066 || fh->elf.root.root.string[1] == '\0')
6067 return TRUE;
6068
4ce794b7 6069 info = inf;
65f38f15 6070 htab = ppc_hash_table (info);
4dfe6ac6
NC
6071 if (htab == NULL)
6072 return FALSE;
5bd4f169 6073
8c5b4e52
AM
6074 /* Find the corresponding function descriptor symbol. */
6075 fdh = lookup_fdh (fh, htab);
6076
c09bdfe5
AM
6077 /* Resolve undefined references to dot-symbols as the value
6078 in the function descriptor, if we have one in a regular object.
6079 This is to satisfy cases like ".quad .foo". Calls to functions
6080 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6081 if ((fh->elf.root.type == bfd_link_hash_undefined
6082 || fh->elf.root.type == bfd_link_hash_undefweak)
6083 && (fdh->elf.root.type == bfd_link_hash_defined
6084 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6085 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6086 && opd_entry_value (fdh->elf.root.u.def.section,
6087 fdh->elf.root.u.def.value,
c09bdfe5 6088 &fh->elf.root.u.def.section,
aef36ac1 6089 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6090 {
b31867b6 6091 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6092 fh->elf.forced_local = 1;
b31867b6
AM
6093 fh->elf.def_regular = fdh->elf.def_regular;
6094 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6095 }
6096
8c5b4e52
AM
6097 if (!fh->elf.dynamic)
6098 {
6099 struct plt_entry *ent;
5bd4f169 6100
8c5b4e52
AM
6101 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6102 if (ent->plt.refcount > 0)
6103 break;
6104 if (ent == NULL)
6105 return TRUE;
6106 }
5bd4f169 6107
8c5b4e52 6108 /* Create a descriptor as undefined if necessary. */
50bc7936 6109 if (fdh == NULL
0e1862bb 6110 && !bfd_link_executable (info)
50bc7936
AM
6111 && (fh->elf.root.type == bfd_link_hash_undefined
6112 || fh->elf.root.type == bfd_link_hash_undefweak))
6113 {
908b32fc 6114 fdh = make_fdh (info, fh);
bb700d78
AM
6115 if (fdh == NULL)
6116 return FALSE;
50bc7936 6117 }
648cca2c 6118
8c5b4e52 6119 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6120 if (fdh != NULL
6121 && fdh->fake
8c5b4e52
AM
6122 && (fh->elf.root.type == bfd_link_hash_defined
6123 || fh->elf.root.type == bfd_link_hash_defweak))
6124 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6125
8c5b4e52
AM
6126 /* Transfer dynamic linking information to the function descriptor. */
6127 if (fdh != NULL)
6128 {
f5385ebf
AM
6129 fdh->elf.ref_regular |= fh->elf.ref_regular;
6130 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6131 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6132 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6133 fdh->elf.dynamic |= fh->elf.dynamic;
6134 fdh->elf.needs_plt |= (fh->elf.needs_plt
6135 || fh->elf.type == STT_FUNC
6136 || fh->elf.type == STT_GNU_IFUNC);
6137 move_plt_plist (fh, fdh);
6138
6139 if (!fdh->elf.forced_local
6140 && fh->elf.dynindx != -1)
6141 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6142 return FALSE;
e86ce104
AM
6143 }
6144
50bc7936
AM
6145 /* Now that the info is on the function descriptor, clear the
6146 function code sym info. Any function code syms for which we
6147 don't have a definition in a regular file, we force local.
6148 This prevents a shared library from exporting syms that have
6149 been imported from another library. Function code syms that
6150 are really in the library we must leave global to prevent the
6151 linker dragging in a definition from a static library. */
93f3fa99
AM
6152 force_local = (!fh->elf.def_regular
6153 || fdh == NULL
6154 || !fdh->elf.def_regular
6155 || fdh->elf.forced_local);
50bc7936
AM
6156 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6157
b34976b6 6158 return TRUE;
e86ce104 6159}
40b8271b 6160
a4b6fadd
AM
6161static const struct sfpr_def_parms save_res_funcs[] =
6162 {
6163 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6164 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6165 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6166 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6167 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6168 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6169 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6170 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6171 { "._savef", 14, 31, savefpr, savefpr1_tail },
6172 { "._restf", 14, 31, restfpr, restfpr1_tail },
6173 { "_savevr_", 20, 31, savevr, savevr_tail },
6174 { "_restvr_", 20, 31, restvr, restvr_tail }
6175 };
6176
e86ce104 6177/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6178 this hook to a) provide some gcc support functions, and b) transfer
6179 dynamic linking information gathered so far on function code symbol
6180 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6181
b34976b6 6182static bfd_boolean
4ce794b7
AM
6183ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6184 struct bfd_link_info *info)
e86ce104
AM
6185{
6186 struct ppc_link_hash_table *htab;
6187
6188 htab = ppc_hash_table (info);
4dfe6ac6
NC
6189 if (htab == NULL)
6190 return FALSE;
6191
b32547cd
AM
6192 /* Provide any missing _save* and _rest* functions. */
6193 if (htab->sfpr != NULL)
6194 {
6195 unsigned int i;
6196
6197 htab->sfpr->size = 0;
6198 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6199 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6200 return FALSE;
6201 if (htab->sfpr->size == 0)
6202 htab->sfpr->flags |= SEC_EXCLUDE;
6203 }
6204
6205 if (bfd_link_relocatable (info))
6206 return TRUE;
6207
6208 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6209 {
6210 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6211 /* Make .TOC. defined so as to prevent it being made dynamic.
6212 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6213 if (!htab->elf.hgot->def_regular
6214 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6215 {
6216 htab->elf.hgot->root.type = bfd_link_hash_defined;
6217 htab->elf.hgot->root.u.def.value = 0;
6218 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6219 htab->elf.hgot->def_regular = 1;
6220 htab->elf.hgot->root.linker_def = 1;
6221 }
dba6fa9b 6222 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6223 htab->elf.hgot->other
6224 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6225 }
c66bb0ee 6226
8c5b4e52
AM
6227 if (htab->need_func_desc_adj)
6228 {
6229 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6230 htab->need_func_desc_adj = 0;
6231 }
805fc799 6232
b34976b6 6233 return TRUE;
e86ce104
AM
6234}
6235
98bbb1b8 6236/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6237
98bbb1b8 6238static asection *
a345bc8d
AM
6239readonly_dynrelocs (struct elf_link_hash_entry *h)
6240{
6241 struct ppc_link_hash_entry *eh;
6242 struct elf_dyn_relocs *p;
6243
6244 eh = (struct ppc_link_hash_entry *) h;
6245 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6246 {
6247 asection *s = p->sec->output_section;
6248
6249 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6250 return p->sec;
a345bc8d 6251 }
98bbb1b8 6252 return NULL;
a345bc8d
AM
6253}
6254
d311bc8b 6255/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6256 aliases, that apply to read-only sections. Cannot be used after
6257 size_dynamic_sections. */
d311bc8b
AM
6258
6259static bfd_boolean
6260alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6261{
6262 struct ppc_link_hash_entry *eh;
6263
6264 eh = (struct ppc_link_hash_entry *) h;
6265 do
6266 {
6267 if (readonly_dynrelocs (&eh->elf))
6268 return TRUE;
ab2477e1 6269 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
6270 }
6271 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6272
6273 return FALSE;
6274}
8a2058b5 6275
8a9e8e72
AM
6276/* Return whether EH has pc-relative dynamic relocs. */
6277
6278static bfd_boolean
6279pc_dynrelocs (struct ppc_link_hash_entry *eh)
6280{
6281 struct elf_dyn_relocs *p;
6282
6283 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6284 if (p->pc_count != 0)
6285 return TRUE;
6286 return FALSE;
6287}
6288
8a2058b5
AM
6289/* Return true if a global entry stub will be created for H. Valid
6290 for ELFv2 before plt entries have been allocated. */
6291
6292static bfd_boolean
6293global_entry_stub (struct elf_link_hash_entry *h)
6294{
6295 struct plt_entry *pent;
6296
6297 if (!h->pointer_equality_needed
6298 || h->def_regular)
6299 return FALSE;
6300
6301 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6302 if (pent->plt.refcount > 0
6303 && pent->addend == 0)
6304 return TRUE;
6305
6306 return FALSE;
6307}
6308
e86ce104
AM
6309/* Adjust a symbol defined by a dynamic object and referenced by a
6310 regular object. The current definition is in some section of the
6311 dynamic object, but we're not including those sections. We have to
6312 change the definition to something the rest of the link can
6313 understand. */
6314
b34976b6 6315static bfd_boolean
4ce794b7
AM
6316ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6317 struct elf_link_hash_entry *h)
e86ce104
AM
6318{
6319 struct ppc_link_hash_table *htab;
5474d94f 6320 asection *s, *srel;
e86ce104
AM
6321
6322 htab = ppc_hash_table (info);
4dfe6ac6
NC
6323 if (htab == NULL)
6324 return FALSE;
e86ce104
AM
6325
6326 /* Deal with function syms. */
6327 if (h->type == STT_FUNC
e054468f 6328 || h->type == STT_GNU_IFUNC
f5385ebf 6329 || h->needs_plt)
e86ce104 6330 {
529fe20e
AM
6331 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6332 || SYMBOL_CALLS_LOCAL (info, h)
6333 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6334 /* Discard dyn_relocs when non-pic if we've decided that a
6335 function symbol is local and not an ifunc. We keep dynamic
6336 relocs for ifuncs when local rather than always emitting a
6337 plt call stub for them and defining the symbol on the call
6338 stub. We can't do that for ELFv1 anyway (a function symbol
6339 is defined on a descriptor, not code) and it can be faster at
6340 run-time due to not needing to bounce through a stub. The
6341 dyn_relocs for ifuncs will be applied even in a static
6342 executable. */
6343 if (!bfd_link_pic (info)
6344 && h->type != STT_GNU_IFUNC
6345 && local)
6346 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6347
e86ce104
AM
6348 /* Clear procedure linkage table information for any symbol that
6349 won't need a .plt entry. */
411e1bfb
AM
6350 struct plt_entry *ent;
6351 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6352 if (ent->plt.refcount > 0)
6353 break;
8387904d 6354 if (ent == NULL
2d7ad24e
AM
6355 || (h->type != STT_GNU_IFUNC
6356 && local
3e04d765
AM
6357 && (htab->can_convert_all_inline_plt
6358 || (((struct ppc_link_hash_entry *) h)->tls_mask
6359 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6360 {
411e1bfb 6361 h->plt.plist = NULL;
f5385ebf 6362 h->needs_plt = 0;
d1eca1e4 6363 h->pointer_equality_needed = 0;
40b8271b 6364 }
8a2058b5 6365 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6366 {
d1eca1e4
AM
6367 /* Taking a function's address in a read/write section
6368 doesn't require us to define the function symbol in the
6369 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6370 be used instead. The reason we prefer a few more dynamic
6371 relocs is that calling via a global entry stub costs a
6372 few more instructions, and pointer_equality_needed causes
6373 extra work in ld.so when resolving these symbols. */
529fe20e 6374 if (global_entry_stub (h))
d1eca1e4 6375 {
ab2477e1 6376 if (!readonly_dynrelocs (h))
529fe20e
AM
6377 {
6378 h->pointer_equality_needed = 0;
04383fd1
AM
6379 /* If we haven't seen a branch reloc and the symbol
6380 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6381 if (!h->needs_plt)
6382 h->plt.plist = NULL;
6383 }
6384 else if (!bfd_link_pic (info))
6385 /* We are going to be defining the function symbol on the
6386 plt stub, so no dyn_relocs needed when non-pic. */
6387 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6388 }
6389
3988aed5
AM
6390 /* ELFv2 function symbols can't have copy relocs. */
6391 return TRUE;
6392 }
6393 else if (!h->needs_plt
ab2477e1 6394 && !readonly_dynrelocs (h))
3988aed5 6395 {
04383fd1
AM
6396 /* If we haven't seen a branch reloc and the symbol isn't an
6397 ifunc then we don't need a plt entry. */
3988aed5
AM
6398 h->plt.plist = NULL;
6399 h->pointer_equality_needed = 0;
a345bc8d
AM
6400 return TRUE;
6401 }
5bd4f169 6402 }
bbd7ec4a 6403 else
411e1bfb 6404 h->plt.plist = NULL;
5bd4f169
AM
6405
6406 /* If this is a weak symbol, and there is a real definition, the
6407 processor independent code will have arranged for us to see the
6408 real definition first, and we can just use the same value. */
60d67dc8 6409 if (h->is_weakalias)
5bd4f169 6410 {
60d67dc8
AM
6411 struct elf_link_hash_entry *def = weakdef (h);
6412 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6413 h->root.u.def.section = def->root.u.def.section;
6414 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6415 if (def->root.u.def.section == htab->elf.sdynbss
6416 || def->root.u.def.section == htab->elf.sdynrelro)
6417 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6418 return TRUE;
5bd4f169
AM
6419 }
6420
5bd4f169
AM
6421 /* If we are creating a shared library, we must presume that the
6422 only references to the symbol are via the global offset table.
6423 For such cases we need not do anything here; the relocations will
6424 be handled correctly by relocate_section. */
ec73ddcd 6425 if (!bfd_link_executable (info))
b34976b6 6426 return TRUE;
5bd4f169 6427
65f38f15
AM
6428 /* If there are no references to this symbol that do not use the
6429 GOT, we don't need to generate a copy reloc. */
f5385ebf 6430 if (!h->non_got_ref)
b34976b6 6431 return TRUE;
65f38f15 6432
b186458a 6433 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6434 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6435
d93d1c80
AM
6436 /* If -z nocopyreloc was given, don't generate them either. */
6437 || info->nocopyreloc
a127494f 6438
dce2246a 6439 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6440 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6441 || (ELIMINATE_COPY_RELOCS
6442 && !h->needs_copy
6443 && !alias_readonly_dynrelocs (h))
65f38f15 6444
d93d1c80
AM
6445 /* Protected variables do not work with .dynbss. The copy in
6446 .dynbss won't be used by the shared library with the protected
6447 definition for the variable. Text relocations are preferable
6448 to an incorrect program. */
6449 || h->protected_def)
529fe20e 6450 return TRUE;
a127494f 6451
5d35169e 6452 if (h->plt.plist != NULL)
97b639ba
AM
6453 {
6454 /* We should never get here, but unfortunately there are versions
6455 of gcc out there that improperly (for this ABI) put initialized
6456 function pointers, vtable refs and suchlike in read-only
6457 sections. Allow them to proceed, but warn that this might
6458 break at runtime. */
25f53a85 6459 info->callbacks->einfo
c1c8c1ef 6460 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6461 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6462 h->root.root.string);
6463 }
5d35169e
AM
6464
6465 /* This is a reference to a symbol defined by a dynamic object which
6466 is not a function. */
6467
5bd4f169
AM
6468 /* We must allocate the symbol in our .dynbss section, which will
6469 become part of the .bss section of the executable. There will be
6470 an entry for this symbol in the .dynsym section. The dynamic
6471 object will contain position independent code, so all references
6472 from the dynamic object to this symbol will go through the global
6473 offset table. The dynamic linker will use the .dynsym entry to
6474 determine the address it must put in the global offset table, so
6475 both the dynamic object and the regular object will refer to the
6476 same memory location for the variable. */
5474d94f
AM
6477 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6478 {
6479 s = htab->elf.sdynrelro;
6480 srel = htab->elf.sreldynrelro;
6481 }
6482 else
6483 {
6484 s = htab->elf.sdynbss;
6485 srel = htab->elf.srelbss;
6486 }
1d7e9d18 6487 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6488 {
4a7e5234
AM
6489 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6490 linker to copy the initial value out of the dynamic object
6491 and into the runtime process image. */
5474d94f 6492 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6493 h->needs_copy = 1;
5bd4f169
AM
6494 }
6495
529fe20e
AM
6496 /* We no longer want dyn_relocs. */
6497 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6498 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6499}
6500
e86ce104
AM
6501/* If given a function descriptor symbol, hide both the function code
6502 sym and the descriptor. */
6503static void
4ce794b7
AM
6504ppc64_elf_hide_symbol (struct bfd_link_info *info,
6505 struct elf_link_hash_entry *h,
6506 bfd_boolean force_local)
e86ce104 6507{
34814b9f 6508 struct ppc_link_hash_entry *eh;
e86ce104
AM
6509 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6510
87469ba2
AM
6511 if (ppc_hash_table (info) == NULL)
6512 return;
6513
34814b9f
AM
6514 eh = (struct ppc_link_hash_entry *) h;
6515 if (eh->is_func_descriptor)
e86ce104 6516 {
34814b9f 6517 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6518
721956f4 6519 if (fh == NULL)
d1329ca3
AM
6520 {
6521 const char *p, *q;
b8ac2841 6522 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6523 char save;
6524
6525 /* We aren't supposed to use alloca in BFD because on
6526 systems which do not have alloca the version in libiberty
6527 calls xmalloc, which might cause the program to crash
6528 when it runs out of memory. This function doesn't have a
6529 return status, so there's no way to gracefully return an
6530 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6531 accessed; It's either a string in an ELF string table,
6532 or allocated in an objalloc structure. */
d1329ca3 6533
34814b9f 6534 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6535 save = *p;
6536 *(char *) p = '.';
34814b9f 6537 fh = (struct ppc_link_hash_entry *)
b8ac2841 6538 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6539 *(char *) p = save;
6540
6541 /* Unfortunately, if it so happens that the string we were
6542 looking for was allocated immediately before this string,
6543 then we overwrote the string terminator. That's the only
6544 reason the lookup should fail. */
6545 if (fh == NULL)
6546 {
34814b9f
AM
6547 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6548 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6549 --q, --p;
34814b9f
AM
6550 if (q < eh->elf.root.root.string && *p == '.')
6551 fh = (struct ppc_link_hash_entry *)
b8ac2841 6552 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6553 }
6554 if (fh != NULL)
6555 {
34814b9f
AM
6556 eh->oh = fh;
6557 fh->oh = eh;
d1329ca3
AM
6558 }
6559 }
e86ce104 6560 if (fh != NULL)
34814b9f 6561 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6562 }
6563}
6564
411e1bfb 6565static bfd_boolean
8843416a
AM
6566get_sym_h (struct elf_link_hash_entry **hp,
6567 Elf_Internal_Sym **symp,
6568 asection **symsecp,
f961d9dd 6569 unsigned char **tls_maskp,
8843416a
AM
6570 Elf_Internal_Sym **locsymsp,
6571 unsigned long r_symndx,
6572 bfd *ibfd)
411e1bfb 6573{
0ffa91dd 6574 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6575
6576 if (r_symndx >= symtab_hdr->sh_info)
6577 {
6578 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6579 struct elf_link_hash_entry *h;
6580
6581 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6582 h = elf_follow_link (h);
411e1bfb
AM
6583
6584 if (hp != NULL)
6585 *hp = h;
6586
6587 if (symp != NULL)
6588 *symp = NULL;
6589
6590 if (symsecp != NULL)
6591 {
6592 asection *symsec = NULL;
6593 if (h->root.type == bfd_link_hash_defined
6594 || h->root.type == bfd_link_hash_defweak)
6595 symsec = h->root.u.def.section;
6596 *symsecp = symsec;
6597 }
6598
e7b938ca 6599 if (tls_maskp != NULL)
411e1bfb
AM
6600 {
6601 struct ppc_link_hash_entry *eh;
6602
6603 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6604 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6605 }
6606 }
6607 else
6608 {
6609 Elf_Internal_Sym *sym;
6610 Elf_Internal_Sym *locsyms = *locsymsp;
6611
6612 if (locsyms == NULL)
6613 {
6614 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6615 if (locsyms == NULL)
6616 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6617 symtab_hdr->sh_info,
6618 0, NULL, NULL, NULL);
6619 if (locsyms == NULL)
6620 return FALSE;
6621 *locsymsp = locsyms;
6622 }
6623 sym = locsyms + r_symndx;
6624
6625 if (hp != NULL)
6626 *hp = NULL;
6627
6628 if (symp != NULL)
6629 *symp = sym;
6630
6631 if (symsecp != NULL)
cb33740c 6632 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6633
e7b938ca 6634 if (tls_maskp != NULL)
411e1bfb
AM
6635 {
6636 struct got_entry **lgot_ents;
f961d9dd 6637 unsigned char *tls_mask;
411e1bfb 6638
e7b938ca 6639 tls_mask = NULL;
411e1bfb
AM
6640 lgot_ents = elf_local_got_ents (ibfd);
6641 if (lgot_ents != NULL)
6642 {
e054468f
AM
6643 struct plt_entry **local_plt = (struct plt_entry **)
6644 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6645 unsigned char *lgot_masks = (unsigned char *)
e054468f 6646 (local_plt + symtab_hdr->sh_info);
e7b938ca 6647 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6648 }
e7b938ca 6649 *tls_maskp = tls_mask;
411e1bfb
AM
6650 }
6651 }
6652 return TRUE;
6653}
6654
e7b938ca 6655/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6656 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6657 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6658
6659static int
f961d9dd 6660get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6661 unsigned long *toc_symndx,
6662 bfd_vma *toc_addend,
0d4792f7 6663 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6664 const Elf_Internal_Rela *rel,
6665 bfd *ibfd)
411e1bfb
AM
6666{
6667 unsigned long r_symndx;
0d4792f7 6668 int next_r;
411e1bfb
AM
6669 struct elf_link_hash_entry *h;
6670 Elf_Internal_Sym *sym;
6671 asection *sec;
6672 bfd_vma off;
6673
6674 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6675 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6676 return 0;
411e1bfb 6677
37da22e5
AM
6678 if ((*tls_maskp != NULL
6679 && (**tls_maskp & TLS_TLS) != 0
6680 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6681 || sec == NULL
6bee8834 6682 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6683 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6684 return 1;
411e1bfb
AM
6685
6686 /* Look inside a TOC section too. */
6687 if (h != NULL)
6688 {
6689 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6690 off = h->root.u.def.value;
6691 }
6692 else
6693 off = sym->st_value;
6694 off += rel->r_addend;
6695 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6696 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6697 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6698 if (toc_symndx != NULL)
6699 *toc_symndx = r_symndx;
3a71aa26
AM
6700 if (toc_addend != NULL)
6701 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6702 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6703 return 0;
854b41e7 6704 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6705 && (next_r == -1 || next_r == -2))
6706 return 1 - next_r;
951fd09b 6707 return 1;
411e1bfb
AM
6708}
6709
3b421ab3
AM
6710/* Find (or create) an entry in the tocsave hash table. */
6711
6712static struct tocsave_entry *
6713tocsave_find (struct ppc_link_hash_table *htab,
6714 enum insert_option insert,
6715 Elf_Internal_Sym **local_syms,
6716 const Elf_Internal_Rela *irela,
6717 bfd *ibfd)
6718{
6719 unsigned long r_indx;
6720 struct elf_link_hash_entry *h;
6721 Elf_Internal_Sym *sym;
6722 struct tocsave_entry ent, *p;
6723 hashval_t hash;
6724 struct tocsave_entry **slot;
6725
6726 r_indx = ELF64_R_SYM (irela->r_info);
6727 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6728 return NULL;
6729 if (ent.sec == NULL || ent.sec->output_section == NULL)
6730 {
4eca0228 6731 _bfd_error_handler
871b3ab2 6732 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6733 return NULL;
6734 }
6735
6736 if (h != NULL)
6737 ent.offset = h->root.u.def.value;
6738 else
6739 ent.offset = sym->st_value;
6740 ent.offset += irela->r_addend;
6741
6742 hash = tocsave_htab_hash (&ent);
6743 slot = ((struct tocsave_entry **)
6744 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6745 if (slot == NULL)
6746 return NULL;
6747
6748 if (*slot == NULL)
6749 {
6750 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6751 if (p == NULL)
6752 return NULL;
6753 *p = ent;
6754 *slot = p;
6755 }
6756 return *slot;
6757}
6758
754021d0 6759/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6760 code for the old ABI, these will already have been done. */
754021d0
AM
6761
6762static bfd_boolean
6763adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6764{
6765 struct ppc_link_hash_entry *eh;
6766 asection *sym_sec;
74f0fb50 6767 struct _opd_sec_data *opd;
754021d0
AM
6768
6769 if (h->root.type == bfd_link_hash_indirect)
6770 return TRUE;
6771
754021d0
AM
6772 if (h->root.type != bfd_link_hash_defined
6773 && h->root.type != bfd_link_hash_defweak)
6774 return TRUE;
6775
6776 eh = (struct ppc_link_hash_entry *) h;
6777 if (eh->adjust_done)
6778 return TRUE;
6779
6780 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6781 opd = get_opd_info (sym_sec);
6782 if (opd != NULL && opd->adjust != NULL)
754021d0 6783 {
51aecdc5 6784 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6785 if (adjust == -1)
6786 {
6787 /* This entry has been deleted. */
b3fac117 6788 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6789 if (dsec == NULL)
6790 {
6791 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6792 if (discarded_section (dsec))
81688140 6793 {
b3fac117 6794 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6795 break;
6796 }
6797 }
4025353c 6798 eh->elf.root.u.def.value = 0;
81688140 6799 eh->elf.root.u.def.section = dsec;
4025353c
AM
6800 }
6801 else
6802 eh->elf.root.u.def.value += adjust;
754021d0
AM
6803 eh->adjust_done = 1;
6804 }
6805 return TRUE;
6806}
6807
8c1d1bb8 6808/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6809 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6810 have already been determined. */
6811
6812static bfd_boolean
6813dec_dynrel_count (bfd_vma r_info,
6814 asection *sec,
6815 struct bfd_link_info *info,
6816 Elf_Internal_Sym **local_syms,
6817 struct elf_link_hash_entry *h,
19e08130 6818 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6819{
6820 enum elf_ppc64_reloc_type r_type;
19e08130 6821 asection *sym_sec = NULL;
8c1d1bb8
AM
6822
6823 /* Can this reloc be dynamic? This switch, and later tests here
6824 should be kept in sync with the code in check_relocs. */
6825 r_type = ELF64_R_TYPE (r_info);
6826 switch (r_type)
6827 {
6828 default:
6829 return TRUE;
6830
1bdd8fac
AM
6831 case R_PPC64_TOC16:
6832 case R_PPC64_TOC16_DS:
6833 case R_PPC64_TOC16_LO:
6834 case R_PPC64_TOC16_HI:
6835 case R_PPC64_TOC16_HA:
6836 case R_PPC64_TOC16_LO_DS:
6837 if (h == NULL)
6838 return TRUE;
6839 break;
6840
8c1d1bb8
AM
6841 case R_PPC64_TPREL16:
6842 case R_PPC64_TPREL16_LO:
6843 case R_PPC64_TPREL16_HI:
6844 case R_PPC64_TPREL16_HA:
6845 case R_PPC64_TPREL16_DS:
6846 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6847 case R_PPC64_TPREL16_HIGH:
6848 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6849 case R_PPC64_TPREL16_HIGHER:
6850 case R_PPC64_TPREL16_HIGHERA:
6851 case R_PPC64_TPREL16_HIGHEST:
6852 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6853 case R_PPC64_TPREL64:
c213164a 6854 case R_PPC64_TPREL34:
8c1d1bb8
AM
6855 case R_PPC64_DTPMOD64:
6856 case R_PPC64_DTPREL64:
6857 case R_PPC64_ADDR64:
6858 case R_PPC64_REL30:
6859 case R_PPC64_REL32:
6860 case R_PPC64_REL64:
6861 case R_PPC64_ADDR14:
6862 case R_PPC64_ADDR14_BRNTAKEN:
6863 case R_PPC64_ADDR14_BRTAKEN:
6864 case R_PPC64_ADDR16:
6865 case R_PPC64_ADDR16_DS:
6866 case R_PPC64_ADDR16_HA:
6867 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6868 case R_PPC64_ADDR16_HIGH:
6869 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6870 case R_PPC64_ADDR16_HIGHER:
6871 case R_PPC64_ADDR16_HIGHERA:
6872 case R_PPC64_ADDR16_HIGHEST:
6873 case R_PPC64_ADDR16_HIGHESTA:
6874 case R_PPC64_ADDR16_LO:
6875 case R_PPC64_ADDR16_LO_DS:
6876 case R_PPC64_ADDR24:
6877 case R_PPC64_ADDR32:
6878 case R_PPC64_UADDR16:
6879 case R_PPC64_UADDR32:
6880 case R_PPC64_UADDR64:
6881 case R_PPC64_TOC:
5663e321
AM
6882 case R_PPC64_D34:
6883 case R_PPC64_D34_LO:
6884 case R_PPC64_D34_HI30:
6885 case R_PPC64_D34_HA30:
6886 case R_PPC64_ADDR16_HIGHER34:
6887 case R_PPC64_ADDR16_HIGHERA34:
6888 case R_PPC64_ADDR16_HIGHEST34:
6889 case R_PPC64_ADDR16_HIGHESTA34:
6890 case R_PPC64_D28:
8c1d1bb8
AM
6891 break;
6892 }
6893
6894 if (local_syms != NULL)
6895 {
6896 unsigned long r_symndx;
8c1d1bb8
AM
6897 bfd *ibfd = sec->owner;
6898
6899 r_symndx = ELF64_R_SYM (r_info);
6900 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6901 return FALSE;
6902 }
6903
ec73ddcd
AM
6904 if ((h != NULL
6905 && (h->root.type == bfd_link_hash_defweak
6906 || !h->def_regular))
6907 || (h != NULL
6908 && !bfd_link_executable (info)
6909 && !SYMBOLIC_BIND (info, h))
6910 || (bfd_link_pic (info)
6911 && must_be_dyn_reloc (info, r_type))
6912 || (!bfd_link_pic (info)
6913 && (h != NULL
6914 ? h->type == STT_GNU_IFUNC
6915 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
6916 ;
6917 else
6918 return TRUE;
6919
6920 if (h != NULL)
6edfbbad 6921 {
19e08130
AM
6922 struct elf_dyn_relocs *p;
6923 struct elf_dyn_relocs **pp;
6924 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6925
6926 /* elf_gc_sweep may have already removed all dyn relocs associated
6927 with local syms for a given section. Also, symbol flags are
6928 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6929 report a dynreloc miscount. */
6930 if (*pp == NULL && info->gc_sections)
6931 return TRUE;
6932
6933 while ((p = *pp) != NULL)
60124e18 6934 {
19e08130
AM
6935 if (p->sec == sec)
6936 {
6937 if (!must_be_dyn_reloc (info, r_type))
6938 p->pc_count -= 1;
6939 p->count -= 1;
6940 if (p->count == 0)
6941 *pp = p->next;
6942 return TRUE;
6943 }
6944 pp = &p->next;
60124e18 6945 }
6edfbbad 6946 }
19e08130
AM
6947 else
6948 {
6949 struct ppc_dyn_relocs *p;
6950 struct ppc_dyn_relocs **pp;
6951 void *vpp;
6952 bfd_boolean is_ifunc;
8c1d1bb8 6953
19e08130
AM
6954 if (local_syms == NULL)
6955 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6956 if (sym_sec == NULL)
6957 sym_sec = sec;
c57da1a7 6958
19e08130
AM
6959 vpp = &elf_section_data (sym_sec)->local_dynrel;
6960 pp = (struct ppc_dyn_relocs **) vpp;
6961
6962 if (*pp == NULL && info->gc_sections)
6963 return TRUE;
6964
6965 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6966 while ((p = *pp) != NULL)
8c1d1bb8 6967 {
19e08130
AM
6968 if (p->sec == sec && p->ifunc == is_ifunc)
6969 {
6970 p->count -= 1;
6971 if (p->count == 0)
6972 *pp = p->next;
6973 return TRUE;
6974 }
6975 pp = &p->next;
8c1d1bb8 6976 }
8c1d1bb8
AM
6977 }
6978
695344c0 6979 /* xgettext:c-format */
cf97bcb0
AM
6980 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6981 sec->owner, sec);
8c1d1bb8
AM
6982 bfd_set_error (bfd_error_bad_value);
6983 return FALSE;
6984}
6985
754021d0
AM
6986/* Remove unused Official Procedure Descriptor entries. Currently we
6987 only remove those associated with functions in discarded link-once
6988 sections, or weakly defined functions that have been overridden. It
6989 would be possible to remove many more entries for statically linked
6990 applications. */
6991
b34976b6 6992bfd_boolean
e7d1c40c 6993ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6994{
6995 bfd *ibfd;
754021d0 6996 bfd_boolean some_edited = FALSE;
3f764659 6997 asection *need_pad = NULL;
e7d1c40c
AM
6998 struct ppc_link_hash_table *htab;
6999
7000 htab = ppc_hash_table (info);
7001 if (htab == NULL)
7002 return FALSE;
1e2f5b6e 7003
c72f2fb2 7004 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7005 {
7006 asection *sec;
7007 Elf_Internal_Rela *relstart, *rel, *relend;
7008 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7009 Elf_Internal_Sym *local_syms;
74f0fb50 7010 struct _opd_sec_data *opd;
51aecdc5 7011 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7012 bfd_size_type cnt_16b = 0;
1e2f5b6e 7013
854b41e7
AM
7014 if (!is_ppc64_elf (ibfd))
7015 continue;
7016
1e2f5b6e 7017 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7018 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7019 continue;
7020
dbaa2011 7021 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7022 continue;
7023
1e2f5b6e
AM
7024 if (sec->output_section == bfd_abs_section_ptr)
7025 continue;
7026
7027 /* Look through the section relocs. */
7028 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7029 continue;
7030
6cdc0ccc 7031 local_syms = NULL;
0ffa91dd 7032 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7033
7034 /* Read the relocations. */
4ce794b7 7035 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7036 info->keep_memory);
1e2f5b6e 7037 if (relstart == NULL)
b34976b6 7038 return FALSE;
1e2f5b6e
AM
7039
7040 /* First run through the relocs to check they are sane, and to
7041 determine whether we need to edit this opd section. */
b34976b6 7042 need_edit = FALSE;
51aecdc5 7043 broken = FALSE;
3f764659 7044 need_pad = sec;
1e2f5b6e 7045 relend = relstart + sec->reloc_count;
50bc7936 7046 for (rel = relstart; rel < relend; )
1e2f5b6e 7047 {
04c9666a 7048 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7049 unsigned long r_symndx;
7050 asection *sym_sec;
7051 struct elf_link_hash_entry *h;
7052 Elf_Internal_Sym *sym;
51aecdc5 7053 bfd_vma offset;
1e2f5b6e 7054
51aecdc5 7055 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7056 only interested in the reloc pointing to a function entry
7057 point. */
51aecdc5
AM
7058 offset = rel->r_offset;
7059 if (rel + 1 == relend
7060 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7061 {
7062 /* If someone messes with .opd alignment then after a
7063 "ld -r" we might have padding in the middle of .opd.
7064 Also, there's nothing to prevent someone putting
7065 something silly in .opd with the assembler. No .opd
b34976b6 7066 optimization for them! */
3f764659 7067 broken_opd:
4eca0228 7068 _bfd_error_handler
871b3ab2 7069 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7070 broken = TRUE;
1e2f5b6e
AM
7071 break;
7072 }
7073
50bc7936
AM
7074 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7075 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7076 {
4eca0228 7077 _bfd_error_handler
695344c0 7078 /* xgettext:c-format */
871b3ab2 7079 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7080 ibfd, r_type);
51aecdc5 7081 broken = TRUE;
50bc7936
AM
7082 break;
7083 }
7084
1e2f5b6e 7085 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7086 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7087 r_symndx, ibfd))
50bc7936 7088 goto error_ret;
1e2f5b6e
AM
7089
7090 if (sym_sec == NULL || sym_sec->owner == NULL)
7091 {
411e1bfb
AM
7092 const char *sym_name;
7093 if (h != NULL)
7094 sym_name = h->root.root.string;
7095 else
26c61ae5
L
7096 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7097 sym_sec);
411e1bfb 7098
4eca0228 7099 _bfd_error_handler
695344c0 7100 /* xgettext:c-format */
871b3ab2 7101 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7102 ibfd, sym_name);
51aecdc5 7103 broken = TRUE;
1e2f5b6e
AM
7104 break;
7105 }
7106
51020317
AM
7107 /* opd entries are always for functions defined in the
7108 current input bfd. If the symbol isn't defined in the
7109 input bfd, then we won't be using the function in this
7110 bfd; It must be defined in a linkonce section in another
7111 bfd, or is weak. It's also possible that we are
7112 discarding the function due to a linker script /DISCARD/,
7113 which we test for via the output_section. */
7114 if (sym_sec->owner != ibfd
7115 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7116 need_edit = TRUE;
1e2f5b6e 7117
50bc7936 7118 rel += 2;
51aecdc5
AM
7119 if (rel + 1 == relend
7120 || (rel + 2 < relend
7121 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7122 ++rel;
7123
7124 if (rel == relend)
3f764659
JJ
7125 {
7126 if (sec->size == offset + 24)
7127 {
7128 need_pad = NULL;
7129 break;
7130 }
51aecdc5 7131 if (sec->size == offset + 16)
3f764659
JJ
7132 {
7133 cnt_16b++;
7134 break;
7135 }
7136 goto broken_opd;
7137 }
3f764659
JJ
7138 else if (rel + 1 < relend
7139 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7140 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7141 {
51aecdc5
AM
7142 if (rel[0].r_offset == offset + 16)
7143 cnt_16b++;
7144 else if (rel[0].r_offset != offset + 24)
7145 goto broken_opd;
3f764659
JJ
7146 }
7147 else
7148 goto broken_opd;
1e2f5b6e
AM
7149 }
7150
e7d1c40c 7151 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7152
51aecdc5 7153 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7154 {
7155 Elf_Internal_Rela *write_rel;
d4730f92 7156 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7157 bfd_byte *rptr, *wptr;
983bddc8 7158 bfd_byte *new_contents;
74f0fb50
AM
7159 bfd_size_type amt;
7160
983bddc8 7161 new_contents = NULL;
51aecdc5 7162 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7163 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7164 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7165 if (opd->adjust == NULL)
7166 return FALSE;
1e2f5b6e
AM
7167
7168 /* This seems a waste of time as input .opd sections are all
7169 zeros as generated by gcc, but I suppose there's no reason
7170 this will always be so. We might start putting something in
7171 the third word of .opd entries. */
7172 if ((sec->flags & SEC_IN_MEMORY) == 0)
7173 {
eea6121a
AM
7174 bfd_byte *loc;
7175 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7176 {
eea6121a
AM
7177 if (loc != NULL)
7178 free (loc);
50bc7936 7179 error_ret:
6cdc0ccc
AM
7180 if (local_syms != NULL
7181 && symtab_hdr->contents != (unsigned char *) local_syms)
7182 free (local_syms);
6cdc0ccc
AM
7183 if (elf_section_data (sec)->relocs != relstart)
7184 free (relstart);
b34976b6 7185 return FALSE;
6cdc0ccc 7186 }
1e2f5b6e
AM
7187 sec->contents = loc;
7188 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7189 }
7190
7191 elf_section_data (sec)->relocs = relstart;
7192
3f764659 7193 new_contents = sec->contents;
3f764659
JJ
7194 if (add_aux_fields)
7195 {
7196 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7197 if (new_contents == NULL)
7198 return FALSE;
51aecdc5 7199 need_pad = NULL;
3f764659 7200 }
b4f4e59f
AM
7201 wptr = new_contents;
7202 rptr = sec->contents;
1e2f5b6e 7203 write_rel = relstart;
51aecdc5 7204 for (rel = relstart; rel < relend; )
1e2f5b6e 7205 {
50bc7936
AM
7206 unsigned long r_symndx;
7207 asection *sym_sec;
7208 struct elf_link_hash_entry *h;
51aecdc5 7209 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7210 Elf_Internal_Sym *sym;
51aecdc5
AM
7211 long opd_ent_size;
7212 Elf_Internal_Rela *next_rel;
7213 bfd_boolean skip;
50bc7936
AM
7214
7215 r_symndx = ELF64_R_SYM (rel->r_info);
7216 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7217 r_symndx, ibfd))
50bc7936
AM
7218 goto error_ret;
7219
51aecdc5
AM
7220 next_rel = rel + 2;
7221 if (next_rel + 1 == relend
7222 || (next_rel + 2 < relend
7223 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7224 ++next_rel;
7225
7226 /* See if the .opd entry is full 24 byte or
7227 16 byte (with fd_aux entry overlapped with next
7228 fd_func). */
7229 opd_ent_size = 24;
7230 if (next_rel == relend)
1e2f5b6e 7231 {
51aecdc5 7232 if (sec->size == rel->r_offset + 16)
3f764659 7233 opd_ent_size = 16;
51aecdc5
AM
7234 }
7235 else if (next_rel->r_offset == rel->r_offset + 16)
7236 opd_ent_size = 16;
3f764659 7237
51aecdc5
AM
7238 if (h != NULL
7239 && h->root.root.string[0] == '.')
7240 {
8c5b4e52
AM
7241 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7242 if (fdh != NULL)
7243 {
7244 fdh = ppc_follow_link (fdh);
7245 if (fdh->elf.root.type != bfd_link_hash_defined
7246 && fdh->elf.root.type != bfd_link_hash_defweak)
7247 fdh = NULL;
7248 }
51aecdc5 7249 }
1e2f5b6e 7250
51aecdc5
AM
7251 skip = (sym_sec->owner != ibfd
7252 || sym_sec->output_section == bfd_abs_section_ptr);
7253 if (skip)
7254 {
7255 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7256 {
51aecdc5
AM
7257 /* Arrange for the function descriptor sym
7258 to be dropped. */
7259 fdh->elf.root.u.def.value = 0;
7260 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7261 }
51aecdc5 7262 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7263
0e1862bb 7264 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7265 rel = next_rel;
7266 else
7267 while (1)
7268 {
7269 if (!dec_dynrel_count (rel->r_info, sec, info,
7270 NULL, h, sym))
7271 goto error_ret;
754021d0 7272
51aecdc5
AM
7273 if (++rel == next_rel)
7274 break;
1e2f5b6e 7275
51aecdc5
AM
7276 r_symndx = ELF64_R_SYM (rel->r_info);
7277 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7278 r_symndx, ibfd))
7279 goto error_ret;
7280 }
50bc7936
AM
7281 }
7282 else
1e2f5b6e 7283 {
51aecdc5
AM
7284 /* We'll be keeping this opd entry. */
7285 long adjust;
7286
7287 if (fdh != NULL)
7288 {
7289 /* Redefine the function descriptor symbol to
7290 this location in the opd section. It is
7291 necessary to update the value here rather
7292 than using an array of adjustments as we do
7293 for local symbols, because various places
7294 in the generic ELF code use the value
7295 stored in u.def.value. */
7296 fdh->elf.root.u.def.value = wptr - new_contents;
7297 fdh->adjust_done = 1;
7298 }
7299
7300 /* Local syms are a bit tricky. We could
7301 tweak them as they can be cached, but
7302 we'd need to look through the local syms
7303 for the function descriptor sym which we
7304 don't have at the moment. So keep an
7305 array of adjustments. */
7306 adjust = (wptr - new_contents) - (rptr - sec->contents);
7307 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7308
7309 if (wptr != rptr)
7310 memcpy (wptr, rptr, opd_ent_size);
7311 wptr += opd_ent_size;
7312 if (add_aux_fields && opd_ent_size == 16)
7313 {
7314 memset (wptr, '\0', 8);
7315 wptr += 8;
7316 }
7317
50bc7936 7318 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7319 new opd entries. */
7320 for ( ; rel != next_rel; ++rel)
7321 {
7322 rel->r_offset += adjust;
7323 if (write_rel != rel)
7324 memcpy (write_rel, rel, sizeof (*rel));
7325 ++write_rel;
7326 }
1e2f5b6e 7327 }
51aecdc5
AM
7328
7329 rptr += opd_ent_size;
1e2f5b6e
AM
7330 }
7331
3f764659 7332 sec->size = wptr - new_contents;
1e2f5b6e 7333 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7334 if (add_aux_fields)
7335 {
7336 free (sec->contents);
7337 sec->contents = new_contents;
7338 }
7339
05bf9422 7340 /* Fudge the header size too, as this is used later in
cdcf6e38 7341 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7342 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7343 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7344 some_edited = TRUE;
1e2f5b6e 7345 }
6cdc0ccc 7346 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7347 free (relstart);
6cdc0ccc 7348
411e1bfb
AM
7349 if (local_syms != NULL
7350 && symtab_hdr->contents != (unsigned char *) local_syms)
7351 {
7352 if (!info->keep_memory)
7353 free (local_syms);
7354 else
7355 symtab_hdr->contents = (unsigned char *) local_syms;
7356 }
7357 }
7358
754021d0
AM
7359 if (some_edited)
7360 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7361
3f764659
JJ
7362 /* If we are doing a final link and the last .opd entry is just 16 byte
7363 long, add a 8 byte padding after it. */
0e1862bb 7364 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7365 {
7366 bfd_byte *p;
7367
7368 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7369 {
7370 BFD_ASSERT (need_pad->size > 0);
7371
7372 p = bfd_malloc (need_pad->size + 8);
7373 if (p == NULL)
7374 return FALSE;
699733f6 7375
2cdcc330
AM
7376 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7377 p, 0, need_pad->size))
3f764659
JJ
7378 return FALSE;
7379
7380 need_pad->contents = p;
7381 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7382 }
7383 else
7384 {
7385 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7386 if (p == NULL)
7387 return FALSE;
7388
7389 need_pad->contents = p;
7390 }
7391
7392 memset (need_pad->contents + need_pad->size, 0, 8);
7393 need_pad->size += 8;
7394 }
7395
411e1bfb
AM
7396 return TRUE;
7397}
7398
3e04d765
AM
7399/* Analyze inline PLT call relocations to see whether calls to locally
7400 defined functions can be converted to direct calls. */
7401
7402bfd_boolean
7403ppc64_elf_inline_plt (struct bfd_link_info *info)
7404{
7405 struct ppc_link_hash_table *htab;
7406 bfd *ibfd;
7407 asection *sec;
7408 bfd_vma low_vma, high_vma, limit;
7409
7410 htab = ppc_hash_table (info);
7411 if (htab == NULL)
7412 return FALSE;
7413
7414 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7415 reduced somewhat to cater for possible stubs that might be added
7416 between the call and its destination. */
7417 if (htab->params->group_size < 0)
7418 {
7419 limit = -htab->params->group_size;
7420 if (limit == 1)
7421 limit = 0x1e00000;
7422 }
7423 else
7424 {
7425 limit = htab->params->group_size;
7426 if (limit == 1)
7427 limit = 0x1c00000;
7428 }
7429
7430 low_vma = -1;
7431 high_vma = 0;
7432 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7433 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7434 {
7435 if (low_vma > sec->vma)
7436 low_vma = sec->vma;
7437 if (high_vma < sec->vma + sec->size)
7438 high_vma = sec->vma + sec->size;
7439 }
7440
7441 /* If a "bl" can reach anywhere in local code sections, then we can
7442 convert all inline PLT sequences to direct calls when the symbol
7443 is local. */
7444 if (high_vma - low_vma < limit)
7445 {
7446 htab->can_convert_all_inline_plt = 1;
7447 return TRUE;
7448 }
7449
7450 /* Otherwise, go looking through relocs for cases where a direct
7451 call won't reach. Mark the symbol on any such reloc to disable
7452 the optimization and keep the PLT entry as it seems likely that
7453 this will be better than creating trampolines. Note that this
7454 will disable the optimization for all inline PLT calls to a
7455 particular symbol, not just those that won't reach. The
7456 difficulty in doing a more precise optimization is that the
7457 linker needs to make a decision depending on whether a
7458 particular R_PPC64_PLTCALL insn can be turned into a direct
7459 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7460 the sequence, and there is nothing that ties those relocs
7461 together except their symbol. */
7462
7463 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7464 {
7465 Elf_Internal_Shdr *symtab_hdr;
7466 Elf_Internal_Sym *local_syms;
7467
7468 if (!is_ppc64_elf (ibfd))
7469 continue;
7470
7471 local_syms = NULL;
7472 symtab_hdr = &elf_symtab_hdr (ibfd);
7473
7474 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7475 if (ppc64_elf_section_data (sec)->has_pltcall
7476 && !bfd_is_abs_section (sec->output_section))
7477 {
7478 Elf_Internal_Rela *relstart, *rel, *relend;
7479
7480 /* Read the relocations. */
7481 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7482 info->keep_memory);
7483 if (relstart == NULL)
7484 return FALSE;
7485
7486 relend = relstart + sec->reloc_count;
7487 for (rel = relstart; rel < relend; )
7488 {
7489 enum elf_ppc64_reloc_type r_type;
7490 unsigned long r_symndx;
7491 asection *sym_sec;
7492 struct elf_link_hash_entry *h;
7493 Elf_Internal_Sym *sym;
7494 unsigned char *tls_maskp;
7495
7496 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7497 if (r_type != R_PPC64_PLTCALL
7498 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7499 continue;
7500
7501 r_symndx = ELF64_R_SYM (rel->r_info);
7502 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7503 r_symndx, ibfd))
7504 {
7505 if (elf_section_data (sec)->relocs != relstart)
7506 free (relstart);
7507 if (local_syms != NULL
2cdcc330 7508 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7509 free (local_syms);
7510 return FALSE;
7511 }
7512
7513 if (sym_sec != NULL && sym_sec->output_section != NULL)
7514 {
7515 bfd_vma from, to;
7516 if (h != NULL)
7517 to = h->root.u.def.value;
7518 else
7519 to = sym->st_value;
7520 to += (rel->r_addend
7521 + sym_sec->output_offset
7522 + sym_sec->output_section->vma);
7523 from = (rel->r_offset
7524 + sec->output_offset
7525 + sec->output_section->vma);
5663e321
AM
7526 if (to - from + limit < 2 * limit
7527 && !(r_type == R_PPC64_PLTCALL_NOTOC
7528 && (((h ? h->other : sym->st_other)
7529 & STO_PPC64_LOCAL_MASK)
4a4e7361 7530 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7531 *tls_maskp &= ~PLT_KEEP;
7532 }
7533 }
7534 if (elf_section_data (sec)->relocs != relstart)
7535 free (relstart);
7536 }
7537
7538 if (local_syms != NULL
7539 && symtab_hdr->contents != (unsigned char *) local_syms)
7540 {
7541 if (!info->keep_memory)
7542 free (local_syms);
7543 else
7544 symtab_hdr->contents = (unsigned char *) local_syms;
7545 }
7546 }
7547
7548 return TRUE;
7549}
7550
e1918d23 7551/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7552
e1918d23 7553asection *
e7d1c40c 7554ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7555{
411e1bfb
AM
7556 struct ppc_link_hash_table *htab;
7557
411e1bfb 7558 htab = ppc_hash_table (info);
4dfe6ac6
NC
7559 if (htab == NULL)
7560 return NULL;
7561
ee67d69a
AM
7562 if (abiversion (info->output_bfd) == 1)
7563 htab->opd_abi = 1;
7564
e7d1c40c 7565 if (htab->params->no_multi_toc)
33c0ec9d
AM
7566 htab->do_multi_toc = 0;
7567 else if (!htab->do_multi_toc)
e7d1c40c 7568 htab->params->no_multi_toc = 1;
33c0ec9d 7569
8b5f1ed8
AM
7570 /* Default to --no-plt-localentry, as this option can cause problems
7571 with symbol interposition. For example, glibc libpthread.so and
7572 libc.so duplicate many pthread symbols, with a fallback
7573 implementation in libc.so. In some cases the fallback does more
7574 work than the pthread implementation. __pthread_condattr_destroy
7575 is one such symbol: the libpthread.so implementation is
7576 localentry:0 while the libc.so implementation is localentry:8.
