elf_backend_section_flags and _bfd_elf_init_private_section_data
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 128#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 129#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 130#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 131
5bd4f169
AM
132/* The name of the dynamic interpreter. This is put in the .interp
133 section. */
134#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
135
136/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 137#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 138#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
139
140/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 141#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 142
a078d95a
AM
143/* Offsets to some stack save slots. */
144#define STK_LR 16
145#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 146/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
147 CR save slot. Used only by optimised __tls_get_addr call stub,
148 relying on __tls_get_addr_opt not saving CR.. */
149#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
150
5bd4f169 151/* TOC base pointers offset from start of TOC. */
411e1bfb 152#define TOC_BASE_OFF 0x8000
a27e685f
AM
153/* TOC base alignment. */
154#define TOC_BASE_ALIGN 256
411e1bfb
AM
155
156/* Offset of tp and dtp pointers from start of TLS block. */
157#define TP_OFFSET 0x7000
158#define DTP_OFFSET 0x8000
5bd4f169 159
ad8e1ba5
AM
160/* .plt call stub instructions. The normal stub is like this, but
161 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 162 insert an addi to adjust r11. */
a078d95a 163#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
164#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
165#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
166#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
167#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
168#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
169#define BCTR 0x4e800420 /* bctr */
170
07d6d2b8 171#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
172#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
173#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
174#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
175#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
176
177#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
178#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
179#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
180#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
181#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
182#define BNECTR 0x4ca20420 /* bnectr+ */
183#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 184
71a39c98 185#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 186#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 187#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 188
07d6d2b8
AM
189#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
190#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
191#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 192
04bdff6a 193#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 194#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 195#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 196#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
197#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
198#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 199#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 200#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 201#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 202#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 203#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 204#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 205#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
206#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
207#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
208#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
209#define PADDI_R12_PC 0x0610000039800000ULL
210#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 211#define PNOP 0x0700000000000000ULL
a345bc8d 212
9e390558
AM
213/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
214#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 215 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
216 /* 0: */
217 /* .quad plt0-1f */
218 /* __glink: */
219#define MFLR_R12 0x7d8802a6 /* mflr %12 */
220#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
221 /* 1: */
222#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 223 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 224#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
225#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
226 /* ld %12,0(%11) */
227 /* ld %2,8(%11) */
228 /* mtctr %12 */
229 /* ld %11,16(%11) */
ee4bf8d2 230 /* bctr */
b9e5796b
AM
231#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
232#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
233#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
234#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
235#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
236
237/* Pad with this. */
238#define NOP 0x60000000
239
721956f4
AM
240/* Some other nops. */
241#define CROR_151515 0x4def7b82
242#define CROR_313131 0x4ffffb82
243
cedb70c5 244/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
245#define LI_R0_0 0x38000000 /* li %r0,0 */
246#define B_DOT 0x48000000 /* b . */
247
248/* After that, we need two instructions to load the index, followed by
249 a branch. */
250#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 251#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 252
deb0e272
AM
253/* Instructions used by the save and restore reg functions. */
254#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
255#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
256#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
257#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
258#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
259#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
260#define LI_R12_0 0x39800000 /* li %r12,0 */
261#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
262#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
263#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
264#define BLR 0x4e800020 /* blr */
265
41bd81ab
AM
266/* Since .opd is an array of descriptors and each entry will end up
267 with identical R_PPC64_RELATIVE relocs, there is really no need to
268 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 269 relocate .opd without reloc entries. */
41bd81ab
AM
270#ifndef NO_OPD_RELOCS
271#define NO_OPD_RELOCS 0
272#endif
810d4e75 273
a4b6fadd
AM
274#ifndef ARRAY_SIZE
275#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
276#endif
277
810d4e75
AM
278static inline int
279abiversion (bfd *abfd)
280{
281 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
282}
283
284static inline void
285set_abiversion (bfd *abfd, int ver)
286{
287 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
288 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
289}
5bd4f169
AM
290\f
291/* Relocation HOWTO's. */
46807bf4
AM
292/* Like other ELF RELA targets that don't apply multiple
293 field-altering relocations to the same localation, src_mask is
294 always zero and pcrel_offset is the same as pc_relative.
295 PowerPC can always use a zero bitpos, even when the field is not at
296 the LSB. For example, a REL24 could use rightshift=2, bisize=24
297 and bitpos=2 which matches the ABI description, or as we do here,
298 rightshift=0, bitsize=26 and bitpos=0. */
299#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
300 complain, special_func) \
301 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
302 complain_overflow_ ## complain, special_func, \
303 #type, FALSE, 0, mask, pc_relative)
304
04c9666a 305static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 306
f3185997
NC
307static reloc_howto_type ppc64_elf_howto_raw[] =
308{
5bd4f169 309 /* This reloc does nothing. */
46807bf4
AM
310 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
311 bfd_elf_generic_reloc),
5bd4f169
AM
312
313 /* A standard 32 bit relocation. */
46807bf4
AM
314 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
315 bfd_elf_generic_reloc),
5bd4f169
AM
316
317 /* An absolute 26 bit branch; the lower two bits must be zero.