7577 An app that "cleverly" uses dlopen to only load necessary
7578 libraries at runtime may omit loading libpthread.so when not
7579 running multi-threaded, which then results in the libc.so
7580 fallback symbols being used and ld.so complaining. Now there
7581 are workarounds in ld (see non_zero_localentry) to detect the
7582 pthread situation, but that may not be the only case where
7583 --plt-localentry can cause trouble. */
f378ab09 7584 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7585 htab->params->plt_localentry0 = 0;
d44c746a
AM
7586 if (htab->params->plt_localentry0
7587 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7588 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7589 _bfd_error_handler
7590 (_("warning: --plt-localentry is especially dangerous without "
7591 "ld.so support to detect ABI violations"));
f378ab09 7592
3a71aa26
AM
7593 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7594 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7595 FALSE, FALSE, TRUE));
a7f2871e
AM
7596 /* Move dynamic linking info to the function descriptor sym. */
7597 if (htab->tls_get_addr != NULL)
7598 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7599 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7600 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7601 FALSE, FALSE, TRUE));
7c9cf415 7602 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7603 {
7604 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7605
7606 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7607 FALSE, FALSE, TRUE);
7608 if (opt != NULL)
7609 func_desc_adjust (opt, info);
7610 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7611 FALSE, FALSE, TRUE);
7612 if (opt_fd != NULL
7613 && (opt_fd->root.type == bfd_link_hash_defined
7614 || opt_fd->root.type == bfd_link_hash_defweak))
7615 {
7616 /* If glibc supports an optimized __tls_get_addr call stub,
7617 signalled by the presence of __tls_get_addr_opt, and we'll
7618 be calling __tls_get_addr via a plt call stub, then
7619 make __tls_get_addr point to __tls_get_addr_opt. */
7620 tga_fd = &htab->tls_get_addr_fd->elf;
7621 if (htab->elf.dynamic_sections_created
7622 && tga_fd != NULL
7623 && (tga_fd->type == STT_FUNC
7624 || tga_fd->needs_plt)
7625 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7626 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7627 {
7628 struct plt_entry *ent;
7629
7630 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7631 if (ent->plt.refcount > 0)
7632 break;
7633 if (ent != NULL)
7634 {
7635 tga_fd->root.type = bfd_link_hash_indirect;
7636 tga_fd->root.u.i.link = &opt_fd->root;
7637 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7638 opt_fd->mark = 1;
a7f2871e
AM
7639 if (opt_fd->dynindx != -1)
7640 {
7641 /* Use __tls_get_addr_opt in dynamic relocations. */
7642 opt_fd->dynindx = -1;
7643 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7644 opt_fd->dynstr_index);
7645 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7646 return NULL;
a7f2871e 7647 }
2cdcc330
AM
7648 htab->tls_get_addr_fd
7649 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7650 tga = &htab->tls_get_addr->elf;
7651 if (opt != NULL && tga != NULL)
7652 {
7653 tga->root.type = bfd_link_hash_indirect;
7654 tga->root.u.i.link = &opt->root;
7655 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7656 opt->mark = 1;
a7f2871e
AM
7657 _bfd_elf_link_hash_hide_symbol (info, opt,
7658 tga->forced_local);
7659 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7660 }
7661 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7662 htab->tls_get_addr_fd->is_func_descriptor = 1;
7663 if (htab->tls_get_addr != NULL)
7664 {
7665 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7666 htab->tls_get_addr->is_func = 1;
7667 }
7668 }
7669 }
7670 }
7c9cf415
AM
7671 else if (htab->params->tls_get_addr_opt < 0)
7672 htab->params->tls_get_addr_opt = 0;
a7f2871e 7673 }
33c0ec9d 7674 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7675}
8387904d 7676
3a71aa26
AM
7677/* Return TRUE iff REL is a branch reloc with a global symbol matching
7678 HASH1 or HASH2. */
8387904d 7679
3a71aa26
AM
7680static bfd_boolean
7681branch_reloc_hash_match (const bfd *ibfd,
7682 const Elf_Internal_Rela *rel,
7683 const struct ppc_link_hash_entry *hash1,
7684 const struct ppc_link_hash_entry *hash2)
7685{
7686 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7687 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7688 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7689
e054468f 7690 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7691 {
3a71aa26
AM
7692 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7693 struct elf_link_hash_entry *h;
8387904d 7694
3a71aa26 7695 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7696 h = elf_follow_link (h);
3a71aa26
AM
7697 if (h == &hash1->elf || h == &hash2->elf)
7698 return TRUE;
a48ebf4d 7699 }
3a71aa26 7700 return FALSE;
951fd09b 7701}
411e1bfb 7702
951fd09b
AM
7703/* Run through all the TLS relocs looking for optimization
7704 opportunities. The linker has been hacked (see ppc64elf.em) to do
7705 a preliminary section layout so that we know the TLS segment
7706 offsets. We can't optimize earlier because some optimizations need
7707 to know the tp offset, and we need to optimize before allocating
7708 dynamic relocations. */
7709
7710bfd_boolean
33c0ec9d 7711ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7712{
7713 bfd *ibfd;
7714 asection *sec;
7715 struct ppc_link_hash_table *htab;
663a1470 7716 unsigned char *toc_ref;
102890f0 7717 int pass;
951fd09b 7718
3cbc1e5e 7719 if (!bfd_link_executable (info))
411e1bfb
AM
7720 return TRUE;
7721
951fd09b 7722 htab = ppc_hash_table (info);
4dfe6ac6
NC
7723 if (htab == NULL)
7724 return FALSE;
7725
663a1470
AM
7726 /* Make two passes over the relocs. On the first pass, mark toc
7727 entries involved with tls relocs, and check that tls relocs
7728 involved in setting up a tls_get_addr call are indeed followed by
7729 such a call. If they are not, we can't do any tls optimization.
7730 On the second pass twiddle tls_mask flags to notify
7731 relocate_section that optimization can be done, and adjust got
7732 and plt refcounts. */
7733 toc_ref = NULL;
7734 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7735 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7736 {
7737 Elf_Internal_Sym *locsyms = NULL;
7738 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7739
102890f0
AM
7740 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7741 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7742 {
7743 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7744 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7745
102890f0
AM
7746 /* Read the relocations. */
7747 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7748 info->keep_memory);
7749 if (relstart == NULL)
2915c55b
JK
7750 {
7751 free (toc_ref);
7752 return FALSE;
7753 }
411e1bfb 7754
102890f0
AM
7755 relend = relstart + sec->reloc_count;
7756 for (rel = relstart; rel < relend; rel++)
7757 {
7758 enum elf_ppc64_reloc_type r_type;
7759 unsigned long r_symndx;
7760 struct elf_link_hash_entry *h;
7761 Elf_Internal_Sym *sym;
7762 asection *sym_sec;
f961d9dd 7763 unsigned char *tls_mask;
46e9995a 7764 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7765 bfd_vma value;
7766 bfd_boolean ok_tprel, is_local;
7767 long toc_ref_index = 0;
7768 int expecting_tls_get_addr = 0;
663a1470 7769 bfd_boolean ret = FALSE;
411e1bfb 7770
102890f0
AM
7771 r_symndx = ELF64_R_SYM (rel->r_info);
7772 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7773 r_symndx, ibfd))
7774 {
7775 err_free_rel:
7776 if (elf_section_data (sec)->relocs != relstart)
7777 free (relstart);
7778 if (toc_ref != NULL)
7779 free (toc_ref);
7780 if (locsyms != NULL
0ffa91dd 7781 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7782 != (unsigned char *) locsyms))
7783 free (locsyms);
663a1470 7784 return ret;
102890f0 7785 }
411e1bfb 7786
102890f0
AM
7787 if (h != NULL)
7788 {
766bc656
AM
7789 if (h->root.type == bfd_link_hash_defined
7790 || h->root.type == bfd_link_hash_defweak)
7791 value = h->root.u.def.value;
7792 else if (h->root.type == bfd_link_hash_undefweak)
7793 value = 0;
7794 else
663a1470
AM
7795 {
7796 found_tls_get_addr_arg = 0;
7797 continue;
7798 }
102890f0
AM
7799 }
7800 else
7801 /* Symbols referenced by TLS relocs must be of type
7802 STT_TLS. So no need for .opd local sym adjust. */
7803 value = sym->st_value;
7804
7805 ok_tprel = FALSE;
7806 is_local = FALSE;
7807 if (h == NULL
7808 || !h->def_dynamic)
7809 {
7810 is_local = TRUE;
766bc656
AM
7811 if (h != NULL
7812 && h->root.type == bfd_link_hash_undefweak)
7813 ok_tprel = TRUE;
c27b8c2a
AM
7814 else if (sym_sec != NULL
7815 && sym_sec->output_section != NULL)
766bc656
AM
7816 {
7817 value += sym_sec->output_offset;
7818 value += sym_sec->output_section->vma;
0b147428 7819 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
7820 /* Note that even though the prefix insns
7821 allow a 1<<33 offset we use the same test
7822 as for addis;addi. There may be a mix of
7823 pcrel and non-pcrel code and the decision
7824 to optimise is per symbol, not per TLS
7825 sequence. */
0b147428 7826 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 7827 }
102890f0 7828 }
951fd09b 7829
102890f0 7830 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7831 /* If this section has old-style __tls_get_addr calls
7832 without marker relocs, then check that each
7833 __tls_get_addr call reloc is preceded by a reloc
7834 that conceivably belongs to the __tls_get_addr arg
7835 setup insn. If we don't find matching arg setup
7836 relocs, don't do any tls optimization. */
7837 if (pass == 0
7838 && sec->has_tls_get_addr_call
7839 && h != NULL
7840 && (h == &htab->tls_get_addr->elf
7841 || h == &htab->tls_get_addr_fd->elf)
7842 && !found_tls_get_addr_arg
7843 && is_branch_reloc (r_type))
7844 {
25f53a85 7845 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7846 "TLS optimization disabled\n"),
7847 ibfd, sec, rel->r_offset);
7848 ret = TRUE;
7849 goto err_free_rel;
7850 }
7851
7852 found_tls_get_addr_arg = 0;
102890f0
AM
7853 switch (r_type)
7854 {
7855 case R_PPC64_GOT_TLSLD16:
7856 case R_PPC64_GOT_TLSLD16_LO:
c213164a 7857 case R_PPC64_GOT_TLSLD34:
102890f0 7858 expecting_tls_get_addr = 1;
663a1470 7859 found_tls_get_addr_arg = 1;
1a0670f3 7860 /* Fall through. */
102890f0
AM
7861
7862 case R_PPC64_GOT_TLSLD16_HI:
7863 case R_PPC64_GOT_TLSLD16_HA:
7864 /* These relocs should never be against a symbol
7865 defined in a shared lib. Leave them alone if
7866 that turns out to be the case. */
7867 if (!is_local)
7868 continue;
411e1bfb 7869
102890f0 7870 /* LD -> LE */
411e1bfb 7871 tls_set = 0;
102890f0
AM
7872 tls_clear = TLS_LD;
7873 tls_type = TLS_TLS | TLS_LD;
7874 break;
411e1bfb 7875
102890f0
AM
7876 case R_PPC64_GOT_TLSGD16:
7877 case R_PPC64_GOT_TLSGD16_LO:
c213164a 7878 case R_PPC64_GOT_TLSGD34:
102890f0 7879 expecting_tls_get_addr = 1;
663a1470 7880 found_tls_get_addr_arg = 1;
1a0670f3 7881 /* Fall through. */
102890f0
AM
7882
7883 case R_PPC64_GOT_TLSGD16_HI:
7884 case R_PPC64_GOT_TLSGD16_HA:
7885 if (ok_tprel)
7886 /* GD -> LE */
411e1bfb 7887 tls_set = 0;
102890f0
AM
7888 else
7889 /* GD -> IE */
b00a0a86 7890 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
7891 tls_clear = TLS_GD;
7892 tls_type = TLS_TLS | TLS_GD;
7893 break;
7894
c213164a 7895 case R_PPC64_GOT_TPREL34:
102890f0
AM
7896 case R_PPC64_GOT_TPREL16_DS:
7897 case R_PPC64_GOT_TPREL16_LO_DS:
7898 case R_PPC64_GOT_TPREL16_HI:
7899 case R_PPC64_GOT_TPREL16_HA:
7900 if (ok_tprel)
7901 {
7902 /* IE -> LE */
7903 tls_set = 0;
7904 tls_clear = TLS_TPREL;
7905 tls_type = TLS_TLS | TLS_TPREL;
7906 break;
7907 }
411e1bfb
AM
7908 continue;
7909
727fc41e
AM
7910 case R_PPC64_TLSGD:
7911 case R_PPC64_TLSLD:
23cedd1d
AM
7912 if (rel + 1 < relend
7913 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7914 {
7915 if (pass != 0
2cdcc330 7916 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
7917 != R_PPC64_PLTSEQ)
7918 && (ELF64_R_TYPE (rel[1].r_info)
7919 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
7920 {
7921 r_symndx = ELF64_R_SYM (rel[1].r_info);
7922 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7923 r_symndx, ibfd))
23cedd1d
AM
7924 goto err_free_rel;
7925 if (h != NULL)
7926 {
7927 struct plt_entry *ent = NULL;
7928
7929 for (ent = h->plt.plist;
7930 ent != NULL;
7931 ent = ent->next)
7932 if (ent->addend == rel[1].r_addend)
7933 break;
7934
7935 if (ent != NULL
7936 && ent->plt.refcount > 0)
7937 ent->plt.refcount -= 1;
7938 }
7939 }
7940 continue;
7941 }
663a1470 7942 found_tls_get_addr_arg = 1;
1a0670f3 7943 /* Fall through. */
663a1470
AM
7944
7945 case R_PPC64_TLS:
7946 case R_PPC64_TOC16:
7947 case R_PPC64_TOC16_LO:
102890f0
AM
7948 if (sym_sec == NULL || sym_sec != toc)
7949 continue;
7950
7951 /* Mark this toc entry as referenced by a TLS
7952 code sequence. We can do that now in the
7953 case of R_PPC64_TLS, and after checking for
7954 tls_get_addr for the TOC16 relocs. */
7955 if (toc_ref == NULL)
2cdcc330
AM
7956 toc_ref
7957 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7958 if (toc_ref == NULL)
7959 goto err_free_rel;
7960
102890f0
AM
7961 if (h != NULL)
7962 value = h->root.u.def.value;
7963 else
7964 value = sym->st_value;
7965 value += rel->r_addend;
73242275
AM
7966 if (value % 8 != 0)
7967 continue;
7968 BFD_ASSERT (value < toc->size
7969 && toc->output_offset % 8 == 0);
663a1470 7970 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7971 if (r_type == R_PPC64_TLS
7972 || r_type == R_PPC64_TLSGD
7973 || r_type == R_PPC64_TLSLD)
102890f0
AM
7974 {
7975 toc_ref[toc_ref_index] = 1;
7976 continue;
7977 }
7978
7979 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7980 continue;
7981
7982 tls_set = 0;
7983 tls_clear = 0;
7984 expecting_tls_get_addr = 2;
7985 break;
7986
7987 case R_PPC64_TPREL64:
7988 if (pass == 0
7989 || sec != toc
7990 || toc_ref == NULL
663a1470 7991 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7992 continue;
7993 if (ok_tprel)
7994 {
7995 /* IE -> LE */
7996 tls_set = TLS_EXPLICIT;
7997 tls_clear = TLS_TPREL;
7998 break;
7999 }
8000 continue;
8001
8002 case R_PPC64_DTPMOD64:
8003 if (pass == 0
8004 || sec != toc
8005 || toc_ref == NULL
663a1470 8006 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8007 continue;
8008 if (rel + 1 < relend
8009 && (rel[1].r_info
8010 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8011 && rel[1].r_offset == rel->r_offset + 8)
8012 {
8013 if (ok_tprel)
8014 /* GD -> LE */
8015 tls_set = TLS_EXPLICIT | TLS_GD;
8016 else
8017 /* GD -> IE */
b00a0a86 8018 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8019 tls_clear = TLS_GD;
8020 }
8021 else
8022 {
8023 if (!is_local)
8024 continue;
8025
8026 /* LD -> LE */
8027 tls_set = TLS_EXPLICIT;
8028 tls_clear = TLS_LD;
8029 }
8030 break;
8031
8032 default:
8033 continue;
8034 }
8035
8036 if (pass == 0)
8037 {
727fc41e
AM
8038 if (!expecting_tls_get_addr
8039 || !sec->has_tls_get_addr_call)
102890f0
AM
8040 continue;
8041
3a71aa26
AM
8042 if (rel + 1 < relend
8043 && branch_reloc_hash_match (ibfd, rel + 1,
8044 htab->tls_get_addr,
8045 htab->tls_get_addr_fd))
102890f0 8046 {
3a71aa26 8047 if (expecting_tls_get_addr == 2)
102890f0 8048 {
3a71aa26 8049 /* Check for toc tls entries. */
f961d9dd 8050 unsigned char *toc_tls;
3a71aa26
AM
8051 int retval;
8052
8053 retval = get_tls_mask (&toc_tls, NULL, NULL,
8054 &locsyms,
8055 rel, ibfd);
8056 if (retval == 0)
8057 goto err_free_rel;
663a1470
AM
8058 if (toc_tls != NULL)
8059 {
37da22e5
AM
8060 if ((*toc_tls & TLS_TLS) != 0
8061 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8062 found_tls_get_addr_arg = 1;
8063 if (retval > 1)
8064 toc_ref[toc_ref_index] = 1;
8065 }
102890f0 8066 }
3a71aa26 8067 continue;
102890f0
AM
8068 }
8069
102890f0
AM
8070 /* Uh oh, we didn't find the expected call. We
8071 could just mark this symbol to exclude it
8072 from tls optimization but it's safer to skip
663a1470 8073 the entire optimization. */
695344c0 8074 /* xgettext:c-format */
25f53a85 8075 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8076 "TLS optimization disabled\n"),
8077 ibfd, sec, rel->r_offset);
8078 ret = TRUE;
8079 goto err_free_rel;
102890f0
AM
8080 }
8081
37da22e5
AM
8082 /* If we don't have old-style __tls_get_addr calls
8083 without TLSGD/TLSLD marker relocs, and we haven't
8084 found a new-style __tls_get_addr call with a
8085 marker for this symbol, then we either have a
8086 broken object file or an -mlongcall style
8087 indirect call to __tls_get_addr without a marker.
8088 Disable optimization in this case. */
8089 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8090 && (tls_set & TLS_EXPLICIT) == 0
8091 && !sec->has_tls_get_addr_call
8092 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8093 != (TLS_TLS | TLS_MARK)))
8094 continue;
8095
23cedd1d 8096 if (expecting_tls_get_addr)
102890f0 8097 {
23cedd1d
AM
8098 struct plt_entry *ent = NULL;
8099
8100 if (htab->tls_get_addr != NULL)
8101 for (ent = htab->tls_get_addr->elf.plt.plist;
8102 ent != NULL;
8103 ent = ent->next)
8104 if (ent->addend == 0)
102890f0 8105 break;
411e1bfb 8106
23cedd1d
AM
8107 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8108 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8109 ent != NULL;
8110 ent = ent->next)
8111 if (ent->addend == 0)
102890f0 8112 break;
23cedd1d
AM
8113
8114 if (ent != NULL
8115 && ent->plt.refcount > 0)
8116 ent->plt.refcount -= 1;
102890f0 8117 }
411e1bfb 8118
102890f0 8119 if (tls_clear == 0)
30038c59
AM
8120 continue;
8121
102890f0
AM
8122 if ((tls_set & TLS_EXPLICIT) == 0)
8123 {
8124 struct got_entry *ent;
411e1bfb 8125
102890f0
AM
8126 /* Adjust got entry for this reloc. */
8127 if (h != NULL)
8128 ent = h->got.glist;
8129 else
8130 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8131
102890f0
AM
8132 for (; ent != NULL; ent = ent->next)
8133 if (ent->addend == rel->r_addend
8134 && ent->owner == ibfd
8135 && ent->tls_type == tls_type)
8136 break;
8137 if (ent == NULL)
8138 abort ();
411e1bfb 8139
102890f0
AM
8140 if (tls_set == 0)
8141 {
8142 /* We managed to get rid of a got entry. */
8143 if (ent->got.refcount > 0)
8144 ent->got.refcount -= 1;
8145 }
8146 }
8147 else
8148 {
8149 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8150 we'll lose one or two dyn relocs. */
8151 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8152 NULL, h, sym))
102890f0 8153 return FALSE;
411e1bfb 8154
102890f0
AM
8155 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8156 {
8157 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8158 NULL, h, sym))
102890f0
AM
8159 return FALSE;
8160 }
8161 }
411e1bfb 8162
46e9995a 8163 *tls_mask |= tls_set & 0xff;
102890f0
AM
8164 *tls_mask &= ~tls_clear;
8165 }
8c1d1bb8 8166
102890f0
AM
8167 if (elf_section_data (sec)->relocs != relstart)
8168 free (relstart);
8169 }
411e1bfb 8170
663a1470
AM
8171 if (locsyms != NULL
8172 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8173 {
8174 if (!info->keep_memory)
8175 free (locsyms);
8176 else
8177 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8178 }
8179 }
411e1bfb 8180
663a1470
AM
8181 if (toc_ref != NULL)
8182 free (toc_ref);
9a23f96e 8183 htab->do_tls_opt = 1;
b34976b6 8184 return TRUE;
1e2f5b6e 8185}
b34976b6 8186
c5614fa4
AM
8187/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8188 the values of any global symbols in a toc section that has been
8189 edited. Globals in toc sections should be a rarity, so this function
8190 sets a flag if any are found in toc sections other than the one just
de194d85 8191 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8192
8193struct adjust_toc_info
8194{
8195 asection *toc;
8196 unsigned long *skip;
8197 bfd_boolean global_toc_syms;
8198};
8199
ba761f19
AM
8200enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8201
c5614fa4
AM
8202static bfd_boolean
8203adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8204{
8205 struct ppc_link_hash_entry *eh;
8206 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8207 unsigned long i;
c5614fa4 8208
c5614fa4
AM
8209 if (h->root.type != bfd_link_hash_defined
8210 && h->root.type != bfd_link_hash_defweak)
8211 return TRUE;
8212
8213 eh = (struct ppc_link_hash_entry *) h;
8214 if (eh->adjust_done)
8215 return TRUE;
8216
8217 if (eh->elf.root.u.def.section == toc_inf->toc)
8218 {
854b41e7
AM
8219 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8220 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8221 else
854b41e7
AM
8222 i = eh->elf.root.u.def.value >> 3;
8223
ba761f19 8224 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8225 {
4eca0228 8226 _bfd_error_handler
854b41e7
AM
8227 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8228 do
8229 ++i;
ba761f19 8230 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8231 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8232 }
854b41e7
AM
8233
8234 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8235 eh->adjust_done = 1;
8236 }
8237 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8238 toc_inf->global_toc_syms = TRUE;
8239
8240 return TRUE;
8241}
8242
39eeab25
AM
8243/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8244 on a _LO variety toc/got reloc. */
560c8763
AM
8245
8246static bfd_boolean
39eeab25 8247ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8248{
39eeab25
AM
8249 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8250 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
8251 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8252 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8253 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8254 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8255 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8256 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8257 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8258 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8259 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8260 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8261 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8262 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8263 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
8264 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8265 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8266 /* Exclude lfqu by testing reloc. If relocs are ever
8267 defined for the reduced D field in psq_lu then those
8268 will need testing too. */
8269 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8270 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8271 && (insn & 1) == 0)
8272 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8273 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8274 /* Exclude stfqu. psq_stu as above for psq_lu. */
8275 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8276 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8277 && (insn & 1) == 0));
560c8763
AM
8278}
8279
4a421c53
AM
8280/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8281 pld ra,symbol@got@pcrel
dd9b12c2 8282 load/store rt,off(ra)
4a421c53 8283 or
d4b87b1e 8284 pla ra,symbol@pcrel
dd9b12c2 8285 load/store rt,off(ra)
4a421c53 8286 may be translated to
dd9b12c2 8287 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8288 nop.
8289 This function returns true if the optimization is possible, placing
dd9b12c2 8290 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8291
8292 On entry to this function, the linker has already determined that
d4b87b1e 8293 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8294 while *PINSN2 is the second instruction. */
8295
8296static bfd_boolean
dd9b12c2 8297xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8298{
77486630
AM
8299 uint64_t insn1 = *pinsn1;
8300 uint64_t insn2 = *pinsn2;
dd9b12c2 8301 bfd_signed_vma off;
4a421c53 8302
77486630
AM
8303 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8304 {
8305 /* Check that regs match. */
8306 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8307 return FALSE;
8308
8309 /* P8LS or PMLS form, non-pcrel. */
8310 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8311 return FALSE;
8312
8313 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8314 *pinsn2 = PNOP;
8315 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8316 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8317 return TRUE;
8318 }
8319
8320 insn2 >>= 32;
8321
4a421c53 8322 /* Check that regs match. */
77486630 8323 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8324 return FALSE;
8325
8326 switch ((insn2 >> 26) & 63)
8327 {
8328 default:
8329 return FALSE;
8330
8331 case 32: /* lwz */
8332 case 34: /* lbz */
8333 case 36: /* stw */
8334 case 38: /* stb */
8335 case 40: /* lhz */
8336 case 42: /* lha */
8337 case 44: /* sth */
8338 case 48: /* lfs */
8339 case 50: /* lfd */
8340 case 52: /* stfs */
8341 case 54: /* stfd */
8342 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8343 on the insn. */
77486630 8344 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8345 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8346 off = insn2 & 0xffff;
4a421c53
AM
8347 break;
8348
8349 case 58: /* lwa, ld */
dd9b12c2 8350 if ((insn2 & 1) != 0)
4a421c53 8351 return FALSE;
77486630 8352 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8353 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8354 | (insn2 & (31ULL << 21)));
dd9b12c2 8355 off = insn2 & 0xfffc;
4a421c53
AM
8356 break;
8357
8358 case 57: /* lxsd, lxssp */
dd9b12c2 8359 if ((insn2 & 3) < 2)
4a421c53 8360 return FALSE;
77486630 8361 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8362 | ((40ULL | (insn2 & 3)) << 26)
8363 | (insn2 & (31ULL << 21)));
dd9b12c2 8364 off = insn2 & 0xfffc;
4a421c53
AM
8365 break;
8366
8367 case 61: /* stxsd, stxssp, lxv, stxv */
8368 if ((insn2 & 3) == 0)
8369 return FALSE;
8370 else if ((insn2 & 3) >= 2)
8371 {
77486630 8372 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8373 | ((44ULL | (insn2 & 3)) << 26)
8374 | (insn2 & (31ULL << 21)));
dd9b12c2 8375 off = insn2 & 0xfffc;
4a421c53
AM
8376 }
8377 else
8378 {
77486630 8379 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8380 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8381 | (insn2 & (31ULL << 21)));
dd9b12c2 8382 off = insn2 & 0xfff0;
4a421c53
AM
8383 }
8384 break;
8385
8386 case 56: /* lq */
77486630 8387 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8388 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8389 off = insn2 & 0xffff;
4a421c53
AM
8390 break;
8391
8392 case 62: /* std, stq */
dd9b12c2 8393 if ((insn2 & 1) != 0)
4a421c53 8394 return FALSE;
77486630 8395 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8396 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8397 | (insn2 & (31ULL << 21)));
dd9b12c2 8398 off = insn2 & 0xfffc;
4a421c53
AM
8399 break;
8400 }
8401
77486630 8402 *pinsn1 = insn1;
4a421c53 8403 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8404 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8405 return TRUE;
8406}
8407
c5614fa4
AM
8408/* Examine all relocs referencing .toc sections in order to remove
8409 unused .toc entries. */
8410
8411bfd_boolean
33c0ec9d 8412ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8413{
8414 bfd *ibfd;
8415 struct adjust_toc_info toc_inf;
67f0cbdb 8416 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8417
67f0cbdb 8418 htab->do_toc_opt = 1;
c5614fa4 8419 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8420 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8421 {
8422 asection *toc, *sec;
8423 Elf_Internal_Shdr *symtab_hdr;
8424 Elf_Internal_Sym *local_syms;
425b145b 8425 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8426 unsigned long *skip, *drop;
8427 unsigned char *used;
8428 unsigned char *keep, last, some_unused;
8429
854b41e7
AM
8430 if (!is_ppc64_elf (ibfd))
8431 continue;
8432
c5614fa4
AM
8433 toc = bfd_get_section_by_name (ibfd, ".toc");
8434 if (toc == NULL
92b7a70f 8435 || toc->size == 0
dbaa2011
AM
8436 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8437 || discarded_section (toc))
c5614fa4
AM
8438 continue;
8439
425b145b 8440 toc_relocs = NULL;
c5614fa4 8441 local_syms = NULL;
0ffa91dd 8442 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8443
8444 /* Look at sections dropped from the final link. */
8445 skip = NULL;
8446 relstart = NULL;
8447 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8448 {
8449 if (sec->reloc_count == 0
dbaa2011 8450 || !discarded_section (sec)
c5614fa4
AM
8451 || get_opd_info (sec)
8452 || (sec->flags & SEC_ALLOC) == 0
8453 || (sec->flags & SEC_DEBUGGING) != 0)
8454 continue;
8455
8456 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8457 if (relstart == NULL)
8458 goto error_ret;
8459
8460 /* Run through the relocs to see which toc entries might be
8461 unused. */
8462 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8463 {
8464 enum elf_ppc64_reloc_type r_type;
8465 unsigned long r_symndx;
8466 asection *sym_sec;
8467 struct elf_link_hash_entry *h;
8468 Elf_Internal_Sym *sym;
8469 bfd_vma val;
8470
8471 r_type = ELF64_R_TYPE (rel->r_info);
8472 switch (r_type)
8473 {
8474 default:
8475 continue;
8476
8477 case R_PPC64_TOC16:
8478 case R_PPC64_TOC16_LO:
8479 case R_PPC64_TOC16_HI:
8480 case R_PPC64_TOC16_HA:
8481 case R_PPC64_TOC16_DS:
8482 case R_PPC64_TOC16_LO_DS:
8483 break;
8484 }
8485
8486 r_symndx = ELF64_R_SYM (rel->r_info);
8487 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8488 r_symndx, ibfd))
8489 goto error_ret;
8490
8491 if (sym_sec != toc)
8492 continue;
8493
8494 if (h != NULL)
8495 val = h->root.u.def.value;
8496 else
8497 val = sym->st_value;
8498 val += rel->r_addend;
8499
8500 if (val >= toc->size)
8501 continue;
8502
8503 /* Anything in the toc ought to be aligned to 8 bytes.
8504 If not, don't mark as unused. */
8505 if (val & 7)
8506 continue;
8507
8508 if (skip == NULL)
8509 {
854b41e7 8510 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8511 if (skip == NULL)
8512 goto error_ret;
8513 }
8514
ba761f19 8515 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8516 }
8517
8518 if (elf_section_data (sec)->relocs != relstart)
8519 free (relstart);
8520 }
8521
ba761f19
AM
8522 /* For largetoc loads of address constants, we can convert
8523 . addis rx,2,addr@got@ha
8524 . ld ry,addr@got@l(rx)
8525 to
8526 . addis rx,2,addr@toc@ha
8527 . addi ry,rx,addr@toc@l
8528 when addr is within 2G of the toc pointer. This then means
8529 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8530
ba761f19
AM
8531 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8532 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8533 && toc->reloc_count != 0)
8534 {
8535 /* Read toc relocs. */
425b145b
AM
8536 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8537 info->keep_memory);
8538 if (toc_relocs == NULL)
ba761f19
AM
8539 goto error_ret;
8540
425b145b 8541 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8542 {
8543 enum elf_ppc64_reloc_type r_type;
8544 unsigned long r_symndx;
8545 asection *sym_sec;
8546 struct elf_link_hash_entry *h;
8547 Elf_Internal_Sym *sym;
8548 bfd_vma val, addr;
8549
8550 r_type = ELF64_R_TYPE (rel->r_info);
8551 if (r_type != R_PPC64_ADDR64)
8552 continue;
8553
8554 r_symndx = ELF64_R_SYM (rel->r_info);
8555 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8556 r_symndx, ibfd))
8557 goto error_ret;
8558
425b145b 8559 if (sym_sec == NULL
c27b8c2a 8560 || sym_sec->output_section == NULL
dbaa2011 8561 || discarded_section (sym_sec))
425b145b
AM
8562 continue;
8563
afe397ea 8564 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8565 continue;
8566
8567 if (h != NULL)
bddc25c9
AM
8568 {
8569 if (h->type == STT_GNU_IFUNC)
8570 continue;
8571 val = h->root.u.def.value;
8572 }
ba761f19 8573 else
bddc25c9
AM
8574 {
8575 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8576 continue;
8577 val = sym->st_value;
8578 }
ba761f19
AM
8579 val += rel->r_addend;
8580 val += sym_sec->output_section->vma + sym_sec->output_offset;
8581
8582 /* We don't yet know the exact toc pointer value, but we
8583 know it will be somewhere in the toc section. Don't
8584 optimize if the difference from any possible toc
8585 pointer is outside [ff..f80008000, 7fff7fff]. */
8586 addr = toc->output_section->vma + TOC_BASE_OFF;
8587 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8588 continue;
8589
8590 addr = toc->output_section->vma + toc->output_section->rawsize;
8591 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8592 continue;
8593
8594 if (skip == NULL)
8595 {
8596 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8597 if (skip == NULL)
8598 goto error_ret;
8599 }
8600
8601 skip[rel->r_offset >> 3]
425b145b 8602 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8603 }
ba761f19
AM
8604 }
8605
c5614fa4
AM
8606 if (skip == NULL)
8607 continue;
8608
8609 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8610 if (used == NULL)
8611 {
8612 error_ret:
8613 if (local_syms != NULL
8614 && symtab_hdr->contents != (unsigned char *) local_syms)
8615 free (local_syms);
8616 if (sec != NULL
8617 && relstart != NULL
8618 && elf_section_data (sec)->relocs != relstart)
8619 free (relstart);
425b145b
AM
8620 if (toc_relocs != NULL
8621 && elf_section_data (toc)->relocs != toc_relocs)
8622 free (toc_relocs);
c5614fa4
AM
8623 if (skip != NULL)
8624 free (skip);
8625 return FALSE;
8626 }
8627
30038c59
AM
8628 /* Now check all kept sections that might reference the toc.
8629 Check the toc itself last. */
8630 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8631 : ibfd->sections);
c5614fa4 8632 sec != NULL;
c5614fa4 8633 sec = (sec == toc ? NULL
c5614fa4 8634 : sec->next == NULL ? toc
30038c59 8635 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8636 : sec->next))
8637 {
8638 int repeat;
8639
8640 if (sec->reloc_count == 0
dbaa2011 8641 || discarded_section (sec)
c5614fa4
AM
8642 || get_opd_info (sec)
8643 || (sec->flags & SEC_ALLOC) == 0
8644 || (sec->flags & SEC_DEBUGGING) != 0)
8645 continue;
8646
854b41e7
AM
8647 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8648 info->keep_memory);
c5614fa4 8649 if (relstart == NULL)
2915c55b
JK
8650 {
8651 free (used);
8652 goto error_ret;
8653 }
c5614fa4
AM
8654
8655 /* Mark toc entries referenced as used. */
c5614fa4 8656 do
d4f1ee75
AM
8657 {
8658 repeat = 0;
8659 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8660 {
8661 enum elf_ppc64_reloc_type r_type;
8662 unsigned long r_symndx;
8663 asection *sym_sec;
8664 struct elf_link_hash_entry *h;
8665 Elf_Internal_Sym *sym;
8666 bfd_vma val;
98528052 8667
d4f1ee75 8668 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8669 switch (r_type)
8670 {
8671 case R_PPC64_TOC16:
8672 case R_PPC64_TOC16_LO:
8673 case R_PPC64_TOC16_HI:
8674 case R_PPC64_TOC16_HA:
8675 case R_PPC64_TOC16_DS:
8676 case R_PPC64_TOC16_LO_DS:
8677 /* In case we're taking addresses of toc entries. */
8678 case R_PPC64_ADDR64:
8679 break;
c5614fa4 8680
d4f1ee75
AM
8681 default:
8682 continue;
8683 }
c5614fa4 8684
d4f1ee75
AM
8685 r_symndx = ELF64_R_SYM (rel->r_info);
8686 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8687 r_symndx, ibfd))
8688 {
8689 free (used);
8690 goto error_ret;
8691 }
c5614fa4 8692
d4f1ee75
AM
8693 if (sym_sec != toc)
8694 continue;
c5614fa4 8695
d4f1ee75
AM
8696 if (h != NULL)
8697 val = h->root.u.def.value;
8698 else
8699 val = sym->st_value;
8700 val += rel->r_addend;
ba761f19 8701
d4f1ee75
AM
8702 if (val >= toc->size)
8703 continue;
ba761f19 8704
d4f1ee75
AM
8705 if ((skip[val >> 3] & can_optimize) != 0)
8706 {
8707 bfd_vma off;
8708 unsigned char opc;
8709
8710 switch (r_type)
8711 {
8712 case R_PPC64_TOC16_HA:
ba761f19 8713 break;
ba761f19 8714
d4f1ee75
AM
8715 case R_PPC64_TOC16_LO_DS:
8716 off = rel->r_offset;
8717 off += (bfd_big_endian (ibfd) ? -2 : 3);
8718 if (!bfd_get_section_contents (ibfd, sec, &opc,
8719 off, 1))
8720 {
8721 free (used);
8722 goto error_ret;
8723 }
8724 if ((opc & (0x3f << 2)) == (58u << 2))
8725 break;
1a0670f3 8726 /* Fall through. */
ba761f19 8727
d4f1ee75
AM
8728 default:
8729 /* Wrong sort of reloc, or not a ld. We may
8730 as well clear ref_from_discarded too. */
8731 skip[val >> 3] = 0;
8732 }
8733 }
8734
8735 if (sec != toc)
8736 used[val >> 3] = 1;
8737 /* For the toc section, we only mark as used if this
8738 entry itself isn't unused. */
8739 else if ((used[rel->r_offset >> 3]
8740 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8741 && !used[val >> 3])
8742 {
8743 /* Do all the relocs again, to catch reference
8744 chains. */
8745 repeat = 1;
8746 used[val >> 3] = 1;
8747 }
8748 }
8749 }
c5614fa4 8750 while (repeat);
854b41e7
AM
8751
8752 if (elf_section_data (sec)->relocs != relstart)
8753 free (relstart);
c5614fa4
AM
8754 }
8755
8756 /* Merge the used and skip arrays. Assume that TOC
8757 doublewords not appearing as either used or unused belong
de194d85 8758 to an entry more than one doubleword in size. */
c5614fa4
AM
8759 for (drop = skip, keep = used, last = 0, some_unused = 0;
8760 drop < skip + (toc->size + 7) / 8;
8761 ++drop, ++keep)
8762 {
8763 if (*keep)
8764 {
ba761f19
AM
8765 *drop &= ~ref_from_discarded;
8766 if ((*drop & can_optimize) != 0)
8767 some_unused = 1;
c5614fa4
AM
8768 last = 0;
8769 }
b140b010 8770 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8771 {
8772 some_unused = 1;
ba761f19 8773 last = ref_from_discarded;
c5614fa4
AM
8774 }
8775 else
8776 *drop = last;
8777 }
8778
8779 free (used);
8780
8781 if (some_unused)
8782 {
8783 bfd_byte *contents, *src;
8784 unsigned long off;
d62b3684 8785 Elf_Internal_Sym *sym;
ba761f19 8786 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8787
8788 /* Shuffle the toc contents, and at the same time convert the
8789 skip array from booleans into offsets. */
8790 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8791 goto error_ret;
8792
8793 elf_section_data (toc)->this_hdr.contents = contents;
8794
8795 for (src = contents, off = 0, drop = skip;
8796 src < contents + toc->size;
8797 src += 8, ++drop)
8798 {
ba761f19
AM
8799 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8800 off += 8;
c5614fa4
AM
8801 else if (off != 0)
8802 {
8803 *drop = off;
8804 memcpy (src - off, src, 8);
8805 }
8806 }
854b41e7 8807 *drop = off;
c5614fa4
AM
8808 toc->rawsize = toc->size;
8809 toc->size = src - contents - off;
8810
ba761f19
AM
8811 /* Adjust addends for relocs against the toc section sym,
8812 and optimize any accesses we can. */
c5614fa4
AM
8813 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8814 {
8815 if (sec->reloc_count == 0
dbaa2011 8816 || discarded_section (sec))
c5614fa4
AM
8817 continue;
8818
8819 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8820 info->keep_memory);
c5614fa4
AM
8821 if (relstart == NULL)
8822 goto error_ret;
8823
8824 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8825 {
8826 enum elf_ppc64_reloc_type r_type;
8827 unsigned long r_symndx;
8828 asection *sym_sec;
8829 struct elf_link_hash_entry *h;
854b41e7 8830 bfd_vma val;
c5614fa4
AM
8831
8832 r_type = ELF64_R_TYPE (rel->r_info);
8833 switch (r_type)
8834 {
8835 default:
8836 continue;
8837
8838 case R_PPC64_TOC16:
8839 case R_PPC64_TOC16_LO:
8840 case R_PPC64_TOC16_HI:
8841 case R_PPC64_TOC16_HA:
8842 case R_PPC64_TOC16_DS:
8843 case R_PPC64_TOC16_LO_DS:
8844 case R_PPC64_ADDR64:
8845 break;
8846 }
8847
8848 r_symndx = ELF64_R_SYM (rel->r_info);
8849 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8850 r_symndx, ibfd))
8851 goto error_ret;
8852
ba761f19 8853 if (sym_sec != toc)
c5614fa4
AM
8854 continue;
8855
ba761f19
AM
8856 if (h != NULL)
8857 val = h->root.u.def.value;
8858 else
8859 {
8860 val = sym->st_value;
8861 if (val != 0)
8862 local_toc_syms = TRUE;
8863 }
8864
8865 val += rel->r_addend;
854b41e7
AM
8866
8867 if (val > toc->rawsize)
8868 val = toc->rawsize;
ba761f19
AM
8869 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8870 continue;
8871 else if ((skip[val >> 3] & can_optimize) != 0)
8872 {
8873 Elf_Internal_Rela *tocrel
425b145b 8874 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8875 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8876
8877 switch (r_type)
8878 {
8879 case R_PPC64_TOC16_HA:
8880 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8881 break;
8882
8883 case R_PPC64_TOC16_LO_DS:
8884 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8885 break;
8886
8887 default:
28942f62
AM
8888 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8889 ppc_howto_init ();
b140b010 8890 info->callbacks->einfo
695344c0 8891 /* xgettext:c-format */
174d0a74 8892 (_("%H: %s references "
b140b010
AM
8893 "optimized away TOC entry\n"),
8894 ibfd, sec, rel->r_offset,
8895 ppc64_elf_howto_table[r_type]->name);
8896 bfd_set_error (bfd_error_bad_value);
8897 goto error_ret;
ba761f19
AM
8898 }
8899 rel->r_addend = tocrel->r_addend;
8900 elf_section_data (sec)->relocs = relstart;
8901 continue;
8902 }
8903
8904 if (h != NULL || sym->st_value != 0)
8905 continue;
854b41e7
AM
8906
8907 rel->r_addend -= skip[val >> 3];
8908 elf_section_data (sec)->relocs = relstart;
c5614fa4 8909 }
854b41e7
AM
8910
8911 if (elf_section_data (sec)->relocs != relstart)
8912 free (relstart);
c5614fa4
AM
8913 }
8914
8915 /* We shouldn't have local or global symbols defined in the TOC,
8916 but handle them anyway. */
df22d223
AM
8917 if (local_syms != NULL)
8918 for (sym = local_syms;
8919 sym < local_syms + symtab_hdr->sh_info;
8920 ++sym)
8921 if (sym->st_value != 0
8922 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8923 {
8924 unsigned long i;
854b41e7 8925
df22d223
AM
8926 if (sym->st_value > toc->rawsize)
8927 i = toc->rawsize >> 3;
8928 else
8929 i = sym->st_value >> 3;
854b41e7 8930
df22d223
AM
8931 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8932 {
8933 if (local_toc_syms)
4eca0228 8934 _bfd_error_handler
df22d223
AM
8935 (_("%s defined on removed toc entry"),
8936 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8937 do
8938 ++i;
8939 while ((skip[i] & (ref_from_discarded | can_optimize)));
8940 sym->st_value = (bfd_vma) i << 3;
8941 }
d62b3684 8942
df22d223
AM
8943 sym->st_value -= skip[i];
8944 symtab_hdr->contents = (unsigned char *) local_syms;
8945 }
c5614fa4 8946
854b41e7 8947 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8948 if (toc_inf.global_toc_syms)
8949 {
8950 toc_inf.toc = toc;
8951 toc_inf.skip = skip;
8952 toc_inf.global_toc_syms = FALSE;
8953 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8954 &toc_inf);
8955 }
854b41e7
AM
8956
8957 if (toc->reloc_count != 0)
8958 {
d4730f92 8959 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8960 Elf_Internal_Rela *wrel;
8961 bfd_size_type sz;
8962
854b41e7 8963 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8964 if (toc_relocs == NULL)
8965 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8966 info->keep_memory);
8967 if (toc_relocs == NULL)
8968 goto error_ret;
8969
425b145b
AM
8970 wrel = toc_relocs;
8971 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8972 if ((skip[rel->r_offset >> 3]
8973 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8974 {
8975 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8976 wrel->r_info = rel->r_info;
8977 wrel->r_addend = rel->r_addend;
8978 ++wrel;
8979 }
8980 else if (!dec_dynrel_count (rel->r_info, toc, info,
8981 &local_syms, NULL, NULL))
8982 goto error_ret;
8983
425b145b
AM
8984 elf_section_data (toc)->relocs = toc_relocs;
8985 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8986 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8987 sz = rel_hdr->sh_entsize;
8988 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8989 }
c5614fa4 8990 }
28be611c
AM
8991 else if (toc_relocs != NULL
8992 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8993 free (toc_relocs);
c5614fa4
AM
8994
8995 if (local_syms != NULL
8996 && symtab_hdr->contents != (unsigned char *) local_syms)
8997 {
8998 if (!info->keep_memory)
8999 free (local_syms);
9000 else
9001 symtab_hdr->contents = (unsigned char *) local_syms;
9002 }
9003 free (skip);
9004 }
9005
066f4018 9006 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9007 a GOT relative or PC relative access, possibly reducing the
9008 number of GOT entries. */
066f4018
AM
9009 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9010 {
9011 asection *sec;
9012 Elf_Internal_Shdr *symtab_hdr;
9013 Elf_Internal_Sym *local_syms;
9014 Elf_Internal_Rela *relstart, *rel;
9015 bfd_vma got;
9016
9017 if (!is_ppc64_elf (ibfd))
9018 continue;
9019
903b777d 9020 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9021 continue;
9022
9023 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9024 got = 0;
9025 if (sec != NULL)
9026 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9027
9028 local_syms = NULL;
9029 symtab_hdr = &elf_symtab_hdr (ibfd);
9030
9031 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9032 {
9033 if (sec->reloc_count == 0
903b777d 9034 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9035 || discarded_section (sec))
9036 continue;
9037
9038 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9039 info->keep_memory);
9040 if (relstart == NULL)
9041 {
9042 got_error_ret:
9043 if (local_syms != NULL
9044 && symtab_hdr->contents != (unsigned char *) local_syms)
9045 free (local_syms);
9046 if (sec != NULL
9047 && relstart != NULL
9048 && elf_section_data (sec)->relocs != relstart)
9049 free (relstart);
9050 return FALSE;
9051 }
9052
9053 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9054 {
9055 enum elf_ppc64_reloc_type r_type;
9056 unsigned long r_symndx;
9057 Elf_Internal_Sym *sym;
9058 asection *sym_sec;
9059 struct elf_link_hash_entry *h;
9060 struct got_entry *ent;
133a1f60 9061 bfd_vma val, pc;
4a421c53 9062 unsigned char buf[8];
066f4018 9063 unsigned int insn;
903b777d 9064 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9065
9066 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9067 switch (r_type)
9068 {
9069 default:
9070 insn_check = no_check;
9071 break;
9072
9073 case R_PPC64_PLT16_HA:
9074 case R_PPC64_GOT_TLSLD16_HA:
9075 case R_PPC64_GOT_TLSGD16_HA:
9076 case R_PPC64_GOT_TPREL16_HA:
9077 case R_PPC64_GOT_DTPREL16_HA:
9078 case R_PPC64_GOT16_HA:
9079 case R_PPC64_TOC16_HA:
9080 insn_check = check_ha;
9081 break;
9082
9083 case R_PPC64_PLT16_LO:
9084 case R_PPC64_PLT16_LO_DS:
9085 case R_PPC64_GOT_TLSLD16_LO:
9086 case R_PPC64_GOT_TLSGD16_LO:
9087 case R_PPC64_GOT_TPREL16_LO_DS:
9088 case R_PPC64_GOT_DTPREL16_LO_DS:
9089 case R_PPC64_GOT16_LO:
9090 case R_PPC64_GOT16_LO_DS:
9091 case R_PPC64_TOC16_LO:
9092 case R_PPC64_TOC16_LO_DS:
9093 insn_check = check_lo;
9094 break;
9095 }
9096
9097 if (insn_check != no_check)
9098 {
9099 bfd_vma off = rel->r_offset & ~3;
9100
9101 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9102 goto got_error_ret;
9103
9104 insn = bfd_get_32 (ibfd, buf);
9105 if (insn_check == check_lo
9106 ? !ok_lo_toc_insn (insn, r_type)
9107 : ((insn & ((0x3f << 26) | 0x1f << 16))
9108 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9109 {
9110 char str[12];
9111
9112 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9113 sprintf (str, "%#08x", insn);
9114 info->callbacks->einfo
9115 /* xgettext:c-format */
9116 (_("%H: got/toc optimization is not supported for"
9117 " %s instruction\n"),
9118 ibfd, sec, rel->r_offset & ~3, str);
9119 continue;
9120 }
9121 }
9122
066f4018
AM
9123 switch (r_type)
9124 {
bb22a418
AM
9125 /* Note that we don't delete GOT entries for
9126 R_PPC64_GOT16_DS since we'd need a lot more
9127 analysis. For starters, the preliminary layout is
9128 before the GOT, PLT, dynamic sections and stubs are
9129 laid out. Then we'd need to allow for changes in
9130 distance between sections caused by alignment. */
066f4018
AM
9131 default:
9132 continue;
9133
066f4018
AM
9134 case R_PPC64_GOT16_HA:
9135 case R_PPC64_GOT16_LO_DS:
4a421c53 9136 case R_PPC64_GOT_PCREL34:
066f4018
AM
9137 break;
9138 }
9139
9140 r_symndx = ELF64_R_SYM (rel->r_info);
9141 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9142 r_symndx, ibfd))
9143 goto got_error_ret;
9144
6d5554a6
AM
9145 if (sym_sec == NULL
9146 || sym_sec->output_section == NULL
9147 || discarded_section (sym_sec))
9148 continue;
9149
066f4018
AM
9150 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9151 continue;
9152
9153 if (h != NULL)
9154 val = h->root.u.def.value;
9155 else
9156 val = sym->st_value;
133a1f60 9157 val += rel->r_addend;
066f4018
AM
9158 val += sym_sec->output_section->vma + sym_sec->output_offset;
9159
bb22a418
AM
9160/* Fudge factor to allow for the fact that the preliminary layout
9161 isn't exact. Reduce limits by this factor. */
9162#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9163
066f4018
AM
9164 switch (r_type)
9165 {
9166 default:
9167 continue;
9168
066f4018 9169 case R_PPC64_GOT16_HA:
bb22a418
AM
9170 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9171 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9172 continue;
9173
9174 if (!bfd_get_section_contents (ibfd, sec, buf,
9175 rel->r_offset & ~3, 4))
9176 goto got_error_ret;
9177 insn = bfd_get_32 (ibfd, buf);
9178 if (((insn & ((0x3f << 26) | 0x1f << 16))
9179 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9180 continue;
9181 break;
9182
9183 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9184 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9185 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9186 continue;
9187 if (!bfd_get_section_contents (ibfd, sec, buf,
9188 rel->r_offset & ~3, 4))
9189 goto got_error_ret;
9190 insn = bfd_get_32 (ibfd, buf);
9191 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9192 continue;
9193 break;
4a421c53
AM
9194
9195 case R_PPC64_GOT_PCREL34:
9196 pc = rel->r_offset;
9197 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9198 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9199 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9200 continue;
9201 if (!bfd_get_section_contents (ibfd, sec, buf,
9202 rel->r_offset & ~3, 8))
9203 goto got_error_ret;
9204 insn = bfd_get_32 (ibfd, buf);
9205 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9206 continue;
9207 insn = bfd_get_32 (ibfd, buf + 4);
9208 if ((insn & (0x3f << 26)) != 57u << 26)
9209 continue;
9210 break;
066f4018 9211 }
bb22a418 9212#undef LIMIT_ADJUST
066f4018
AM
9213
9214 if (h != NULL)
9215 ent = h->got.glist;
9216 else
9217 {
9218 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9219 ent = local_got_ents[r_symndx];
9220 }
9221 for (; ent != NULL; ent = ent->next)
133a1f60 9222 if (ent->addend == rel->r_addend
066f4018
AM
9223 && ent->owner == ibfd
9224 && ent->tls_type == 0)
9225 break;
9226 BFD_ASSERT (ent && ent->got.refcount > 0);
9227 ent->got.refcount -= 1;
9228 }
9229
9230 if (elf_section_data (sec)->relocs != relstart)
9231 free (relstart);
9232 }
9233
9234 if (local_syms != NULL
9235 && symtab_hdr->contents != (unsigned char *) local_syms)
9236 {
9237 if (!info->keep_memory)
9238 free (local_syms);
9239 else
9240 symtab_hdr->contents = (unsigned char *) local_syms;
9241 }
9242 }
9243
c5614fa4
AM
9244 return TRUE;
9245}
9246
1bbe0902
AM
9247/* Return true iff input section I references the TOC using
9248 instructions limited to +/-32k offsets. */
9249
9250bfd_boolean
9251ppc64_elf_has_small_toc_reloc (asection *i)
9252{
9253 return (is_ppc64_elf (i->owner)
9254 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9255}
9256
927be08e
AM
9257/* Allocate space for one GOT entry. */
9258
9259static void
9260allocate_got (struct elf_link_hash_entry *h,
9261 struct bfd_link_info *info,
9262 struct got_entry *gent)
9263{
9264 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9265 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9266 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9267 ? 16 : 8);
9268 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9269 ? 2 : 1) * sizeof (Elf64_External_Rela);
9270 asection *got = ppc64_elf_tdata (gent->owner)->got;
9271
9272 gent->got.offset = got->size;
9273 got->size += entsize;
9274
19e08130 9275 if (h->type == STT_GNU_IFUNC)
927be08e 9276 {
33e44f2e 9277 htab->elf.irelplt->size += rentsize;
19e08130 9278 htab->got_reli_size += rentsize;
927be08e 9279 }
f15d0b54
AM
9280 else if (((bfd_link_pic (info)
9281 && !((gent->tls_type & TLS_TPREL) != 0
9282 && bfd_link_executable (info)
9283 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9284 || (htab->elf.dynamic_sections_created
9285 && h->dynindx != -1
9286 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9287 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9288 {
19e08130 9289 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9290 relgot->size += rentsize;
927be08e
AM
9291 }
9292}
9293
7865406b
AM
9294/* This function merges got entries in the same toc group. */
9295
9296static void
9297merge_got_entries (struct got_entry **pent)
9298{
9299 struct got_entry *ent, *ent2;
9300
9301 for (ent = *pent; ent != NULL; ent = ent->next)
9302 if (!ent->is_indirect)
9303 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9304 if (!ent2->is_indirect
9305 && ent2->addend == ent->addend
9306 && ent2->tls_type == ent->tls_type
9307 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9308 {
9309 ent2->is_indirect = TRUE;
9310 ent2->got.ent = ent;
9311 }
9312}
9313
46434633 9314/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9315
9316static bfd_boolean
46434633
AM
9317ensure_undef_dynamic (struct bfd_link_info *info,
9318 struct elf_link_hash_entry *h)
f0158f44
AM
9319{
9320 struct elf_link_hash_table *htab = elf_hash_table (info);
9321
9322 if (htab->dynamic_sections_created
46434633
AM
9323 && ((info->dynamic_undefined_weak != 0
9324 && h->root.type == bfd_link_hash_undefweak)
9325 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9326 && h->dynindx == -1
9327 && !h->forced_local
9328 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9329 return bfd_elf_link_record_dynamic_symbol (info, h);
9330 return TRUE;
9331}
9332
65f38f15
AM
9333/* Allocate space in .plt, .got and associated reloc sections for
9334 dynamic relocs. */
5bd4f169 9335
b34976b6 9336static bfd_boolean
4ce794b7 9337allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9338{
65f38f15
AM
9339 struct bfd_link_info *info;
9340 struct ppc_link_hash_table *htab;
5bd4f169 9341 asection *s;
65f38f15 9342 struct ppc_link_hash_entry *eh;
0b8bcf0d 9343 struct got_entry **pgent, *gent;
5bd4f169 9344
e92d460e 9345 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9346 return TRUE;
5bd4f169 9347
65f38f15
AM
9348 info = (struct bfd_link_info *) inf;
9349 htab = ppc_hash_table (info);
4dfe6ac6
NC
9350 if (htab == NULL)
9351 return FALSE;
5bd4f169 9352
951fd09b
AM
9353 eh = (struct ppc_link_hash_entry *) h;
9354 /* Run through the TLS GD got entries first if we're changing them
9355 to TPREL. */
b00a0a86 9356 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9357 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9358 if (gent->got.refcount > 0
9359 && (gent->tls_type & TLS_GD) != 0)
9360 {
9361 /* This was a GD entry that has been converted to TPREL. If
9362 there happens to be a TPREL entry we can use that one. */
9363 struct got_entry *ent;
9364 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9365 if (ent->got.refcount > 0
9366 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9367 && ent->addend == gent->addend
9368 && ent->owner == gent->owner)
951fd09b
AM
9369 {
9370 gent->got.refcount = 0;
9371 break;
9372 }
9373
9374 /* If not, then we'll be using our own TPREL entry. */
9375 if (gent->got.refcount != 0)
9376 gent->tls_type = TLS_TLS | TLS_TPREL;
9377 }
9378
7865406b
AM
9379 /* Remove any list entry that won't generate a word in the GOT before
9380 we call merge_got_entries. Otherwise we risk merging to empty
9381 entries. */
0b8bcf0d
AM
9382 pgent = &h->got.glist;
9383 while ((gent = *pgent) != NULL)
411e1bfb 9384 if (gent->got.refcount > 0)
7865406b
AM
9385 {
9386 if ((gent->tls_type & TLS_LD) != 0
9387 && !h->def_dynamic)
9388 {
9389 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9390 *pgent = gent->next;
9391 }
9392 else
9393 pgent = &gent->next;
9394 }
9395 else
9396 *pgent = gent->next;
9397
9398 if (!htab->do_multi_toc)
9399 merge_got_entries (&h->got.glist);
9400
9401 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9402 if (!gent->is_indirect)
411e1bfb 9403 {
ec73ddcd
AM
9404 /* Ensure we catch all the cases where this symbol should
9405 be made dynamic. */
46434633 9406 if (!ensure_undef_dynamic (info, h))
f0158f44 9407 return FALSE;
65f38f15 9408
0c8d6e5c 9409 if (!is_ppc64_elf (gent->owner))
927be08e 9410 abort ();
0ffa91dd 9411
927be08e 9412 allocate_got (h, info, gent);
411e1bfb 9413 }
65f38f15 9414
954b63d4
AM
9415 /* If no dynamic sections we can't have dynamic relocs, except for
9416 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9417 if (!htab->elf.dynamic_sections_created
9418 && h->type != STT_GNU_IFUNC)
9419 eh->dyn_relocs = NULL;
9420
529fe20e
AM
9421 /* Discard relocs on undefined symbols that must be local. */
9422 else if (h->root.type == bfd_link_hash_undefined
9423 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9424 eh->dyn_relocs = NULL;
9425
954b63d4
AM
9426 /* Also discard relocs on undefined weak syms with non-default
9427 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9428 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9429 eh->dyn_relocs = NULL;
9430
8a2058b5 9431 if (eh->dyn_relocs != NULL)
65f38f15 9432 {
8a2058b5
AM
9433 struct elf_dyn_relocs *p, **pp;
9434
57e7d118
AM
9435 /* In the shared -Bsymbolic case, discard space allocated for
9436 dynamic pc-relative relocs against symbols which turn out to
9437 be defined in regular objects. For the normal shared case,
9438 discard space for relocs that have become local due to symbol
9439 visibility changes. */
57e7d118 9440 if (bfd_link_pic (info))
65f38f15 9441 {
57e7d118
AM
9442 /* Relocs that use pc_count are those that appear on a call
9443 insn, or certain REL relocs (see must_be_dyn_reloc) that
9444 can be generated via assembly. We want calls to
9445 protected symbols to resolve directly to the function
9446 rather than going via the plt. If people want function
9447 pointer comparisons to work as expected then they should
9448 avoid writing weird assembly. */
9449 if (SYMBOL_CALLS_LOCAL (info, h))
9450 {
57e7d118
AM
9451 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9452 {
9453 p->count -= p->pc_count;
9454 p->pc_count = 0;
9455 if (p->count == 0)
9456 *pp = p->next;
9457 else
9458 pp = &p->next;
9459 }
9460 }
65f38f15 9461
954b63d4 9462 if (eh->dyn_relocs != NULL)
5bd4f169 9463 {
ec73ddcd
AM
9464 /* Ensure we catch all the cases where this symbol
9465 should be made dynamic. */
46434633 9466 if (!ensure_undef_dynamic (info, h))
f0158f44 9467 return FALSE;
5bd4f169 9468 }
65f38f15 9469 }
ec73ddcd
AM
9470
9471 /* For a fixed position executable, discard space for
9472 relocs against symbols which are not dynamic. */
9473 else if (h->type != STT_GNU_IFUNC)
57e7d118 9474 {
529fe20e
AM
9475 if (h->dynamic_adjusted
9476 && !h->def_regular
9477 && !ELF_COMMON_DEF_P (h))
f0158f44 9478 {
ec73ddcd
AM
9479 /* Ensure we catch all the cases where this symbol
9480 should be made dynamic. */
46434633 9481 if (!ensure_undef_dynamic (info, h))
f0158f44 9482 return FALSE;
dfbb6ac9 9483
ec73ddcd 9484 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9485 if (h->dynindx == -1)
9486 eh->dyn_relocs = NULL;
9487 }
9488 else
8a2058b5 9489 eh->dyn_relocs = NULL;
57e7d118
AM
9490 }
9491
9492 /* Finally, allocate space. */
9493 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9494 {
9495 asection *sreloc = elf_section_data (p->sec)->sreloc;
9496 if (eh->elf.type == STT_GNU_IFUNC)
9497 sreloc = htab->elf.irelplt;
9498 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9499 }
65f38f15 9500 }
57e7d118 9501
2d7ad24e
AM
9502 /* We might need a PLT entry when the symbol
9503 a) is dynamic, or
9504 b) is an ifunc, or
9505 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9506 d) has plt16 relocs and we are linking statically. */
9507 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9508 || h->type == STT_GNU_IFUNC
9509 || (h->needs_plt && h->dynamic_adjusted)
9510 || (h->needs_plt
9511 && h->def_regular
9512 && !htab->elf.dynamic_sections_created
3e04d765 9513 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
9514 && (((struct ppc_link_hash_entry *) h)->tls_mask
9515 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9516 {
57e7d118
AM
9517 struct plt_entry *pent;
9518 bfd_boolean doneone = FALSE;
9519 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9520 if (pent->plt.refcount > 0)
9521 {
9522 if (!htab->elf.dynamic_sections_created
9523 || h->dynindx == -1)
9524 {
2d7ad24e
AM
9525 if (h->type == STT_GNU_IFUNC)
9526 {
9527 s = htab->elf.iplt;
9528 pent->plt.offset = s->size;
9529 s->size += PLT_ENTRY_SIZE (htab);
9530 s = htab->elf.irelplt;
9531 }
9532 else
9533 {
9534 s = htab->pltlocal;
9535 pent->plt.offset = s->size;
9536 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9537 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9538 }
57e7d118
AM
9539 }
9540 else
9541 {
9542 /* If this is the first .plt entry, make room for the special
9543 first entry. */
9544 s = htab->elf.splt;
9545 if (s->size == 0)
9546 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9547
57e7d118 9548 pent->plt.offset = s->size;
65f38f15 9549
57e7d118
AM
9550 /* Make room for this entry. */
9551 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9552
57e7d118
AM
9553 /* Make room for the .glink code. */
9554 s = htab->glink;
9555 if (s->size == 0)
9e390558 9556 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9557 if (htab->opd_abi)
9558 {
9559 /* We need bigger stubs past index 32767. */
9e390558 9560 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9561 s->size += 4;
9562 s->size += 2*4;
9563 }
9564 else
9565 s->size += 4;
65f38f15 9566
57e7d118
AM
9567 /* We also need to make an entry in the .rela.plt section. */
9568 s = htab->elf.srelplt;
9569 }
2d7ad24e
AM
9570 if (s != NULL)
9571 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9572 doneone = TRUE;
9573 }
9574 else
9575 pent->plt.offset = (bfd_vma) -1;
9576 if (!doneone)
9577 {
9578 h->plt.plist = NULL;
9579 h->needs_plt = 0;
9580 }
65f38f15 9581 }
57e7d118 9582 else
65f38f15 9583 {
57e7d118
AM
9584 h->plt.plist = NULL;
9585 h->needs_plt = 0;
65f38f15
AM
9586 }
9587
b34976b6 9588 return TRUE;
65f38f15
AM
9589}
9590
9e390558
AM
9591#define PPC_LO(v) ((v) & 0xffff)
9592#define PPC_HI(v) (((v) >> 16) & 0xffff)
9593#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9594#define D34(v) \
9595 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9596#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9597
a345bc8d
AM
9598/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9599 to set up space for global entry stubs. These are put in glink,
9600 after the branch table. */
65f38f15 9601
b34976b6 9602static bfd_boolean
a345bc8d 9603size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9604{
a345bc8d
AM
9605 struct bfd_link_info *info;
9606 struct ppc_link_hash_table *htab;
9607 struct plt_entry *pent;
9e390558 9608 asection *s, *plt;
65f38f15 9609
a345bc8d
AM
9610 if (h->root.type == bfd_link_hash_indirect)
9611 return TRUE;
65f38f15 9612
a345bc8d
AM
9613 if (!h->pointer_equality_needed)
9614 return TRUE;
65f38f15 9615
a345bc8d
AM
9616 if (h->def_regular)
9617 return TRUE;
65f38f15 9618
a345bc8d
AM
9619 info = inf;
9620 htab = ppc_hash_table (info);
9621 if (htab == NULL)
9622 return FALSE;
9623
9e390558
AM
9624 s = htab->global_entry;
9625 plt = htab->elf.splt;
a345bc8d
AM
9626 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9627 if (pent->plt.offset != (bfd_vma) -1
9628 && pent->addend == 0)
9629 {
afe397ea
AM
9630 /* For ELFv2, if this symbol is not defined in a regular file
9631 and we are not generating a shared library or pie, then we
9632 need to define the symbol in the executable on a call stub.
9633 This is to avoid text relocations. */
9e390558
AM
9634 bfd_vma off, stub_align, stub_off, stub_size;
9635 unsigned int align_power;
9636
9637 stub_size = 16;
9638 stub_off = s->size;
9639 if (htab->params->plt_stub_align >= 0)
9640 align_power = htab->params->plt_stub_align;
9641 else
9642 align_power = -htab->params->plt_stub_align;
9643 /* Setting section alignment is delayed until we know it is
9644 non-empty. Otherwise the .text output section will be
9645 aligned at least to plt_stub_align even when no global
9646 entry stubs are needed. */
9647 if (s->alignment_power < align_power)
9648 s->alignment_power = align_power;
9649 stub_align = (bfd_vma) 1 << align_power;
9650 if (htab->params->plt_stub_align >= 0
9651 || ((((stub_off + stub_size - 1) & -stub_align)
9652 - (stub_off & -stub_align))
9653 > ((stub_size - 1) & -stub_align)))
9654 stub_off = (stub_off + stub_align - 1) & -stub_align;
9655 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9656 off -= stub_off + s->output_offset + s->output_section->vma;
9657 /* Note that for --plt-stub-align negative we have a possible
9658 dependency between stub offset and size. Break that
9659 dependency by assuming the max stub size when calculating
9660 the stub offset. */
9661 if (PPC_HA (off) == 0)
9662 stub_size -= 4;
8a2058b5 9663 h->root.type = bfd_link_hash_defined;
afe397ea 9664 h->root.u.def.section = s;
9e390558
AM
9665 h->root.u.def.value = stub_off;
9666 s->size = stub_off + stub_size;
a345bc8d
AM
9667 break;
9668 }
9669 return TRUE;
9670}
9671
9672/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9673 read-only sections. */
9674
9675static bfd_boolean
98bbb1b8 9676maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9677{
98bbb1b8
AM
9678 asection *sec;
9679
a345bc8d
AM
9680 if (h->root.type == bfd_link_hash_indirect)
9681 return TRUE;
9682
98bbb1b8
AM
9683 sec = readonly_dynrelocs (h);
9684 if (sec != NULL)
a345bc8d 9685 {
98bbb1b8
AM
9686 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9687
9688 info->flags |= DF_TEXTREL;
2cdcc330
AM
9689 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9690 " in read-only section `%pA'\n"),
9691 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9692
9693 /* Not an error, just cut short the traversal. */
9694 return FALSE;
65f38f15 9695 }
b34976b6 9696 return TRUE;
65f38f15
AM
9697}
9698
9699/* Set the sizes of the dynamic sections. */
9700
b34976b6 9701static bfd_boolean
ee67d69a 9702ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9703 struct bfd_link_info *info)
65f38f15
AM
9704{
9705 struct ppc_link_hash_table *htab;
9706 bfd *dynobj;
9707 asection *s;
b34976b6 9708 bfd_boolean relocs;
65f38f15 9709 bfd *ibfd;
7865406b 9710 struct got_entry *first_tlsld;
65f38f15
AM
9711
9712 htab = ppc_hash_table (info);
4dfe6ac6
NC
9713 if (htab == NULL)
9714 return FALSE;
9715
65f38f15
AM
9716 dynobj = htab->elf.dynobj;
9717 if (dynobj == NULL)
9718 abort ();
9719
9720 if (htab->elf.dynamic_sections_created)
9721 {
9722 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9723 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9724 {
3d4d4302 9725 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9726 if (s == NULL)
9727 abort ();
eea6121a 9728 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9729 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9730 }
9731 }
9732
9733 /* Set up .got offsets for local syms, and space for local dynamic
9734 relocs. */
c72f2fb2 9735 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9736 {
411e1bfb
AM
9737 struct got_entry **lgot_ents;
9738 struct got_entry **end_lgot_ents;
e054468f
AM
9739 struct plt_entry **local_plt;
9740 struct plt_entry **end_local_plt;
f961d9dd 9741 unsigned char *lgot_masks;
65f38f15
AM
9742 bfd_size_type locsymcount;
9743 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9744
0c8d6e5c 9745 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9746 continue;
9747
9748 for (s = ibfd->sections; s != NULL; s = s->next)
9749 {
19e08130 9750 struct ppc_dyn_relocs *p;
65f38f15 9751
6edfbbad 9752 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9753 {
ec338859
AM
9754 if (!bfd_is_abs_section (p->sec)
9755 && bfd_is_abs_section (p->sec->output_section))
9756 {
9757 /* Input section has been discarded, either because
9758 it is a copy of a linkonce section or due to
9759 linker script /DISCARD/, so we'll be discarding
9760 the relocs too. */
9761 }
248866a8 9762 else if (p->count != 0)
ec338859 9763 {
19e08130
AM
9764 asection *srel = elf_section_data (p->sec)->sreloc;
9765 if (p->ifunc)
33e44f2e 9766 srel = htab->elf.irelplt;
eea6121a 9767 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9768 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9769 info->flags |= DF_TEXTREL;
ec338859 9770 }
65f38f15
AM
9771 }
9772 }
9773
411e1bfb
AM
9774 lgot_ents = elf_local_got_ents (ibfd);
9775 if (!lgot_ents)
65f38f15
AM
9776 continue;
9777
0ffa91dd 9778 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9779 locsymcount = symtab_hdr->sh_info;
411e1bfb 9780 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9781 local_plt = (struct plt_entry **) end_lgot_ents;
9782 end_local_plt = local_plt + locsymcount;
f961d9dd 9783 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9784 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9785 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9786 {
0b8bcf0d 9787 struct got_entry **pent, *ent;
411e1bfb 9788
0b8bcf0d
AM
9789 pent = lgot_ents;
9790 while ((ent = *pent) != NULL)
411e1bfb
AM
9791 if (ent->got.refcount > 0)
9792 {
e7b938ca 9793 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9794 {
927be08e 9795 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9796 *pent = ent->next;
411e1bfb
AM
9797 }
9798 else
9799 {
19e08130
AM
9800 unsigned int ent_size = 8;
9801 unsigned int rel_size = sizeof (Elf64_External_Rela);
9802
eea6121a 9803 ent->got.offset = s->size;
e7b938ca 9804 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9805 {
19e08130
AM
9806 ent_size *= 2;
9807 rel_size *= 2;
9808 }
9809 s->size += ent_size;
37da22e5 9810 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9811 {
33e44f2e 9812 htab->elf.irelplt->size += rel_size;
19e08130
AM
9813 htab->got_reli_size += rel_size;
9814 }
f15d0b54
AM
9815 else if (bfd_link_pic (info)
9816 && !((ent->tls_type & TLS_TPREL) != 0
9817 && bfd_link_executable (info)))
19e08130
AM
9818 {
9819 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9820 srel->size += rel_size;
927be08e 9821 }
0b8bcf0d 9822 pent = &ent->next;
411e1bfb
AM
9823 }
9824 }
9825 else
0b8bcf0d 9826 *pent = ent->next;
65f38f15 9827 }
e054468f 9828
2d7ad24e
AM
9829 /* Allocate space for plt calls to local syms. */
9830 lgot_masks = (unsigned char *) end_local_plt;
9831 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9832 {
9833 struct plt_entry *ent;
9834
9835 for (ent = *local_plt; ent != NULL; ent = ent->next)
9836 if (ent->plt.refcount > 0)
9837 {
2d7ad24e
AM
9838 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9839 {
9840 s = htab->elf.iplt;
9841 ent->plt.offset = s->size;
9842 s->size += PLT_ENTRY_SIZE (htab);
9843 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9844 }
3e04d765
AM
9845 else if (htab->can_convert_all_inline_plt
9846 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9847 ent->plt.offset = (bfd_vma) -1;
9848 else
9849 {
9850 s = htab->pltlocal;
9851 ent->plt.offset = s->size;
9852 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9853 if (bfd_link_pic (info))
9854 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9855 }
e054468f
AM
9856 }
9857 else
9858 ent->plt.offset = (bfd_vma) -1;
9859 }
65f38f15
AM
9860 }
9861
9862 /* Allocate global sym .plt and .got entries, and space for global
9863 sym dynamic relocs. */
4ce794b7 9864 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9865
0e1862bb 9866 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9867 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9868
7865406b 9869 first_tlsld = NULL;
c72f2fb2 9870 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9871 {
7865406b
AM
9872 struct got_entry *ent;
9873
0c8d6e5c 9874 if (!is_ppc64_elf (ibfd))
102890f0
AM
9875 continue;
9876
7865406b
AM
9877 ent = ppc64_tlsld_got (ibfd);
9878 if (ent->got.refcount > 0)
102890f0 9879 {
7865406b 9880 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9881 {
7865406b
AM
9882 ent->is_indirect = TRUE;
9883 ent->got.ent = first_tlsld;
9884 }
9885 else
9886 {
9887 if (first_tlsld == NULL)
9888 first_tlsld = ent;
9889 s = ppc64_elf_tdata (ibfd)->got;
9890 ent->got.offset = s->size;
9891 ent->owner = ibfd;
9892 s->size += 16;
0e1862bb 9893 if (bfd_link_pic (info))
7865406b
AM
9894 {
9895 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9896 srel->size += sizeof (Elf64_External_Rela);
9897 }
102890f0
AM
9898 }
9899 }
9900 else
7865406b 9901 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9902 }
9903
65f38f15
AM
9904 /* We now have determined the sizes of the various dynamic sections.
9905 Allocate memory for them. */
b34976b6 9906 relocs = FALSE;
65f38f15
AM
9907 for (s = dynobj->sections; s != NULL; s = s->next)
9908 {
9909 if ((s->flags & SEC_LINKER_CREATED) == 0)
9910 continue;
9911
4ce794b7 9912 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9913 /* These haven't been allocated yet; don't strip. */
9914 continue;
33e44f2e
AM
9915 else if (s == htab->elf.sgot
9916 || s == htab->elf.splt
9917 || s == htab->elf.iplt
2d7ad24e 9918 || s == htab->pltlocal
c456f082 9919 || s == htab->glink
9e390558 9920 || s == htab->global_entry
5474d94f
AM
9921 || s == htab->elf.sdynbss
9922 || s == htab->elf.sdynrelro)
65f38f15
AM
9923 {
9924 /* Strip this section if we don't need it; see the
9925 comment below. */
5bd4f169 9926 }
58d180e8
AM
9927 else if (s == htab->glink_eh_frame)
9928 {
9929 if (!bfd_is_abs_section (s->output_section))
9930 /* Not sized yet. */
9931 continue;
9932 }
70cc837d 9933 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9934 {
c456f082 9935 if (s->size != 0)
5bd4f169 9936 {
33e44f2e 9937 if (s != htab->elf.srelplt)
b34976b6 9938 relocs = TRUE;
5bd4f169
AM
9939
9940 /* We use the reloc_count field as a counter if we need
9941 to copy relocs into the output file. */
9942 s->reloc_count = 0;
9943 }
9944 }
65f38f15 9945 else
5bd4f169
AM
9946 {
9947 /* It's not one of our sections, so don't allocate space. */
9948 continue;
9949 }
9950
eea6121a 9951 if (s->size == 0)
5bd4f169 9952 {
c456f082
AM
9953 /* If we don't need this section, strip it from the
9954 output file. This is mostly to handle .rela.bss and
9955 .rela.plt. We must create both sections in
9956 create_dynamic_sections, because they must be created
9957 before the linker maps input sections to output
9958 sections. The linker does that before
9959 adjust_dynamic_symbol is called, and it is that
9960 function which decides whether anything needs to go
9961 into these sections. */
8423293d 9962 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9963 continue;
9964 }
9965
06bcf541
AM
9966 if (bfd_is_abs_section (s->output_section))
9967 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9968 s->name);
9969
c456f082 9970 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9971 continue;
9972
65f38f15
AM
9973 /* Allocate memory for the section contents. We use bfd_zalloc
9974 here in case unused entries are not reclaimed before the
9975 section's contents are written out. This should not happen,
411e1bfb
AM
9976 but this way if it does we get a R_PPC64_NONE reloc in .rela
9977 sections instead of garbage.
9978 We also rely on the section contents being zero when writing
5474d94f 9979 the GOT and .dynrelro. */
eea6121a 9980 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9981 if (s->contents == NULL)
b34976b6 9982 return FALSE;
5bd4f169
AM
9983 }
9984
c72f2fb2 9985 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9986 {
0c8d6e5c 9987 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9988 continue;
9989
e717da7e 9990 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9991 if (s != NULL && s != htab->elf.sgot)
e717da7e 9992 {
eea6121a 9993 if (s->size == 0)
8423293d 9994 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9995 else
9996 {
eea6121a 9997 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
9998 if (s->contents == NULL)
9999 return FALSE;
10000 }
10001 }
10002 s = ppc64_elf_tdata (ibfd)->relgot;
10003 if (s != NULL)
10004 {
eea6121a 10005 if (s->size == 0)
8423293d 10006 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10007 else
10008 {
eea6121a 10009 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10010 if (s->contents == NULL)
10011 return FALSE;
10012 relocs = TRUE;
10013 s->reloc_count = 0;
10014 }
10015 }
10016 }
10017
e86ce104 10018 if (htab->elf.dynamic_sections_created)
5bd4f169 10019 {
e8910a83
AM
10020 bfd_boolean tls_opt;
10021
5bd4f169
AM
10022 /* Add some entries to the .dynamic section. We fill in the
10023 values later, in ppc64_elf_finish_dynamic_sections, but we
10024 must add the entries now so that we get the correct size for
10025 the .dynamic section. The DT_DEBUG entry is filled in by the
10026 dynamic linker and used by the debugger. */
dc810e39 10027#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10028 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10029
0e1862bb 10030 if (bfd_link_executable (info))
5bd4f169 10031 {
dc810e39 10032 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10033 return FALSE;
5bd4f169
AM
10034 }
10035
33e44f2e 10036 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10037 {
dc810e39
AM
10038 if (!add_dynamic_entry (DT_PLTGOT, 0)
10039 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10040 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10041 || !add_dynamic_entry (DT_JMPREL, 0)
10042 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10043 return FALSE;
5bd4f169
AM
10044 }
10045
ee67d69a 10046 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10047 {
10048 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10049 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10050 return FALSE;
19397422
AM
10051 }
10052
7c9cf415 10053 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10054 && htab->tls_get_addr_fd != NULL
10055 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10056 if (tls_opt || !htab->opd_abi)
10057 {
10058 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10059 return FALSE;
10060 }
a7f2871e 10061
5bd4f169
AM
10062 if (relocs)
10063 {
dc810e39
AM
10064 if (!add_dynamic_entry (DT_RELA, 0)
10065 || !add_dynamic_entry (DT_RELASZ, 0)
10066 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10067 return FALSE;
5bd4f169 10068
65f38f15
AM
10069 /* If any dynamic relocs apply to a read-only section,
10070 then we need a DT_TEXTREL entry. */
248866a8 10071 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10072 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10073
65f38f15 10074 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10075 {
65f38f15 10076 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10077 return FALSE;
5bd4f169 10078 }
5bd4f169 10079 }
5bd4f169 10080 }
65f38f15 10081#undef add_dynamic_entry
5bd4f169 10082
b34976b6 10083 return TRUE;
5bd4f169
AM
10084}
10085
a345bc8d
AM
10086/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10087
10088static bfd_boolean
10089ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10090{
10091 if (h->plt.plist != NULL
10092 && !h->def_regular
10093 && !h->pointer_equality_needed)
10094 return FALSE;
10095
10096 return _bfd_elf_hash_symbol (h);
10097}
10098
721956f4 10099/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10100
4ce794b7
AM
10101static inline enum ppc_stub_type
10102ppc_type_of_stub (asection *input_sec,
10103 const Elf_Internal_Rela *rel,
10104 struct ppc_link_hash_entry **hash,
e054468f 10105 struct plt_entry **plt_ent,
6911b7dc
AM
10106 bfd_vma destination,
10107 unsigned long local_off)
5bd4f169 10108{
721956f4
AM
10109 struct ppc_link_hash_entry *h = *hash;
10110 bfd_vma location;
10111 bfd_vma branch_offset;
10112 bfd_vma max_branch_offset;
4ce794b7 10113 enum elf_ppc64_reloc_type r_type;
5bd4f169 10114
721956f4
AM
10115 if (h != NULL)
10116 {
e054468f 10117 struct plt_entry *ent;
7fe2b9a6 10118 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10119 if (h->oh != NULL
10120 && h->oh->is_func_descriptor)
7b8f6675
AM
10121 {
10122 fdh = ppc_follow_link (h->oh);
10123 *hash = fdh;
10124 }
8387904d 10125
e054468f
AM
10126 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10127 if (ent->addend == rel->r_addend
10128 && ent->plt.offset != (bfd_vma) -1)
10129 {
e054468f
AM
10130 *plt_ent = ent;
10131 return ppc_stub_plt_call;
10132 }
5bd4f169 10133
7fe2b9a6
AM
10134 /* Here, we know we don't have a plt entry. If we don't have a
10135 either a defined function descriptor or a defined entry symbol
10136 in a regular object file, then it is pointless trying to make
10137 any other type of stub. */
854b41e7
AM
10138 if (!is_static_defined (&fdh->elf)
10139 && !is_static_defined (&h->elf))
721956f4 10140 return ppc_stub_none;
5d1634d7 10141 }
e054468f
AM
10142 else if (elf_local_got_ents (input_sec->owner) != NULL)
10143 {
10144 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10145 struct plt_entry **local_plt = (struct plt_entry **)
10146 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10147 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10148
10149 if (local_plt[r_symndx] != NULL)
10150 {
10151 struct plt_entry *ent;
10152
10153 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10154 if (ent->addend == rel->r_addend
10155 && ent->plt.offset != (bfd_vma) -1)
10156 {
10157 *plt_ent = ent;
10158 return ppc_stub_plt_call;
10159 }
10160 }
10161 }
5d1634d7 10162
721956f4
AM
10163 /* Determine where the call point is. */
10164 location = (input_sec->output_offset
10165 + input_sec->output_section->vma
10166 + rel->r_offset);
5d1634d7 10167
721956f4
AM
10168 branch_offset = destination - location;
10169 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10170
721956f4
AM
10171 /* Determine if a long branch stub is needed. */
10172 max_branch_offset = 1 << 25;
23cedd1d
AM
10173 if (r_type == R_PPC64_REL14
10174 || r_type == R_PPC64_REL14_BRTAKEN
10175 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10176 max_branch_offset = 1 << 15;
5d1634d7 10177
6911b7dc 10178 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10179 /* We need a stub. Figure out whether a long_branch or plt_branch
10180 is needed later. */
10181 return ppc_stub_long_branch;
5d1634d7 10182
721956f4 10183 return ppc_stub_none;
5d1634d7
AM
10184}
10185
f891966f
AM
10186/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10187 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10188 . mflr %r12
10189 . bcl 20,31,1f
10190 .1: mflr %r11
10191 . mtlr %r12
05d0e962 10192 . lis %r12,xxx-1b@highest
f891966f 10193 . ori %r12,%r12,xxx-1b@higher
05d0e962 10194 . sldi %r12,%r12,32
f891966f 10195 . oris %r12,%r12,xxx-1b@high
05d0e962 10196 . ori %r12,%r12,xxx-1b@l
f891966f 10197 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10198
10199static bfd_byte *
10200build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10201{
f891966f
AM
10202 bfd_put_32 (abfd, MFLR_R12, p);
10203 p += 4;
10204 bfd_put_32 (abfd, BCL_20_31, p);
10205 p += 4;
10206 bfd_put_32 (abfd, MFLR_R11, p);
10207 p += 4;
10208 bfd_put_32 (abfd, MTLR_R12, p);
10209 p += 4;
05d0e962
AM
10210 if (off + 0x8000 < 0x10000)
10211 {
10212 if (load)
10213 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10214 else
10215 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10216 p += 4;
10217 }
10218 else if (off + 0x80008000ULL < 0x100000000ULL)
10219 {
10220 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10221 p += 4;
10222 if (load)
10223 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10224 else
10225 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10226 p += 4;
10227 }
10228 else
10229 {
10230 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10231 {
10232 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10233 p += 4;
10234 }
10235 else
10236 {
10237 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10238 p += 4;
10239 if (((off >> 32) & 0xffff) != 0)
10240 {
10241 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10242 p += 4;
10243 }
10244 }
10245 if (((off >> 32) & 0xffffffffULL) != 0)
10246 {
10247 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10248 p += 4;
10249 }
10250 if (PPC_HI (off) != 0)
10251 {
10252 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10253 p += 4;
10254 }
10255 if (PPC_LO (off) != 0)
10256 {
10257 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10258 p += 4;
10259 }
10260 if (load)
10261 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10262 else
10263 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10264 p += 4;
10265 }
10266 return p;
10267}
10268
10269static unsigned int
10270size_offset (bfd_vma off)
10271{
10272 unsigned int size;
10273 if (off + 0x8000 < 0x10000)
10274 size = 4;
10275 else if (off + 0x80008000ULL < 0x100000000ULL)
10276 size = 8;
10277 else
10278 {
10279 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10280 size = 4;
10281 else
10282 {
10283 size = 4;
10284 if (((off >> 32) & 0xffff) != 0)
10285 size += 4;
10286 }
10287 if (((off >> 32) & 0xffffffffULL) != 0)
10288 size += 4;
10289 if (PPC_HI (off) != 0)
10290 size += 4;
10291 if (PPC_LO (off) != 0)
10292 size += 4;
10293 size += 4;
10294 }
f891966f 10295 return size + 16;
05d0e962
AM
10296}
10297
3d58e1fc
AM
10298static unsigned int
10299num_relocs_for_offset (bfd_vma off)
10300{
10301 unsigned int num_rel;
10302 if (off + 0x8000 < 0x10000)
10303 num_rel = 1;
10304 else if (off + 0x80008000ULL < 0x100000000ULL)
10305 num_rel = 2;
10306 else
10307 {
10308 num_rel = 1;
10309 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10310 && ((off >> 32) & 0xffff) != 0)
10311 num_rel += 1;
10312 if (PPC_HI (off) != 0)
10313 num_rel += 1;
10314 if (PPC_LO (off) != 0)
10315 num_rel += 1;
10316 }
10317 return num_rel;
10318}
10319
10320static Elf_Internal_Rela *
10321emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10322 bfd_vma roff, bfd_vma targ, bfd_vma off)
10323{
10324 bfd_vma relative_targ = targ - (roff - 8);
10325 if (bfd_big_endian (info->output_bfd))
10326 roff += 2;
10327 r->r_offset = roff;
10328 r->r_addend = relative_targ + roff;
10329 if (off + 0x8000 < 0x10000)
10330 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10331 else if (off + 0x80008000ULL < 0x100000000ULL)
10332 {
10333 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10334 ++r;
10335 roff += 4;
10336 r->r_offset = roff;
10337 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10338 r->r_addend = relative_targ + roff;
10339 }
10340 else
10341 {
10342 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10343 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10344 else
10345 {
10346 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10347 if (((off >> 32) & 0xffff) != 0)
10348 {
10349 ++r;
10350 roff += 4;
10351 r->r_offset = roff;
10352 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10353 r->r_addend = relative_targ + roff;
10354 }
10355 }
10356 if (((off >> 32) & 0xffffffffULL) != 0)
10357 roff += 4;
10358 if (PPC_HI (off) != 0)
10359 {
10360 ++r;
10361 roff += 4;
10362 r->r_offset = roff;
10363 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10364 r->r_addend = relative_targ + roff;
10365 }
10366 if (PPC_LO (off) != 0)
10367 {
10368 ++r;
10369 roff += 4;
10370 r->r_offset = roff;
10371 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10372 r->r_addend = relative_targ + roff;
10373 }
10374 }
10375 return r;
10376}
10377
04bdff6a
AM
10378static bfd_byte *
10379build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10380 bfd_boolean load)
10381{
10382 uint64_t insn;
10383 if (off - odd + (1ULL << 33) < 1ULL << 34)
10384 {
10385 off -= odd;
10386 if (odd)
10387 {
10388 bfd_put_32 (abfd, NOP, p);
10389 p += 4;
10390 }
10391 if (load)
10392 insn = PLD_R12_PC;
10393 else
10394 insn = PADDI_R12_PC;
10395 insn |= D34 (off);
10396 bfd_put_32 (abfd, insn >> 32, p);
10397 p += 4;
10398 bfd_put_32 (abfd, insn, p);
10399 }
10400 /* The minimum value for paddi is -0x200000000. The minimum value
10401 for li is -0x8000, which when shifted by 34 and added gives a
10402 minimum value of -0x2000200000000. The maximum value is
10403 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10404 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10405 {
10406 off -= 8 - odd;
10407 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10408 p += 4;
10409 if (!odd)
10410 {
10411 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10412 p += 4;
10413 }
10414 insn = PADDI_R12_PC | D34 (off);
10415 bfd_put_32 (abfd, insn >> 32, p);
10416 p += 4;
10417 bfd_put_32 (abfd, insn, p);
10418 p += 4;
10419 if (odd)
10420 {
10421 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10422 p += 4;
10423 }
10424 if (load)
10425 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10426 else
10427 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10428 }
10429 else
10430 {
10431 off -= odd + 8;
10432 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10433 p += 4;
10434 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10435 p += 4;
10436 if (odd)
10437 {
10438 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10439 p += 4;
10440 }
10441 insn = PADDI_R12_PC | D34 (off);
10442 bfd_put_32 (abfd, insn >> 32, p);
10443 p += 4;
10444 bfd_put_32 (abfd, insn, p);
10445 p += 4;
10446 if (!odd)
10447 {
10448 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10449 p += 4;
10450 }
10451 if (load)
10452 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10453 else
10454 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10455 }
10456 p += 4;
10457 return p;
10458}
10459
10460static unsigned int
10461size_powerxx_offset (bfd_vma off, int odd)
10462{
10463 if (off - odd + (1ULL << 33) < 1ULL << 34)
10464 return odd + 8;
10465 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10466 return 20;
10467 else
10468 return 24;
10469}
10470
10471static unsigned int
10472num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10473{
10474 if (off - odd + (1ULL << 33) < 1ULL << 34)
10475 return 1;
10476 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10477 return 2;
10478 else
10479 return 3;
10480}
10481
10482static Elf_Internal_Rela *
10483emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10484 Elf_Internal_Rela *r, bfd_vma roff,
10485 bfd_vma targ, bfd_vma off, int odd)
10486{
10487 if (off - odd + (1ULL << 33) < 1ULL << 34)
10488 roff += odd;
10489 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10490 {
10491 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10492 r->r_offset = roff + d_offset;
10493 r->r_addend = targ + 8 - odd - d_offset;
10494 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10495 ++r;
10496 roff += 8 - odd;
10497 }
10498 else
10499 {
10500 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10501 r->r_offset = roff + d_offset;
10502 r->r_addend = targ + 8 + odd - d_offset;
10503 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10504 ++r;
10505 roff += 4;
10506 r->r_offset = roff + d_offset;
10507 r->r_addend = targ + 4 + odd - d_offset;
10508 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10509 ++r;
10510 roff += 4 + odd;
10511 }
10512 r->r_offset = roff;
10513 r->r_addend = targ;
10514 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10515 return r;
10516}
10517
df136d64
AM
10518/* Emit .eh_frame opcode to advance pc by DELTA. */
10519
10520static bfd_byte *
10521eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10522{
10523 delta /= 4;
10524 if (delta < 64)
10525 *eh++ = DW_CFA_advance_loc + delta;
10526 else if (delta < 256)
10527 {
10528 *eh++ = DW_CFA_advance_loc1;
10529 *eh++ = delta;
10530 }
10531 else if (delta < 65536)
10532 {
10533 *eh++ = DW_CFA_advance_loc2;
10534 bfd_put_16 (abfd, delta, eh);
10535 eh += 2;
10536 }
10537 else
10538 {
10539 *eh++ = DW_CFA_advance_loc4;
10540 bfd_put_32 (abfd, delta, eh);
10541 eh += 4;
10542 }
10543 return eh;
10544}
10545
10546/* Size of required .eh_frame opcode to advance pc by DELTA. */
10547
10548static unsigned int
10549eh_advance_size (unsigned int delta)
10550{
10551 if (delta < 64 * 4)
10552 /* DW_CFA_advance_loc+[1..63]. */
10553 return 1;
10554 if (delta < 256 * 4)
10555 /* DW_CFA_advance_loc1, byte. */
10556 return 2;
10557 if (delta < 65536 * 4)
10558 /* DW_CFA_advance_loc2, 2 bytes. */
10559 return 3;
10560 /* DW_CFA_advance_loc4, 4 bytes. */
10561 return 5;
10562}
10563
794e51c0
AM
10564/* With power7 weakly ordered memory model, it is possible for ld.so
10565 to update a plt entry in one thread and have another thread see a
10566 stale zero toc entry. To avoid this we need some sort of acquire
10567 barrier in the call stub. One solution is to make the load of the
10568 toc word seem to appear to depend on the load of the function entry
10569 word. Another solution is to test for r2 being zero, and branch to
10570 the appropriate glink entry if so.