318 FIXME: we don't check that, we just clear them. */
46807bf4
AM
319 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
320 bfd_elf_generic_reloc),
5bd4f169
AM
321
322 /* A standard 16 bit relocation. */
46807bf4
AM
323 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
324 bfd_elf_generic_reloc),
5bd4f169
AM
325
326 /* A 16 bit relocation without overflow. */
46807bf4
AM
327 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
328 bfd_elf_generic_reloc),
5bd4f169
AM
329
330 /* Bits 16-31 of an address. */
46807bf4
AM
331 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
332 bfd_elf_generic_reloc),
5bd4f169
AM
333
334 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
335 bits, treated as a signed number, is negative. */
46807bf4
AM
336 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
337 ppc64_elf_ha_reloc),
5bd4f169
AM
338
339 /* An absolute 16 bit branch; the lower two bits must be zero.
340 FIXME: we don't check that, we just clear them. */
46807bf4
AM
341 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
342 ppc64_elf_branch_reloc),
5bd4f169
AM
343
344 /* An absolute 16 bit branch, for which bit 10 should be set to
345 indicate that the branch is expected to be taken. The lower two
346 bits must be zero. */
46807bf4
AM
347 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
348 ppc64_elf_brtaken_reloc),
5bd4f169
AM
349
350 /* An absolute 16 bit branch, for which bit 10 should be set to
351 indicate that the branch is not expected to be taken. The lower
352 two bits must be zero. */
46807bf4
AM
353 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
354 ppc64_elf_brtaken_reloc),
5bd4f169
AM
355
356 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
357 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
358 ppc64_elf_branch_reloc),
5bd4f169 359
05d0e962 360 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
361 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
362 ppc64_elf_branch_reloc),
05d0e962 363
5bd4f169 364 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
365 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
366 ppc64_elf_branch_reloc),
5bd4f169
AM
367
368 /* A relative 16 bit branch. Bit 10 should be set to indicate that
369 the branch is expected to be taken. The lower two bits must be
370 zero. */
46807bf4
AM
371 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
372 ppc64_elf_brtaken_reloc),
5bd4f169
AM
373
374 /* A relative 16 bit branch. Bit 10 should be set to indicate that
375 the branch is not expected to be taken. The lower two bits must
376 be zero. */
46807bf4
AM
377 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
378 ppc64_elf_brtaken_reloc),
5bd4f169
AM
379
380 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
381 symbol. */
46807bf4
AM
382 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
383 ppc64_elf_unhandled_reloc),
5bd4f169
AM
384
385 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
386 the symbol. */
46807bf4
AM
387 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
388 ppc64_elf_unhandled_reloc),
5bd4f169
AM
389
390 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
391 the symbol. */
46807bf4
AM
392 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
393 ppc64_elf_unhandled_reloc),
5bd4f169
AM
394
395 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
396 the symbol. */
46807bf4
AM
397 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
398 ppc64_elf_unhandled_reloc),
5bd4f169
AM
399
400 /* This is used only by the dynamic linker. The symbol should exist
401 both in the object being run and in some shared library. The
402 dynamic linker copies the data addressed by the symbol from the
403 shared library into the object, because the object being
404 run has to have the data at some particular address. */
46807bf4
AM
405 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
406 ppc64_elf_unhandled_reloc),
5bd4f169
AM
407
408 /* Like R_PPC64_ADDR64, but used when setting global offset table
409 entries. */
46807bf4
AM
410 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
411 ppc64_elf_unhandled_reloc),
5bd4f169
AM
412
413 /* Created by the link editor. Marks a procedure linkage table
414 entry for a symbol. */
46807bf4
AM
415 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
416 ppc64_elf_unhandled_reloc),
5bd4f169
AM
417
418 /* Used only by the dynamic linker. When the object is run, this
419 doubleword64 is set to the load address of the object, plus the
420 addend. */
46807bf4
AM
421 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
422 bfd_elf_generic_reloc),
5bd4f169
AM
423
424 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
425 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
426 bfd_elf_generic_reloc),
5bd4f169
AM
427
428 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
429 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
430 bfd_elf_generic_reloc),
5bd4f169
AM
431
432 /* 32-bit PC relative. */
46807bf4
AM
433 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
434 bfd_elf_generic_reloc),
5bd4f169 435