10571
10572 . fake dep barrier compare
71a39c98
AM
10573 . ld 12,xxx(2) ld 12,xxx(2)
10574 . mtctr 12 mtctr 12
10575 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10576 . add 2,2,11 cmpldi 2,0
10577 . ld 2,xxx+8(2) bnectr+
10578 . bctr b <glink_entry>
10579
10580 The solution involving the compare turns out to be faster, so
10581 that's what we use unless the branch won't reach. */
10582
10583#define ALWAYS_USE_FAKE_DEP 0
10584#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10585
794e51c0
AM
10586static inline unsigned int
10587plt_stub_size (struct ppc_link_hash_table *htab,
10588 struct ppc_stub_hash_entry *stub_entry,
10589 bfd_vma off)
10590{
05d0e962 10591 unsigned size;
b9e5796b 10592
05d0e962
AM
10593 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10594 {
04bdff6a
AM
10595 if (htab->powerxx_stubs)
10596 {
10597 bfd_vma start = (stub_entry->stub_offset
10598 + stub_entry->group->stub_sec->output_offset
10599 + stub_entry->group->stub_sec->output_section->vma);
10600 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10601 start += 4;
10602 size = 8 + size_powerxx_offset (off, start & 4);
10603 }
10604 else
10605 size = 8 + size_offset (off - 8);
05d0e962
AM
10606 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10607 size += 4;
10608 return size;
10609 }
10610
10611 size = 12;
b9e5796b
AM
10612 if (ALWAYS_EMIT_R2SAVE
10613 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10614 size += 4;
10615 if (PPC_HA (off) != 0)
794e51c0 10616 size += 4;
b9e5796b
AM
10617 if (htab->opd_abi)
10618 {
10619 size += 4;
e7d1c40c 10620 if (htab->params->plt_static_chain)
b9e5796b 10621 size += 4;
bd4d2eaa
AM
10622 if (htab->params->plt_thread_safe
10623 && htab->elf.dynamic_sections_created
10624 && stub_entry->h != NULL
10625 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10626 size += 8;
e7d1c40c 10627 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10628 size += 4;
10629 }
794e51c0
AM
10630 if (stub_entry->h != NULL
10631 && (stub_entry->h == htab->tls_get_addr_fd
10632 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10633 && htab->params->tls_get_addr_opt)
f378ab09
AM
10634 {
10635 size += 7 * 4;
e81b4c93 10636 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10637 size += 6 * 4;
f378ab09 10638 }
794e51c0
AM
10639 return size;
10640}
10641
2420fff6
AM
10642/* Depending on the sign of plt_stub_align:
10643 If positive, return the padding to align to a 2**plt_stub_align
10644 boundary.
10645 If negative, if this stub would cross fewer 2**plt_stub_align
10646 boundaries if we align, then return the padding needed to do so. */
10647
794e51c0
AM
10648static inline unsigned int
10649plt_stub_pad (struct ppc_link_hash_table *htab,
10650 struct ppc_stub_hash_entry *stub_entry,
10651 bfd_vma plt_off)
10652{
2420fff6 10653 int stub_align;
1aa42141 10654 unsigned stub_size;
6f20ed8a 10655 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10656
2420fff6
AM
10657 if (htab->params->plt_stub_align >= 0)
10658 {
10659 stub_align = 1 << htab->params->plt_stub_align;
10660 if ((stub_off & (stub_align - 1)) != 0)
10661 return stub_align - (stub_off & (stub_align - 1));
10662 return 0;
10663 }
10664
10665 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10666 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10667 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10668 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10669 return stub_align - (stub_off & (stub_align - 1));
10670 return 0;
10671}
10672
10673/* Build a .plt call stub. */
10674
10675static inline bfd_byte *
10676build_plt_stub (struct ppc_link_hash_table *htab,
10677 struct ppc_stub_hash_entry *stub_entry,
10678 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10679{
e7d1c40c 10680 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10681 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10682 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10683 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10684 && htab->elf.dynamic_sections_created
10685 && stub_entry->h != NULL
10686 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10687 bfd_boolean use_fake_dep = plt_thread_safe;
10688 bfd_vma cmp_branch_off = 0;
10689
10690 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10691 && plt_load_toc
794e51c0 10692 && plt_thread_safe
bd4d2eaa
AM
10693 && !((stub_entry->h == htab->tls_get_addr_fd
10694 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10695 && htab->params->tls_get_addr_opt))
794e51c0
AM
10696 {
10697 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10698 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10699 / PLT_ENTRY_SIZE (htab));
9e390558 10700 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10701 bfd_vma to, from;
10702
68d62958
AM
10703 if (pltindex > 32768)
10704 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10705 to = (glinkoff
10706 + htab->glink->output_offset
10707 + htab->glink->output_section->vma);
6f20ed8a 10708 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10709 + 4 * (ALWAYS_EMIT_R2SAVE
10710 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10711 + 4 * (PPC_HA (offset) != 0)
10712 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10713 != PPC_HA (offset))
10714 + 4 * (plt_static_chain != 0)
10715 + 20
6f20ed8a
AM
10716 + stub_entry->group->stub_sec->output_offset
10717 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10718 cmp_branch_off = to - from;
10719 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10720 }
10721
ac2df442
AM
10722 if (PPC_HA (offset) != 0)
10723 {
176a0d42
AM
10724 if (r != NULL)
10725 {
794e51c0
AM
10726 if (ALWAYS_EMIT_R2SAVE
10727 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10728 r[0].r_offset += 4;
176a0d42 10729 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10730 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10731 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10732 r[1].r_addend = r[0].r_addend;
b9e5796b 10733 if (plt_load_toc)
176a0d42 10734 {
b9e5796b 10735 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10736 {
b9e5796b
AM
10737 r[2].r_offset = r[1].r_offset + 4;
10738 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10739 r[2].r_addend = r[0].r_addend;
10740 }
10741 else
10742 {
10743 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10744 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10745 r[2].r_addend = r[0].r_addend + 8;
10746 if (plt_static_chain)
10747 {
10748 r[3].r_offset = r[2].r_offset + 4;
10749 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10750 r[3].r_addend = r[0].r_addend + 16;
10751 }
c7131b65 10752 }
176a0d42
AM
10753 }
10754 }
794e51c0
AM
10755 if (ALWAYS_EMIT_R2SAVE
10756 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10757 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10758 if (plt_load_toc)
10759 {
10760 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10761 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10762 }
10763 else
10764 {
10765 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10766 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10767 }
b9e5796b
AM
10768 if (plt_load_toc
10769 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10770 {
71a39c98 10771 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10772 offset = 0;
10773 }
71a39c98 10774 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10775 if (plt_load_toc)
794e51c0 10776 {
b9e5796b
AM
10777 if (use_fake_dep)
10778 {
10779 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10780 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10781 }
10782 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10783 if (plt_static_chain)
10784 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10785 }
ac2df442
AM
10786 }
10787 else
10788 {
176a0d42
AM
10789 if (r != NULL)
10790 {
794e51c0
AM
10791 if (ALWAYS_EMIT_R2SAVE
10792 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10793 r[0].r_offset += 4;
176a0d42 10794 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10795 if (plt_load_toc)
176a0d42 10796 {
b9e5796b 10797 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10798 {
b9e5796b
AM
10799 r[1].r_offset = r[0].r_offset + 4;
10800 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10801 r[1].r_addend = r[0].r_addend;
10802 }
10803 else
10804 {
10805 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10806 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10807 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10808 if (plt_static_chain)
10809 {
10810 r[2].r_offset = r[1].r_offset + 4;
10811 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10812 r[2].r_addend = r[0].r_addend + 8;
10813 }
c7131b65 10814 }
176a0d42
AM
10815 }
10816 }
794e51c0
AM
10817 if (ALWAYS_EMIT_R2SAVE
10818 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10819 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10820 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10821 if (plt_load_toc
10822 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10823 {
10824 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10825 offset = 0;
10826 }
71a39c98 10827 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10828 if (plt_load_toc)
794e51c0 10829 {
b9e5796b
AM
10830 if (use_fake_dep)
10831 {
10832 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10833 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10834 }
10835 if (plt_static_chain)
10836 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10837 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10838 }
ac2df442 10839 }
b9e5796b 10840 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10841 {
10842 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10843 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10844 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10845 }
10846 else
407aa07c 10847 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10848 return p;
10849}
10850
a7f2871e
AM
10851/* Build a special .plt call stub for __tls_get_addr. */
10852
10853#define LD_R11_0R3 0xe9630000
10854#define LD_R12_0R3 0xe9830000
10855#define MR_R0_R3 0x7c601b78
10856#define CMPDI_R11_0 0x2c2b0000
10857#define ADD_R3_R12_R13 0x7c6c6a14
10858#define BEQLR 0x4d820020
10859#define MR_R3_R0 0x7c030378
a7f2871e
AM
10860#define STD_R11_0R1 0xf9610000
10861#define BCTRL 0x4e800421
10862#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10863#define MTLR_R11 0x7d6803a6
10864
10865static inline bfd_byte *
794e51c0
AM
10866build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10867 struct ppc_stub_hash_entry *stub_entry,
10868 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10869{
e7d1c40c 10870 bfd *obfd = htab->params->stub_bfd;
df136d64 10871 bfd_byte *loc = p;
794e51c0 10872
a7f2871e
AM
10873 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10874 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10875 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10876 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10877 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10878 bfd_put_32 (obfd, BEQLR, p), p += 4;
10879 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10880 if (r != NULL)
10881 r[0].r_offset += 7 * 4;
e81b4c93 10882 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10883 return build_plt_stub (htab, stub_entry, p, offset, r);
10884
a7f2871e 10885 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10886 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10887
10888 if (r != NULL)
f378ab09 10889 r[0].r_offset += 2 * 4;
794e51c0 10890 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10891 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10892
a078d95a 10893 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10894 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10895 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10896 bfd_put_32 (obfd, BLR, p), p += 4;
10897
df136d64
AM
10898 if (htab->glink_eh_frame != NULL
10899 && htab->glink_eh_frame->size != 0)
10900 {
10901 bfd_byte *base, *eh;
10902 unsigned int lr_used, delta;
10903
10904 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10905 eh = base + stub_entry->group->eh_size;
10906 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10907 delta = lr_used - stub_entry->group->lr_restore;
10908 stub_entry->group->lr_restore = lr_used + 16;
10909 eh = eh_advance (htab->elf.dynobj, eh, delta);
10910 *eh++ = DW_CFA_offset_extended_sf;
10911 *eh++ = 65;
10912 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10913 *eh++ = DW_CFA_advance_loc + 4;
10914 *eh++ = DW_CFA_restore_extended;
10915 *eh++ = 65;
10916 stub_entry->group->eh_size = eh - base;
10917 }
a7f2871e
AM
10918 return p;
10919}
10920
176a0d42
AM
10921static Elf_Internal_Rela *
10922get_relocs (asection *sec, int count)
10923{
10924 Elf_Internal_Rela *relocs;
10925 struct bfd_elf_section_data *elfsec_data;
10926
10927 elfsec_data = elf_section_data (sec);
10928 relocs = elfsec_data->relocs;
10929 if (relocs == NULL)
10930 {
10931 bfd_size_type relsize;
10932 relsize = sec->reloc_count * sizeof (*relocs);
10933 relocs = bfd_alloc (sec->owner, relsize);
10934 if (relocs == NULL)
10935 return NULL;
10936 elfsec_data->relocs = relocs;
d4730f92
BS
10937 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10938 sizeof (Elf_Internal_Shdr));
10939 if (elfsec_data->rela.hdr == NULL)
10940 return NULL;
10941 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10942 * sizeof (Elf64_External_Rela));
10943 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10944 sec->reloc_count = 0;
10945 }
10946 relocs += sec->reloc_count;
10947 sec->reloc_count += count;
10948 return relocs;
10949}
10950
3d58e1fc
AM
10951/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10952 forms, to the equivalent relocs against the global symbol given by
10953 STUB_ENTRY->H. */
10954
10955static bfd_boolean
10956use_global_in_relocs (struct ppc_link_hash_table *htab,
10957 struct ppc_stub_hash_entry *stub_entry,
10958 Elf_Internal_Rela *r, unsigned int num_rel)
10959{
10960 struct elf_link_hash_entry **hashes;
10961 unsigned long symndx;
10962 struct ppc_link_hash_entry *h;
10963 bfd_vma symval;
10964
10965 /* Relocs are always against symbols in their own object file. Fake
10966 up global sym hashes for the stub bfd (which has no symbols). */
10967 hashes = elf_sym_hashes (htab->params->stub_bfd);
10968 if (hashes == NULL)
10969 {
10970 bfd_size_type hsize;
10971
10972 /* When called the first time, stub_globals will contain the
10973 total number of symbols seen during stub sizing. After
10974 allocating, stub_globals is used as an index to fill the
10975 hashes array. */
10976 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10977 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10978 if (hashes == NULL)
10979 return FALSE;
10980 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10981 htab->stub_globals = 1;
10982 }
10983 symndx = htab->stub_globals++;
10984 h = stub_entry->h;
10985 hashes[symndx] = &h->elf;
10986 if (h->oh != NULL && h->oh->is_func)
10987 h = ppc_follow_link (h->oh);
10988 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10989 || h->elf.root.type == bfd_link_hash_defweak);
10990 symval = (h->elf.root.u.def.value
10991 + h->elf.root.u.def.section->output_offset
10992 + h->elf.root.u.def.section->output_section->vma);
10993 while (num_rel-- != 0)
10994 {
10995 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10996 if (h->elf.root.u.def.section != stub_entry->target_section)
10997 {
10998 /* H is an opd symbol. The addend must be zero, and the
10999 branch reloc is the only one we can convert. */
11000 r->r_addend = 0;
11001 break;
11002 }
11003 else
11004 r->r_addend -= symval;
11005 --r;
11006 }
11007 return TRUE;
11008}
11009
aa374f67 11010static bfd_vma
25f53a85 11011get_r2off (struct bfd_link_info *info,
aa374f67
AM
11012 struct ppc_stub_hash_entry *stub_entry)
11013{
25f53a85 11014 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11015 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11016
11017 if (r2off == 0)
11018 {
11019 /* Support linking -R objects. Get the toc pointer from the
11020 opd entry. */
11021 char buf[8];
b9e5796b
AM
11022 if (!htab->opd_abi)
11023 return r2off;
aa374f67
AM
11024 asection *opd = stub_entry->h->elf.root.u.def.section;
11025 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11026
11027 if (strcmp (opd->name, ".opd") != 0
11028 || opd->reloc_count != 0)
11029 {
2cdcc330
AM
11030 info->callbacks->einfo
11031 (_("%P: cannot find opd entry toc for `%pT'\n"),
11032 stub_entry->h->elf.root.root.string);
aa374f67 11033 bfd_set_error (bfd_error_bad_value);
a7c49797 11034 return (bfd_vma) -1;
aa374f67
AM
11035 }
11036 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11037 return (bfd_vma) -1;
aa374f67 11038 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11039 r2off -= elf_gp (info->output_bfd);
aa374f67 11040 }
6f20ed8a 11041 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11042 return r2off;
11043}
11044
b34976b6 11045static bfd_boolean
4ce794b7 11046ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11047{
721956f4
AM
11048 struct ppc_stub_hash_entry *stub_entry;
11049 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11050 struct bfd_link_info *info;
11051 struct ppc_link_hash_table *htab;
721956f4 11052 bfd_byte *loc;
3d58e1fc 11053 bfd_byte *p, *relp;
1aa42141 11054 bfd_vma targ, off;
176a0d42 11055 Elf_Internal_Rela *r;
e054468f 11056 asection *plt;
3d58e1fc 11057 int num_rel;
04bdff6a 11058 int odd;
5d1634d7 11059
721956f4
AM
11060 /* Massage our args to the form they really have. */
11061 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11062 info = in_arg;
5d1634d7 11063
5d1634d7 11064 htab = ppc_hash_table (info);
4dfe6ac6
NC
11065 if (htab == NULL)
11066 return FALSE;
5d1634d7 11067
1aa42141 11068 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11069 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11070
4ce794b7 11071 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11072 switch (stub_entry->stub_type)
5d1634d7 11073 {
721956f4 11074 case ppc_stub_long_branch:
ad8e1ba5 11075 case ppc_stub_long_branch_r2off:
721956f4 11076 /* Branches are relative. This is where we are going to. */
1aa42141 11077 targ = (stub_entry->target_value
6911b7dc
AM
11078 + stub_entry->target_section->output_offset
11079 + stub_entry->target_section->output_section->vma);
1aa42141 11080 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11081
721956f4 11082 /* And this is where we are coming from. */
1aa42141
AM
11083 off = (stub_entry->stub_offset
11084 + stub_entry->group->stub_sec->output_offset
11085 + stub_entry->group->stub_sec->output_section->vma);
11086 off = targ - off;
e86ce104 11087
9e390558 11088 p = loc;
ac2df442 11089 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11090 {
25f53a85 11091 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11092
a7c49797 11093 if (r2off == (bfd_vma) -1)
aa374f67
AM
11094 {
11095 htab->stub_error = TRUE;
11096 return FALSE;
11097 }
9e390558
AM
11098 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11099 p += 4;
ac2df442
AM
11100 if (PPC_HA (r2off) != 0)
11101 {
e7d1c40c 11102 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11103 ADDIS_R2_R2 | PPC_HA (r2off), p);
11104 p += 4;
a7c49797
AM
11105 }
11106 if (PPC_LO (r2off) != 0)
11107 {
11108 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11109 ADDI_R2_R2 | PPC_LO (r2off), p);
11110 p += 4;
ac2df442 11111 }
9e390558 11112 off -= p - loc;
ad8e1ba5 11113 }
9e390558
AM
11114 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11115 p += 4;
ad8e1ba5 11116
5c3dead3
AM
11117 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11118 {
cf97bcb0
AM
11119 _bfd_error_handler
11120 (_("long branch stub `%s' offset overflow"),
bc30df16 11121 stub_entry->root.string);
5c3dead3
AM
11122 htab->stub_error = TRUE;
11123 return FALSE;
11124 }
ee75fd95
AM
11125
11126 if (info->emitrelocations)
11127 {
6f20ed8a 11128 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11129 if (r == NULL)
11130 return FALSE;
9e390558 11131 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11132 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11133 r->r_addend = targ;
3d58e1fc
AM
11134 if (stub_entry->h != NULL
11135 && !use_global_in_relocs (htab, stub_entry, r, 1))
11136 return FALSE;
ee75fd95 11137 }
721956f4 11138 break;
e86ce104 11139
721956f4 11140 case ppc_stub_plt_branch:
ad8e1ba5 11141 case ppc_stub_plt_branch_r2off:
721956f4
AM
11142 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11143 stub_entry->root.string + 9,
b34976b6 11144 FALSE, FALSE);
721956f4
AM
11145 if (br_entry == NULL)
11146 {
cf97bcb0
AM
11147 _bfd_error_handler (_("can't find branch stub `%s'"),
11148 stub_entry->root.string);
b34976b6
AM
11149 htab->stub_error = TRUE;
11150 return FALSE;
721956f4
AM
11151 }
11152
1aa42141 11153 targ = (stub_entry->target_value
176a0d42
AM
11154 + stub_entry->target_section->output_offset
11155 + stub_entry->target_section->output_section->vma);
6911b7dc 11156 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11157 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11158
1aa42141 11159 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11160 htab->brlt->contents + br_entry->offset);
721956f4 11161
f94498ff 11162 if (br_entry->iter == htab->stub_iteration)
721956f4 11163 {
f94498ff 11164 br_entry->iter = 0;
84f5d08e 11165
f94498ff 11166 if (htab->relbrlt != NULL)
84f5d08e 11167 {
f94498ff
AM
11168 /* Create a reloc for the branch lookup table entry. */
11169 Elf_Internal_Rela rela;
11170 bfd_byte *rl;
11171
11172 rela.r_offset = (br_entry->offset
11173 + htab->brlt->output_offset
11174 + htab->brlt->output_section->vma);
11175 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11176 rela.r_addend = targ;
f94498ff
AM
11177
11178 rl = htab->relbrlt->contents;
11179 rl += (htab->relbrlt->reloc_count++
11180 * sizeof (Elf64_External_Rela));
11181 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11182 }
11183 else if (info->emitrelocations)
11184 {
176a0d42
AM
11185 r = get_relocs (htab->brlt, 1);
11186 if (r == NULL)
11187 return FALSE;
11188 /* brlt, being SEC_LINKER_CREATED does not go through the
11189 normal reloc processing. Symbols and offsets are not
11190 translated from input file to output file form, so
11191 set up the offset per the output file. */
f94498ff
AM
11192 r->r_offset = (br_entry->offset
11193 + htab->brlt->output_offset
11194 + htab->brlt->output_section->vma);
11195 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11196 r->r_addend = targ;
84f5d08e 11197 }
84f5d08e 11198 }
721956f4 11199
1aa42141 11200 targ = (br_entry->offset
176a0d42
AM
11201 + htab->brlt->output_offset
11202 + htab->brlt->output_section->vma);
11203
1aa42141
AM
11204 off = (elf_gp (info->output_bfd)
11205 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11206 off = targ - off;
721956f4 11207
ad8e1ba5 11208 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11209 {
25f53a85 11210 info->callbacks->einfo
c1c8c1ef 11211 (_("%P: linkage table error against `%pT'\n"),
721956f4 11212 stub_entry->root.string);
5d1634d7 11213 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11214 htab->stub_error = TRUE;
11215 return FALSE;
5d1634d7 11216 }
41bd81ab 11217
176a0d42
AM
11218 if (info->emitrelocations)
11219 {
6f20ed8a 11220 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11221 if (r == NULL)
11222 return FALSE;
6f20ed8a 11223 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11224 if (bfd_big_endian (info->output_bfd))
11225 r[0].r_offset += 2;
00f412ee 11226 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11227 r[0].r_offset += 4;
11228 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11229 r[0].r_addend = targ;
176a0d42
AM
11230 if (PPC_HA (off) != 0)
11231 {
11232 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11233 r[1].r_offset = r[0].r_offset + 4;
11234 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11235 r[1].r_addend = r[0].r_addend;
11236 }
11237 }
11238
9e390558 11239 p = loc;
00f412ee 11240 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11241 {
176a0d42 11242 if (PPC_HA (off) != 0)
ac2df442 11243 {
e7d1c40c 11244 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11245 ADDIS_R12_R2 | PPC_HA (off), p);
11246 p += 4;
e7d1c40c 11247 bfd_put_32 (htab->params->stub_bfd,
9e390558 11248 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11249 }
11250 else
9e390558
AM
11251 bfd_put_32 (htab->params->stub_bfd,
11252 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11253 }
11254 else
11255 {
25f53a85 11256 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11257
a7c49797 11258 if (r2off == (bfd_vma) -1)
aa374f67
AM
11259 {
11260 htab->stub_error = TRUE;
11261 return FALSE;
11262 }
ad8e1ba5 11263
9e390558
AM
11264 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11265 p += 4;
176a0d42 11266 if (PPC_HA (off) != 0)
ac2df442 11267 {
e7d1c40c 11268 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11269 ADDIS_R12_R2 | PPC_HA (off), p);
11270 p += 4;
e7d1c40c 11271 bfd_put_32 (htab->params->stub_bfd,
9e390558 11272 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11273 }
11274 else
9e390558 11275 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11276
11277 if (PPC_HA (r2off) != 0)
11278 {
9e390558 11279 p += 4;
e7d1c40c 11280 bfd_put_32 (htab->params->stub_bfd,
9e390558 11281 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11282 }
11283 if (PPC_LO (r2off) != 0)
11284 {
9e390558 11285 p += 4;
e7d1c40c 11286 bfd_put_32 (htab->params->stub_bfd,
9e390558 11287 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11288 }
ad8e1ba5 11289 }
9e390558
AM
11290 p += 4;
11291 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11292 p += 4;
407aa07c
AM
11293 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11294 p += 4;
721956f4 11295 break;
5d1634d7 11296
05d0e962
AM
11297 case ppc_stub_long_branch_notoc:
11298 case ppc_stub_long_branch_both:
11299 case ppc_stub_plt_branch_notoc:
11300 case ppc_stub_plt_branch_both:
11301 case ppc_stub_plt_call_notoc:
11302 case ppc_stub_plt_call_both:
11303 p = loc;
f891966f 11304 off = (stub_entry->stub_offset
05d0e962
AM
11305 + stub_entry->group->stub_sec->output_offset
11306 + stub_entry->group->stub_sec->output_section->vma);
11307 if (stub_entry->stub_type == ppc_stub_long_branch_both
11308 || stub_entry->stub_type == ppc_stub_plt_branch_both
11309 || stub_entry->stub_type == ppc_stub_plt_call_both)
11310 {
11311 off += 4;
11312 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11313 p += 4;
11314 }
11315 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11316 {
11317 targ = stub_entry->plt_ent->plt.offset & ~1;
11318 if (targ >= (bfd_vma) -2)
11319 abort ();
11320
11321 plt = htab->elf.splt;
11322 if (!htab->elf.dynamic_sections_created
11323 || stub_entry->h == NULL
11324 || stub_entry->h->elf.dynindx == -1)
11325 {
11326 if (stub_entry->symtype == STT_GNU_IFUNC)
11327 plt = htab->elf.iplt;
11328 else
11329 plt = htab->pltlocal;
11330 }
11331 targ += plt->output_offset + plt->output_section->vma;
11332 }
11333 else
11334 targ = (stub_entry->target_value
11335 + stub_entry->target_section->output_offset
11336 + stub_entry->target_section->output_section->vma);
04bdff6a 11337 odd = off & 4;
05d0e962 11338 off = targ - off;
f891966f 11339
3d58e1fc
AM
11340 relp = p;
11341 num_rel = 0;
04bdff6a
AM
11342 if (htab->powerxx_stubs)
11343 {
11344 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11345 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11346 }
11347 else
11348 {
11349 /* The notoc stubs calculate their target (either a PLT entry or
11350 the global entry point of a function) relative to the PC
11351 returned by the "bcl" two instructions past the start of the
11352 sequence emitted by build_offset. The offset is therefore 8
11353 less than calculated from the start of the sequence. */
11354 off -= 8;
11355 p = build_offset (htab->params->stub_bfd, p, off,
11356 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11357 }
11358
f891966f 11359 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11360 {
f891966f 11361 bfd_vma from;
3d58e1fc 11362 num_rel = 1;
f891966f
AM
11363 from = (stub_entry->stub_offset
11364 + stub_entry->group->stub_sec->output_offset
11365 + stub_entry->group->stub_sec->output_section->vma
11366 + (p - loc));
05d0e962 11367 bfd_put_32 (htab->params->stub_bfd,
f891966f 11368 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11369 }
11370 else
11371 {
11372 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11373 p += 4;
11374 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11375 }
11376 p += 4;
df136d64 11377
3d58e1fc
AM
11378 if (info->emitrelocations)
11379 {
04bdff6a
AM
11380 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11381 if (htab->powerxx_stubs)
11382 num_rel += num_relocs_for_powerxx_offset (off, odd);
11383 else
11384 {
11385 num_rel += num_relocs_for_offset (off);
11386 roff += 16;
11387 }
3d58e1fc
AM
11388 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11389 if (r == NULL)
11390 return FALSE;
04bdff6a
AM
11391 if (htab->powerxx_stubs)
11392 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11393 else
11394 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11395 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11396 || stub_entry->stub_type == ppc_stub_long_branch_both)
11397 {
11398 ++r;
11399 roff = p - 4 - stub_entry->group->stub_sec->contents;
11400 r->r_offset = roff;
11401 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11402 r->r_addend = targ;
11403 if (stub_entry->h != NULL
11404 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11405 return FALSE;
11406 }
11407 }
11408
04bdff6a
AM
11409 if (!htab->powerxx_stubs
11410 && htab->glink_eh_frame != NULL
11411 && htab->glink_eh_frame->size != 0)
df136d64
AM
11412 {
11413 bfd_byte *base, *eh;
11414 unsigned int lr_used, delta;
11415
11416 base = (htab->glink_eh_frame->contents
11417 + stub_entry->group->eh_base + 17);
11418 eh = base + stub_entry->group->eh_size;
11419 lr_used = stub_entry->stub_offset + 8;
11420 if (stub_entry->stub_type == ppc_stub_long_branch_both
11421 || stub_entry->stub_type == ppc_stub_plt_branch_both
11422 || stub_entry->stub_type == ppc_stub_plt_call_both)
11423 lr_used += 4;
11424 delta = lr_used - stub_entry->group->lr_restore;
11425 stub_entry->group->lr_restore = lr_used + 8;
11426 eh = eh_advance (htab->elf.dynobj, eh, delta);
11427 *eh++ = DW_CFA_register;
11428 *eh++ = 65;
11429 *eh++ = 12;
11430 *eh++ = DW_CFA_advance_loc + 2;
11431 *eh++ = DW_CFA_restore_extended;
11432 *eh++ = 65;
11433 stub_entry->group->eh_size = eh - base;
11434 }
05d0e962
AM
11435 break;
11436
721956f4 11437 case ppc_stub_plt_call:
794e51c0 11438 case ppc_stub_plt_call_r2save:
e054468f 11439 if (stub_entry->h != NULL
b31867b6
AM
11440 && stub_entry->h->is_func_descriptor
11441 && stub_entry->h->oh != NULL)
c862ae31 11442 {
b31867b6
AM
11443 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11444
11445 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11446 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11447 if (fh->elf.root.type == bfd_link_hash_undefined
11448 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11449 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11450 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11451 }
11452
721956f4 11453 /* Now build the stub. */
1aa42141
AM
11454 targ = stub_entry->plt_ent->plt.offset & ~1;
11455 if (targ >= (bfd_vma) -2)
721956f4
AM
11456 abort ();
11457
33e44f2e 11458 plt = htab->elf.splt;
25f23106
AM
11459 if (!htab->elf.dynamic_sections_created
11460 || stub_entry->h == NULL
11461 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11462 {
11463 if (stub_entry->symtype == STT_GNU_IFUNC)
11464 plt = htab->elf.iplt;
11465 else
11466 plt = htab->pltlocal;
11467 }
1aa42141 11468 targ += plt->output_offset + plt->output_section->vma;
e054468f 11469
1aa42141
AM
11470 off = (elf_gp (info->output_bfd)
11471 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11472 off = targ - off;
721956f4 11473
ad8e1ba5 11474 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11475 {
25f53a85 11476 info->callbacks->einfo
695344c0 11477 /* xgettext:c-format */
c1c8c1ef 11478 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11479 stub_entry->h != NULL
11480 ? stub_entry->h->elf.root.root.string
11481 : "<local sym>");
721956f4 11482 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11483 htab->stub_error = TRUE;
11484 return FALSE;
721956f4
AM
11485 }
11486
176a0d42
AM
11487 r = NULL;
11488 if (info->emitrelocations)
11489 {
6f20ed8a 11490 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11491 ((PPC_HA (off) != 0)
11492 + (htab->opd_abi
e7d1c40c 11493 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11494 && PPC_HA (off + 16) == PPC_HA (off))
11495 : 1)));
176a0d42
AM
11496 if (r == NULL)
11497 return FALSE;
6f20ed8a 11498 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11499 if (bfd_big_endian (info->output_bfd))
11500 r[0].r_offset += 2;
1aa42141 11501 r[0].r_addend = targ;
176a0d42 11502 }
a7f2871e
AM
11503 if (stub_entry->h != NULL
11504 && (stub_entry->h == htab->tls_get_addr_fd
11505 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11506 && htab->params->tls_get_addr_opt)
794e51c0 11507 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11508 else
794e51c0 11509 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11510 break;
11511
a4b6fadd
AM
11512 case ppc_stub_save_res:
11513 return TRUE;
11514
721956f4
AM
11515 default:
11516 BFD_FAIL ();
b34976b6 11517 return FALSE;
721956f4
AM
11518 }
11519
1aa42141 11520 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11521
e7d1c40c 11522 if (htab->params->emit_stub_syms)
97b639ba
AM
11523 {
11524 struct elf_link_hash_entry *h;
ee75fd95
AM
11525 size_t len1, len2;
11526 char *name;
11527 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11528 "long_branch",
11529 "long_branch",
3f6ff479
AM
11530 "long_branch",
11531 "plt_branch",
ee75fd95 11532 "plt_branch",
05d0e962
AM
11533 "plt_branch",
11534 "plt_branch",
11535 "plt_call",
11536 "plt_call",
794e51c0 11537 "plt_call",
ee75fd95
AM
11538 "plt_call" };
11539
11540 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11541 len2 = strlen (stub_entry->root.string);
11542 name = bfd_malloc (len1 + len2 + 2);
11543 if (name == NULL)
11544 return FALSE;
11545 memcpy (name, stub_entry->root.string, 9);
11546 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11547 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11548 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11549 if (h == NULL)
11550 return FALSE;
11551 if (h->root.type == bfd_link_hash_new)
11552 {
11553 h->root.type = bfd_link_hash_defined;
6f20ed8a 11554 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11555 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11556 h->ref_regular = 1;
11557 h->def_regular = 1;
11558 h->ref_regular_nonweak = 1;
11559 h->forced_local = 1;
11560 h->non_elf = 0;
2ec55de3 11561 h->root.linker_def = 1;
97b639ba
AM
11562 }
11563 }
11564
b34976b6 11565 return TRUE;
721956f4
AM
11566}
11567
11568/* As above, but don't actually build the stub. Just bump offset so
11569 we know stub section sizes, and select plt_branch stubs where
11570 long_branch stubs won't do. */
11571
b34976b6 11572static bfd_boolean
4ce794b7 11573ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11574{
11575 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11576 struct bfd_link_info *info;
721956f4 11577 struct ppc_link_hash_table *htab;
f891966f
AM
11578 asection *plt;
11579 bfd_vma targ, off, r2off;
04bdff6a 11580 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11581
11582 /* Massage our args to the form they really have. */
11583 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11584 info = in_arg;
11585
11586 htab = ppc_hash_table (info);
4dfe6ac6
NC
11587 if (htab == NULL)
11588 return FALSE;
721956f4 11589
1aa42141
AM
11590 /* Make a note of the offset within the stubs for this entry. */
11591 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11592
a4b6fadd
AM
11593 if (stub_entry->h != NULL
11594 && stub_entry->h->save_res
11595 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11596 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11597 {
11598 /* Don't make stubs to out-of-line register save/restore
11599 functions. Instead, emit copies of the functions. */
11600 stub_entry->group->needs_save_res = 1;
11601 stub_entry->stub_type = ppc_stub_save_res;
11602 return TRUE;
11603 }
11604
f891966f 11605 switch (stub_entry->stub_type)
721956f4 11606 {
f891966f
AM
11607 case ppc_stub_plt_branch:
11608 case ppc_stub_plt_branch_r2off:
11609 /* Reset the stub type from the plt branch variant in case we now
11610 can reach with a shorter stub. */
11611 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11612 /* Fall through. */
11613 case ppc_stub_long_branch:
11614 case ppc_stub_long_branch_r2off:
1aa42141
AM
11615 targ = (stub_entry->target_value
11616 + stub_entry->target_section->output_offset
11617 + stub_entry->target_section->output_section->vma);
f891966f 11618 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11619 off = (stub_entry->stub_offset
11620 + stub_entry->group->stub_sec->output_offset
11621 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11622
ad8e1ba5 11623 size = 4;
f891966f 11624 r2off = 0;
ad8e1ba5
AM
11625 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11626 {
25f53a85 11627 r2off = get_r2off (info, stub_entry);
a7c49797 11628 if (r2off == (bfd_vma) -1)
aa374f67
AM
11629 {
11630 htab->stub_error = TRUE;
11631 return FALSE;
11632 }
a7c49797 11633 size = 8;
ac2df442 11634 if (PPC_HA (r2off) != 0)
a7c49797
AM
11635 size += 4;
11636 if (PPC_LO (r2off) != 0)
11637 size += 4;
1aa42141 11638 off += size - 4;
ad8e1ba5 11639 }
1aa42141 11640 off = targ - off;
ad8e1ba5 11641
f891966f
AM
11642 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11643 Do the same for -R objects without function descriptors. */
11644 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11645 && r2off == 0
11646 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11647 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11648 {
f891966f 11649 struct ppc_branch_hash_entry *br_entry;
df136d64 11650
f891966f
AM
11651 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11652 stub_entry->root.string + 9,
11653 TRUE, FALSE);
11654 if (br_entry == NULL)
721956f4 11655 {
f891966f
AM
11656 _bfd_error_handler (_("can't build branch stub `%s'"),
11657 stub_entry->root.string);
11658 htab->stub_error = TRUE;
11659 return FALSE;
721956f4
AM
11660 }
11661
f891966f 11662 if (br_entry->iter != htab->stub_iteration)
721956f4 11663 {
f891966f
AM
11664 br_entry->iter = htab->stub_iteration;
11665 br_entry->offset = htab->brlt->size;
11666 htab->brlt->size += 8;
63bc6f6c 11667
f891966f
AM
11668 if (htab->relbrlt != NULL)
11669 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11670 else if (info->emitrelocations)
84f5d08e 11671 {
f891966f
AM
11672 htab->brlt->reloc_count += 1;
11673 htab->brlt->flags |= SEC_RELOC;
05d0e962 11674 }
f891966f 11675 }
ac2df442 11676
f891966f
AM
11677 targ = (br_entry->offset
11678 + htab->brlt->output_offset
11679 + htab->brlt->output_section->vma);
11680 off = (elf_gp (info->output_bfd)
11681 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11682 off = targ - off;
176a0d42 11683
f891966f
AM
11684 if (info->emitrelocations)
11685 {
11686 stub_entry->group->stub_sec->reloc_count
11687 += 1 + (PPC_HA (off) != 0);
11688 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11689 }
05d0e962 11690
f891966f
AM
11691 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11692 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11693 {
11694 size = 12;
11695 if (PPC_HA (off) != 0)
11696 size = 16;
ac2df442 11697 }
f891966f 11698 else
ac2df442 11699 {
f891966f
AM
11700 size = 16;
11701 if (PPC_HA (off) != 0)
11702 size += 4;
11703
11704 if (PPC_HA (r2off) != 0)
11705 size += 4;
11706 if (PPC_LO (r2off) != 0)
11707 size += 4;
ac2df442 11708 }
721956f4 11709 }
f891966f
AM
11710 else if (info->emitrelocations)
11711 {
11712 stub_entry->group->stub_sec->reloc_count += 1;
11713 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11714 }
11715 break;
11716
11717 case ppc_stub_plt_branch_notoc:
11718 case ppc_stub_plt_branch_both:
11719 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11720 /* Fall through. */
11721 case ppc_stub_long_branch_notoc:
11722 case ppc_stub_long_branch_both:
11723 off = (stub_entry->stub_offset
11724 + stub_entry->group->stub_sec->output_offset
11725 + stub_entry->group->stub_sec->output_section->vma);
11726 size = 0;
11727 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11728 size = 4;
11729 off += size;
11730 targ = (stub_entry->target_value
11731 + stub_entry->target_section->output_offset
11732 + stub_entry->target_section->output_section->vma);
04bdff6a 11733 odd = off & 4;
f891966f
AM
11734 off = targ - off;
11735
3d58e1fc
AM
11736 if (info->emitrelocations)
11737 {
04bdff6a
AM
11738 unsigned int num_rel;
11739 if (htab->powerxx_stubs)
11740 num_rel = num_relocs_for_powerxx_offset (off, odd);
11741 else
11742 num_rel = num_relocs_for_offset (off - 8);
11743 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11744 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11745 }
11746
04bdff6a
AM
11747 if (htab->powerxx_stubs)
11748 extra = size_powerxx_offset (off, odd);
11749 else
11750 extra = size_offset (off - 8);
f891966f
AM
11751 /* Include branch insn plus those in the offset sequence. */
11752 size += 4 + extra;
11753 /* The branch insn is at the end, or "extra" bytes along. So
11754 its offset will be "extra" bytes less that that already
11755 calculated. */
11756 off -= extra;
11757
04bdff6a
AM
11758 if (!htab->powerxx_stubs)
11759 {
11760 /* After the bcl, lr has been modified so we need to emit
11761 .eh_frame info saying the return address is in r12. */
11762 lr_used = stub_entry->stub_offset + 8;
11763 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11764 lr_used += 4;
11765 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11766 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11767 DW_CFA_restore_extended 65. */
11768 delta = lr_used - stub_entry->group->lr_restore;
11769 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11770 stub_entry->group->lr_restore = lr_used + 8;
11771 }
f891966f
AM
11772
11773 /* If the branch can't reach, use a plt_branch. */
11774 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11775 {
11776 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11777 - ppc_stub_long_branch_notoc);
11778 size += 4;
11779 }
3d58e1fc
AM
11780 else if (info->emitrelocations)
11781 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
11782 break;
11783
11784 case ppc_stub_plt_call_notoc:
11785 case ppc_stub_plt_call_both:
11786 off = (stub_entry->stub_offset
11787 + stub_entry->group->stub_sec->output_offset
11788 + stub_entry->group->stub_sec->output_section->vma);
11789 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11790 off += 4;
11791 targ = stub_entry->plt_ent->plt.offset & ~1;
11792 if (targ >= (bfd_vma) -2)
11793 abort ();
11794
11795 plt = htab->elf.splt;
11796 if (!htab->elf.dynamic_sections_created
11797 || stub_entry->h == NULL
11798 || stub_entry->h->elf.dynindx == -1)
11799 {
11800 if (stub_entry->symtype == STT_GNU_IFUNC)
11801 plt = htab->elf.iplt;
11802 else
11803 plt = htab->pltlocal;
11804 }
11805 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 11806 odd = off & 4;
f891966f
AM
11807 off = targ - off;
11808
11809 if (htab->params->plt_stub_align != 0)
11810 {
11811 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11812
11813 stub_entry->group->stub_sec->size += pad;
11814 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11815 off -= pad;
11816 }
11817
3d58e1fc
AM
11818 if (info->emitrelocations)
11819 {
04bdff6a
AM
11820 unsigned int num_rel;
11821 if (htab->powerxx_stubs)
11822 num_rel = num_relocs_for_powerxx_offset (off, odd);
11823 else
11824 num_rel = num_relocs_for_offset (off - 8);
11825 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11826 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11827 }
11828
f891966f
AM
11829 size = plt_stub_size (htab, stub_entry, off);
11830
04bdff6a
AM
11831 if (!htab->powerxx_stubs)
11832 {
11833 /* After the bcl, lr has been modified so we need to emit
11834 .eh_frame info saying the return address is in r12. */
11835 lr_used = stub_entry->stub_offset + 8;
11836 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11837 lr_used += 4;
11838 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11839 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11840 DW_CFA_restore_extended 65. */
11841 delta = lr_used - stub_entry->group->lr_restore;
11842 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11843 stub_entry->group->lr_restore = lr_used + 8;
11844 }
f891966f
AM
11845 break;
11846
11847 case ppc_stub_plt_call:
11848 case ppc_stub_plt_call_r2save:
11849 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11850 if (targ >= (bfd_vma) -2)
11851 abort ();
11852 plt = htab->elf.splt;
11853 if (!htab->elf.dynamic_sections_created
11854 || stub_entry->h == NULL
11855 || stub_entry->h->elf.dynindx == -1)
11856 {
11857 if (stub_entry->symtype == STT_GNU_IFUNC)
11858 plt = htab->elf.iplt;
11859 else
11860 plt = htab->pltlocal;
11861 }
11862 targ += plt->output_offset + plt->output_section->vma;
11863
11864 off = (elf_gp (info->output_bfd)
11865 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11866 off = targ - off;
11867
11868 if (htab->params->plt_stub_align != 0)
11869 {
11870 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11871
11872 stub_entry->group->stub_sec->size += pad;
11873 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11874 }
11875
11876 if (info->emitrelocations)
11877 {
11878 stub_entry->group->stub_sec->reloc_count
11879 += ((PPC_HA (off) != 0)
11880 + (htab->opd_abi
11881 ? 2 + (htab->params->plt_static_chain
11882 && PPC_HA (off + 16) == PPC_HA (off))
11883 : 1));
11884 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11885 }
11886
11887 size = plt_stub_size (htab, stub_entry, off);
11888
11889 if (stub_entry->h != NULL
11890 && (stub_entry->h == htab->tls_get_addr_fd
11891 || stub_entry->h == htab->tls_get_addr)
11892 && htab->params->tls_get_addr_opt
11893 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11894 {
11895 /* After the bctrl, lr has been modified so we need to
11896 emit .eh_frame info saying the return address is
11897 on the stack. In fact we put the EH info specifying
11898 that the return address is on the stack *at* the
11899 call rather than after it, because the EH info for a
11900 call needs to be specified by that point.
11901 See libgcc/unwind-dw2.c execute_cfa_program. */
11902 lr_used = stub_entry->stub_offset + size - 20;
11903 /* The eh_frame info will consist of a DW_CFA_advance_loc
11904 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11905 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11906 delta = lr_used - stub_entry->group->lr_restore;
11907 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11908 stub_entry->group->lr_restore = size - 4;
11909 }
11910 break;
11911
11912 default:
11913 BFD_FAIL ();
11914 return FALSE;
721956f4
AM
11915 }
11916
6f20ed8a 11917 stub_entry->group->stub_sec->size += size;
b34976b6 11918 return TRUE;
721956f4
AM
11919}
11920
11921/* Set up various things so that we can make a list of input sections
11922 for each output section included in the link. Returns -1 on error,
cedb70c5 11923 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11924
11925int
e7d1c40c 11926ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11927{
6f20ed8a 11928 unsigned int id;
721956f4
AM
11929 bfd_size_type amt;
11930 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11931
4dfe6ac6
NC
11932 if (htab == NULL)
11933 return -1;
4c52953f 11934
7cf7fcc8 11935 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11936 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11937 htab->sec_info = bfd_zmalloc (amt);
11938 if (htab->sec_info == NULL)
721956f4
AM
11939 return -1;
11940
3d6f9012
AM
11941 /* Set toc_off for com, und, abs and ind sections. */
11942 for (id = 0; id < 3; id++)
6f20ed8a 11943 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11944
721956f4
AM
11945 return 1;
11946}
11947
927be08e
AM
11948/* Set up for first pass at multitoc partitioning. */
11949
11950void
11951ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11952{
11953 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11954
1c865ab2 11955 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11956 htab->toc_bfd = NULL;
11957 htab->toc_first_sec = NULL;
11958}
11959
e717da7e
AM
11960/* The linker repeatedly calls this function for each TOC input section
11961 and linker generated GOT section. Group input bfds such that the toc
927be08e 11962 within a group is less than 64k in size. */
ad8e1ba5 11963
927be08e 11964bfd_boolean
4ce794b7 11965ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11966{
11967 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11968 bfd_vma addr, off, limit;
ad8e1ba5 11969
4dfe6ac6
NC
11970 if (htab == NULL)
11971 return FALSE;
11972
927be08e 11973 if (!htab->second_toc_pass)
4c52953f 11974 {
927be08e 11975 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11976 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11977
11978 if (new_bfd)
bf102f86
AM
11979 {
11980 htab->toc_bfd = isec->owner;
11981 htab->toc_first_sec = isec;
11982 }
927be08e 11983
bf102f86
AM
11984 addr = isec->output_offset + isec->output_section->vma;
11985 off = addr - htab->toc_curr;
d77c8a4b
AM
11986 limit = 0x80008000;
11987 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11988 limit = 0x10000;
11989 if (off + isec->size > limit)
bf102f86
AM
11990 {
11991 addr = (htab->toc_first_sec->output_offset
11992 + htab->toc_first_sec->output_section->vma);
11993 htab->toc_curr = addr;
a27e685f 11994 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11995 }
99877b66 11996
927be08e
AM
11997 /* toc_curr is the base address of this toc group. Set elf_gp
11998 for the input section to be the offset relative to the
11999 output toc base plus 0x8000. Making the input elf_gp an
12000 offset allows us to move the toc as a whole without
12001 recalculating input elf_gp. */
06bcf541 12002 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12003 off += TOC_BASE_OFF;
12004
12005 /* Die if someone uses a linker script that doesn't keep input
12006 file .toc and .got together. */
a4fd3de5
AM
12007 if (new_bfd
12008 && elf_gp (isec->owner) != 0
927be08e
AM
12009 && elf_gp (isec->owner) != off)
12010 return FALSE;
12011
12012 elf_gp (isec->owner) = off;
12013 return TRUE;
4c52953f 12014 }
927be08e
AM
12015
12016 /* During the second pass toc_first_sec points to the start of
12017 a toc group, and toc_curr is used to track the old elf_gp.
12018 We use toc_bfd to ensure we only look at each bfd once. */
12019 if (htab->toc_bfd == isec->owner)
12020 return TRUE;
12021 htab->toc_bfd = isec->owner;
12022
12023 if (htab->toc_first_sec == NULL
12024 || htab->toc_curr != elf_gp (isec->owner))
12025 {
12026 htab->toc_curr = elf_gp (isec->owner);
12027 htab->toc_first_sec = isec;
12028 }
12029 addr = (htab->toc_first_sec->output_offset
12030 + htab->toc_first_sec->output_section->vma);
06bcf541 12031 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12032 elf_gp (isec->owner) = off;
12033
12034 return TRUE;
ad8e1ba5
AM
12035}
12036
927be08e
AM
12037/* Called via elf_link_hash_traverse to merge GOT entries for global
12038 symbol H. */
12039
12040static bfd_boolean
12041merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12042{
12043 if (h->root.type == bfd_link_hash_indirect)
12044 return TRUE;
12045
927be08e
AM
12046 merge_got_entries (&h->got.glist);
12047
12048 return TRUE;
12049}
12050
12051/* Called via elf_link_hash_traverse to allocate GOT entries for global
12052 symbol H. */
12053
12054static bfd_boolean
12055reallocate_got (struct elf_link_hash_entry *h, void *inf)
12056{
12057 struct got_entry *gent;
12058
12059 if (h->root.type == bfd_link_hash_indirect)
12060 return TRUE;
12061
927be08e
AM
12062 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12063 if (!gent->is_indirect)
12064 allocate_got (h, (struct bfd_link_info *) inf, gent);
12065 return TRUE;
12066}
12067
12068/* Called on the first multitoc pass after the last call to
12069 ppc64_elf_next_toc_section. This function removes duplicate GOT
12070 entries. */
12071
12072bfd_boolean
12073ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12074{
12075 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12076 struct bfd *ibfd, *ibfd2;
12077 bfd_boolean done_something;
12078
12079 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12080
7865406b
AM
12081 if (!htab->do_multi_toc)
12082 return FALSE;
12083
d0fae19d 12084 /* Merge global sym got entries within a toc group. */
927be08e
AM
12085 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12086
12087 /* And tlsld_got. */
c72f2fb2 12088 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12089 {
12090 struct got_entry *ent, *ent2;
12091
12092 if (!is_ppc64_elf (ibfd))
12093 continue;
12094
12095 ent = ppc64_tlsld_got (ibfd);
12096 if (!ent->is_indirect
12097 && ent->got.offset != (bfd_vma) -1)
12098 {
c72f2fb2 12099 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12100 {
12101 if (!is_ppc64_elf (ibfd2))
12102 continue;
12103
12104 ent2 = ppc64_tlsld_got (ibfd2);
12105 if (!ent2->is_indirect
12106 && ent2->got.offset != (bfd_vma) -1
12107 && elf_gp (ibfd2) == elf_gp (ibfd))
12108 {
12109 ent2->is_indirect = TRUE;
12110 ent2->got.ent = ent;
12111 }
12112 }
12113 }
12114 }
12115
12116 /* Zap sizes of got sections. */
33e44f2e
AM
12117 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12118 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12119 htab->got_reli_size = 0;
12120
c72f2fb2 12121 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12122 {
12123 asection *got, *relgot;
12124
12125 if (!is_ppc64_elf (ibfd))
12126 continue;
12127
12128 got = ppc64_elf_tdata (ibfd)->got;
12129 if (got != NULL)
12130 {
12131 got->rawsize = got->size;
12132 got->size = 0;
12133 relgot = ppc64_elf_tdata (ibfd)->relgot;
12134 relgot->rawsize = relgot->size;
12135 relgot->size = 0;
12136 }
12137 }
12138
12139 /* Now reallocate the got, local syms first. We don't need to
12140 allocate section contents again since we never increase size. */
c72f2fb2 12141 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12142 {
12143 struct got_entry **lgot_ents;
12144 struct got_entry **end_lgot_ents;
12145 struct plt_entry **local_plt;
12146 struct plt_entry **end_local_plt;
f961d9dd 12147 unsigned char *lgot_masks;
927be08e
AM
12148 bfd_size_type locsymcount;
12149 Elf_Internal_Shdr *symtab_hdr;
19e08130 12150 asection *s;
927be08e
AM
12151
12152 if (!is_ppc64_elf (ibfd))
12153 continue;
12154
12155 lgot_ents = elf_local_got_ents (ibfd);
12156 if (!lgot_ents)
12157 continue;
12158
12159 symtab_hdr = &elf_symtab_hdr (ibfd);
12160 locsymcount = symtab_hdr->sh_info;
12161 end_lgot_ents = lgot_ents + locsymcount;
12162 local_plt = (struct plt_entry **) end_lgot_ents;
12163 end_local_plt = local_plt + locsymcount;
f961d9dd 12164 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12165 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12166 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12167 {
12168 struct got_entry *ent;
12169
12170 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12171 {
19e08130
AM
12172 unsigned int ent_size = 8;
12173 unsigned int rel_size = sizeof (Elf64_External_Rela);
12174
d0fae19d
AM
12175 ent->got.offset = s->size;
12176 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12177 {
19e08130
AM
12178 ent_size *= 2;
12179 rel_size *= 2;
12180 }
12181 s->size += ent_size;
37da22e5 12182 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12183 {
33e44f2e 12184 htab->elf.irelplt->size += rel_size;
19e08130
AM
12185 htab->got_reli_size += rel_size;
12186 }
6a3858a6
AM
12187 else if (bfd_link_pic (info)
12188 && !((ent->tls_type & TLS_TPREL) != 0
12189 && bfd_link_executable (info)))
19e08130
AM
12190 {
12191 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12192 srel->size += rel_size;
d0fae19d
AM
12193 }
12194 }
927be08e
AM
12195 }
12196 }
12197
12198 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12199
c72f2fb2 12200 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12201 {
12202 struct got_entry *ent;
12203
12204 if (!is_ppc64_elf (ibfd))
12205 continue;
12206
12207 ent = ppc64_tlsld_got (ibfd);
12208 if (!ent->is_indirect
12209 && ent->got.offset != (bfd_vma) -1)
12210 {
12211 asection *s = ppc64_elf_tdata (ibfd)->got;
12212 ent->got.offset = s->size;
12213 s->size += 16;
0e1862bb 12214 if (bfd_link_pic (info))
927be08e
AM
12215 {
12216 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12217 srel->size += sizeof (Elf64_External_Rela);
12218 }
12219 }
12220 }
12221
33e44f2e 12222 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12223 if (!done_something)
c72f2fb2 12224 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12225 {
12226 asection *got;
12227
12228 if (!is_ppc64_elf (ibfd))
12229 continue;
12230
12231 got = ppc64_elf_tdata (ibfd)->got;
12232 if (got != NULL)
12233 {
12234 done_something = got->rawsize != got->size;
12235 if (done_something)
12236 break;
12237 }
12238 }
12239
12240 if (done_something)
e7d1c40c 12241 (*htab->params->layout_sections_again) ();
927be08e
AM
12242
12243 /* Set up for second pass over toc sections to recalculate elf_gp
12244 on input sections. */
12245 htab->toc_bfd = NULL;
12246 htab->toc_first_sec = NULL;
12247 htab->second_toc_pass = TRUE;
12248 return done_something;
12249}
12250
12251/* Called after second pass of multitoc partitioning. */
12252
12253void
12254ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12255{
12256 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12257
12258 /* After the second pass, toc_curr tracks the TOC offset used
12259 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12260 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12261}
12262
9b5ecbd0
AM
12263/* No toc references were found in ISEC. If the code in ISEC makes no
12264 calls, then there's no need to use toc adjusting stubs when branching
12265 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12266 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12267 needed, and 2 if a cyclical call-graph was found but no other reason
12268 for a stub was detected. If called from the top level, a return of
12269 2 means the same as a return of 0. */
9b5ecbd0
AM
12270
12271static int
4ce794b7 12272toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12273{
9b5ecbd0 12274 int ret;
70cc837d
AM
12275
12276 /* Mark this section as checked. */
12277 isec->call_check_done = 1;
9b5ecbd0 12278
772119ce
AM
12279 /* We know none of our code bearing sections will need toc stubs. */
12280 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12281 return 0;
12282
eea6121a 12283 if (isec->size == 0)
082c50f8
AM
12284 return 0;
12285
4c52953f
AM
12286 if (isec->output_section == NULL)
12287 return 0;
12288
4c52953f 12289 ret = 0;
70cc837d 12290 if (isec->reloc_count != 0)
9b5ecbd0 12291 {
70cc837d
AM
12292 Elf_Internal_Rela *relstart, *rel;
12293 Elf_Internal_Sym *local_syms;
12294 struct ppc_link_hash_table *htab;
2917689a 12295
70cc837d
AM
12296 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12297 info->keep_memory);
12298 if (relstart == NULL)
12299 return -1;
90aecf7a 12300
70cc837d
AM
12301 /* Look for branches to outside of this section. */
12302 local_syms = NULL;
12303 htab = ppc_hash_table (info);
12304 if (htab == NULL)
12305 return -1;
4c52953f 12306
70cc837d 12307 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12308 {
70cc837d
AM
12309 enum elf_ppc64_reloc_type r_type;
12310 unsigned long r_symndx;
12311 struct elf_link_hash_entry *h;
12312 struct ppc_link_hash_entry *eh;
12313 Elf_Internal_Sym *sym;
12314 asection *sym_sec;
12315 struct _opd_sec_data *opd;
12316 bfd_vma sym_value;
12317 bfd_vma dest;
12318
12319 r_type = ELF64_R_TYPE (rel->r_info);
12320 if (r_type != R_PPC64_REL24
05d0e962 12321 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12322 && r_type != R_PPC64_REL14
12323 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12324 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12325 && r_type != R_PPC64_PLTCALL
12326 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12327 continue;
4c52953f 12328
70cc837d
AM
12329 r_symndx = ELF64_R_SYM (rel->r_info);
12330 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12331 isec->owner))
4c52953f 12332 {
70cc837d
AM
12333 ret = -1;
12334 break;
12335 }
4c52953f 12336
70cc837d
AM
12337 /* Calls to dynamic lib functions go through a plt call stub
12338 that uses r2. */
12339 eh = (struct ppc_link_hash_entry *) h;
12340 if (eh != NULL
12341 && (eh->elf.plt.plist != NULL
12342 || (eh->oh != NULL
12343 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12344 {
12345 ret = 1;
12346 break;
4c52953f
AM
12347 }
12348
70cc837d
AM
12349 if (sym_sec == NULL)
12350 /* Ignore other undefined symbols. */
4c52953f 12351 continue;
4c52953f 12352
70cc837d
AM
12353 /* Assume branches to other sections not included in the
12354 link need stubs too, to cover -R and absolute syms. */
12355 if (sym_sec->output_section == NULL)
12356 {
12357 ret = 1;
12358 break;
12359 }
4c52953f 12360
70cc837d
AM
12361 if (h == NULL)
12362 sym_value = sym->st_value;
12363 else
12364 {
12365 if (h->root.type != bfd_link_hash_defined
12366 && h->root.type != bfd_link_hash_defweak)
12367 abort ();
12368 sym_value = h->root.u.def.value;
12369 }
12370 sym_value += rel->r_addend;
4c52953f 12371
70cc837d
AM
12372 /* If this branch reloc uses an opd sym, find the code section. */
12373 opd = get_opd_info (sym_sec);
12374 if (opd != NULL)
12375 {
12376 if (h == NULL && opd->adjust != NULL)
12377 {
12378 long adjust;
4c52953f 12379
92a9c616 12380 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12381 if (adjust == -1)
12382 /* Assume deleted functions won't ever be called. */
12383 continue;
12384 sym_value += adjust;
12385 }
4c52953f 12386
aef36ac1
AM
12387 dest = opd_entry_value (sym_sec, sym_value,
12388 &sym_sec, NULL, FALSE);
70cc837d
AM
12389 if (dest == (bfd_vma) -1)
12390 continue;
12391 }
12392 else
12393 dest = (sym_value
12394 + sym_sec->output_offset
12395 + sym_sec->output_section->vma);
4c52953f 12396
70cc837d
AM
12397 /* Ignore branch to self. */
12398 if (sym_sec == isec)
12399 continue;
4c52953f 12400
70cc837d
AM
12401 /* If the called function uses the toc, we need a stub. */
12402 if (sym_sec->has_toc_reloc
12403 || sym_sec->makes_toc_func_call)
4c52953f 12404 {
70cc837d 12405 ret = 1;
4c52953f
AM
12406 break;
12407 }
70cc837d
AM
12408
12409 /* Assume any branch that needs a long branch stub might in fact
12410 need a plt_branch stub. A plt_branch stub uses r2. */
12411 else if (dest - (isec->output_offset
12412 + isec->output_section->vma
6911b7dc
AM
12413 + rel->r_offset) + (1 << 25)
12414 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12415 ? h->other
12416 : sym->st_other))
4c52953f 12417 {
70cc837d
AM
12418 ret = 1;
12419 break;
12420 }
12421
12422 /* If calling back to a section in the process of being
12423 tested, we can't say for sure that no toc adjusting stubs
12424 are needed, so don't return zero. */
12425 else if (sym_sec->call_check_in_progress)
12426 ret = 2;
12427
12428 /* Branches to another section that itself doesn't have any TOC
12429 references are OK. Recursively call ourselves to check. */
12430 else if (!sym_sec->call_check_done)
12431 {
12432 int recur;
12433
12434 /* Mark current section as indeterminate, so that other
12435 sections that call back to current won't be marked as
12436 known. */
12437 isec->call_check_in_progress = 1;
12438 recur = toc_adjusting_stub_needed (info, sym_sec);
12439 isec->call_check_in_progress = 0;
12440
4c52953f
AM
12441 if (recur != 0)
12442 {
70cc837d
AM
12443 ret = recur;
12444 if (recur != 2)
12445 break;
4c52953f
AM
12446 }
12447 }
4c52953f 12448 }
70cc837d
AM
12449
12450 if (local_syms != NULL
12451 && (elf_symtab_hdr (isec->owner).contents
12452 != (unsigned char *) local_syms))
12453 free (local_syms);
12454 if (elf_section_data (isec)->relocs != relstart)
12455 free (relstart);
9b5ecbd0
AM
12456 }
12457
70cc837d
AM
12458 if ((ret & 1) == 0
12459 && isec->map_head.s != NULL
12460 && (strcmp (isec->output_section->name, ".init") == 0
12461 || strcmp (isec->output_section->name, ".fini") == 0))
12462 {
12463 if (isec->map_head.s->has_toc_reloc
12464 || isec->map_head.s->makes_toc_func_call)
12465 ret = 1;
12466 else if (!isec->map_head.s->call_check_done)
12467 {
12468 int recur;
12469 isec->call_check_in_progress = 1;
12470 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12471 isec->call_check_in_progress = 0;
12472 if (recur != 0)
12473 ret = recur;
12474 }
12475 }
12476
12477 if (ret == 1)
12478 isec->makes_toc_func_call = 1;
4c52953f 12479
9b5ecbd0
AM
12480 return ret;
12481}
12482
721956f4
AM
12483/* The linker repeatedly calls this function for each input section,
12484 in the order that input sections are linked into output sections.
12485 Build lists of input sections to determine groupings between which
12486 we may insert linker stubs. */
12487
9b5ecbd0 12488bfd_boolean
4ce794b7 12489ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12490{
12491 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12492
4dfe6ac6
NC
12493 if (htab == NULL)
12494 return FALSE;
12495
734b6cf9 12496 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12497 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12498 {
3d6f9012
AM
12499 /* This happens to make the list in reverse order,
12500 which is what we want. */
6f20ed8a
AM
12501 htab->sec_info[isec->id].u.list
12502 = htab->sec_info[isec->output_section->id].u.list;
12503 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12504 }
ad8e1ba5 12505
4c52953f 12506 if (htab->multi_toc_needed)
9b5ecbd0 12507 {
8b974ba3
AM
12508 /* Analyse sections that aren't already flagged as needing a
12509 valid toc pointer. Exclude .fixup for the linux kernel.
12510 .fixup contains branches, but only back to the function that
12511 hit an exception. */
12512 if (!(isec->has_toc_reloc
12513 || (isec->flags & SEC_CODE) == 0
12514 || strcmp (isec->name, ".fixup") == 0
12515 || isec->call_check_done))
12516 {
12517 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12518 return FALSE;
8b974ba3
AM
12519 }
12520 /* Make all sections use the TOC assigned for this object file.
12521 This will be wrong for pasted sections; We fix that in
12522 check_pasted_section(). */
12523 if (elf_gp (isec->owner) != 0)
12524 htab->toc_curr = elf_gp (isec->owner);
12525 }
12526
6f20ed8a 12527 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12528 return TRUE;
721956f4
AM
12529}
12530
70cc837d
AM
12531/* Check that all .init and .fini sections use the same toc, if they
12532 have toc relocs. */
12533
12534static bfd_boolean
12535check_pasted_section (struct bfd_link_info *info, const char *name)
12536{
12537 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12538
12539 if (o != NULL)
12540 {
12541 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12542 bfd_vma toc_off = 0;
12543 asection *i;
12544
12545 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12546 if (i->has_toc_reloc)
12547 {
12548 if (toc_off == 0)
6f20ed8a
AM
12549 toc_off = htab->sec_info[i->id].toc_off;
12550 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12551 return FALSE;
12552 }
6683a28d
AM
12553
12554 if (toc_off == 0)
12555 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12556 if (i->makes_toc_func_call)
12557 {
6f20ed8a 12558 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12559 break;
12560 }
12561
70cc837d
AM
12562 /* Make sure the whole pasted function uses the same toc offset. */
12563 if (toc_off != 0)
12564 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12565 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12566 }
12567 return TRUE;
12568}
12569
12570bfd_boolean
12571ppc64_elf_check_init_fini (struct bfd_link_info *info)
12572{
12573 return (check_pasted_section (info, ".init")
12574 & check_pasted_section (info, ".fini"));
12575}
12576
721956f4
AM
12577/* See whether we can group stub sections together. Grouping stub
12578 sections may result in fewer stubs. More importantly, we need to
12579 put all .init* and .fini* stubs at the beginning of the .init or
12580 .fini output sections respectively, because glibc splits the
12581 _init and _fini functions into multiple parts. Putting a stub in
12582 the middle of a function is not a good idea. */
12583
6f20ed8a
AM
12584static bfd_boolean
12585group_sections (struct bfd_link_info *info,
4ce794b7
AM
12586 bfd_size_type stub_group_size,
12587 bfd_boolean stubs_always_before_branch)
721956f4 12588{
6f20ed8a
AM
12589 struct ppc_link_hash_table *htab;
12590 asection *osec;
7c8fe5c4
AM
12591 bfd_boolean suppress_size_errors;
12592
6f20ed8a
AM
12593 htab = ppc_hash_table (info);
12594 if (htab == NULL)
12595 return FALSE;
12596
7c8fe5c4 12597 suppress_size_errors = FALSE;
7c8fe5c4
AM
12598 if (stub_group_size == 1)
12599 {
12600 /* Default values. */
12601 if (stubs_always_before_branch)
09f92717 12602 stub_group_size = 0x1e00000;
7c8fe5c4 12603 else
09f92717 12604 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12605 suppress_size_errors = TRUE;
12606 }
12607
6f20ed8a 12608 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12609 {
6f20ed8a
AM
12610 asection *tail;
12611
12612 if (osec->id >= htab->sec_info_arr_size)
12613 continue;
12614
12615 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12616 while (tail != NULL)
721956f4 12617 {
734b6cf9
AM
12618 asection *curr;
12619 asection *prev;
12620 bfd_size_type total;
12621 bfd_boolean big_sec;
12622 bfd_vma curr_toc;
6f20ed8a 12623 struct map_stub *group;
09f92717 12624 bfd_size_type group_size;
734b6cf9
AM
12625
12626 curr = tail;
eea6121a 12627 total = tail->size;
09f92717
AM
12628 group_size = (ppc64_elf_section_data (tail) != NULL
12629 && ppc64_elf_section_data (tail)->has_14bit_branch
12630 ? stub_group_size >> 10 : stub_group_size);
12631
12632 big_sec = total > group_size;
7c8fe5c4 12633 if (big_sec && !suppress_size_errors)
695344c0 12634 /* xgettext:c-format */
871b3ab2 12635 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12636 tail->owner, tail);
6f20ed8a 12637 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12638
6f20ed8a 12639 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12640 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12641 < (ppc64_elf_section_data (prev) != NULL
12642 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12643 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12644 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12645 curr = prev;
12646
12647 /* OK, the size from the start of CURR to the end is less
09f92717 12648 than group_size and thus can be handled by one stub
734b6cf9 12649 section. (or the tail section is itself larger than
09f92717
AM
12650 group_size, in which case we may be toast.) We should
12651 really be keeping track of the total size of stubs added
12652 here, as stubs contribute to the final output section
12653 size. That's a little tricky, and this way will only
12654 break if stubs added make the total size more than 2^25,
12655 ie. for the default stub_group_size, if stubs total more
12656 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12657 group = bfd_alloc (curr->owner, sizeof (*group));
12658 if (group == NULL)
12659 return FALSE;
12660 group->link_sec = curr;
12661 group->stub_sec = NULL;
a4b6fadd 12662 group->needs_save_res = 0;
df136d64
AM
12663 group->lr_restore = 0;
12664 group->eh_size = 0;
12665 group->eh_base = 0;
a4b6fadd
AM
12666 group->next = htab->group;
12667 htab->group = group;
734b6cf9 12668 do
721956f4 12669 {
6f20ed8a 12670 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12671 /* Set up this stub group. */
6f20ed8a 12672 htab->sec_info[tail->id].u.group = group;
721956f4 12673 }
734b6cf9
AM
12674 while (tail != curr && (tail = prev) != NULL);
12675
09f92717 12676 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12677 bytes before the stub section can be handled by it too.
12678 Don't do this if we have a really large section after the
12679 stubs, as adding more stubs increases the chance that
12680 branches may not reach into the stub section. */
12681 if (!stubs_always_before_branch && !big_sec)
12682 {
12683 total = 0;
12684 while (prev != NULL
12685 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12686 < (ppc64_elf_section_data (prev) != NULL
12687 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12688 ? (group_size = stub_group_size >> 10)
12689 : group_size))
6f20ed8a 12690 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12691 {
12692 tail = prev;
6f20ed8a
AM
12693 prev = htab->sec_info[tail->id].u.list;
12694 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12695 }
12696 }
12697 tail = prev;
721956f4
AM
12698 }
12699 }
6f20ed8a 12700 return TRUE;
721956f4
AM
12701}
12702
58d180e8
AM
12703static const unsigned char glink_eh_frame_cie[] =
12704{
12705 0, 0, 0, 16, /* length. */
12706 0, 0, 0, 0, /* id. */
12707 1, /* CIE version. */
12708 'z', 'R', 0, /* Augmentation string. */
12709 4, /* Code alignment. */
12710 0x78, /* Data alignment. */
12711 65, /* RA reg. */
12712 1, /* Augmentation size. */
12713 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12714 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12715};
12716
d969d15f
AM
12717/* Stripping output sections is normally done before dynamic section
12718 symbols have been allocated. This function is called later, and
12719 handles cases like htab->brlt which is mapped to its own output
12720 section. */
12721
12722static void
12723maybe_strip_output (struct bfd_link_info *info, asection *isec)
12724{
12725 if (isec->size == 0
12726 && isec->output_section->size == 0
53d8967a 12727 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12728 && !bfd_section_removed_from_list (info->output_bfd,
12729 isec->output_section)
12730 && elf_section_data (isec->output_section)->dynindx == 0)
12731 {
12732 isec->output_section->flags |= SEC_EXCLUDE;
12733 bfd_section_list_remove (info->output_bfd, isec->output_section);
12734 info->output_bfd->section_count--;
12735 }
12736}
12737
721956f4
AM
12738/* Determine and set the size of the stub section for a final link.
12739
12740 The basic idea here is to examine all the relocations looking for
12741 PC-relative calls to a target that is unreachable with a "bl"
12742 instruction. */
12743
b34976b6 12744bfd_boolean
e7d1c40c 12745ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12746{
12747 bfd_size_type stub_group_size;
b34976b6 12748 bfd_boolean stubs_always_before_branch;
721956f4
AM
12749 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12750
4dfe6ac6
NC
12751 if (htab == NULL)
12752 return FALSE;
12753
0e1862bb 12754 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12755 htab->params->plt_thread_safe = 1;
b9e5796b 12756 if (!htab->opd_abi)
e7d1c40c
AM
12757 htab->params->plt_thread_safe = 0;
12758 else if (htab->params->plt_thread_safe == -1)
794e51c0 12759 {
e2458743 12760 static const char *const thread_starter[] =
794e51c0
AM
12761 {
12762 "pthread_create",
12763 /* libstdc++ */
12764 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12765 /* librt */
12766 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12767 "mq_notify", "create_timer",
12768 /* libanl */
12769 "getaddrinfo_a",
12770 /* libgomp */
2300b5a1 12771 "GOMP_parallel",
794e51c0 12772 "GOMP_parallel_start",
2300b5a1 12773 "GOMP_parallel_loop_static",
794e51c0 12774 "GOMP_parallel_loop_static_start",
2300b5a1 12775 "GOMP_parallel_loop_dynamic",
794e51c0 12776 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12777 "GOMP_parallel_loop_guided",
794e51c0 12778 "GOMP_parallel_loop_guided_start",
2300b5a1 12779 "GOMP_parallel_loop_runtime",
794e51c0 12780 "GOMP_parallel_loop_runtime_start",
2300b5a1 12781 "GOMP_parallel_sections",
68ffbac6 12782 "GOMP_parallel_sections_start",
f9dffbf0
AM
12783 /* libgo */
12784 "__go_go",
794e51c0
AM
12785 };
12786 unsigned i;
12787
a4b6fadd 12788 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12789 {
12790 struct elf_link_hash_entry *h;
12791 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12792 FALSE, FALSE, TRUE);
e7d1c40c
AM
12793 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12794 if (htab->params->plt_thread_safe)
794e51c0
AM
12795 break;
12796 }
12797 }
e7d1c40c
AM
12798 stubs_always_before_branch = htab->params->group_size < 0;
12799 if (htab->params->group_size < 0)
12800 stub_group_size = -htab->params->group_size;
721956f4 12801 else
e7d1c40c 12802 stub_group_size = htab->params->group_size;
721956f4 12803
6f20ed8a
AM
12804 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12805 return FALSE;
721956f4 12806
c9301e31
AM
12807#define STUB_SHRINK_ITER 20
12808 /* Loop until no stubs added. After iteration 20 of this loop we may
12809 exit on a stub section shrinking. This is to break out of a
12810 pathological case where adding stubs on one iteration decreases
12811 section gaps (perhaps due to alignment), which then requires
12812 fewer or smaller stubs on the next iteration. */
12813
721956f4
AM
12814 while (1)
12815 {
12816 bfd *input_bfd;
12817 unsigned int bfd_indx;
a4b6fadd 12818 struct map_stub *group;
721956f4
AM
12819
12820 htab->stub_iteration += 1;
721956f4
AM
12821
12822 for (input_bfd = info->input_bfds, bfd_indx = 0;
12823 input_bfd != NULL;
c72f2fb2 12824 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12825 {
12826 Elf_Internal_Shdr *symtab_hdr;
12827 asection *section;
6cdc0ccc 12828 Elf_Internal_Sym *local_syms = NULL;
721956f4 12829
0c8d6e5c 12830 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12831 continue;
12832
721956f4 12833 /* We'll need the symbol table in a second. */
0ffa91dd 12834 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12835 if (symtab_hdr->sh_info == 0)
12836 continue;
12837
721956f4
AM
12838 /* Walk over each section attached to the input bfd. */
12839 for (section = input_bfd->sections;
12840 section != NULL;
12841 section = section->next)
12842 {
721956f4 12843 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12844
12845 /* If there aren't any relocs, then there's nothing more
12846 to do. */
12847 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12848 || (section->flags & SEC_ALLOC) == 0
12849 || (section->flags & SEC_LOAD) == 0
12850 || (section->flags & SEC_CODE) == 0
721956f4
AM
12851 || section->reloc_count == 0)
12852 continue;
12853
12854 /* If this section is a link-once section that will be
12855 discarded, then don't create any stubs. */
12856 if (section->output_section == NULL
927be08e 12857 || section->output_section->owner != info->output_bfd)
721956f4
AM
12858 continue;
12859
1e2f5b6e
AM
12860 /* Get the relocs. */
12861 internal_relocs
4ce794b7 12862 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12863 info->keep_memory);
721956f4 12864 if (internal_relocs == NULL)
1e2f5b6e 12865 goto error_ret_free_local;
721956f4
AM
12866
12867 /* Now examine each relocation. */
12868 irela = internal_relocs;
12869 irelaend = irela + section->reloc_count;
12870 for (; irela < irelaend; irela++)
12871 {
4ce794b7
AM
12872 enum elf_ppc64_reloc_type r_type;
12873 unsigned int r_indx;
721956f4
AM
12874 enum ppc_stub_type stub_type;
12875 struct ppc_stub_hash_entry *stub_entry;
8387904d 12876 asection *sym_sec, *code_sec;
e054468f 12877 bfd_vma sym_value, code_value;
721956f4 12878 bfd_vma destination;
6911b7dc 12879 unsigned long local_off;
8843416a 12880 bfd_boolean ok_dest;
721956f4 12881 struct ppc_link_hash_entry *hash;
8387904d 12882 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12883 struct elf_link_hash_entry *h;
12884 Elf_Internal_Sym *sym;
721956f4
AM
12885 char *stub_name;
12886 const asection *id_sec;
74f0fb50 12887 struct _opd_sec_data *opd;
e054468f 12888 struct plt_entry *plt_ent;
721956f4
AM
12889
12890 r_type = ELF64_R_TYPE (irela->r_info);
12891 r_indx = ELF64_R_SYM (irela->r_info);
12892
4ce794b7 12893 if (r_type >= R_PPC64_max)
721956f4
AM
12894 {
12895 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12896 goto error_ret_free_internal;
721956f4
AM
12897 }
12898
12899 /* Only look for stubs on branch instructions. */
4ce794b7 12900 if (r_type != R_PPC64_REL24
05d0e962 12901 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12902 && r_type != R_PPC64_REL14
12903 && r_type != R_PPC64_REL14_BRTAKEN
12904 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12905 continue;
12906
12907 /* Now determine the call target, its name, value,
12908 section. */
411e1bfb
AM
12909 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12910 r_indx, input_bfd))
12911 goto error_ret_free_internal;
12912 hash = (struct ppc_link_hash_entry *) h;
12913
8843416a 12914 ok_dest = FALSE;
8387904d 12915 fdh = NULL;
7fe2b9a6 12916 sym_value = 0;
411e1bfb 12917 if (hash == NULL)
721956f4 12918 {
411e1bfb 12919 sym_value = sym->st_value;
c27b8c2a
AM
12920 if (sym_sec != NULL
12921 && sym_sec->output_section != NULL)
12922 ok_dest = TRUE;
721956f4 12923 }
7fe2b9a6
AM
12924 else if (hash->elf.root.type == bfd_link_hash_defined
12925 || hash->elf.root.type == bfd_link_hash_defweak)
12926 {
12927 sym_value = hash->elf.root.u.def.value;
12928 if (sym_sec->output_section != NULL)
12929 ok_dest = TRUE;
12930 }
12931 else if (hash->elf.root.type == bfd_link_hash_undefweak
12932 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12933 {
99877b66 12934 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12935 use the func descriptor sym instead if it is
12936 defined. */
ceb1f1ef 12937 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12938 && hash->oh != NULL)
8387904d 12939 {
8c5b4e52 12940 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12941 if (fdh->elf.root.type == bfd_link_hash_defined
12942 || fdh->elf.root.type == bfd_link_hash_defweak)
12943 {
12944 sym_sec = fdh->elf.root.u.def.section;
12945 sym_value = fdh->elf.root.u.def.value;
12946 if (sym_sec->output_section != NULL)
12947 ok_dest = TRUE;
12948 }
99877b66
AM
12949 else
12950 fdh = NULL;
8387904d 12951 }
7fe2b9a6
AM
12952 }
12953 else
12954 {
12955 bfd_set_error (bfd_error_bad_value);
12956 goto error_ret_free_internal;
721956f4
AM
12957 }
12958
8843416a 12959 destination = 0;
6911b7dc 12960 local_off = 0;
8843416a
AM
12961 if (ok_dest)
12962 {
12963 sym_value += irela->r_addend;
12964 destination = (sym_value
12965 + sym_sec->output_offset
12966 + sym_sec->output_section->vma);
6911b7dc
AM
12967 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12968 ? hash->elf.other
12969 : sym->st_other);
8843416a
AM
12970 }
12971
8387904d 12972 code_sec = sym_sec;
e054468f 12973 code_value = sym_value;
74f0fb50
AM
12974 opd = get_opd_info (sym_sec);
12975 if (opd != NULL)
8387904d
AM
12976 {
12977 bfd_vma dest;
12978
74f0fb50 12979 if (hash == NULL && opd->adjust != NULL)
8387904d 12980 {
51aecdc5 12981 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12982 if (adjust == -1)
12983 continue;
e054468f 12984 code_value += adjust;
8387904d
AM
12985 sym_value += adjust;
12986 }
12987 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12988 &code_sec, &code_value, FALSE);
8387904d
AM
12989 if (dest != (bfd_vma) -1)
12990 {
12991 destination = dest;
12992 if (fdh != NULL)
12993 {
12994 /* Fixup old ABI sym to point at code
12995 entry. */
99877b66 12996 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12997 hash->elf.root.u.def.section = code_sec;
e054468f 12998 hash->elf.root.u.def.value = code_value;
8387904d
AM
12999 }
13000 }
13001 }
13002
721956f4 13003 /* Determine what (if any) linker stub is needed. */
e054468f 13004 plt_ent = NULL;
721956f4 13005 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13006 &plt_ent, destination,
13007 local_off);
ad8e1ba5 13008
05d0e962
AM
13009 if (r_type == R_PPC64_REL24_NOTOC)
13010 {
13011 if (stub_type == ppc_stub_plt_call)
13012 stub_type = ppc_stub_plt_call_notoc;
13013 else if (stub_type == ppc_stub_long_branch
13014 || (code_sec != NULL
13015 && code_sec->output_section != NULL
13016 && (((hash ? hash->elf.other : sym->st_other)
13017 & STO_PPC64_LOCAL_MASK)
4a4e7361 13018 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13019 stub_type = ppc_stub_long_branch_notoc;
13020 }
13021 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13022 {
13023 /* Check whether we need a TOC adjusting stub.