10ed1bba 436 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
437 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
438 ppc64_elf_unhandled_reloc),
5bd4f169
AM
439
440 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
441 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
442 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
443 ppc64_elf_unhandled_reloc),
5bd4f169
AM
444
445 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
446 the symbol. */
46807bf4
AM
447 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
448 ppc64_elf_unhandled_reloc),
5bd4f169
AM
449
450 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
451 the symbol. */
46807bf4
AM
452 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
453 ppc64_elf_unhandled_reloc),
5bd4f169
AM
454
455 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
456 the symbol. */
46807bf4
AM
457 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
458 ppc64_elf_unhandled_reloc),
5bd4f169 459
c061c2d8 460 /* 16-bit section relative relocation. */
46807bf4
AM
461 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
462 ppc64_elf_sectoff_reloc),
5bd4f169 463
c061c2d8 464 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
465 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
466 ppc64_elf_sectoff_reloc),
5bd4f169
AM
467
468 /* 16-bit upper half section relative relocation. */
46807bf4
AM
469 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
470 ppc64_elf_sectoff_reloc),
5bd4f169
AM
471
472 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
473 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
474 ppc64_elf_sectoff_ha_reloc),
5bd4f169 475
04c9666a 476 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
477 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
478 bfd_elf_generic_reloc),
5bd4f169
AM
479
480 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
481
482 /* A standard 64-bit relocation. */
46807bf4
AM
483 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
484 bfd_elf_generic_reloc),
5bd4f169
AM
485
486 /* The bits 32-47 of an address. */
46807bf4
AM
487 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
488 bfd_elf_generic_reloc),
5bd4f169
AM
489
490 /* The bits 32-47 of an address, plus 1 if the contents of the low
491 16 bits, treated as a signed number, is negative. */
46807bf4
AM
492 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
493 ppc64_elf_ha_reloc),
5bd4f169
AM
494
495 /* The bits 48-63 of an address. */
46807bf4
AM
496 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
497 bfd_elf_generic_reloc),
5bd4f169
AM
498
499 /* The bits 48-63 of an address, plus 1 if the contents of the low
500 16 bits, treated as a signed number, is negative. */
46807bf4
AM
501 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
502 ppc64_elf_ha_reloc),
5bd4f169
AM
503
504 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
505 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
506 bfd_elf_generic_reloc),
5bd4f169
AM
507
508 /* 64-bit relative relocation. */
46807bf4
AM
509 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
510 bfd_elf_generic_reloc),
5bd4f169 511
cedb70c5 512 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
513 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
514 ppc64_elf_unhandled_reloc),
5bd4f169
AM
515
516 /* 64-bit PC relative relocation to the symbol's procedure linkage
517 table. */
518 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
519 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
520 ppc64_elf_unhandled_reloc),
5bd4f169
AM
521
522 /* 16 bit TOC-relative relocation. */
5bd4f169 523 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
524 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
525 ppc64_elf_toc_reloc),
5bd4f169
AM
526
527 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 528 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
529 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
530 ppc64_elf_toc_reloc),
5bd4f169
AM
531
532 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 533 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
534 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
535 ppc64_elf_toc_reloc),
5bd4f169
AM
536
537 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
538 contents of the low 16 bits, treated as a signed number, is
539 negative. */
5bd4f169 540 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
541 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
542 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
543
544 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 545 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
546 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
547 ppc64_elf_toc64_reloc),
5bd4f169
AM
548
549 /* Like R_PPC64_GOT16, but also informs the link editor that the
550 value to relocate may (!) refer to a PLT entry which the link
551 editor (a) may replace with the symbol value. If the link editor
552 is unable to fully resolve the symbol, it may (b) create a PLT
553 entry and store the address to the new PLT entry in the GOT.