13024 Since the linker pastes together pieces from
13025 different object files when creating the
13026 _init and _fini functions, it may be that a
13027 call to what looks like a local sym is in
13028 fact a call needing a TOC adjustment. */
33cb30a1
AM
13029 if ((code_sec != NULL
13030 && code_sec->output_section != NULL
13031 && (htab->sec_info[code_sec->id].toc_off
13032 != htab->sec_info[section->id].toc_off)
13033 && (code_sec->has_toc_reloc
13034 || code_sec->makes_toc_func_call))
13035 || (((hash ? hash->elf.other : sym->st_other)
13036 & STO_PPC64_LOCAL_MASK)
13037 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13038 stub_type = ppc_stub_long_branch_r2off;
13039 }
13040
721956f4
AM
13041 if (stub_type == ppc_stub_none)
13042 continue;
13043
411e1bfb
AM
13044 /* __tls_get_addr calls might be eliminated. */
13045 if (stub_type != ppc_stub_plt_call
05d0e962 13046 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13047 && hash != NULL
8387904d
AM
13048 && (hash == htab->tls_get_addr
13049 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
13050 && section->has_tls_reloc
13051 && irela != internal_relocs)
13052 {
13053 /* Get tls info. */
f961d9dd 13054 unsigned char *tls_mask;
411e1bfb 13055
3a71aa26 13056 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13057 irela - 1, input_bfd))
13058 goto error_ret_free_internal;
37da22e5 13059 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
13060 continue;
13061 }
13062
f378ab09 13063 if (stub_type == ppc_stub_plt_call)
794e51c0 13064 {
6e1816be
AM
13065 if (!htab->opd_abi
13066 && htab->params->plt_localentry0 != 0
13067 && is_elfv2_localentry0 (&hash->elf))
13068 htab->has_plt_localentry0 = 1;
13069 else if (irela + 1 < irelaend
13070 && irela[1].r_offset == irela->r_offset + 4
13071 && (ELF64_R_TYPE (irela[1].r_info)
13072 == R_PPC64_TOCSAVE))
f378ab09
AM
13073 {
13074 if (!tocsave_find (htab, INSERT,
13075 &local_syms, irela + 1, input_bfd))
13076 goto error_ret_free_internal;
13077 }
f378ab09
AM
13078 else
13079 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13080 }
3b421ab3 13081
721956f4 13082 /* Support for grouping stub sections. */
6f20ed8a 13083 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13084
13085 /* Get the name of this stub. */
13086 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13087 if (!stub_name)
13088 goto error_ret_free_internal;
13089
13090 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13091 stub_name, FALSE, FALSE);
721956f4
AM
13092 if (stub_entry != NULL)
13093 {
05d0e962
AM
13094 enum ppc_stub_type old_type;
13095 /* A stub has already been created, but it may
13096 not be the required type. We shouldn't be
13097 transitioning from plt_call to long_branch
13098 stubs or vice versa, but we might be
13099 upgrading from plt_call to plt_call_r2save or
13100 from long_branch to long_branch_r2off. */
721956f4 13101 free (stub_name);
05d0e962
AM
13102 old_type = stub_entry->stub_type;
13103 switch (old_type)
13104 {
13105 default:
13106 abort ();
13107
13108 case ppc_stub_save_res:
13109 continue;
13110
13111 case ppc_stub_plt_call:
13112 case ppc_stub_plt_call_r2save:
13113 case ppc_stub_plt_call_notoc:
13114 case ppc_stub_plt_call_both:
13115 if (stub_type == ppc_stub_plt_call)
13116 continue;
13117 else if (stub_type == ppc_stub_plt_call_r2save)
13118 {
13119 if (old_type == ppc_stub_plt_call_notoc)
13120 stub_type = ppc_stub_plt_call_both;
13121 }
13122 else if (stub_type == ppc_stub_plt_call_notoc)
13123 {
13124 if (old_type == ppc_stub_plt_call_r2save)
13125 stub_type = ppc_stub_plt_call_both;
13126 }
13127 else
13128 abort ();
13129 break;
13130
13131 case ppc_stub_plt_branch:
13132 case ppc_stub_plt_branch_r2off:
13133 case ppc_stub_plt_branch_notoc:
13134 case ppc_stub_plt_branch_both:
13135 old_type += (ppc_stub_long_branch
13136 - ppc_stub_plt_branch);
13137 /* Fall through. */
13138 case ppc_stub_long_branch:
13139 case ppc_stub_long_branch_r2off:
13140 case ppc_stub_long_branch_notoc:
13141 case ppc_stub_long_branch_both:
13142 if (stub_type == ppc_stub_long_branch)
13143 continue;
13144 else if (stub_type == ppc_stub_long_branch_r2off)
13145 {
13146 if (old_type == ppc_stub_long_branch_notoc)
13147 stub_type = ppc_stub_long_branch_both;
13148 }
13149 else if (stub_type == ppc_stub_long_branch_notoc)
13150 {
13151 if (old_type == ppc_stub_long_branch_r2off)
13152 stub_type = ppc_stub_long_branch_both;
13153 }
13154 else
13155 abort ();
13156 break;
13157 }
13158 if (old_type < stub_type)
794e51c0 13159 stub_entry->stub_type = stub_type;
721956f4
AM
13160 continue;
13161 }
13162
25f53a85 13163 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13164 if (stub_entry == NULL)
13165 {
13166 free (stub_name);
6cdc0ccc
AM
13167 error_ret_free_internal:
13168 if (elf_section_data (section)->relocs == NULL)
13169 free (internal_relocs);
13170 error_ret_free_local:
13171 if (local_syms != NULL
13172 && (symtab_hdr->contents
13173 != (unsigned char *) local_syms))
13174 free (local_syms);
b34976b6 13175 return FALSE;
721956f4
AM
13176 }
13177
ad8e1ba5 13178 stub_entry->stub_type = stub_type;
05d0e962
AM
13179 if (stub_type >= ppc_stub_plt_call
13180 && stub_type <= ppc_stub_plt_call_both)
e054468f 13181 {
05d0e962
AM
13182 stub_entry->target_value = sym_value;
13183 stub_entry->target_section = sym_sec;
e054468f
AM
13184 }
13185 else
13186 {
05d0e962
AM
13187 stub_entry->target_value = code_value;
13188 stub_entry->target_section = code_sec;
e054468f 13189 }
721956f4 13190 stub_entry->h = hash;
e054468f 13191 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13192 stub_entry->symtype
13193 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13194 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13195
3d58e1fc
AM
13196 if (hash != NULL
13197 && (hash->elf.root.type == bfd_link_hash_defined
13198 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13199 htab->stub_globals += 1;
721956f4
AM
13200 }
13201
13202 /* We're done with the internal relocs, free them. */
6cdc0ccc 13203 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13204 free (internal_relocs);
721956f4 13205 }
6cdc0ccc
AM
13206
13207 if (local_syms != NULL
13208 && symtab_hdr->contents != (unsigned char *) local_syms)
13209 {
13210 if (!info->keep_memory)
13211 free (local_syms);
13212 else
13213 symtab_hdr->contents = (unsigned char *) local_syms;
13214 }
721956f4
AM
13215 }
13216
5c3dead3 13217 /* We may have added some stubs. Find out the new size of the
721956f4 13218 stub sections. */
d4aaa2a0 13219 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13220 {
13221 group->lr_restore = 0;
13222 group->eh_size = 0;
13223 if (group->stub_sec != NULL)
13224 {
13225 asection *stub_sec = group->stub_sec;
13226
13227 if (htab->stub_iteration <= STUB_SHRINK_ITER
13228 || stub_sec->rawsize < stub_sec->size)
13229 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13230 stub_sec->rawsize = stub_sec->size;
13231 stub_sec->size = 0;
13232 stub_sec->reloc_count = 0;
13233 stub_sec->flags &= ~SEC_RELOC;
13234 }
13235 }
eea6121a 13236
ba21f564
AM
13237 if (htab->stub_iteration <= STUB_SHRINK_ITER
13238 || htab->brlt->rawsize < htab->brlt->size)
13239 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13240 htab->brlt->size = 0;
84f5d08e
AM
13241 htab->brlt->reloc_count = 0;
13242 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13243 if (htab->relbrlt != NULL)
eea6121a 13244 htab->relbrlt->size = 0;
721956f4 13245
63bc6f6c 13246 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13247
a4b6fadd
AM
13248 for (group = htab->group; group != NULL; group = group->next)
13249 if (group->needs_save_res)
13250 group->stub_sec->size += htab->sfpr->size;
13251
176a0d42
AM
13252 if (info->emitrelocations
13253 && htab->glink != NULL && htab->glink->size != 0)
13254 {
13255 htab->glink->reloc_count = 1;
13256 htab->glink->flags |= SEC_RELOC;
13257 }
13258
58d180e8
AM
13259 if (htab->glink_eh_frame != NULL
13260 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13261 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13262 {
2e0ce1c8 13263 size_t size = 0, align = 4;
58d180e8 13264
d4aaa2a0 13265 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13266 if (group->eh_size != 0)
13267 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13268 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13269 size += (24 + align - 1) & -align;
58d180e8 13270 if (size != 0)
2e0ce1c8
AM
13271 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13272 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13273 size = (size + align - 1) & -align;
58d180e8
AM
13274 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13275 htab->glink_eh_frame->size = size;
13276 }
13277
e7d1c40c 13278 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13279 for (group = htab->group; group != NULL; group = group->next)
13280 if (group->stub_sec != NULL)
691d2e9a
AM
13281 {
13282 int align = abs (htab->params->plt_stub_align);
13283 group->stub_sec->size
13284 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13285 }
d4aaa2a0
AM
13286
13287 for (group = htab->group; group != NULL; group = group->next)
13288 if (group->stub_sec != NULL
13289 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13290 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13291 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13292 break;
13293
d4aaa2a0 13294 if (group == NULL
ba21f564
AM
13295 && (htab->brlt->rawsize == htab->brlt->size
13296 || (htab->stub_iteration > STUB_SHRINK_ITER
13297 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13298 && (htab->glink_eh_frame == NULL
13299 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13300 break;
13301
721956f4 13302 /* Ask the linker to do its stuff. */
e7d1c40c 13303 (*htab->params->layout_sections_again) ();
721956f4
AM
13304 }
13305
da44f4e5
AM
13306 if (htab->glink_eh_frame != NULL
13307 && htab->glink_eh_frame->size != 0)
13308 {
13309 bfd_vma val;
13310 bfd_byte *p, *last_fde;
13311 size_t last_fde_len, size, align, pad;
d4aaa2a0 13312 struct map_stub *group;
da44f4e5 13313
df136d64
AM
13314 /* It is necessary to at least have a rough outline of the
13315 linker generated CIEs and FDEs written before
13316 bfd_elf_discard_info is run, in order for these FDEs to be
13317 indexed in .eh_frame_hdr. */
da44f4e5
AM
13318 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13319 if (p == NULL)
13320 return FALSE;
13321 htab->glink_eh_frame->contents = p;
13322 last_fde = p;
2e0ce1c8 13323 align = 4;
da44f4e5
AM
13324
13325 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13326 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13327 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13328 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13329 p += last_fde_len + 4;
da44f4e5 13330
d4aaa2a0 13331 for (group = htab->group; group != NULL; group = group->next)
df136d64 13332 if (group->eh_size != 0)
da44f4e5 13333 {
df136d64 13334 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13335 last_fde = p;
df136d64 13336 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13337 /* FDE length. */
2e0ce1c8 13338 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13339 p += 4;
13340 /* CIE pointer. */
13341 val = p - htab->glink_eh_frame->contents;
13342 bfd_put_32 (htab->elf.dynobj, val, p);
13343 p += 4;
13344 /* Offset to stub section, written later. */
13345 p += 4;
13346 /* stub section size. */
d4aaa2a0 13347 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13348 p += 4;
13349 /* Augmentation. */
13350 p += 1;
df136d64
AM
13351 /* Make sure we don't have all nops. This is enough for
13352 elf-eh-frame.c to detect the last non-nop opcode. */
13353 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13354 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13355 }
13356 if (htab->glink != NULL && htab->glink->size != 0)
13357 {
13358 last_fde = p;
2e0ce1c8 13359 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13360 /* FDE length. */
2e0ce1c8 13361 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13362 p += 4;
13363 /* CIE pointer. */
13364 val = p - htab->glink_eh_frame->contents;
13365 bfd_put_32 (htab->elf.dynobj, val, p);
13366 p += 4;
13367 /* Offset to .glink, written later. */
13368 p += 4;
13369 /* .glink size. */
13370 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13371 p += 4;
13372 /* Augmentation. */
13373 p += 1;
13374
13375 *p++ = DW_CFA_advance_loc + 1;
13376 *p++ = DW_CFA_register;
13377 *p++ = 65;
9f08fa5c 13378 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13379 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13380 *p++ = DW_CFA_restore_extended;
13381 *p++ = 65;
2e0ce1c8 13382 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13383 }
13384 /* Subsume any padding into the last FDE if user .eh_frame
13385 sections are aligned more than glink_eh_frame. Otherwise any
13386 zero padding will be seen as a terminator. */
2e0ce1c8 13387 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13388 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13389 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13390 htab->glink_eh_frame->size = size + pad;
13391 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13392 }
13393
d969d15f
AM
13394 maybe_strip_output (info, htab->brlt);
13395 if (htab->glink_eh_frame != NULL)
13396 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13397
b34976b6 13398 return TRUE;
721956f4
AM
13399}
13400
13401/* Called after we have determined section placement. If sections
805fc799 13402 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13403
805fc799 13404bfd_vma
1c865ab2 13405ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13406{
805fc799 13407 asection *s;
a27e685f 13408 bfd_vma TOCstart, adjust;
721956f4 13409
43417696
AM
13410 if (info != NULL)
13411 {
13412 struct elf_link_hash_entry *h;
13413 struct elf_link_hash_table *htab = elf_hash_table (info);
13414
13415 if (is_elf_hash_table (htab)
13416 && htab->hgot != NULL)
13417 h = htab->hgot;
13418 else
13419 {
13420 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13421 if (is_elf_hash_table (htab))
13422 htab->hgot = h;
13423 }
13424 if (h != NULL
13425 && h->root.type == bfd_link_hash_defined
13426 && !h->root.linker_def
13427 && (!is_elf_hash_table (htab)
13428 || h->def_regular))
13429 {
13430 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13431 + h->root.u.def.section->output_offset
13432 + h->root.u.def.section->output_section->vma);
13433 _bfd_set_gp_value (obfd, TOCstart);
13434 return TOCstart;
13435 }
13436 }
13437
805fc799
AM
13438 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13439 order. The TOC starts where the first of these sections starts. */
13440 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13441 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13442 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13443 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13444 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13445 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13446 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13447 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13448 {
13449 /* This may happen for
13450 o references to TOC base (SYM@toc / TOC[tc0]) without a
13451 .toc directive
13452 o bad linker script
13453 o --gc-sections and empty TOC sections
13454
13455 FIXME: Warn user? */
13456
13457 /* Look for a likely section. We probably won't even be
13458 using TOCstart. */
13459 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13460 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13461 | SEC_EXCLUDE))
805fc799
AM
13462 == (SEC_ALLOC | SEC_SMALL_DATA))
13463 break;
721956f4 13464 if (s == NULL)
805fc799 13465 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13466 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13467 == (SEC_ALLOC | SEC_SMALL_DATA))
13468 break;
721956f4 13469 if (s == NULL)
805fc799 13470 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13471 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13472 == SEC_ALLOC)
805fc799 13473 break;
721956f4 13474 if (s == NULL)
805fc799 13475 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13476 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13477 break;
13478 }
721956f4 13479
805fc799
AM
13480 TOCstart = 0;
13481 if (s != NULL)
13482 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13483
a27e685f
AM
13484 /* Force alignment. */
13485 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13486 TOCstart -= adjust;
1c865ab2
AM
13487 _bfd_set_gp_value (obfd, TOCstart);
13488
810d4e75 13489 if (info != NULL && s != NULL)
1c865ab2
AM
13490 {
13491 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13492
810d4e75
AM
13493 if (htab != NULL)
13494 {
13495 if (htab->elf.hgot != NULL)
13496 {
a27e685f 13497 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13498 htab->elf.hgot->root.u.def.section = s;
13499 }
13500 }
13501 else
1c865ab2 13502 {
810d4e75
AM
13503 struct bfd_link_hash_entry *bh = NULL;
13504 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13505 s, TOC_BASE_OFF - adjust,
13506 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13507 }
13508 }
805fc799 13509 return TOCstart;
721956f4
AM
13510}
13511
a345bc8d 13512/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13513 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13514
13515static bfd_boolean
49c09209 13516build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13517{
13518 struct bfd_link_info *info;
13519 struct ppc_link_hash_table *htab;
49c09209 13520 struct plt_entry *ent;
a345bc8d
AM
13521 asection *s;
13522
13523 if (h->root.type == bfd_link_hash_indirect)
13524 return TRUE;
13525
49c09209
AM
13526 info = inf;
13527 htab = ppc_hash_table (info);
13528 if (htab == NULL)
13529 return FALSE;
13530
13531 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13532 if (ent->plt.offset != (bfd_vma) -1)
13533 {
13534 /* This symbol has an entry in the procedure linkage
13535 table. Set it up. */
13536 Elf_Internal_Rela rela;
2d7ad24e 13537 asection *plt, *relplt;
49c09209
AM
13538 bfd_byte *loc;
13539
13540 if (!htab->elf.dynamic_sections_created
13541 || h->dynindx == -1)
13542 {
13543 if (!(h->def_regular
13544 && (h->root.type == bfd_link_hash_defined
13545 || h->root.type == bfd_link_hash_defweak)))
13546 continue;
2d7ad24e
AM
13547 if (h->type == STT_GNU_IFUNC)
13548 {
13549 plt = htab->elf.iplt;
13550 relplt = htab->elf.irelplt;
13551 htab->local_ifunc_resolver = 1;
13552 if (htab->opd_abi)
13553 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13554 else
13555 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13556 }
49c09209 13557 else
2d7ad24e
AM
13558 {
13559 plt = htab->pltlocal;
13560 if (bfd_link_pic (info))
13561 {
13562 relplt = htab->relpltlocal;
13563 if (htab->opd_abi)
13564 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13565 else
13566 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13567 }
13568 else
13569 relplt = NULL;
13570 }
49c09209
AM
13571 rela.r_addend = (h->root.u.def.value
13572 + h->root.u.def.section->output_offset
13573 + h->root.u.def.section->output_section->vma
13574 + ent->addend);
2d7ad24e
AM
13575
13576 if (relplt == NULL)
13577 {
13578 loc = plt->contents + ent->plt.offset;
13579 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13580 if (htab->opd_abi)
13581 {
13582 bfd_vma toc = elf_gp (info->output_bfd);
13583 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13584 bfd_put_64 (info->output_bfd, toc, loc + 8);
13585 }
13586 }
13587 else
13588 {
13589 rela.r_offset = (plt->output_section->vma
13590 + plt->output_offset
13591 + ent->plt.offset);
13592 loc = relplt->contents + (relplt->reloc_count++
13593 * sizeof (Elf64_External_Rela));
13594 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13595 }
49c09209
AM
13596 }
13597 else
13598 {
13599 rela.r_offset = (htab->elf.splt->output_section->vma
13600 + htab->elf.splt->output_offset
13601 + ent->plt.offset);
13602 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13603 rela.r_addend = ent->addend;
13604 loc = (htab->elf.srelplt->contents
13605 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13606 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13607 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13608 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13609 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13610 }
49c09209
AM
13611 }
13612
a345bc8d
AM
13613 if (!h->pointer_equality_needed)
13614 return TRUE;
13615
13616 if (h->def_regular)
13617 return TRUE;
13618
9e390558 13619 s = htab->global_entry;
49c09209
AM
13620 if (s == NULL || s->size == 0)
13621 return TRUE;
13622
13623 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13624 if (ent->plt.offset != (bfd_vma) -1
13625 && ent->addend == 0)
a345bc8d
AM
13626 {
13627 bfd_byte *p;
13628 asection *plt;
13629 bfd_vma off;
13630
a345bc8d 13631 p = s->contents + h->root.u.def.value;
33e44f2e 13632 plt = htab->elf.splt;
a345bc8d
AM
13633 if (!htab->elf.dynamic_sections_created
13634 || h->dynindx == -1)
2d7ad24e
AM
13635 {
13636 if (h->type == STT_GNU_IFUNC)
13637 plt = htab->elf.iplt;
13638 else
13639 plt = htab->pltlocal;
13640 }
49c09209 13641 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13642 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13643
13644 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13645 {
13646 info->callbacks->einfo
c1c8c1ef 13647 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13648 h->root.root.string);
13649 bfd_set_error (bfd_error_bad_value);
13650 htab->stub_error = TRUE;
13651 }
13652
7341d5e2
AM
13653 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13654 if (htab->params->emit_stub_syms)
13655 {
13656 size_t len = strlen (h->root.root.string);
13657 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13658
13659 if (name == NULL)
13660 return FALSE;
13661
13662 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13663 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13664 if (h == NULL)
13665 return FALSE;
13666 if (h->root.type == bfd_link_hash_new)
13667 {
13668 h->root.type = bfd_link_hash_defined;
13669 h->root.u.def.section = s;
13670 h->root.u.def.value = p - s->contents;
13671 h->ref_regular = 1;
13672 h->def_regular = 1;
13673 h->ref_regular_nonweak = 1;
13674 h->forced_local = 1;
13675 h->non_elf = 0;
2ec55de3 13676 h->root.linker_def = 1;
7341d5e2
AM
13677 }
13678 }
13679
a345bc8d
AM
13680 if (PPC_HA (off) != 0)
13681 {
13682 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13683 p += 4;
13684 }
13685 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13686 p += 4;
13687 bfd_put_32 (s->owner, MTCTR_R12, p);
13688 p += 4;
407aa07c 13689 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13690 break;
13691 }
13692 return TRUE;
13693}
13694
49c09209
AM
13695/* Write PLT relocs for locals. */
13696
13697static bfd_boolean
13698write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13699{
13700 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13701 bfd *ibfd;
13702
13703 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13704 {
13705 struct got_entry **lgot_ents, **end_lgot_ents;
13706 struct plt_entry **local_plt, **lplt, **end_local_plt;
13707 Elf_Internal_Shdr *symtab_hdr;
13708 bfd_size_type locsymcount;
13709 Elf_Internal_Sym *local_syms = NULL;
13710 struct plt_entry *ent;
13711
13712 if (!is_ppc64_elf (ibfd))
13713 continue;
13714
13715 lgot_ents = elf_local_got_ents (ibfd);
13716 if (!lgot_ents)
13717 continue;
13718
13719 symtab_hdr = &elf_symtab_hdr (ibfd);
13720 locsymcount = symtab_hdr->sh_info;
13721 end_lgot_ents = lgot_ents + locsymcount;
13722 local_plt = (struct plt_entry **) end_lgot_ents;
13723 end_local_plt = local_plt + locsymcount;
13724 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13725 for (ent = *lplt; ent != NULL; ent = ent->next)
13726 if (ent->plt.offset != (bfd_vma) -1)
13727 {
13728 Elf_Internal_Sym *sym;
13729 asection *sym_sec;
13730 asection *plt, *relplt;
13731 bfd_byte *loc;
13732 bfd_vma val;
49c09209
AM
13733
13734 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13735 lplt - local_plt, ibfd))
13736 {
13737 if (local_syms != NULL
13738 && symtab_hdr->contents != (unsigned char *) local_syms)
13739 free (local_syms);
13740 return FALSE;
13741 }
13742
13743 val = sym->st_value + ent->addend;
ba85c15d
AM
13744 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13745 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
13746 if (sym_sec != NULL && sym_sec->output_section != NULL)
13747 val += sym_sec->output_offset + sym_sec->output_section->vma;
13748
2d7ad24e
AM
13749 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13750 {
13751 htab->local_ifunc_resolver = 1;
13752 plt = htab->elf.iplt;
13753 relplt = htab->elf.irelplt;
13754 }
13755 else
13756 {
13757 plt = htab->pltlocal;
13758 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13759 }
49c09209 13760
2d7ad24e
AM
13761 if (relplt == NULL)
13762 {
13763 loc = plt->contents + ent->plt.offset;
13764 bfd_put_64 (info->output_bfd, val, loc);
13765 if (htab->opd_abi)
13766 {
13767 bfd_vma toc = elf_gp (ibfd);
13768 bfd_put_64 (info->output_bfd, toc, loc + 8);
13769 }
13770 }
49c09209 13771 else
2d7ad24e
AM
13772 {
13773 Elf_Internal_Rela rela;
13774 rela.r_offset = (ent->plt.offset
13775 + plt->output_offset
13776 + plt->output_section->vma);
13777 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13778 {
13779 if (htab->opd_abi)
13780 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13781 else
13782 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13783 }
13784 else
13785 {
13786 if (htab->opd_abi)
13787 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13788 else
13789 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13790 }
13791 rela.r_addend = val;
13792 loc = relplt->contents + (relplt->reloc_count++
13793 * sizeof (Elf64_External_Rela));
13794 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13795 }
49c09209
AM
13796 }
13797
13798 if (local_syms != NULL
13799 && symtab_hdr->contents != (unsigned char *) local_syms)
13800 {
13801 if (!info->keep_memory)
13802 free (local_syms);
13803 else
13804 symtab_hdr->contents = (unsigned char *) local_syms;
13805 }
13806 }
13807 return TRUE;
13808}
13809
721956f4
AM
13810/* Build all the stubs associated with the current output file.
13811 The stubs are kept in a hash table attached to the main linker
13812 hash table. This function is called via gldelf64ppc_finish. */
13813
b34976b6 13814bfd_boolean
e7d1c40c 13815ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13816 char **stats)
5d1634d7
AM
13817{
13818 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13819 struct map_stub *group;
721956f4 13820 asection *stub_sec;
5d1634d7 13821 bfd_byte *p;
e717da7e 13822 int stub_sec_count = 0;
5d1634d7 13823
4dfe6ac6
NC
13824 if (htab == NULL)
13825 return FALSE;
13826
eea6121a 13827 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 13828 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13829 {
13830 group->eh_size = 0;
13831 group->lr_restore = 0;
13832 if ((stub_sec = group->stub_sec) != NULL
13833 && stub_sec->size != 0)
13834 {
13835 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13836 stub_sec->size);
13837 if (stub_sec->contents == NULL)
13838 return FALSE;
13839 stub_sec->size = 0;
13840 }
13841 }
5d1634d7 13842
23eb7e01 13843 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13844 {
9f951329 13845 unsigned int indx;
ad8e1ba5 13846 bfd_vma plt0;
9f951329 13847
721956f4 13848 /* Build the .glink plt call stub. */
e7d1c40c 13849 if (htab->params->emit_stub_syms)
97b639ba
AM
13850 {
13851 struct elf_link_hash_entry *h;
468392fb
AM
13852 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13853 TRUE, FALSE, FALSE);
97b639ba
AM
13854 if (h == NULL)
13855 return FALSE;
13856 if (h->root.type == bfd_link_hash_new)
13857 {
13858 h->root.type = bfd_link_hash_defined;
13859 h->root.u.def.section = htab->glink;
ee4bf8d2 13860 h->root.u.def.value = 8;
f5385ebf
AM
13861 h->ref_regular = 1;
13862 h->def_regular = 1;
13863 h->ref_regular_nonweak = 1;
13864 h->forced_local = 1;
13865 h->non_elf = 0;
2ec55de3 13866 h->root.linker_def = 1;
97b639ba
AM
13867 }
13868 }
33e44f2e
AM
13869 plt0 = (htab->elf.splt->output_section->vma
13870 + htab->elf.splt->output_offset
13871 - 16);
176a0d42
AM
13872 if (info->emitrelocations)
13873 {
13874 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13875 if (r == NULL)
13876 return FALSE;
13877 r->r_offset = (htab->glink->output_offset
13878 + htab->glink->output_section->vma);
13879 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13880 r->r_addend = plt0;
13881 }
4ce794b7 13882 p = htab->glink->contents;
176a0d42 13883 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13884 bfd_put_64 (htab->glink->owner, plt0, p);
13885 p += 8;
b9e5796b
AM
13886 if (htab->opd_abi)
13887 {
13888 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13889 p += 4;
13890 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13891 p += 4;
13892 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13893 p += 4;
13894 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13895 p += 4;
13896 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13897 p += 4;
13898 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13899 p += 4;
13900 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13901 p += 4;
13902 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13903 p += 4;
13904 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13905 p += 4;
13906 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13907 p += 4;
13908 }
13909 else
13910 {
13911 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13912 p += 4;
13913 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13914 p += 4;
13915 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13916 p += 4;
f378ab09
AM
13917 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13918 p += 4;
b9e5796b
AM
13919 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13920 p += 4;
13921 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13922 p += 4;
13923 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13924 p += 4;
13925 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13926 p += 4;
13927 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13928 p += 4;
13929 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13930 p += 4;
13931 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13932 p += 4;
13933 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13934 p += 4;
13935 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13936 p += 4;
13937 }
407aa07c
AM
13938 bfd_put_32 (htab->glink->owner, BCTR, p);
13939 p += 4;
c75bc4f7 13940 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13941
9f951329
AM
13942 /* Build the .glink lazy link call stubs. */
13943 indx = 0;
9e390558 13944 while (p < htab->glink->contents + htab->glink->size)
9f951329 13945 {
b9e5796b 13946 if (htab->opd_abi)
9f951329 13947 {
b9e5796b
AM
13948 if (indx < 0x8000)
13949 {
13950 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13951 p += 4;
13952 }
13953 else
13954 {
13955 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13956 p += 4;
13957 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13958 p);
13959 p += 4;
13960 }
9f951329 13961 }
4ce794b7 13962 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13963 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13964 indx++;
9f951329
AM
13965 p += 4;
13966 }
5d1634d7 13967 }
5d1634d7 13968
49c09209
AM
13969 /* Build .glink global entry stubs, and PLT relocs for globals. */
13970 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13971
13972 if (!write_plt_relocs_for_local_syms (info))
13973 return FALSE;
9e390558 13974
7341d5e2 13975 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13976 {
4ce794b7 13977 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13978 htab->brlt->size);
4ce794b7 13979 if (htab->brlt->contents == NULL)
b34976b6 13980 return FALSE;
721956f4 13981 }
ee75fd95 13982 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13983 {
13984 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13985 htab->relbrlt->size);
63bc6f6c
AM
13986 if (htab->relbrlt->contents == NULL)
13987 return FALSE;
13988 }
5d1634d7 13989
721956f4
AM
13990 /* Build the stubs as directed by the stub hash table. */
13991 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13992
a4b6fadd
AM
13993 for (group = htab->group; group != NULL; group = group->next)
13994 if (group->needs_save_res)
7dda8d3c 13995 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13996
aa8a7074
AM
13997 if (htab->relbrlt != NULL)
13998 htab->relbrlt->reloc_count = 0;
13999
e7d1c40c 14000 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14001 for (group = htab->group; group != NULL; group = group->next)
14002 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14003 {
14004 int align = abs (htab->params->plt_stub_align);
14005 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14006 }
794e51c0 14007
7dda8d3c
AM
14008 for (group = htab->group; group != NULL; group = group->next)
14009 if (group->needs_save_res)
14010 {
14011 stub_sec = group->stub_sec;
14012 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14013 htab->sfpr->contents, htab->sfpr->size);
14014 if (htab->params->emit_stub_syms)
14015 {
14016 unsigned int i;
14017
14018 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14019 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14020 return FALSE;
14021 }
14022 }
14023
df136d64
AM
14024 if (htab->glink_eh_frame != NULL
14025 && htab->glink_eh_frame->size != 0)
14026 {
14027 bfd_vma val;
14028 size_t align = 4;
14029
14030 p = htab->glink_eh_frame->contents;
14031 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14032
14033 for (group = htab->group; group != NULL; group = group->next)
14034 if (group->eh_size != 0)
14035 {
14036 /* Offset to stub section. */
14037 val = (group->stub_sec->output_section->vma
14038 + group->stub_sec->output_offset);
14039 val -= (htab->glink_eh_frame->output_section->vma
14040 + htab->glink_eh_frame->output_offset
14041 + (p + 8 - htab->glink_eh_frame->contents));
14042 if (val + 0x80000000 > 0xffffffff)
14043 {
14044 _bfd_error_handler
14045 (_("%s offset too large for .eh_frame sdata4 encoding"),
14046 group->stub_sec->name);
14047 return FALSE;
14048 }
14049 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14050 p += (group->eh_size + 17 + 3) & -4;
14051 }
14052 if (htab->glink != NULL && htab->glink->size != 0)
14053 {
14054 /* Offset to .glink. */
14055 val = (htab->glink->output_section->vma
14056 + htab->glink->output_offset
14057 + 8);
14058 val -= (htab->glink_eh_frame->output_section->vma
14059 + htab->glink_eh_frame->output_offset
14060 + (p + 8 - htab->glink_eh_frame->contents));
14061 if (val + 0x80000000 > 0xffffffff)
14062 {
14063 _bfd_error_handler
14064 (_("%s offset too large for .eh_frame sdata4 encoding"),
14065 htab->glink->name);
14066 return FALSE;
14067 }
14068 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14069 p += (24 + align - 1) & -align;
14070 }
14071 }
14072
d4aaa2a0
AM
14073 for (group = htab->group; group != NULL; group = group->next)
14074 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14075 {
14076 stub_sec_count += 1;
c9301e31
AM
14077 if (stub_sec->rawsize != stub_sec->size
14078 && (htab->stub_iteration <= STUB_SHRINK_ITER
14079 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14080 break;
14081 }
5d1634d7 14082
25516cc5 14083 if (group != NULL)
5d1634d7 14084 {
b34976b6 14085 htab->stub_error = TRUE;
cf97bcb0 14086 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14087 }
721956f4 14088
d2a300cf
AM
14089 if (htab->stub_error)
14090 return FALSE;
14091
14092 if (stats != NULL)
14093 {
db84fff3 14094 size_t len;
d2a300cf
AM
14095 *stats = bfd_malloc (500);
14096 if (*stats == NULL)
14097 return FALSE;
14098
db84fff3
AM
14099 len = sprintf (*stats,
14100 ngettext ("linker stubs in %u group\n",
14101 "linker stubs in %u groups\n",
14102 stub_sec_count),
14103 stub_sec_count);
05d0e962
AM
14104 sprintf (*stats + len, _(" branch %lu\n"
14105 " branch toc adj %lu\n"
14106 " branch notoc %lu\n"
14107 " branch both %lu\n"
14108 " long branch %lu\n"
14109 " long toc adj %lu\n"
14110 " long notoc %lu\n"
14111 " long both %lu\n"
14112 " plt call %lu\n"
14113 " plt call save %lu\n"
14114 " plt call notoc %lu\n"
14115 " plt call both %lu\n"
14116 " global entry %lu"),
4ce794b7
AM
14117 htab->stub_count[ppc_stub_long_branch - 1],
14118 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14119 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14120 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14121 htab->stub_count[ppc_stub_plt_branch - 1],
14122 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14123 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14124 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14125 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14126 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14127 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14128 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14129 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14130 }
14131 return TRUE;
5bd4f169
AM
14132}
14133
60124e18
AM
14134/* What to do when ld finds relocations against symbols defined in
14135 discarded sections. */
14136
14137static unsigned int
14138ppc64_elf_action_discarded (asection *sec)
14139{
14140 if (strcmp (".opd", sec->name) == 0)
14141 return 0;
14142
14143 if (strcmp (".toc", sec->name) == 0)
14144 return 0;
14145
bce50a28
JJ
14146 if (strcmp (".toc1", sec->name) == 0)
14147 return 0;
14148
60124e18
AM
14149 return _bfd_elf_default_action_discarded (sec);
14150}
14151
e59a1001
AM
14152/* These are the dynamic relocations supported by glibc. */
14153
14154static bfd_boolean
14155ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14156{
14157 switch (r_type)
14158 {
14159 case R_PPC64_RELATIVE:
14160 case R_PPC64_NONE:
14161 case R_PPC64_ADDR64:
14162 case R_PPC64_GLOB_DAT:
14163 case R_PPC64_IRELATIVE:
14164 case R_PPC64_JMP_IREL:
14165 case R_PPC64_JMP_SLOT:
14166 case R_PPC64_DTPMOD64:
14167 case R_PPC64_DTPREL64:
14168 case R_PPC64_TPREL64:
14169 case R_PPC64_TPREL16_LO_DS:
14170 case R_PPC64_TPREL16_DS:
14171 case R_PPC64_TPREL16:
14172 case R_PPC64_TPREL16_LO:
14173 case R_PPC64_TPREL16_HI:
14174 case R_PPC64_TPREL16_HIGH:
14175 case R_PPC64_TPREL16_HA:
14176 case R_PPC64_TPREL16_HIGHA:
14177 case R_PPC64_TPREL16_HIGHER:
14178 case R_PPC64_TPREL16_HIGHEST:
14179 case R_PPC64_TPREL16_HIGHERA:
14180 case R_PPC64_TPREL16_HIGHESTA:
14181 case R_PPC64_ADDR16_LO_DS:
14182 case R_PPC64_ADDR16_LO:
14183 case R_PPC64_ADDR16_HI:
14184 case R_PPC64_ADDR16_HIGH:
14185 case R_PPC64_ADDR16_HA:
14186 case R_PPC64_ADDR16_HIGHA:
14187 case R_PPC64_REL30:
14188 case R_PPC64_COPY:
14189 case R_PPC64_UADDR64:
14190 case R_PPC64_UADDR32:
14191 case R_PPC64_ADDR32:
14192 case R_PPC64_ADDR24:
14193 case R_PPC64_ADDR16:
14194 case R_PPC64_UADDR16:
14195 case R_PPC64_ADDR16_DS:
14196 case R_PPC64_ADDR16_HIGHER:
14197 case R_PPC64_ADDR16_HIGHEST:
14198 case R_PPC64_ADDR16_HIGHERA:
14199 case R_PPC64_ADDR16_HIGHESTA:
14200 case R_PPC64_ADDR14:
14201 case R_PPC64_ADDR14_BRTAKEN:
14202 case R_PPC64_ADDR14_BRNTAKEN:
14203 case R_PPC64_REL32:
14204 case R_PPC64_REL64:
14205 return TRUE;
14206
14207 default:
14208 return FALSE;
14209 }
14210}
14211
5bd4f169
AM
14212/* The RELOCATE_SECTION function is called by the ELF backend linker
14213 to handle the relocations for a section.
14214
14215 The relocs are always passed as Rela structures; if the section
14216 actually uses Rel structures, the r_addend field will always be
14217 zero.
14218
14219 This function is responsible for adjust the section contents as
14220 necessary, and (if using Rela relocs and generating a
1049f94e 14221 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14222 necessary.
14223
14224 This function does not have to worry about setting the reloc
14225 address or the reloc symbol index.
14226
14227 LOCAL_SYMS is a pointer to the swapped in local symbols.
14228
14229 LOCAL_SECTIONS is an array giving the section in the input file
14230 corresponding to the st_shndx field of each local symbol.
14231
14232 The global hash table entry for the global symbols can be found
14233 via elf_sym_hashes (input_bfd).
14234
1049f94e 14235 When generating relocatable output, this function must handle
5bd4f169
AM
14236 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14237 going to be the section symbol corresponding to the output
14238 section, which means that the addend must be adjusted
14239 accordingly. */
14240
b34976b6 14241static bfd_boolean
4ce794b7
AM
14242ppc64_elf_relocate_section (bfd *output_bfd,
14243 struct bfd_link_info *info,
14244 bfd *input_bfd,
14245 asection *input_section,
14246 bfd_byte *contents,
14247 Elf_Internal_Rela *relocs,
14248 Elf_Internal_Sym *local_syms,
14249 asection **local_sections)
5bd4f169 14250{
65f38f15 14251 struct ppc_link_hash_table *htab;
5bd4f169
AM
14252 Elf_Internal_Shdr *symtab_hdr;
14253 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14254 Elf_Internal_Rela *rel;
c316a17c 14255 Elf_Internal_Rela *wrel;
5bd4f169 14256 Elf_Internal_Rela *relend;
411e1bfb
AM
14257 Elf_Internal_Rela outrel;
14258 bfd_byte *loc;
411e1bfb 14259 struct got_entry **local_got_ents;
5bd4f169 14260 bfd_vma TOCstart;
b34976b6
AM
14261 bfd_boolean ret = TRUE;
14262 bfd_boolean is_opd;
794e51c0
AM
14263 /* Assume 'at' branch hints. */
14264 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14265 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14266 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14267
65f38f15 14268 /* Initialize howto table if needed. */
5bd4f169 14269 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14270 ppc_howto_init ();
14271
65f38f15 14272 htab = ppc_hash_table (info);
4dfe6ac6
NC
14273 if (htab == NULL)
14274 return FALSE;
ee75fd95
AM
14275
14276 /* Don't relocate stub sections. */
e7d1c40c 14277 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14278 return TRUE;
14279
7af5d5c4
AM
14280 if (!is_ppc64_elf (input_bfd))
14281 {
14282 bfd_set_error (bfd_error_wrong_format);
14283 return FALSE;
14284 }
0ffa91dd 14285
411e1bfb 14286 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14287 TOCstart = elf_gp (output_bfd);
0ffa91dd 14288 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14289 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14290 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14291
c316a17c 14292 rel = wrel = relocs;
5bd4f169 14293 relend = relocs + input_section->reloc_count;
c316a17c 14294 for (; rel < relend; wrel++, rel++)
5bd4f169 14295 {
04c9666a 14296 enum elf_ppc64_reloc_type r_type;
31c76678 14297 bfd_vma addend;
5bd4f169
AM
14298 bfd_reloc_status_type r;
14299 Elf_Internal_Sym *sym;
14300 asection *sec;
039b3fef
AM
14301 struct elf_link_hash_entry *h_elf;
14302 struct ppc_link_hash_entry *h;
14303 struct ppc_link_hash_entry *fdh;
5bd4f169 14304 const char *sym_name;
0d4792f7 14305 unsigned long r_symndx, toc_symndx;
3a71aa26 14306 bfd_vma toc_addend;
f961d9dd
AM
14307 unsigned char tls_mask, tls_gd, tls_type;
14308 unsigned char sym_type;
5bd4f169 14309 bfd_vma relocation;
23cedd1d 14310 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14311 bfd_boolean warned;
bc30df16 14312 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14313 unsigned int insn;
e11840f9 14314 unsigned int mask;
721956f4
AM
14315 struct ppc_stub_hash_entry *stub_entry;
14316 bfd_vma max_br_offset;
14317 bfd_vma from;
c316a17c 14318 Elf_Internal_Rela orig_rel;
b80eed39
AM
14319 reloc_howto_type *howto;
14320 struct reloc_howto_struct alt_howto;
4a421c53
AM
14321 uint64_t pinsn;
14322 bfd_vma offset;
5bd4f169 14323
c316a17c
AM
14324 again:
14325 orig_rel = *rel;
14326
4ce794b7 14327 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14328 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14329
14330 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14331 symbol of the previous ADDR64 reloc. The symbol gives us the
14332 proper TOC base to use. */
14333 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14334 && wrel != relocs
14335 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14336 && is_opd)
c316a17c 14337 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14338
4ce794b7
AM
14339 sym = NULL;
14340 sec = NULL;
039b3fef 14341 h_elf = NULL;
4ce794b7 14342 sym_name = NULL;
b34976b6
AM
14343 unresolved_reloc = FALSE;
14344 warned = FALSE;
65f38f15 14345
0b13192e 14346 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14347 {
14348 /* It's a local symbol. */
74f0fb50 14349 struct _opd_sec_data *opd;
4025353c 14350
5bd4f169
AM
14351 sym = local_syms + r_symndx;
14352 sec = local_sections[r_symndx];
26c61ae5 14353 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14354 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14355 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14356 opd = get_opd_info (sec);
14357 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14358 {
51aecdc5
AM
14359 long adjust = opd->adjust[OPD_NDX (sym->st_value
14360 + rel->r_addend)];
4025353c
AM
14361 if (adjust == -1)
14362 relocation = 0;
14363 else
4cc603a5
AM
14364 {
14365 /* If this is a relocation against the opd section sym
14366 and we have edited .opd, adjust the reloc addend so
14367 that ld -r and ld --emit-relocs output is correct.
14368 If it is a reloc against some other .opd symbol,
14369 then the symbol value will be adjusted later. */
14370 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14371 rel->r_addend += adjust;
14372 else
14373 relocation += adjust;
14374 }
1e2f5b6e 14375 }
5bd4f169
AM
14376 }
14377 else
14378 {
62d887d4
L
14379 bfd_boolean ignored;
14380
b2a8e766
AM
14381 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14382 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14383 h_elf, sec, relocation,
62d887d4 14384 unresolved_reloc, warned, ignored);
039b3fef
AM
14385 sym_name = h_elf->root.root.string;
14386 sym_type = h_elf->type;
b69fdb4e
AM
14387 if (sec != NULL
14388 && sec->owner == output_bfd
14389 && strcmp (sec->name, ".opd") == 0)
14390 {
14391 /* This is a symbol defined in a linker script. All
14392 such are defined in output sections, even those
14393 defined by simple assignment from a symbol defined in
14394 an input section. Transfer the symbol to an
14395 appropriate input .opd section, so that a branch to
14396 this symbol will be mapped to the location specified
14397 by the opd entry. */
14398 struct bfd_link_order *lo;
14399 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14400 if (lo->type == bfd_indirect_link_order)
14401 {
14402 asection *isec = lo->u.indirect.section;
14403 if (h_elf->root.u.def.value >= isec->output_offset
14404 && h_elf->root.u.def.value < (isec->output_offset
14405 + isec->size))
14406 {
14407 h_elf->root.u.def.value -= isec->output_offset;
14408 h_elf->root.u.def.section = isec;
14409 sec = isec;
14410 break;
14411 }
14412 }
14413 }
5bd4f169 14414 }
039b3fef 14415 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14416
dbaa2011 14417 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14418 {
14419 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14420 input_bfd, input_section,
0930cb30 14421 contents, rel->r_offset);
c316a17c
AM
14422 wrel->r_offset = rel->r_offset;
14423 wrel->r_info = 0;
14424 wrel->r_addend = 0;
14425
14426 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14427 symbols defined in discarded sections. Not done for
c316a17c
AM
14428 non-debug to preserve relocs in .eh_frame which the
14429 eh_frame editing code expects to be present. */
14430 if (bfd_link_relocatable (info)
14431 && (input_section->flags & SEC_DEBUGGING))
14432 wrel--;
14433
14434 continue;
14435 }
ab96bf03 14436
0e1862bb 14437 if (bfd_link_relocatable (info))
c316a17c 14438 goto copy_reloc;
ab96bf03 14439
f40da81b
AM
14440 if (h != NULL && &h->elf == htab->elf.hgot)
14441 {
6f20ed8a 14442 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14443 sec = bfd_abs_section_ptr;
14444 unresolved_reloc = FALSE;
14445 }
14446
951fd09b
AM
14447 /* TLS optimizations. Replace instruction sequences and relocs
14448 based on information we collected in tls_optimize. We edit
14449 RELOCS so that --emit-relocs will output something sensible
14450 for the final instruction stream. */
14451 tls_mask = 0;
14452 tls_gd = 0;
0d4792f7 14453 toc_symndx = 0;
727fc41e
AM
14454 if (h != NULL)
14455 tls_mask = h->tls_mask;
14456 else if (local_got_ents != NULL)
411e1bfb 14457 {
e054468f
AM
14458 struct plt_entry **local_plt = (struct plt_entry **)
14459 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14460 unsigned char *lgot_masks = (unsigned char *)
e054468f 14461 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14462 tls_mask = lgot_masks[r_symndx];
14463 }
37da22e5 14464 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14465 && (r_type == R_PPC64_TLS
14466 || r_type == R_PPC64_TLSGD
14467 || r_type == R_PPC64_TLSLD))
14468 {
14469 /* Check for toc tls entries. */
f961d9dd 14470 unsigned char *toc_tls;
0d4792f7 14471
727fc41e
AM
14472 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14473 &local_syms, rel, input_bfd))
14474 return FALSE;
0d4792f7 14475
727fc41e
AM
14476 if (toc_tls)
14477 tls_mask = *toc_tls;
0d4792f7
AM
14478 }
14479
14480 /* Check that tls relocs are used with tls syms, and non-tls
14481 relocs are used with non-tls syms. */
cf35638d 14482 if (r_symndx != STN_UNDEF
0d4792f7
AM
14483 && r_type != R_PPC64_NONE
14484 && (h == NULL
039b3fef
AM
14485 || h->elf.root.type == bfd_link_hash_defined
14486 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14487 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14488 {
37da22e5 14489 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14490 && (r_type == R_PPC64_TLS
14491 || r_type == R_PPC64_TLSGD
14492 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14493 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14494 ;
14495 else
25f53a85 14496 info->callbacks->einfo
1d483afe 14497 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14498 /* xgettext:c-format */
c1c8c1ef 14499 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14500 /* xgettext:c-format */
c1c8c1ef 14501 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14502 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14503 ppc64_elf_howto_table[r_type]->name,
14504 sym_name);
411e1bfb
AM
14505 }
14506
14507 /* Ensure reloc mapping code below stays sane. */
14508 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14509 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14510 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14511 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14512 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14513 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14514 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14515 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14516 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14517 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14518 abort ();
0d4792f7 14519
411e1bfb
AM
14520 switch (r_type)
14521 {
14522 default:
411e1bfb
AM
14523 break;
14524
ba761f19 14525 case R_PPC64_LO_DS_OPT:
95f0d0d2 14526 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
14527 if ((insn & (0x3f << 26)) != 58u << 26)
14528 abort ();
14529 insn += (14u << 26) - (58u << 26);
95f0d0d2 14530 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14531 r_type = R_PPC64_TOC16_LO;
14532 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14533 break;
14534
411e1bfb
AM
14535 case R_PPC64_TOC16:
14536 case R_PPC64_TOC16_LO:
14537 case R_PPC64_TOC16_DS:
14538 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14539 {
14540 /* Check for toc tls entries. */
f961d9dd 14541 unsigned char *toc_tls;
951fd09b 14542 int retval;
411e1bfb 14543
3a71aa26
AM
14544 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14545 &local_syms, rel, input_bfd);
951fd09b 14546 if (retval == 0)
411e1bfb
AM
14547 return FALSE;
14548
14549 if (toc_tls)
14550 {
951fd09b 14551 tls_mask = *toc_tls;
411e1bfb
AM
14552 if (r_type == R_PPC64_TOC16_DS
14553 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14554 {
37da22e5 14555 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14556 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14557 goto toctprel;
14558 }
411e1bfb 14559 else
951fd09b
AM
14560 {
14561 /* If we found a GD reloc pair, then we might be
14562 doing a GD->IE transition. */
14563 if (retval == 2)
14564 {
b00a0a86 14565 tls_gd = TLS_GDIE;
37da22e5
AM
14566 if ((tls_mask & TLS_TLS) != 0
14567 && (tls_mask & TLS_GD) == 0)
102890f0 14568 goto tls_ldgd_opt;
951fd09b
AM
14569 }
14570 else if (retval == 3)
14571 {
37da22e5
AM
14572 if ((tls_mask & TLS_TLS) != 0
14573 && (tls_mask & TLS_LD) == 0)
102890f0 14574 goto tls_ldgd_opt;
951fd09b
AM
14575 }
14576 }
411e1bfb
AM
14577 }
14578 }
14579 break;
14580
9d6ded02
AM
14581 case R_PPC64_GOT_TPREL16_HI:
14582 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14583 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14584 && (tls_mask & TLS_TPREL) == 0)
14585 {
14586 rel->r_offset -= d_offset;
95f0d0d2 14587 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14588 r_type = R_PPC64_NONE;
14589 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14590 }
14591 break;
14592
411e1bfb
AM
14593 case R_PPC64_GOT_TPREL16_DS:
14594 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14595 if ((tls_mask & TLS_TLS) != 0
951fd09b 14596 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14597 {
81407a69 14598 toctprel:
95f0d0d2 14599 insn = bfd_get_32 (input_bfd,
c316a17c 14600 contents + rel->r_offset - d_offset);
411e1bfb
AM
14601 insn &= 31 << 21;
14602 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14603 bfd_put_32 (input_bfd, insn,
c316a17c 14604 contents + rel->r_offset - d_offset);
411e1bfb 14605 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14606 if (toc_symndx != 0)
14607 {
14608 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14609 rel->r_addend = toc_addend;
0d4792f7
AM
14610 /* We changed the symbol. Start over in order to
14611 get h, sym, sec etc. right. */
c316a17c 14612 goto again;
0d4792f7
AM
14613 }
14614 else
14615 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14616 }
14617 break;
14618
c213164a
AM
14619 case R_PPC64_GOT_TPREL34:
14620 if ((tls_mask & TLS_TLS) != 0
14621 && (tls_mask & TLS_TPREL) == 0)
14622 {
14623 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14624 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14625 pinsn <<= 32;
14626 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14627 pinsn += ((2ULL << 56) + (-1ULL << 52)
14628 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14629 bfd_put_32 (input_bfd, pinsn >> 32,
14630 contents + rel->r_offset);
14631 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14632 contents + rel->r_offset + 4);
14633 r_type = R_PPC64_TPREL34;
14634 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14635 }
14636 break;
14637
411e1bfb 14638 case R_PPC64_TLS:
37da22e5 14639 if ((tls_mask & TLS_TLS) != 0
951fd09b 14640 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14641 {
c213164a 14642 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
14643 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14644 if (insn == 0)
c213164a
AM
14645 break;
14646 if ((rel->r_offset & 3) == 0)
0d4792f7 14647 {
c213164a
AM
14648 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14649 /* Was PPC64_TLS which sits on insn boundary, now
14650 PPC64_TPREL16_LO which is at low-order half-word. */
14651 rel->r_offset += d_offset;
14652 r_type = R_PPC64_TPREL16_LO;
14653 if (toc_symndx != 0)
14654 {
14655 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14656 rel->r_addend = toc_addend;
14657 /* We changed the symbol. Start over in order to
14658 get h, sym, sec etc. right. */
14659 goto again;
14660 }
14661 else
14662 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14663 }
14664 else if ((rel->r_offset & 3) == 1)
14665 {
14666 /* For pcrel IE to LE we already have the full
14667 offset and thus don't need an addi here. A nop
14668 or mr will do. */
14669 if ((insn & (0x3f << 26)) == 14 << 26)
14670 {
14671 /* Extract regs from addi rt,ra,si. */
14672 unsigned int rt = (insn >> 21) & 0x1f;
14673 unsigned int ra = (insn >> 16) & 0x1f;
14674 if (rt == ra)
14675 insn = NOP;
14676 else
14677 {
14678 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14679 insn = (rt << 16) | (ra << 21) | (ra << 11);
14680 insn |= (31u << 26) | (444u << 1);
14681 }
14682 }
14683 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 14684 }
411e1bfb
AM
14685 }
14686 break;
14687
411e1bfb
AM
14688 case R_PPC64_GOT_TLSGD16_HI:
14689 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 14690 tls_gd = TLS_GDIE;
37da22e5 14691 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14692 goto tls_gdld_hi;
14693 break;
14694
411e1bfb
AM
14695 case R_PPC64_GOT_TLSLD16_HI:
14696 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14697 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14698 {
951fd09b
AM
14699 tls_gdld_hi:
14700 if ((tls_mask & tls_gd) != 0)
14701 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14702 + R_PPC64_GOT_TPREL16_DS);
14703 else
411e1bfb 14704 {
4fe5ca5b 14705 rel->r_offset -= d_offset;
95f0d0d2 14706 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14707 r_type = R_PPC64_NONE;
411e1bfb 14708 }
951fd09b 14709 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14710 }
14711 break;
14712
951fd09b
AM
14713 case R_PPC64_GOT_TLSGD16:
14714 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 14715 tls_gd = TLS_GDIE;
37da22e5 14716 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14717 goto tls_ldgd_opt;
951fd09b 14718 break;
411e1bfb 14719
951fd09b
AM
14720 case R_PPC64_GOT_TLSLD16:
14721 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14722 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14723 {
b9f04fe0 14724 unsigned int insn1, insn2;
102890f0
AM
14725
14726 tls_ldgd_opt:
727fc41e
AM
14727 offset = (bfd_vma) -1;
14728 /* If not using the newer R_PPC64_TLSGD/LD to mark
14729 __tls_get_addr calls, we must trust that the call
14730 stays with its arg setup insns, ie. that the next
14731 reloc is the __tls_get_addr call associated with
14732 the current reloc. Edit both insns. */
14733 if (input_section->has_tls_get_addr_call
14734 && rel + 1 < relend
14735 && branch_reloc_hash_match (input_bfd, rel + 1,
14736 htab->tls_get_addr,
14737 htab->tls_get_addr_fd))
14738 offset = rel[1].r_offset;
b86ac8e3
AM
14739 /* We read the low GOT_TLS (or TOC16) insn because we
14740 need to keep the destination reg. It may be
14741 something other than the usual r3, and moved to r3
14742 before the call by intervening code. */
95f0d0d2 14743 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14744 contents + rel->r_offset - d_offset);
102890f0 14745 if ((tls_mask & tls_gd) != 0)
411e1bfb 14746 {
102890f0 14747 /* IE */
b86ac8e3 14748 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
14749 insn1 |= 58 << 26; /* ld */
14750 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14751 if (offset != (bfd_vma) -1)
f58d5a2d 14752 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
14753 if (r_type == R_PPC64_TOC16
14754 || r_type == R_PPC64_TOC16_LO)
102890f0 14755 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
14756 else
14757 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14758 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
14759 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14760 }
14761 else
14762 {
14763 /* LE */
b86ac8e3
AM
14764 insn1 &= 0x1f << 21;
14765 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14766 insn2 = 0x38630000; /* addi 3,3,0 */
14767 if (tls_gd == 0)
951fd09b 14768 {
102890f0 14769 /* Was an LD reloc. */
71c4e95a 14770 r_symndx = STN_UNDEF;
102890f0 14771 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 14772 }
102890f0 14773 else if (toc_symndx != 0)
3a71aa26
AM
14774 {
14775 r_symndx = toc_symndx;
14776 rel->r_addend = toc_addend;
14777 }
102890f0
AM
14778 r_type = R_PPC64_TPREL16_HA;
14779 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14780 if (offset != (bfd_vma) -1)
14781 {
14782 rel[1].r_info = ELF64_R_INFO (r_symndx,
14783 R_PPC64_TPREL16_LO);
14784 rel[1].r_offset = offset + d_offset;
14785 rel[1].r_addend = rel->r_addend;
14786 }
102890f0 14787 }
95f0d0d2 14788 bfd_put_32 (input_bfd, insn1,
3a71aa26 14789 contents + rel->r_offset - d_offset);
727fc41e 14790 if (offset != (bfd_vma) -1)
c96e0573
AM
14791 {
14792 bfd_put_32 (input_bfd, insn2, contents + offset);
14793 if (offset + 8 <= input_section->size)
14794 {
14795 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14796 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14797 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14798 }
14799 }
727fc41e
AM
14800 if ((tls_mask & tls_gd) == 0
14801 && (tls_gd == 0 || toc_symndx != 0))
14802 {
14803 /* We changed the symbol. Start over in order
14804 to get h, sym, sec etc. right. */
c316a17c 14805 goto again;
727fc41e
AM
14806 }
14807 }
14808 break;
14809
c213164a
AM
14810 case R_PPC64_GOT_TLSGD34:
14811 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14812 {
14813 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14814 pinsn <<= 32;
14815 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14816 if ((tls_mask & TLS_GDIE) != 0)
14817 {
14818 /* IE, pla -> pld */
14819 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14820 r_type = R_PPC64_GOT_TPREL34;
14821 }
14822 else
14823 {
14824 /* LE, pla pcrel -> paddi r13 */
14825 pinsn += (-1ULL << 52) + (13ULL << 16);
14826 r_type = R_PPC64_TPREL34;
14827 }
14828 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14829 bfd_put_32 (input_bfd, pinsn >> 32,
14830 contents + rel->r_offset);
14831 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14832 contents + rel->r_offset + 4);
14833 }
14834 break;
14835
14836 case R_PPC64_GOT_TLSLD34:
14837 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14838 {
14839 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14840 pinsn <<= 32;
14841 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14842 pinsn += (-1ULL << 52) + (13ULL << 16);
14843 bfd_put_32 (input_bfd, pinsn >> 32,
14844 contents + rel->r_offset);
14845 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14846 contents + rel->r_offset + 4);
14847 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14848 r_symndx = STN_UNDEF;
14849 r_type = R_PPC64_TPREL34;
14850 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14851 goto again;
14852 }
14853 break;
14854
727fc41e 14855 case R_PPC64_TLSGD:
37da22e5 14856 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14857 && rel + 1 < relend)
727fc41e 14858 {
b9f04fe0 14859 unsigned int insn2;
5663e321 14860 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14861
4a421c53 14862 offset = rel->r_offset;
5663e321 14863 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14864 {
14865 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14866 if (r_type1 == R_PPC64_PLT_PCREL34
14867 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14868 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14869 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14870 break;
14871 }
14872
14873 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14874 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14875
b00a0a86 14876 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
14877 {
14878 /* IE */
14879 r_type = R_PPC64_NONE;
14880 insn2 = 0x7c636a14; /* add 3,3,13 */
14881 }
14882 else
14883 {
14884 /* LE */
14885 if (toc_symndx != 0)
14886 {
14887 r_symndx = toc_symndx;
14888 rel->r_addend = toc_addend;
14889 }
c213164a
AM
14890 if (r_type1 == R_PPC64_REL24_NOTOC
14891 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14892 {
14893 r_type = R_PPC64_NONE;
14894 insn2 = NOP;
14895 }
14896 else
14897 {
14898 rel->r_offset = offset + d_offset;
14899 r_type = R_PPC64_TPREL16_LO;
14900 insn2 = 0x38630000; /* addi 3,3,0 */
14901 }
727fc41e
AM
14902 }
14903 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14904 /* Zap the reloc on the _tls_get_addr call too. */
14905 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14906 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14907 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14908 if ((tls_mask & TLS_GDIE) == 0
14909 && toc_symndx != 0
14910 && r_type != R_PPC64_NONE)
c316a17c 14911 goto again;
411e1bfb 14912 }
411e1bfb
AM
14913 break;
14914
727fc41e 14915 case R_PPC64_TLSLD:
37da22e5 14916 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14917 && rel + 1 < relend)
727fc41e 14918 {
b9f04fe0 14919 unsigned int insn2;
5663e321 14920 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14921
4a421c53 14922 offset = rel->r_offset;
5663e321 14923 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14924 {
14925 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14926 if (r_type1 == R_PPC64_PLT_PCREL34
14927 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14928 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14929 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14930 break;
14931 }
14932
14933 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14934 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14935
c213164a
AM
14936 if (r_type1 == R_PPC64_REL24_NOTOC
14937 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14938 {
14939 r_type = R_PPC64_NONE;
14940 insn2 = NOP;
14941 }
14942 else
14943 {
14944 rel->r_offset = offset + d_offset;
14945 r_symndx = STN_UNDEF;
14946 r_type = R_PPC64_TPREL16_LO;
14947 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14948 insn2 = 0x38630000; /* addi 3,3,0 */
14949 }
727fc41e 14950 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14951 /* Zap the reloc on the _tls_get_addr call too. */
14952 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14953 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14954 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14955 if (r_type != R_PPC64_NONE)
14956 goto again;
727fc41e
AM
14957 }
14958 break;
14959
411e1bfb 14960 case R_PPC64_DTPMOD64:
951fd09b
AM
14961 if (rel + 1 < relend
14962 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14963 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14964 {
951fd09b
AM
14965 if ((tls_mask & TLS_GD) == 0)
14966 {
14967 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 14968 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
14969 r_type = R_PPC64_TPREL64;
14970 else
14971 {
4ce794b7 14972 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14973 r_type = R_PPC64_NONE;
14974 }
14975 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14976 }
14977 }
14978 else
14979 {
14980 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14981 {
4ce794b7 14982 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14983 r_type = R_PPC64_NONE;
951fd09b 14984 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14985 }
411e1bfb
AM
14986 }
14987 break;
14988
14989 case R_PPC64_TPREL64:
951fd09b 14990 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14991 {
14992 r_type = R_PPC64_NONE;
14993 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14994 }
14995 break;
52a82034 14996
006589cf
AM
14997 case R_PPC64_ENTRY:
14998 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
14999 if (!bfd_link_pic (info)
15000 && !info->traditional_format
15001 && relocation + 0x80008000 <= 0xffffffff)
15002 {
15003 unsigned int insn1, insn2;
15004
15005 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15006 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15007 if ((insn1 & ~0xfffc) == LD_R2_0R12
15008 && insn2 == ADD_R2_R2_R12)
15009 {
95f0d0d2 15010 bfd_put_32 (input_bfd,
006589cf
AM
15011 LIS_R2 + PPC_HA (relocation),
15012 contents + rel->r_offset);
95f0d0d2 15013 bfd_put_32 (input_bfd,
006589cf
AM
15014 ADDI_R2_R2 + PPC_LO (relocation),
15015 contents + rel->r_offset + 4);
15016 }
15017 }
15018 else
15019 {
15020 relocation -= (rel->r_offset
15021 + input_section->output_offset
15022 + input_section->output_section->vma);
15023 if (relocation + 0x80008000 <= 0xffffffff)
15024 {
15025 unsigned int insn1, insn2;
15026
15027 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15028 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15029 if ((insn1 & ~0xfffc) == LD_R2_0R12
15030 && insn2 == ADD_R2_R2_R12)
15031 {
95f0d0d2 15032 bfd_put_32 (input_bfd,
006589cf
AM
15033 ADDIS_R2_R12 + PPC_HA (relocation),
15034 contents + rel->r_offset);
95f0d0d2 15035 bfd_put_32 (input_bfd,
006589cf
AM
15036 ADDI_R2_R2 + PPC_LO (relocation),
15037 contents + rel->r_offset + 4);
15038 }
15039 }
15040 }
15041 break;
15042
52a82034
AM
15043 case R_PPC64_REL16_HA:
15044 /* If we are generating a non-PIC executable, edit
15045 . 0: addis 2,12,.TOC.-0b@ha
15046 . addi 2,2,.TOC.-0b@l
15047 used by ELFv2 global entry points to set up r2, to
15048 . lis 2,.TOC.@ha
15049 . addi 2,2,.TOC.@l
15050 if .TOC. is in range. */
0e1862bb 15051 if (!bfd_link_pic (info)
810d4e75 15052 && !info->traditional_format
006589cf 15053 && !htab->opd_abi
4f038ee5 15054 && rel->r_addend == d_offset
52a82034
AM
15055 && h != NULL && &h->elf == htab->elf.hgot
15056 && rel + 1 < relend
15057 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15058 && rel[1].r_offset == rel->r_offset + 4
15059 && rel[1].r_addend == rel->r_addend + 4
15060 && relocation + 0x80008000 <= 0xffffffff)
15061 {
15062 unsigned int insn1, insn2;
4a421c53 15063 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15064 insn1 = bfd_get_32 (input_bfd, contents + offset);
15065 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15066 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15067 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15068 {
15069 r_type = R_PPC64_ADDR16_HA;
15070 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15071 rel->r_addend -= d_offset;
15072 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15073 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15074 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15075 }
15076 }
15077 break;
411e1bfb
AM
15078 }
15079
15080 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15081 insn = 0;
b25116a9
AM
15082 max_br_offset = 1 << 25;
15083 addend = rel->r_addend;
bc30df16 15084 reloc_dest = DEST_NORMAL;
65f38f15 15085 switch (r_type)
5bd4f169
AM
15086 {
15087 default:
65f38f15 15088 break;
5bd4f169 15089
3b421ab3
AM
15090 case R_PPC64_TOCSAVE:
15091 if (relocation + addend == (rel->r_offset
15092 + input_section->output_offset
15093 + input_section->output_section->vma)
15094 && tocsave_find (htab, NO_INSERT,
15095 &local_syms, rel, input_bfd))
15096 {
15097 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15098 if (insn == NOP
15099 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15100 bfd_put_32 (input_bfd,
15101 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15102 contents + rel->r_offset);
15103 }
15104 break;
15105
65f38f15
AM
15106 /* Branch taken prediction relocations. */
15107 case R_PPC64_ADDR14_BRTAKEN:
15108 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15109 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15110 /* Fall through. */
65f38f15 15111
86c76c7b 15112 /* Branch not taken prediction relocations. */
65f38f15
AM
15113 case R_PPC64_ADDR14_BRNTAKEN:
15114 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15115 insn |= bfd_get_32 (input_bfd,
411e1bfb 15116 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15117 /* Fall through. */
86c76c7b 15118
b25116a9
AM
15119 case R_PPC64_REL14:
15120 max_br_offset = 1 << 15;
1a0670f3 15121 /* Fall through. */
5bd4f169 15122
65f38f15 15123 case R_PPC64_REL24:
05d0e962 15124 case R_PPC64_REL24_NOTOC:
23cedd1d 15125 case R_PPC64_PLTCALL:
5663e321 15126 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15127 /* Calls to functions with a different TOC, such as calls to
15128 shared objects, need to alter the TOC pointer. This is
15129 done using a linkage stub. A REL24 branching to these
15130 linkage stubs needs to be followed by a nop, as the nop
15131 will be replaced with an instruction to restore the TOC
15132 base pointer. */
8387904d 15133 fdh = h;
b31867b6
AM
15134 if (h != NULL
15135 && h->oh != NULL
15136 && h->oh->is_func_descriptor)
15137 fdh = ppc_follow_link (h->oh);
31c76678
DK
15138 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15139 htab);
5663e321
AM
15140 if ((r_type == R_PPC64_PLTCALL
15141 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15142 && stub_entry != NULL
05d0e962
AM
15143 && stub_entry->stub_type >= ppc_stub_plt_call
15144 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15145 stub_entry = NULL;
15146
6abec6bc 15147 if (stub_entry != NULL
d0abeec8
AM
15148 && ((stub_entry->stub_type >= ppc_stub_plt_call
15149 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15150 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15151 || stub_entry->stub_type == ppc_stub_plt_branch_both
15152 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15153 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15154 {
b25116a9 15155 bfd_boolean can_plt_call = FALSE;
721956f4 15156
6e1816be
AM
15157 if (stub_entry->stub_type == ppc_stub_plt_call
15158 && !htab->opd_abi
15159 && htab->params->plt_localentry0 != 0
15160 && is_elfv2_localentry0 (&h->elf))
15161 {
15162 /* The function doesn't use or change r2. */
15163 can_plt_call = TRUE;
15164 }
05d0e962
AM
15165 else if (r_type == R_PPC64_REL24_NOTOC)
15166 {
15167 /* NOTOC calls don't need to restore r2. */
15168 can_plt_call = TRUE;
15169 }
6e1816be 15170
f378ab09 15171 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15172 branch and link followed by a nop. The nop is
15173 replaced by an insn to restore r2. */
6e1816be 15174 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15175 {
ba8ca3e7
AM
15176 unsigned long br;
15177
15178 br = bfd_get_32 (input_bfd,
15179 contents + rel->r_offset);
15180 if ((br & 1) != 0)
41bd81ab 15181 {
ba8ca3e7
AM
15182 unsigned long nop;
15183
15184 nop = bfd_get_32 (input_bfd,
15185 contents + rel->r_offset + 4);
23cedd1d
AM
15186 if (nop == LD_R2_0R1 + STK_TOC (htab))
15187 can_plt_call = TRUE;
15188 else if (nop == NOP
15189 || nop == CROR_151515
15190 || nop == CROR_313131)
a7f2871e 15191 {
ba8ca3e7
AM
15192 if (h != NULL
15193 && (h == htab->tls_get_addr_fd
15194 || h == htab->tls_get_addr)
7c9cf415 15195 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15196 {
15197 /* Special stub used, leave nop alone. */
15198 }
15199 else
a078d95a
AM
15200 bfd_put_32 (input_bfd,
15201 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15202 contents + rel->r_offset + 4);
15203 can_plt_call = TRUE;
a7f2871e 15204 }
41bd81ab 15205 }
5bd4f169 15206 }
721956f4 15207
ba8ca3e7 15208 if (!can_plt_call && h != NULL)
721956f4 15209 {
ba8ca3e7
AM
15210 const char *name = h->elf.root.root.string;
15211
15212 if (*name == '.')
15213 ++name;
15214
15215 if (strncmp (name, "__libc_start_main", 17) == 0
15216 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15217 {
ba8ca3e7
AM
15218 /* Allow crt1 branch to go via a toc adjusting
15219 stub. Other calls that never return could do
15220 the same, if we could detect such. */
b25116a9 15221 can_plt_call = TRUE;
6ab189d5 15222 }
ba8ca3e7
AM
15223 }
15224
15225 if (!can_plt_call)
15226 {
15227 /* g++ as of 20130507 emits self-calls without a
15228 following nop. This is arguably wrong since we
15229 have conflicting information. On the one hand a
15230 global symbol and on the other a local call
15231 sequence, but don't error for this special case.
15232 It isn't possible to cheaply verify we have
15233 exactly such a call. Allow all calls to the same
15234 section. */
15235 asection *code_sec = sec;
15236
15237 if (get_opd_info (sec) != NULL)
ad8e1ba5 15238 {
ba8ca3e7
AM
15239 bfd_vma off = (relocation + addend
15240 - sec->output_section->vma
15241 - sec->output_offset);
bc30df16 15242
ba8ca3e7 15243 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15244 }
ba8ca3e7
AM
15245 if (code_sec == input_section)
15246 can_plt_call = TRUE;
15247 }
15248
15249 if (!can_plt_call)
15250 {
05d0e962
AM
15251 if (stub_entry->stub_type >= ppc_stub_plt_call
15252 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15253 info->callbacks->einfo
695344c0 15254 /* xgettext:c-format */
c1c8c1ef 15255 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15256 "(plt call stub)\n"),
4805fc55
AM
15257 input_bfd, input_section, rel->r_offset, sym_name);
15258 else
15259 info->callbacks->einfo
695344c0 15260 /* xgettext:c-format */
c1c8c1ef 15261 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15262 "(toc save/adjust stub)\n"),
4805fc55 15263 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15264
15265 bfd_set_error (bfd_error_bad_value);
15266 ret = FALSE;
721956f4
AM
15267 }
15268
b25116a9 15269 if (can_plt_call
05d0e962
AM
15270 && stub_entry->stub_type >= ppc_stub_plt_call
15271 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15272 unresolved_reloc = FALSE;
15273 }
15274
6abec6bc
AM
15275 if ((stub_entry == NULL
15276 || stub_entry->stub_type == ppc_stub_long_branch
15277 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15278 && get_opd_info (sec) != NULL)
15279 {
15280 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15281 bfd_vma off = (relocation + addend
15282 - sec->output_section->vma
15283 - sec->output_offset);
aef36ac1 15284 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15285 if (dest != (bfd_vma) -1)
15286 {
15287 relocation = dest;
15288 addend = 0;
bc30df16 15289 reloc_dest = DEST_OPD;
8387904d
AM
15290 }
15291 }
15292
b25116a9
AM
15293 /* If the branch is out of reach we ought to have a long
15294 branch stub. */
15295 from = (rel->r_offset
15296 + input_section->output_offset
15297 + input_section->output_section->vma);
15298
6911b7dc
AM
15299 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15300 ? fdh->elf.other
15301 : sym->st_other);
15302
6abec6bc
AM
15303 if (stub_entry != NULL
15304 && (stub_entry->stub_type == ppc_stub_long_branch
15305 || stub_entry->stub_type == ppc_stub_plt_branch)
15306 && (r_type == R_PPC64_ADDR14_BRTAKEN
15307 || r_type == R_PPC64_ADDR14_BRNTAKEN
15308 || (relocation + addend - from + max_br_offset
15309 < 2 * max_br_offset)))
15310 /* Don't use the stub if this branch is in range. */
15311 stub_entry = NULL;
b25116a9 15312
05d0e962
AM
15313 if (stub_entry != NULL
15314 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15315 || stub_entry->stub_type == ppc_stub_long_branch_both
15316 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15317 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15318 && (r_type != R_PPC64_REL24_NOTOC
15319 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15320 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15321 && (relocation + addend - from + max_br_offset
15322 < 2 * max_br_offset))
15323 stub_entry = NULL;
15324
15325 if (stub_entry != NULL
15326 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15327 || stub_entry->stub_type == ppc_stub_long_branch_both
15328 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15329 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15330 && r_type == R_PPC64_REL24_NOTOC
15331 && (relocation + addend - from + max_br_offset
15332 < 2 * max_br_offset))
15333 stub_entry = NULL;
15334
b25116a9
AM
15335 if (stub_entry != NULL)
15336 {
15337 /* Munge up the value and addend so that we call the stub
15338 rather than the procedure directly. */
a4b6fadd
AM
15339 asection *stub_sec = stub_entry->group->stub_sec;
15340
15341 if (stub_entry->stub_type == ppc_stub_save_res)
15342 relocation += (stub_sec->output_offset
15343 + stub_sec->output_section->vma
15344 + stub_sec->size - htab->sfpr->size
15345 - htab->sfpr->output_offset
15346 - htab->sfpr->output_section->vma);
15347 else
15348 relocation = (stub_entry->stub_offset
15349 + stub_sec->output_offset
15350 + stub_sec->output_section->vma);
b25116a9 15351 addend = 0;
bc30df16 15352 reloc_dest = DEST_STUB;
3b421ab3 15353
05d0e962
AM
15354 if (((stub_entry->stub_type == ppc_stub_plt_call
15355 && ALWAYS_EMIT_R2SAVE)
15356 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15357 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
15358 && !(h != NULL
15359 && (h == htab->tls_get_addr_fd
15360 || h == htab->tls_get_addr)
15361 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15362 && rel + 1 < relend
15363 && rel[1].r_offset == rel->r_offset + 4
15364 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15365 relocation += 4;
05d0e962
AM
15366 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15367 || stub_entry->stub_type == ppc_stub_plt_branch_both
15368 || stub_entry->stub_type == ppc_stub_plt_call_both)
15369 && r_type == R_PPC64_REL24_NOTOC)
15370 relocation += 4;
5663e321
AM
15371
15372 if (r_type == R_PPC64_REL24_NOTOC
15373 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15374 || stub_entry->stub_type == ppc_stub_plt_call_both))
15375 htab->notoc_plt = 1;
b25116a9
AM
15376 }
15377
15378 if (insn != 0)
15379 {
794e51c0 15380 if (is_isa_v2)
721956f4 15381 {
b25116a9
AM
15382 /* Set 'a' bit. This is 0b00010 in BO field for branch
15383 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15384 for branch on CTR insns (BO == 1a00t or 1a01t). */
15385 if ((insn & (0x14 << 21)) == (0x04 << 21))
15386 insn |= 0x02 << 21;
15387 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15388 insn |= 0x08 << 21;
15389 else
15390 break;
15391 }
15392 else
15393 {
15394 /* Invert 'y' bit if not the default. */
4cc603a5 15395 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15396 insn ^= 0x01 << 21;
721956f4 15397 }
b25116a9 15398
95f0d0d2 15399 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15400 }
e86ce104 15401
06da1e8e
AM
15402 /* NOP out calls to undefined weak functions.
15403 We can thus call a weak function without first
15404 checking whether the function is defined. */
b25116a9 15405 else if (h != NULL
039b3fef 15406 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15407 && h->elf.dynindx == -1
05d0e962
AM
15408 && (r_type == R_PPC64_REL24
15409 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15410 && relocation == 0
4cc603a5 15411 && addend == 0)
e86ce104 15412 {
95f0d0d2 15413 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15414 goto copy_reloc;
e86ce104 15415 }
65f38f15 15416 break;
066f4018
AM
15417
15418 case R_PPC64_GOT16_DS:
15419 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15420 if (relocation + addend - from + 0x8000 < 0x10000
15421 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15422 {
15423 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15424 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15425 {
15426 insn += (14u << 26) - (58u << 26);
15427 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15428 r_type = R_PPC64_TOC16;
15429 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15430 }
15431 }
15432 break;
15433
15434 case R_PPC64_GOT16_LO_DS:
15435 case R_PPC64_GOT16_HA:
15436 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15437 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15438 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15439 {
15440 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15441 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15442 {
15443 insn += (14u << 26) - (58u << 26);
15444 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15445 r_type = R_PPC64_TOC16_LO;
15446 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15447 }
15448 else if ((insn & (0x3f << 26)) == 15u << 26 /* addis */)
15449 {
15450 r_type = R_PPC64_TOC16_HA;
15451 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15452 }
15453 }
15454 break;
4a421c53
AM
15455
15456 case R_PPC64_GOT_PCREL34:
15457 from = (rel->r_offset
15458 + input_section->output_section->vma
15459 + input_section->output_offset);
15460 if (relocation - from + (1ULL << 33) < 1ULL << 34
15461 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15462 {
15463 offset = rel->r_offset;
15464 pinsn = bfd_get_32 (input_bfd, contents + offset);
15465 pinsn <<= 32;
15466 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15467 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15468 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15469 {
15470 /* Replace with paddi. */
15471 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15472 r_type = R_PPC64_PCREL34;
15473 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15474 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15475 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15476 goto pcrelopt;
15477 }
15478 }
15479 break;
15480
15481 case R_PPC64_PCREL34:
15482 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15483 {
15484 offset = rel->r_offset;
15485 pinsn = bfd_get_32 (input_bfd, contents + offset);
15486 pinsn <<= 32;
15487 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15488 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15489 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15490 | (14ULL << 26) /* paddi */))
15491 {
15492 pcrelopt:
15493 if (rel + 1 < relend
15494 && rel[1].r_offset == offset
15495 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15496 {
15497 bfd_vma off2 = rel[1].r_addend;
15498 if (off2 == 0)
15499 /* zero means next insn. */
15500 off2 = 8;
15501 off2 += offset;
15502 if (off2 + 4 <= input_section->size)
15503 {
15504 uint64_t pinsn2;
dd9b12c2 15505 bfd_signed_vma addend_off;
4a421c53
AM
15506 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15507 pinsn2 <<= 32;
15508 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15509 {
15510 if (off2 + 8 > input_section->size)
15511 break;
15512 pinsn2 |= bfd_get_32 (input_bfd,
15513 contents + off2 + 4);
15514 }
dd9b12c2 15515 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15516 {
dd9b12c2
AM
15517 addend += addend_off;
15518 rel->r_addend = addend;
4a421c53
AM
15519 bfd_put_32 (input_bfd, pinsn >> 32,
15520 contents + offset);
15521 bfd_put_32 (input_bfd, pinsn,
15522 contents + offset + 4);
15523 bfd_put_32 (input_bfd, pinsn2 >> 32,
15524 contents + off2);
77486630
AM
15525 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15526 bfd_put_32 (input_bfd, pinsn2,
15527 contents + off2 + 4);
4a421c53
AM
15528 }
15529 }
15530 }
15531 }
15532 }
15533 break;
65f38f15 15534 }
5bd4f169 15535
411e1bfb 15536 tls_type = 0;
23cedd1d 15537 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15538 switch (r_type)
15539 {
15540 default:
cf97bcb0
AM
15541 /* xgettext:c-format */
15542 _bfd_error_handler (_("%pB: %s unsupported"),
15543 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15544
65f38f15 15545 bfd_set_error (bfd_error_bad_value);
b34976b6 15546 ret = FALSE;
c316a17c 15547 goto copy_reloc;
5bd4f169 15548
65f38f15 15549 case R_PPC64_NONE:
411e1bfb 15550 case R_PPC64_TLS:
727fc41e
AM
15551 case R_PPC64_TLSGD:
15552 case R_PPC64_TLSLD:
3b421ab3 15553 case R_PPC64_TOCSAVE:
04c9666a
AM
15554 case R_PPC64_GNU_VTINHERIT:
15555 case R_PPC64_GNU_VTENTRY:
006589cf 15556 case R_PPC64_ENTRY:
4a421c53 15557 case R_PPC64_PCREL_OPT:
c316a17c 15558 goto copy_reloc;
5bd4f169
AM
15559
15560 /* GOT16 relocations. Like an ADDR16 using the symbol's
15561 address in the GOT as relocation value instead of the
411e1bfb 15562 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15563 symbol and put the symbol value there. */
411e1bfb
AM
15564 case R_PPC64_GOT_TLSGD16:
15565 case R_PPC64_GOT_TLSGD16_LO:
15566 case R_PPC64_GOT_TLSGD16_HI:
15567 case R_PPC64_GOT_TLSGD16_HA:
c213164a 15568 case R_PPC64_GOT_TLSGD34:
951fd09b 15569 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15570 goto dogot;
15571
15572 case R_PPC64_GOT_TLSLD16:
15573 case R_PPC64_GOT_TLSLD16_LO:
15574 case R_PPC64_GOT_TLSLD16_HI:
15575 case R_PPC64_GOT_TLSLD16_HA:
c213164a 15576 case R_PPC64_GOT_TLSLD34:
951fd09b 15577 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15578 goto dogot;
15579
15580 case R_PPC64_GOT_TPREL16_DS:
15581 case R_PPC64_GOT_TPREL16_LO_DS:
15582 case R_PPC64_GOT_TPREL16_HI:
15583 case R_PPC64_GOT_TPREL16_HA:
c213164a 15584 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
15585 tls_type = TLS_TLS | TLS_TPREL;
15586 goto dogot;
15587
15588 case R_PPC64_GOT_DTPREL16_DS:
15589 case R_PPC64_GOT_DTPREL16_LO_DS:
15590 case R_PPC64_GOT_DTPREL16_HI:
15591 case R_PPC64_GOT_DTPREL16_HA:
c213164a 15592 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
15593 tls_type = TLS_TLS | TLS_DTPREL;
15594 goto dogot;
15595
65f38f15
AM
15596 case R_PPC64_GOT16:
15597 case R_PPC64_GOT16_LO:
15598 case R_PPC64_GOT16_HI:
15599 case R_PPC64_GOT16_HA:
15600 case R_PPC64_GOT16_DS:
15601 case R_PPC64_GOT16_LO_DS:
5663e321 15602 case R_PPC64_GOT_PCREL34:
411e1bfb 15603 dogot:
5bd4f169
AM
15604 {
15605 /* Relocation is to the entry for this symbol in the global
15606 offset table. */
e717da7e 15607 asection *got;
d881513a 15608 bfd_vma *offp;
5bd4f169 15609 bfd_vma off;
d881513a 15610 unsigned long indx = 0;
927be08e 15611 struct got_entry *ent;
65f38f15 15612
d881513a
AM
15613 if (tls_type == (TLS_TLS | TLS_LD)
15614 && (h == NULL
f5385ebf 15615 || !h->elf.def_dynamic))
927be08e 15616 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15617 else
5bd4f169 15618 {
d881513a
AM
15619 if (h != NULL)
15620 {
f0158f44
AM
15621 if (!htab->elf.dynamic_sections_created
15622 || h->elf.dynindx == -1
15623 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15624 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15625 /* This is actually a static link, or it is a
15626 -Bsymbolic link and the symbol is defined
15627 locally, or the symbol was forced to be local
15628 because of a version file. */
15629 ;
15630 else
15631 {
039b3fef 15632 indx = h->elf.dynindx;
d881513a
AM
15633 unresolved_reloc = FALSE;
15634 }
039b3fef 15635 ent = h->elf.got.glist;
d881513a 15636 }
411e1bfb 15637 else
5bd4f169 15638 {
d881513a
AM
15639 if (local_got_ents == NULL)
15640 abort ();
15641 ent = local_got_ents[r_symndx];
5bd4f169 15642 }
d881513a
AM
15643
15644 for (; ent != NULL; ent = ent->next)
133a1f60 15645 if (ent->addend == orig_rel.r_addend
e717da7e 15646 && ent->owner == input_bfd
d881513a
AM
15647 && ent->tls_type == tls_type)
15648 break;
5bd4f169 15649 }
411e1bfb 15650
927be08e
AM
15651 if (ent == NULL)
15652 abort ();
15653 if (ent->is_indirect)
15654 ent = ent->got.ent;
15655 offp = &ent->got.offset;
15656 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15657 if (got == NULL)
15658 abort ();
15659
411e1bfb
AM
15660 /* The offset must always be a multiple of 8. We use the
15661 least significant bit to record whether we have already
15662 processed this entry. */
d881513a 15663 off = *offp;
411e1bfb
AM
15664 if ((off & 1) != 0)
15665 off &= ~1;
5bd4f169
AM
15666 else
15667 {
411e1bfb
AM
15668 /* Generate relocs for the dynamic linker, except in
15669 the case of TLSLD where we'll use one entry per
15670 module. */
25f23106
AM
15671 asection *relgot;
15672 bfd_boolean ifunc;
e717da7e 15673
d881513a 15674 *offp = off | 1;
25f23106
AM
15675 relgot = NULL;
15676 ifunc = (h != NULL
15677 ? h->elf.type == STT_GNU_IFUNC
15678 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15679 if (ifunc)
82e66161
AM
15680 {
15681 relgot = htab->elf.irelplt;
15682 if (indx == 0)
15683 htab->local_ifunc_resolver = 1;
15684 else if (is_static_defined (&h->elf))
15685 htab->maybe_local_ifunc_resolver = 1;
15686 }
f0158f44
AM
15687 else if (indx != 0
15688 || (bfd_link_pic (info)
15689 && (h == NULL
21d68fcd 15690 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf)
f0158f44 15691 || (tls_type == (TLS_TLS | TLS_LD)
f15d0b54
AM
15692 && !h->elf.def_dynamic))
15693 && !(tls_type == (TLS_TLS | TLS_TPREL)
15694 && bfd_link_executable (info)
15695 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15696 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15697 if (relgot != NULL)
5bd4f169 15698 {
e717da7e
AM
15699 outrel.r_offset = (got->output_section->vma
15700 + got->output_offset
411e1bfb 15701 + off);
133a1f60 15702 outrel.r_addend = orig_rel.r_addend;
d881513a 15703 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15704 {
411e1bfb 15705 outrel.r_addend = 0;
e515b051 15706 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15707 if (tls_type == (TLS_TLS | TLS_GD))
15708 {
e717da7e
AM
15709 loc = relgot->contents;
15710 loc += (relgot->reloc_count++
d881513a
AM
15711 * sizeof (Elf64_External_Rela));
15712 bfd_elf64_swap_reloca_out (output_bfd,
15713 &outrel, loc);
e515b051 15714 outrel.r_offset += 8;
133a1f60 15715 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
15716 outrel.r_info
15717 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15718 }
411e1bfb 15719 }
951fd09b 15720 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15721 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15722 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15723 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15724 else if (indx != 0)
15725 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15726 else
81407a69 15727 {
25f23106
AM
15728 if (ifunc)
15729 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15730 else
15731 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15732
15733 /* Write the .got section contents for the sake
15734 of prelink. */
e717da7e 15735 loc = got->contents + off;
23fbd6fa
JJ
15736 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15737 loc);
81407a69 15738 }
81407a69
AM
15739
15740 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15741 {
15742 outrel.r_addend += relocation;
15743 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15744 {
15745 if (htab->elf.tls_sec == NULL)
15746 outrel.r_addend = 0;
15747 else
15748 outrel.r_addend -= htab->elf.tls_sec->vma;
15749 }
e515b051 15750 }
e717da7e
AM
15751 loc = relgot->contents;
15752 loc += (relgot->reloc_count++
411e1bfb
AM
15753 * sizeof (Elf64_External_Rela));
15754 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15755 }
15756
ad8e1ba5 15757 /* Init the .got section contents here if we're not
81407a69 15758 emitting a reloc. */
d881513a 15759 else
411e1bfb 15760 {
133a1f60 15761 relocation += orig_rel.r_addend;
f0158f44 15762 if (tls_type != 0)
411e1bfb 15763 {
989f9879
AM
15764 if (htab->elf.tls_sec == NULL)
15765 relocation = 0;
15766 else
15767 {
f0158f44
AM
15768 if (tls_type & TLS_LD)
15769 relocation = 0;
15770 else
15771 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15772 if (tls_type & TLS_TPREL)
989f9879
AM
15773 relocation += DTP_OFFSET - TP_OFFSET;
15774 }
5bd4f169 15775
f0158f44 15776 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15777 {
15778 bfd_put_64 (output_bfd, relocation,
e717da7e 15779 got->contents + off + 8);
676ee2b5 15780 relocation = 1;
7b609f53 15781 }
411e1bfb
AM
15782 }
15783 bfd_put_64 (output_bfd, relocation,
e717da7e 15784 got->contents + off);
5bd4f169
AM
15785 }
15786 }
15787
65f38f15
AM
15788 if (off >= (bfd_vma) -2)
15789 abort ();
15790
bf102f86 15791 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 15792 addend = 0;
c213164a
AM
15793 if (!(r_type == R_PPC64_GOT_PCREL34
15794 || r_type == R_PPC64_GOT_TLSGD34
15795 || r_type == R_PPC64_GOT_TLSLD34
15796 || r_type == R_PPC64_GOT_TPREL34
15797 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 15798 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15799 }
65f38f15
AM
15800 break;
15801
15802 case R_PPC64_PLT16_HA:
15803 case R_PPC64_PLT16_HI:
15804 case R_PPC64_PLT16_LO:
08be3224 15805 case R_PPC64_PLT16_LO_DS:
5663e321
AM
15806 case R_PPC64_PLT_PCREL34:
15807 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
15808 case R_PPC64_PLT32:
15809 case R_PPC64_PLT64:
23cedd1d 15810 case R_PPC64_PLTSEQ:
5663e321 15811 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 15812 case R_PPC64_PLTCALL:
5663e321 15813 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
15814 /* Relocation is to the entry for this symbol in the
15815 procedure linkage table. */
23cedd1d 15816 unresolved_reloc = TRUE;
cbf95972
AM
15817 {
15818 struct plt_entry **plt_list = NULL;
15819 if (h != NULL)
15820 plt_list = &h->elf.plt.plist;
15821 else if (local_got_ents != NULL)
15822 {
15823 struct plt_entry **local_plt = (struct plt_entry **)
15824 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15825 plt_list = local_plt + r_symndx;
cbf95972
AM
15826 }
15827 if (plt_list)
15828 {
15829 struct plt_entry *ent;
65f38f15 15830
cbf95972
AM
15831 for (ent = *plt_list; ent != NULL; ent = ent->next)
15832 if (ent->plt.offset != (bfd_vma) -1
133a1f60 15833 && ent->addend == orig_rel.r_addend)
cbf95972
AM
15834 {
15835 asection *plt;
08be3224 15836 bfd_vma got;
cbf95972
AM
15837
15838 plt = htab->elf.splt;
15839 if (!htab->elf.dynamic_sections_created
15840 || h == NULL
15841 || h->elf.dynindx == -1)
2d7ad24e
AM
15842 {
15843 if (h != NULL
15844 ? h->elf.type == STT_GNU_IFUNC
15845 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15846 plt = htab->elf.iplt;
15847 else
15848 plt = htab->pltlocal;
15849 }
15850 relocation = (plt->output_section->vma
15851 + plt->output_offset
15852 + ent->plt.offset);
08be3224 15853 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
15854 || r_type == R_PPC64_PLT16_HI
15855 || r_type == R_PPC64_PLT16_LO
15856 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
15857 {
15858 got = (elf_gp (output_bfd)
15859 + htab->sec_info[input_section->id].toc_off);
15860 relocation -= got;
15861 }
133a1f60 15862 addend = 0;
cbf95972
AM
15863 unresolved_reloc = FALSE;
15864 break;
15865 }
15866 }
15867 }
65f38f15 15868 break;
5bd4f169 15869
0b13192e
AM
15870 case R_PPC64_TOC:
15871 /* Relocation value is TOC base. */
15872 relocation = TOCstart;
cf35638d 15873 if (r_symndx == STN_UNDEF)
6f20ed8a 15874 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15875 else if (unresolved_reloc)
15876 ;
6f20ed8a
AM
15877 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15878 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15879 else
15880 unresolved_reloc = TRUE;
ab96bf03 15881 goto dodyn;
0b13192e 15882
5bd4f169
AM
15883 /* TOC16 relocs. We want the offset relative to the TOC base,
15884 which is the address of the start of the TOC plus 0x8000.
15885 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15886 in this order. */
65f38f15
AM
15887 case R_PPC64_TOC16:
15888 case R_PPC64_TOC16_LO:
15889 case R_PPC64_TOC16_HI:
15890 case R_PPC64_TOC16_DS:
15891 case R_PPC64_TOC16_LO_DS:
15892 case R_PPC64_TOC16_HA:
6f20ed8a 15893 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
15894 if (h != NULL)
15895 goto dodyn;
5bd4f169
AM
15896 break;
15897
15898 /* Relocate against the beginning of the section. */
65f38f15
AM
15899 case R_PPC64_SECTOFF:
15900 case R_PPC64_SECTOFF_LO:
15901 case R_PPC64_SECTOFF_HI:
15902 case R_PPC64_SECTOFF_DS:
15903 case R_PPC64_SECTOFF_LO_DS:
15904 case R_PPC64_SECTOFF_HA:
4ce794b7 15905 if (sec != NULL)
65f38f15 15906 addend -= sec->output_section->vma;
5bd4f169
AM
15907 break;
15908
25f23106
AM
15909 case R_PPC64_REL16:
15910 case R_PPC64_REL16_LO:
15911 case R_PPC64_REL16_HI:
15912 case R_PPC64_REL16_HA:
4a969973
AM
15913 case R_PPC64_REL16_HIGH:
15914 case R_PPC64_REL16_HIGHA:
15915 case R_PPC64_REL16_HIGHER:
15916 case R_PPC64_REL16_HIGHERA:
15917 case R_PPC64_REL16_HIGHEST:
15918 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
15919 case R_PPC64_REL16_HIGHER34:
15920 case R_PPC64_REL16_HIGHERA34:
15921 case R_PPC64_REL16_HIGHEST34:
15922 case R_PPC64_REL16_HIGHESTA34:
a680de9a 15923 case R_PPC64_REL16DX_HA:
721956f4
AM
15924 case R_PPC64_REL14:
15925 case R_PPC64_REL14_BRNTAKEN:
15926 case R_PPC64_REL14_BRTAKEN:
5d1634d7 15927 case R_PPC64_REL24:
05d0e962 15928 case R_PPC64_REL24_NOTOC:
5663e321
AM
15929 case R_PPC64_PCREL34:
15930 case R_PPC64_PCREL28:
5d1634d7
AM
15931 break;
15932
411e1bfb
AM
15933 case R_PPC64_TPREL16:
15934 case R_PPC64_TPREL16_LO:
15935 case R_PPC64_TPREL16_HI:
15936 case R_PPC64_TPREL16_HA:
15937 case R_PPC64_TPREL16_DS:
15938 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15939 case R_PPC64_TPREL16_HIGH:
15940 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15941 case R_PPC64_TPREL16_HIGHER:
15942 case R_PPC64_TPREL16_HIGHERA:
15943 case R_PPC64_TPREL16_HIGHEST:
15944 case R_PPC64_TPREL16_HIGHESTA:
c213164a 15945 case R_PPC64_TPREL34:
766bc656
AM
15946 if (h != NULL
15947 && h->elf.root.type == bfd_link_hash_undefweak
15948 && h->elf.dynindx == -1)
15949 {
15950 /* Make this relocation against an undefined weak symbol
15951 resolve to zero. This is really just a tweak, since
15952 code using weak externs ought to check that they are
15953 defined before using them. */
15954 bfd_byte *p = contents + rel->r_offset - d_offset;
15955
95f0d0d2 15956 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15957 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15958 if (insn != 0)
95f0d0d2 15959 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15960 break;
15961 }
989f9879
AM
15962 if (htab->elf.tls_sec != NULL)
15963 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15964 /* The TPREL16 relocs shouldn't really be used in shared
15965 libs or with non-local symbols as that will result in
15966 DT_TEXTREL being set, but support them anyway. */
15967 goto dodyn;
411e1bfb
AM
15968
15969 case R_PPC64_DTPREL16:
15970 case R_PPC64_DTPREL16_LO:
15971 case R_PPC64_DTPREL16_HI:
15972 case R_PPC64_DTPREL16_HA:
15973 case R_PPC64_DTPREL16_DS:
15974 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15975 case R_PPC64_DTPREL16_HIGH:
15976 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15977 case R_PPC64_DTPREL16_HIGHER:
15978 case R_PPC64_DTPREL16_HIGHERA:
15979 case R_PPC64_DTPREL16_HIGHEST:
15980 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 15981 case R_PPC64_DTPREL34:
989f9879
AM
15982 if (htab->elf.tls_sec != NULL)
15983 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15984 break;
15985
45965137
AM
15986 case R_PPC64_ADDR64_LOCAL:
15987 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15988 ? h->elf.other
15989 : sym->st_other);
15990 break;
15991
e515b051
AM
15992 case R_PPC64_DTPMOD64:
15993 relocation = 1;
15994 addend = 0;
15995 goto dodyn;
15996
411e1bfb 15997 case R_PPC64_TPREL64:
989f9879
AM
15998 if (htab->elf.tls_sec != NULL)
15999 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16000 goto dodyn;
16001
16002 case R_PPC64_DTPREL64:
989f9879
AM
16003 if (htab->elf.tls_sec != NULL)
16004 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16005 /* Fall through. */
411e1bfb 16006
65f38f15
AM
16007 /* Relocations that may need to be propagated if this is a
16008 dynamic object. */
04c9666a 16009 case R_PPC64_REL30:
65f38f15
AM
16010 case R_PPC64_REL32:
16011 case R_PPC64_REL64:
16012 case R_PPC64_ADDR14:
16013 case R_PPC64_ADDR14_BRNTAKEN:
16014 case R_PPC64_ADDR14_BRTAKEN:
16015 case R_PPC64_ADDR16:
16016 case R_PPC64_ADDR16_DS:
16017 case R_PPC64_ADDR16_HA:
16018 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16019 case R_PPC64_ADDR16_HIGH:
16020 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16021 case R_PPC64_ADDR16_HIGHER:
16022 case R_PPC64_ADDR16_HIGHERA:
16023 case R_PPC64_ADDR16_HIGHEST:
16024 case R_PPC64_ADDR16_HIGHESTA:
16025 case R_PPC64_ADDR16_LO:
16026 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16027 case R_PPC64_ADDR16_HIGHER34:
16028 case R_PPC64_ADDR16_HIGHERA34:
16029 case R_PPC64_ADDR16_HIGHEST34:
16030 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16031 case R_PPC64_ADDR24:
65f38f15
AM
16032 case R_PPC64_ADDR32:
16033 case R_PPC64_ADDR64:
16034 case R_PPC64_UADDR16:
16035 case R_PPC64_UADDR32:
16036 case R_PPC64_UADDR64:
5663e321
AM
16037 case R_PPC64_D34:
16038 case R_PPC64_D34_LO:
16039 case R_PPC64_D34_HI30:
16040 case R_PPC64_D34_HA30:
16041 case R_PPC64_D28:
411e1bfb 16042 dodyn:
5d1634d7 16043 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16044 break;
16045
41bd81ab
AM
16046 if (NO_OPD_RELOCS && is_opd)
16047 break;
16048
8a9e8e72 16049 if (bfd_link_pic (info)
b1b07054
AM
16050 ? ((h == NULL
16051 || h->dyn_relocs != NULL)
16052 && ((h != NULL && pc_dynrelocs (h))
16053 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16054 : (h != NULL
16055 ? h->dyn_relocs != NULL
d311bc8b 16056 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16057 {
b34976b6 16058 bfd_boolean skip, relocate;
65f38f15 16059 asection *sreloc;
1cf1f670 16060 bfd_vma out_off;
82e66161 16061 long indx = 0;
65f38f15
AM
16062
16063 /* When generating a dynamic object, these relocations
16064 are copied into the output file to be resolved at run
16065 time. */
16066
b34976b6
AM
16067 skip = FALSE;
16068 relocate = FALSE;
65f38f15 16069
1cf1f670
AM
16070 out_off = _bfd_elf_section_offset (output_bfd, info,
16071 input_section, rel->r_offset);
16072 if (out_off == (bfd_vma) -1)
b34976b6 16073 skip = TRUE;
1cf1f670 16074 else if (out_off == (bfd_vma) -2)
b34976b6 16075 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16076 out_off += (input_section->output_section->vma
16077 + input_section->output_offset);
16078 outrel.r_offset = out_off;
411e1bfb 16079 outrel.r_addend = rel->r_addend;
65f38f15 16080
1cf1f670
AM
16081 /* Optimize unaligned reloc use. */
16082 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16083 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16084 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16085 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16086 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16087 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16088 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16089 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16090 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16091
65f38f15 16092 if (skip)
0bb2d96a 16093 memset (&outrel, 0, sizeof outrel);
afe397ea 16094 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16095 && !is_opd
16096 && r_type != R_PPC64_TOC)
14acf4dc 16097 {
82e66161
AM
16098 indx = h->elf.dynindx;
16099 BFD_ASSERT (indx != -1);
16100 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16101 }
65f38f15
AM
16102 else
16103 {
41bd81ab
AM
16104 /* This symbol is local, or marked to become local,
16105 or this is an opd section reloc which must point
16106 at a local function. */
65f38f15 16107 outrel.r_addend += relocation;
e86ce104 16108 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16109 {
3fad3c7c 16110 if (is_opd && h != NULL)
afbe61cf
AM
16111 {
16112 /* Lie about opd entries. This case occurs
16113 when building shared libraries and we
16114 reference a function in another shared
3fad3c7c
AM
16115 lib. The same thing happens for a weak
16116 definition in an application that's
16117 overridden by a strong definition in a
16118 shared lib. (I believe this is a generic
16119 bug in binutils handling of weak syms.)
16120 In these cases we won't use the opd
1e2f5b6e 16121 entry in this lib. */
b34976b6 16122 unresolved_reloc = FALSE;
afbe61cf 16123 }
25f23106
AM
16124 if (!is_opd
16125 && r_type == R_PPC64_ADDR64
16126 && (h != NULL
16127 ? h->elf.type == STT_GNU_IFUNC
16128 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16129 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16130 else
16131 {
16132 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16133
25f23106
AM
16134 /* We need to relocate .opd contents for ld.so.
16135 Prelink also wants simple and consistent rules
16136 for relocs. This make all RELATIVE relocs have
16137 *r_offset equal to r_addend. */
16138 relocate = TRUE;
16139 }
65f38f15
AM
16140 }
16141 else
16142 {
25f23106
AM
16143 if (h != NULL
16144 ? h->elf.type == STT_GNU_IFUNC
16145 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16146 {
25f53a85 16147 info->callbacks->einfo
695344c0 16148 /* xgettext:c-format */
174d0a74 16149 (_("%H: %s for indirect "
c1c8c1ef 16150 "function `%pT' unsupported\n"),
25f53a85 16151 input_bfd, input_section, rel->r_offset,
25f23106
AM
16152 ppc64_elf_howto_table[r_type]->name,
16153 sym_name);
16154 ret = FALSE;
16155 }
cf35638d 16156 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16157 ;
16158 else if (sec == NULL || sec->owner == NULL)
16159 {
16160 bfd_set_error (bfd_error_bad_value);
b34976b6 16161 return FALSE;
65f38f15
AM
16162 }
16163 else
16164 {
f26a3287 16165 asection *osec = sec->output_section;
65f38f15 16166
f26a3287
AM
16167 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16168 {
16169 /* TLS symbol values are relative to the
16170 TLS segment. Dynamic relocations for
16171 local TLS symbols therefore can't be
16172 reduced to a relocation against their
16173 section symbol because it holds the
16174 address of the section, not a value
16175 relative to the TLS segment. We could
16176 change the .tdata dynamic section symbol
16177 to be zero value but STN_UNDEF works
16178 and is used elsewhere, eg. for TPREL64
16179 GOT relocs against local TLS symbols. */
16180 osec = htab->elf.tls_sec;
16181 indx = 0;
16182 }
16183 else
74541ad4 16184 {
74541ad4 16185 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16186 if (indx == 0)
16187 {
16188 if ((osec->flags & SEC_READONLY) == 0
16189 && htab->elf.data_index_section != NULL)
16190 osec = htab->elf.data_index_section;
16191 else
16192 osec = htab->elf.text_index_section;
16193 indx = elf_section_data (osec)->dynindx;
16194 }
16195 BFD_ASSERT (indx != 0);
74541ad4 16196 }
74541ad4 16197
65f38f15
AM
16198 /* We are turning this relocation into one
16199 against a section symbol, so subtract out
16200 the output section's address but not the
16201 offset of the input section in the output
16202 section. */
16203 outrel.r_addend -= osec->vma;
16204 }
16205
16206 outrel.r_info = ELF64_R_INFO (indx, r_type);
16207 }
16208 }
16209
16210 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16211 if (h != NULL
16212 ? h->elf.type == STT_GNU_IFUNC
16213 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16214 {
16215 sreloc = htab->elf.irelplt;
16216 if (indx == 0)
16217 htab->local_ifunc_resolver = 1;
16218 else if (is_static_defined (&h->elf))
16219 htab->maybe_local_ifunc_resolver = 1;
16220 }
65f38f15
AM
16221 if (sreloc == NULL)
16222 abort ();
16223
dfbb6ac9
AM
16224 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16225 >= sreloc->size)
16226 abort ();
947216bf
AM
16227 loc = sreloc->contents;
16228 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16229 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16230
e59a1001
AM
16231 if (!warned_dynamic
16232 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16233 {
16234 info->callbacks->einfo
16235 /* xgettext:c-format */
16236 (_("%X%P: %pB: %s against %pT "
16237 "is not supported by glibc as a dynamic relocation\n"),
16238 input_bfd,
16239 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16240 sym_name);
16241 warned_dynamic = TRUE;
16242 }
16243
65f38f15
AM
16244 /* If this reloc is against an external symbol, it will
16245 be computed at runtime, so there's no need to do
81407a69
AM
16246 anything now. However, for the sake of prelink ensure
16247 that the section contents are a known value. */
2cdcc330 16248 if (!relocate)
81407a69
AM
16249 {
16250 unresolved_reloc = FALSE;
16251 /* The value chosen here is quite arbitrary as ld.so
16252 ignores section contents except for the special
16253 case of .opd where the contents might be accessed
16254 before relocation. Choose zero, as that won't
16255 cause reloc overflow. */
16256 relocation = 0;
16257 addend = 0;
16258 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16259 to improve backward compatibility with older
16260 versions of ld. */
16261 if (r_type == R_PPC64_ADDR64)
16262 addend = outrel.r_addend;
16263 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16264 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16265 addend = outrel.r_offset;
81407a69 16266 }
65f38f15 16267 }
5bd4f169
AM
16268 break;
16269
65f38f15
AM
16270 case R_PPC64_COPY:
16271 case R_PPC64_GLOB_DAT:
16272 case R_PPC64_JMP_SLOT:
25f23106 16273 case R_PPC64_JMP_IREL:
65f38f15
AM
16274 case R_PPC64_RELATIVE:
16275 /* We shouldn't ever see these dynamic relocs in relocatable
16276 files. */
ae9a127f 16277 /* Fall through. */
65f38f15
AM
16278
16279 case R_PPC64_PLTGOT16:
16280 case R_PPC64_PLTGOT16_DS:
16281 case R_PPC64_PLTGOT16_HA:
16282 case R_PPC64_PLTGOT16_HI:
16283 case R_PPC64_PLTGOT16_LO:
16284 case R_PPC64_PLTGOT16_LO_DS:
16285 case R_PPC64_PLTREL32:
16286 case R_PPC64_PLTREL64:
16287 /* These ones haven't been implemented yet. */
16288
25f53a85 16289 info->callbacks->einfo
695344c0 16290 /* xgettext:c-format */
c1c8c1ef 16291 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16292 input_bfd,
4ce794b7 16293 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16294
16295 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16296 ret = FALSE;
c316a17c 16297 goto copy_reloc;
65f38f15 16298 }
5bd4f169 16299
67f0cbdb
AM
16300 /* Multi-instruction sequences that access the TOC can be
16301 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16302 to nop; addi rb,r2,x; */
67f0cbdb
AM
16303 switch (r_type)
16304 {
16305 default:
16306 break;
16307
16308 case R_PPC64_GOT_TLSLD16_HI:
16309 case R_PPC64_GOT_TLSGD16_HI:
16310 case R_PPC64_GOT_TPREL16_HI:
16311 case R_PPC64_GOT_DTPREL16_HI:
16312 case R_PPC64_GOT16_HI:
16313 case R_PPC64_TOC16_HI:
16314 /* These relocs would only be useful if building up an
16315 offset to later add to r2, perhaps in an indexed
16316 addressing mode instruction. Don't try to optimize.
16317 Unfortunately, the possibility of someone building up an
16318 offset like this or even with the HA relocs, means that
16319 we need to check the high insn when optimizing the low
16320 insn. */
16321 break;
16322
5663e321
AM
16323 case R_PPC64_PLTCALL_NOTOC:
16324 if (!unresolved_reloc)
16325 htab->notoc_plt = 1;
16326 /* Fall through. */
23cedd1d
AM
16327 case R_PPC64_PLTCALL:
16328 if (unresolved_reloc)
16329 {
16330 /* No plt entry. Make this into a direct call. */
16331 bfd_byte *p = contents + rel->r_offset;
16332 insn = bfd_get_32 (input_bfd, p);
16333 insn &= 1;
16334 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16335 if (r_type == R_PPC64_PLTCALL)
16336 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16337 unresolved_reloc = save_unresolved_reloc;
16338 r_type = R_PPC64_REL24;
16339 }
16340 break;
16341
5663e321 16342 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16343 case R_PPC64_PLTSEQ:
16344 if (unresolved_reloc)
16345 {
16346 unresolved_reloc = FALSE;
16347 goto nop_it;
16348 }
16349 break;
16350
5663e321
AM
16351 case R_PPC64_PLT_PCREL34_NOTOC:
16352 if (!unresolved_reloc)
16353 htab->notoc_plt = 1;
16354 /* Fall through. */
16355 case R_PPC64_PLT_PCREL34:
16356 if (unresolved_reloc)
16357 {
16358 bfd_byte *p = contents + rel->r_offset;
16359 bfd_put_32 (input_bfd, PNOP >> 32, p);
16360 bfd_put_32 (input_bfd, PNOP, p + 4);
16361 unresolved_reloc = FALSE;
16362 goto copy_reloc;
16363 }
16364 break;
16365
23cedd1d
AM
16366 case R_PPC64_PLT16_HA:
16367 if (unresolved_reloc)
16368 {
16369 unresolved_reloc = FALSE;
16370 goto nop_it;
16371 }
16372 /* Fall through. */
67f0cbdb
AM
16373 case R_PPC64_GOT_TLSLD16_HA:
16374 case R_PPC64_GOT_TLSGD16_HA:
16375 case R_PPC64_GOT_TPREL16_HA:
16376 case R_PPC64_GOT_DTPREL16_HA:
16377 case R_PPC64_GOT16_HA:
16378 case R_PPC64_TOC16_HA:
98528052 16379 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16380 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16381 {
23cedd1d
AM
16382 bfd_byte *p;
16383 nop_it:
16384 p = contents + (rel->r_offset & ~3);
98528052 16385 bfd_put_32 (input_bfd, NOP, p);
d830549d 16386 goto copy_reloc;
98528052 16387 }
67f0cbdb
AM
16388 break;
16389
23cedd1d
AM
16390 case R_PPC64_PLT16_LO:
16391 case R_PPC64_PLT16_LO_DS:
16392 if (unresolved_reloc)
16393 {
16394 unresolved_reloc = FALSE;
16395 goto nop_it;
16396 }
16397 /* Fall through. */
67f0cbdb
AM
16398 case R_PPC64_GOT_TLSLD16_LO:
16399 case R_PPC64_GOT_TLSGD16_LO:
16400 case R_PPC64_GOT_TPREL16_LO_DS:
16401 case R_PPC64_GOT_DTPREL16_LO_DS:
16402 case R_PPC64_GOT16_LO:
16403 case R_PPC64_GOT16_LO_DS:
16404 case R_PPC64_TOC16_LO:
16405 case R_PPC64_TOC16_LO_DS:
98528052 16406 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16407 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16408 {
16409 bfd_byte *p = contents + (rel->r_offset & ~3);
16410 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
16411 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
16412 {
16413 /* Transform addic to addi when we change reg. */
16414 insn &= ~((0x3f << 26) | (0x1f << 16));
16415 insn |= (14u << 26) | (2 << 16);
16416 }
16417 else
67f0cbdb 16418 {
98528052
AM
16419 insn &= ~(0x1f << 16);
16420 insn |= 2 << 16;
67f0cbdb 16421 }
560c8763 16422 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16423 }
16424 break;
9a23f96e
AM
16425
16426 case R_PPC64_TPREL16_HA:
16427 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16428 {
16429 bfd_byte *p = contents + (rel->r_offset & ~3);
16430 insn = bfd_get_32 (input_bfd, p);
16431 if ((insn & ((0x3f << 26) | 0x1f << 16))
16432 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16433 /* xgettext:c-format */
16434 info->callbacks->minfo
16435 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16436 input_bfd, input_section, rel->r_offset,
16437 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16438 else
d830549d
AM
16439 {
16440 bfd_put_32 (input_bfd, NOP, p);
16441 goto copy_reloc;
16442 }
9a23f96e
AM
16443 }
16444 break;
16445
16446 case R_PPC64_TPREL16_LO:
16447 case R_PPC64_TPREL16_LO_DS:
16448 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16449 {
16450 bfd_byte *p = contents + (rel->r_offset & ~3);
16451 insn = bfd_get_32 (input_bfd, p);
16452 insn &= ~(0x1f << 16);
16453 insn |= 13 << 16;
16454 bfd_put_32 (input_bfd, insn, p);
16455 }
16456 break;
67f0cbdb
AM
16457 }
16458
65f38f15
AM
16459 /* Do any further special processing. */
16460 switch (r_type)
16461 {
16462 default:
16463 break;
16464
25f23106 16465 case R_PPC64_REL16_HA:
4a969973
AM
16466 case R_PPC64_REL16_HIGHA:
16467 case R_PPC64_REL16_HIGHERA:
16468 case R_PPC64_REL16_HIGHESTA:
a680de9a 16469 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16470 case R_PPC64_ADDR16_HA:
16471 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16472 case R_PPC64_ADDR16_HIGHERA:
16473 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16474 case R_PPC64_TOC16_HA:
16475 case R_PPC64_SECTOFF_HA:
411e1bfb 16476 case R_PPC64_TPREL16_HA:
f9c6b907 16477 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16478 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16479 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16480 case R_PPC64_DTPREL16_HA:
16481 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16482 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16483 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16484 /* It's just possible that this symbol is a weak symbol
16485 that's not actually defined anywhere. In that case,
16486 'sec' would be NULL, and we should leave the symbol
16487 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16488 if (sec == NULL)
16489 break;
1a0670f3 16490 /* Fall through. */
5c5f6e17
AM
16491
16492 case R_PPC64_GOT16_HA:
16493 case R_PPC64_PLTGOT16_HA:
16494 case R_PPC64_PLT16_HA:
16495 case R_PPC64_GOT_TLSGD16_HA:
16496 case R_PPC64_GOT_TLSLD16_HA:
16497 case R_PPC64_GOT_TPREL16_HA:
16498 case R_PPC64_GOT_DTPREL16_HA:
16499 /* Add 0x10000 if sign bit in 0:15 is set.
16500 Bits 0:15 are not used. */
16501 addend += 0x8000;
65f38f15
AM
16502 break;
16503
5663e321
AM
16504 case R_PPC64_D34_HA30:
16505 case R_PPC64_ADDR16_HIGHERA34:
16506 case R_PPC64_ADDR16_HIGHESTA34:
16507 case R_PPC64_REL16_HIGHERA34:
16508 case R_PPC64_REL16_HIGHESTA34:
16509 if (sec != NULL)
16510 addend += 1ULL << 33;
16511 break;
16512
65f38f15
AM
16513 case R_PPC64_ADDR16_DS:
16514 case R_PPC64_ADDR16_LO_DS:
16515 case R_PPC64_GOT16_DS:
16516 case R_PPC64_GOT16_LO_DS:
16517 case R_PPC64_PLT16_LO_DS:
16518 case R_PPC64_SECTOFF_DS:
16519 case R_PPC64_SECTOFF_LO_DS:
16520 case R_PPC64_TOC16_DS:
16521 case R_PPC64_TOC16_LO_DS:
16522 case R_PPC64_PLTGOT16_DS:
16523 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16524 case R_PPC64_GOT_TPREL16_DS:
16525 case R_PPC64_GOT_TPREL16_LO_DS:
16526 case R_PPC64_GOT_DTPREL16_DS:
16527 case R_PPC64_GOT_DTPREL16_LO_DS:
16528 case R_PPC64_TPREL16_DS:
16529 case R_PPC64_TPREL16_LO_DS:
16530 case R_PPC64_DTPREL16_DS:
16531 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16532 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16533 mask = 3;
a680de9a
PB
16534 /* If this reloc is against an lq, lxv, or stxv insn, then
16535 the value must be a multiple of 16. This is somewhat of
16536 a hack, but the "correct" way to do this by defining _DQ
16537 forms of all the _DS relocs bloats all reloc switches in
16538 this file. It doesn't make much sense to use these
16539 relocs in data, so testing the insn should be safe. */
16540 if ((insn & (0x3f << 26)) == (56u << 26)
16541 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16542 mask = 15;
a680de9a
PB
16543 relocation += addend;
16544 addend = insn & (mask ^ 3);
16545 if ((relocation & mask) != 0)
65f38f15 16546 {
a680de9a 16547 relocation ^= relocation & mask;
25f53a85 16548 info->callbacks->einfo
695344c0 16549 /* xgettext:c-format */
174d0a74 16550 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16551 input_bfd, input_section, rel->r_offset,
d830549d 16552 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16553 mask + 1);
65f38f15 16554 bfd_set_error (bfd_error_bad_value);
b34976b6 16555 ret = FALSE;
c316a17c 16556 goto copy_reloc;
65f38f15
AM
16557 }
16558 break;
5bd4f169
AM
16559 }
16560
239e1f3a
AM
16561 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16562 because such sections are not SEC_ALLOC and thus ld.so will
16563 not process them. */
d830549d 16564 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16565 if (unresolved_reloc
239e1f3a 16566 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16567 && h->elf.def_dynamic)
16568 && _bfd_elf_section_offset (output_bfd, info, input_section,
16569 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16570 {
25f53a85 16571 info->callbacks->einfo
695344c0 16572 /* xgettext:c-format */
c1c8c1ef 16573 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16574 input_bfd, input_section, rel->r_offset,
b80eed39 16575 howto->name,
039b3fef 16576 h->elf.root.root.string);
b34976b6 16577 ret = FALSE;
9c07fe7c 16578 }
5bd4f169 16579
b80eed39
AM
16580 /* 16-bit fields in insns mostly have signed values, but a
16581 few insns have 16-bit unsigned values. Really, we should
16582 have different reloc types. */
16583 if (howto->complain_on_overflow != complain_overflow_dont
16584 && howto->dst_mask == 0xffff
16585 && (input_section->flags & SEC_CODE) != 0)
16586 {
16587 enum complain_overflow complain = complain_overflow_signed;
16588
16589 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
16590 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
16591 complain = complain_overflow_bitfield;
16592 else if (howto->rightshift == 0
16593 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
16594 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
16595 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
16596 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
16597 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
16598 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
16599 complain = complain_overflow_unsigned;
16600 if (howto->complain_on_overflow != complain)
16601 {
16602 alt_howto = *howto;
16603 alt_howto.complain_on_overflow = complain;
16604 howto = &alt_howto;
16605 }
16606 }
16607
5663e321 16608 switch (r_type)
a680de9a 16609 {
5663e321
AM
16610 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16611 case R_PPC64_D34:
16612 case R_PPC64_D34_LO:
16613 case R_PPC64_D34_HI30:
16614 case R_PPC64_D34_HA30:
16615 case R_PPC64_PCREL34:
16616 case R_PPC64_GOT_PCREL34:
c213164a
AM
16617 case R_PPC64_TPREL34:
16618 case R_PPC64_DTPREL34:
16619 case R_PPC64_GOT_TLSGD34:
16620 case R_PPC64_GOT_TLSLD34:
16621 case R_PPC64_GOT_TPREL34:
16622 case R_PPC64_GOT_DTPREL34:
5663e321
AM
16623 case R_PPC64_PLT_PCREL34:
16624 case R_PPC64_PLT_PCREL34_NOTOC:
16625 case R_PPC64_D28:
16626 case R_PPC64_PCREL28:
16627 if (rel->r_offset + 8 > input_section->size)
16628 r = bfd_reloc_outofrange;
16629 else
16630 {
5663e321
AM
16631 relocation += addend;
16632 if (howto->pc_relative)
16633 relocation -= (rel->r_offset
16634 + input_section->output_offset
16635 + input_section->output_section->vma);
16636 relocation >>= howto->rightshift;
16637
16638 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16639 pinsn <<= 32;
16640 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16641
16642 pinsn &= ~howto->dst_mask;
16643 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16644 & howto->dst_mask);
16645 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16646 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16647 r = bfd_reloc_ok;
16648 if (howto->complain_on_overflow == complain_overflow_signed
16649 && (relocation + (1ULL << (howto->bitsize - 1))
16650 >= 1ULL << howto->bitsize))
16651 r = bfd_reloc_overflow;
16652 }
16653 break;
16654
16655 case R_PPC64_REL16DX_HA:
a680de9a
PB
16656 if (rel->r_offset + 4 > input_section->size)
16657 r = bfd_reloc_outofrange;
16658 else
16659 {
16660 relocation += addend;
16661 relocation -= (rel->r_offset
16662 + input_section->output_offset
16663 + input_section->output_section->vma);
3de43e7b 16664 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
16665 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16666 insn &= ~0x1fffc1;
3de43e7b 16667 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
16668 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16669 r = bfd_reloc_ok;
3de43e7b 16670 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
16671 r = bfd_reloc_overflow;
16672 }
5663e321
AM
16673 break;
16674
16675 default:
16676 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16677 contents, rel->r_offset,
16678 relocation, addend);
a680de9a 16679 }
5bd4f169 16680
ef60b7ff 16681 if (r != bfd_reloc_ok)
5bd4f169 16682 {
bc30df16 16683 char *more_info = NULL;
b80eed39 16684 const char *reloc_name = howto->name;
bc30df16
AM
16685
16686 if (reloc_dest != DEST_NORMAL)
16687 {
16688 more_info = bfd_malloc (strlen (reloc_name) + 8);
16689 if (more_info != NULL)
16690 {
16691 strcpy (more_info, reloc_name);
16692 strcat (more_info, (reloc_dest == DEST_OPD
16693 ? " (OPD)" : " (stub)"));
16694 reloc_name = more_info;
16695 }
16696 }
16697
cd27b276 16698 if (r == bfd_reloc_overflow)
5bd4f169 16699 {
8131c122
AM
16700 /* On code like "if (foo) foo();" don't report overflow
16701 on a branch to zero when foo is undefined. */
16702 if (!warned
16703 && (reloc_dest == DEST_STUB
16704 || !(h != NULL
16705 && (h->elf.root.type == bfd_link_hash_undefweak
16706 || h->elf.root.type == bfd_link_hash_undefined)
16707 && is_branch_reloc (r_type))))
1a72702b
AM
16708 info->callbacks->reloc_overflow (info, &h->elf.root,
16709 sym_name, reloc_name,
16710 orig_rel.r_addend,
16711 input_bfd, input_section,
16712 rel->r_offset);
ef60b7ff
AM
16713 }
16714 else
16715 {
25f53a85 16716 info->callbacks->einfo
695344c0 16717 /* xgettext:c-format */
c1c8c1ef 16718 (_("%H: %s against `%pT': error %d\n"),
25f53a85 16719 input_bfd, input_section, rel->r_offset,
bc30df16 16720 reloc_name, sym_name, (int) r);
b34976b6 16721 ret = FALSE;
ef60b7ff 16722 }
bc30df16
AM
16723 if (more_info != NULL)
16724 free (more_info);
5bd4f169 16725 }
c316a17c
AM
16726 copy_reloc:
16727 if (wrel != rel)
16728 *wrel = *rel;
16729 }
16730
16731 if (wrel != rel)
16732 {
16733 Elf_Internal_Shdr *rel_hdr;
16734 size_t deleted = rel - wrel;
16735
16736 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16737 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16738 if (rel_hdr->sh_size == 0)
16739 {
16740 /* It is too late to remove an empty reloc section. Leave
16741 one NONE reloc.
16742 ??? What is wrong with an empty section??? */
16743 rel_hdr->sh_size = rel_hdr->sh_entsize;
16744 deleted -= 1;
16745 }
16746 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16747 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16748 input_section->reloc_count -= deleted;
5bd4f169
AM
16749 }
16750
645ea6a9
AM
16751 /* If we're emitting relocations, then shortly after this function
16752 returns, reloc offsets and addends for this section will be
16753 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
16754 file rather than the input. Save a copy of the relocs for
16755 opd_entry_value. */
0e1862bb 16756 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16757 {
16758 bfd_size_type amt;
16759 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16760 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16761 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16762 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16763 if (rel == NULL)
16764 return FALSE;
16765 memcpy (rel, relocs, amt);
16766 }
5bd4f169
AM
16767 return ret;
16768}
16769
754021d0
AM
16770/* Adjust the value of any local symbols in opd sections. */
16771
6e0b88f1 16772static int
754021d0
AM
16773ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16774 const char *name ATTRIBUTE_UNUSED,
16775 Elf_Internal_Sym *elfsym,
16776 asection *input_sec,
16777 struct elf_link_hash_entry *h)
16778{
74f0fb50
AM
16779 struct _opd_sec_data *opd;
16780 long adjust;
754021d0
AM
16781 bfd_vma value;
16782
4025353c 16783 if (h != NULL)
6e0b88f1 16784 return 1;
4025353c 16785
74f0fb50
AM
16786 opd = get_opd_info (input_sec);
16787 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16788 return 1;
754021d0
AM
16789
16790 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16791 if (!bfd_link_relocatable (info))
754021d0
AM
16792 value -= input_sec->output_section->vma;
16793
51aecdc5 16794 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16795 if (adjust == -1)
6e0b88f1
AM
16796 return 2;
16797
16798 elfsym->st_value += adjust;
16799 return 1;
754021d0
AM
16800}
16801
5bd4f169
AM
16802/* Finish up dynamic symbol handling. We set the contents of various
16803 dynamic sections here. */
16804
b34976b6 16805static bfd_boolean
4ce794b7
AM
16806ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16807 struct bfd_link_info *info,
16808 struct elf_link_hash_entry *h,
4aef7643 16809 Elf_Internal_Sym *sym)
5bd4f169 16810{
65f38f15 16811 struct ppc_link_hash_table *htab;
8387904d 16812 struct plt_entry *ent;
5bd4f169 16813
65f38f15 16814 htab = ppc_hash_table (info);
4dfe6ac6
NC
16815 if (htab == NULL)
16816 return FALSE;
5bd4f169 16817
49c09209
AM
16818 if (!htab->opd_abi && !h->def_regular)
16819 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16820 if (ent->plt.offset != (bfd_vma) -1)
16821 {
16822 /* Mark the symbol as undefined, rather than as
16823 defined in glink. Leave the value if there were
16824 any relocations where pointer equality matters
16825 (this is a clue for the dynamic linker, to make
16826 function pointer comparisons work between an
16827 application and shared library), otherwise set it
16828 to zero. */
16829 sym->st_shndx = SHN_UNDEF;
16830 if (!h->pointer_equality_needed)
16831 sym->st_value = 0;
16832 else if (!h->ref_regular_nonweak)
16833 {
16834 /* This breaks function pointer comparisons, but
16835 that is better than breaking tests for a NULL
16836 function pointer. */
16837 sym->st_value = 0;
16838 }
16839 break;
16840 }
5bd4f169 16841
1bdd8fac
AM
16842 if (h->needs_copy
16843 && (h->root.type == bfd_link_hash_defined
16844 || h->root.type == bfd_link_hash_defweak)
16845 && (h->root.u.def.section == htab->elf.sdynbss
16846 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 16847 {
65f38f15 16848 /* This symbol needs a copy reloc. Set it up. */
49c09209 16849 Elf_Internal_Rela rela;
5474d94f 16850 asection *srel;
49c09209 16851 bfd_byte *loc;
5bd4f169 16852
1bdd8fac 16853 if (h->dynindx == -1)
65f38f15 16854 abort ();
5bd4f169
AM
16855
16856 rela.r_offset = (h->root.u.def.value
16857 + h->root.u.def.section->output_section->vma
16858 + h->root.u.def.section->output_offset);
16859 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16860 rela.r_addend = 0;
afbf7e8e 16861 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16862 srel = htab->elf.sreldynrelro;
16863 else
16864 srel = htab->elf.srelbss;
16865 loc = srel->contents;
16866 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16867 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16868 }
16869
b34976b6 16870 return TRUE;
5bd4f169
AM
16871}
16872
65f38f15
AM
16873/* Used to decide how to sort relocs in an optimal manner for the
16874 dynamic linker, before writing them out. */
16875
16876static enum elf_reloc_type_class
7e612e98
AM
16877ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16878 const asection *rel_sec,
16879 const Elf_Internal_Rela *rela)
65f38f15 16880{
04c9666a 16881 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16882 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16883
33e44f2e 16884 if (rel_sec == htab->elf.irelplt)
7e612e98 16885 return reloc_class_ifunc;
a33d1f77 16886
4ce794b7 16887 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16888 switch (r_type)
65f38f15
AM
16889 {
16890 case R_PPC64_RELATIVE:
16891 return reloc_class_relative;
16892 case R_PPC64_JMP_SLOT:
16893 return reloc_class_plt;
16894 case R_PPC64_COPY:
16895 return reloc_class_copy;
16896 default:
16897 return reloc_class_normal;
16898 }
16899}
16900
5bd4f169
AM
16901/* Finish up the dynamic sections. */
16902
b34976b6 16903static bfd_boolean
4ce794b7
AM
16904ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16905 struct bfd_link_info *info)
5bd4f169 16906{
65f38f15
AM
16907 struct ppc_link_hash_table *htab;
16908 bfd *dynobj;
5bd4f169 16909 asection *sdyn;
5bd4f169 16910
65f38f15 16911 htab = ppc_hash_table (info);
4dfe6ac6
NC
16912 if (htab == NULL)
16913 return FALSE;
16914
65f38f15 16915 dynobj = htab->elf.dynobj;
3d4d4302 16916 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16917
65f38f15 16918 if (htab->elf.dynamic_sections_created)
5bd4f169 16919 {
5bd4f169
AM
16920 Elf64_External_Dyn *dyncon, *dynconend;
16921
33e44f2e 16922 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16923 abort ();
5bd4f169
AM
16924
16925 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16926 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16927 for (; dyncon < dynconend; dyncon++)
16928 {
16929 Elf_Internal_Dyn dyn;
19397422 16930 asection *s;
5bd4f169
AM
16931
16932 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16933
16934 switch (dyn.d_tag)
16935 {
65f38f15
AM
16936 default:
16937 continue;
5bd4f169 16938
5d1634d7 16939 case DT_PPC64_GLINK:
4ce794b7 16940 s = htab->glink;
6348e046 16941 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16942 /* We stupidly defined DT_PPC64_GLINK to be the start
16943 of glink rather than the first entry point, which is
16944 what ld.so needs, and now have a bigger stub to
16945 support automatic multiple TOCs. */
9e390558 16946 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16947 break;
16948
19397422
AM
16949 case DT_PPC64_OPD:
16950 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16951 if (s == NULL)
16952 continue;
16953 dyn.d_un.d_ptr = s->vma;
19397422
AM
16954 break;
16955
e8910a83 16956 case DT_PPC64_OPT:
5663e321
AM
16957 if ((htab->do_multi_toc && htab->multi_toc_needed)
16958 || htab->notoc_plt)
e8910a83 16959 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16960 if (htab->has_plt_localentry0)
16961 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16962 break;
16963
19397422
AM
16964 case DT_PPC64_OPDSZ:
16965 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16966 if (s == NULL)
16967 continue;
eea6121a 16968 dyn.d_un.d_val = s->size;
19397422
AM
16969 break;
16970
65f38f15 16971 case DT_PLTGOT:
33e44f2e 16972 s = htab->elf.splt;
6348e046 16973 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16974 break;
16975
16976 case DT_JMPREL:
33e44f2e 16977 s = htab->elf.srelplt;
6348e046 16978 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16979 break;
5bd4f169 16980
65f38f15 16981 case DT_PLTRELSZ:
33e44f2e 16982 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16983 break;
82e66161
AM
16984
16985 case DT_TEXTREL:
16986 if (htab->local_ifunc_resolver)
16987 info->callbacks->einfo
16988 (_("%X%P: text relocations and GNU indirect "
16989 "functions will result in a segfault at runtime\n"));
16990 else if (htab->maybe_local_ifunc_resolver)
16991 info->callbacks->einfo
16992 (_("%P: warning: text relocations and GNU indirect "
16993 "functions may result in a segfault at runtime\n"));
16994 continue;
5bd4f169 16995 }
5bd4f169 16996
65f38f15 16997 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 16998 }
5bd4f169
AM
16999 }
17000
6528b6eb
AM
17001 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17002 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17003 {
17004 /* Fill in the first entry in the global offset table.
17005 We use it to hold the link-time TOCbase. */
17006 bfd_put_64 (output_bfd,
60ee0d4a 17007 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17008 htab->elf.sgot->contents);
5d1634d7
AM
17009
17010 /* Set .got entry size. */
2cdcc330
AM
17011 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17012 = 8;
5d1634d7
AM
17013 }
17014
6528b6eb
AM
17015 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17016 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17017 {
17018 /* Set .plt entry size. */
33e44f2e 17019 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17020 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17021 }
17022
84f5d08e
AM
17023 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17024 brlt ourselves if emitrelocations. */
17025 if (htab->brlt != NULL
17026 && htab->brlt->reloc_count != 0
17027 && !_bfd_elf_link_output_relocs (output_bfd,
17028 htab->brlt,
d4730f92 17029 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17030 elf_section_data (htab->brlt)->relocs,
17031 NULL))
17032 return FALSE;
17033
176a0d42
AM
17034 if (htab->glink != NULL
17035 && htab->glink->reloc_count != 0
17036 && !_bfd_elf_link_output_relocs (output_bfd,
17037 htab->glink,
d4730f92 17038 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17039 elf_section_data (htab->glink)->relocs,
17040 NULL))
17041 return FALSE;
17042
da44f4e5 17043
df136d64
AM
17044 if (htab->glink_eh_frame != NULL
17045 && htab->glink_eh_frame->size != 0
17046 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17047 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17048 htab->glink_eh_frame,
17049 htab->glink_eh_frame->contents))
17050 return FALSE;
58d180e8 17051
e717da7e 17052 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17053 since we didn't add them to DYNOBJ. We know dynobj is the first
17054 bfd. */
c72f2fb2 17055 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17056 {
17057 asection *s;
7b53ace3 17058
0c8d6e5c 17059 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17060 continue;
17061
e717da7e
AM
17062 s = ppc64_elf_tdata (dynobj)->got;
17063 if (s != NULL
eea6121a 17064 && s->size != 0
e717da7e
AM
17065 && s->output_section != bfd_abs_section_ptr
17066 && !bfd_set_section_contents (output_bfd, s->output_section,
17067 s->contents, s->output_offset,
eea6121a 17068 s->size))
e717da7e
AM
17069 return FALSE;
17070 s = ppc64_elf_tdata (dynobj)->relgot;
17071 if (s != NULL
eea6121a 17072 && s->size != 0
e717da7e
AM
17073 && s->output_section != bfd_abs_section_ptr
17074 && !bfd_set_section_contents (output_bfd, s->output_section,
17075 s->contents, s->output_offset,
eea6121a 17076 s->size))
e717da7e
AM
17077 return FALSE;
17078 }
f6c52c13 17079
b34976b6 17080 return TRUE;
5bd4f169
AM
17081}
17082
5bd4f169 17083#include "elf64-target.h"
7b8e7dad
AM
17084
17085/* FreeBSD support */
17086
17087#undef TARGET_LITTLE_SYM
17088#undef TARGET_LITTLE_NAME
17089
17090#undef TARGET_BIG_SYM
6d00b590 17091#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17092#undef TARGET_BIG_NAME
17093#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17094
17095#undef ELF_OSABI
17096#define ELF_OSABI ELFOSABI_FREEBSD
17097
17098#undef elf64_bed
17099#define elf64_bed elf64_powerpc_fbsd_bed
17100
17101#include "elf64-target.h"
This page took 2.711629 seconds and 4 git commands to generate.