554 This permits lazy resolution of function symbols at run time.
555 The link editor may also skip all of this and just (c) emit a
556 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
557 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
558 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
559 ppc64_elf_unhandled_reloc),
411e1bfb
AM
560
561 /* Like R_PPC64_PLTGOT16, but without overflow. */
562 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
563 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
564 ppc64_elf_unhandled_reloc),
411e1bfb
AM
565
566 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
567 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
568 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
569 ppc64_elf_unhandled_reloc),
411e1bfb
AM
570
571 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
572 1 if the contents of the low 16 bits, treated as a signed number,
573 is negative. */
574 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
575 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
576 ppc64_elf_unhandled_reloc),
411e1bfb
AM
577
578 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
579 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
580 bfd_elf_generic_reloc),
411e1bfb
AM
581
582 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
583 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
584 bfd_elf_generic_reloc),
411e1bfb
AM
585
586 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
587 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
588 ppc64_elf_unhandled_reloc),
411e1bfb
AM
589
590 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
591 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
592 ppc64_elf_unhandled_reloc),
411e1bfb
AM
593
594 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
595 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
596 ppc64_elf_unhandled_reloc),
411e1bfb
AM
597
598 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
599 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
600 ppc64_elf_sectoff_reloc),
411e1bfb
AM
601
602 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
603 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
604 ppc64_elf_sectoff_reloc),
411e1bfb
AM
605
606 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
607 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
608 ppc64_elf_toc_reloc),
411e1bfb
AM
609
610 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
611 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
612 ppc64_elf_toc_reloc),
411e1bfb
AM
613
614 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
615 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
616 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
617 ppc64_elf_unhandled_reloc),
411e1bfb
AM
618
619 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
620 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
621 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
622 ppc64_elf_unhandled_reloc),
411e1bfb 623
727fc41e 624 /* Marker relocs for TLS. */
46807bf4
AM
625 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
630
631 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
632 bfd_elf_generic_reloc),
727fc41e 633
23cedd1d
AM
634 /* Marker reloc for optimizing r2 save in prologue rather than on
635 each plt call stub. */
46807bf4
AM
636 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
637 bfd_elf_generic_reloc),
3b421ab3 638
23cedd1d 639 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
640 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
642
643 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
644 bfd_elf_generic_reloc),
23cedd1d 645
411e1bfb
AM
646 /* Computes the load module index of the load module that contains the
647 definition of its TLS sym. */
46807bf4
AM
648 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
649 ppc64_elf_unhandled_reloc),
411e1bfb
AM
650
651 /* Computes a dtv-relative displacement, the difference between the value
652 of sym+add and the base address of the thread-local storage block that
653 contains the definition of sym, minus 0x8000. */
46807bf4
AM
654 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
655 ppc64_elf_unhandled_reloc),
411e1bfb
AM
656
657 /* A 16 bit dtprel reloc. */
46807bf4
AM
658 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
659 ppc64_elf_unhandled_reloc),
411e1bfb
AM
660
661 /* Like DTPREL16, but no overflow. */
46807bf4
AM
662 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
663 ppc64_elf_unhandled_reloc),
411e1bfb
AM
664
665 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
666 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
667 ppc64_elf_unhandled_reloc),
411e1bfb
AM
668
669 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
670 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
671 ppc64_elf_unhandled_reloc),
411e1bfb
AM
672
673 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
674 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
675 ppc64_elf_unhandled_reloc),
411e1bfb
AM
676
677 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
678 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
679 ppc64_elf_unhandled_reloc),
411e1bfb
AM
680
681 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
682 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
683 ppc64_elf_unhandled_reloc),
411e1bfb
AM
684
685 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
686 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
687 ppc64_elf_unhandled_reloc),
411e1bfb
AM
688
689 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
690 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
691 ppc64_elf_unhandled_reloc),
411e1bfb
AM
692
693 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
694 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
695 ppc64_elf_unhandled_reloc),
411e1bfb
AM
696
697 /* Computes a tp-relative displacement, the difference between the value of
698 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
699 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
700 ppc64_elf_unhandled_reloc),
411e1bfb
AM
701
702 /* A 16 bit tprel reloc. */
46807bf4
AM
703 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
704 ppc64_elf_unhandled_reloc),
411e1bfb
AM
705
706 /* Like TPREL16, but no overflow. */
46807bf4
AM
707 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
708 ppc64_elf_unhandled_reloc),
411e1bfb
AM
709
710 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
711 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
712 ppc64_elf_unhandled_reloc),
411e1bfb
AM
713
714 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
715 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
716 ppc64_elf_unhandled_reloc),
411e1bfb
AM
717
718 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
719 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
720 ppc64_elf_unhandled_reloc),
411e1bfb
AM
721
722 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
723 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
724 ppc64_elf_unhandled_reloc),
411e1bfb
AM
725
726 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
727 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
728 ppc64_elf_unhandled_reloc),
411e1bfb
AM
729
730 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
731 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
732 ppc64_elf_unhandled_reloc),
411e1bfb
AM
733
734 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
735 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
736 ppc64_elf_unhandled_reloc),
411e1bfb
AM
737
738 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
739 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
740 ppc64_elf_unhandled_reloc),
411e1bfb
AM
741
742 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
743 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
744 to the first entry relative to the TOC base (r2). */
46807bf4
AM
745 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
746 ppc64_elf_unhandled_reloc),
5bd4f169 747
411e1bfb 748 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
749 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
750 ppc64_elf_unhandled_reloc),
5bd4f169 751
411e1bfb 752 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
753 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
754 ppc64_elf_unhandled_reloc),
5bd4f169 755
411e1bfb 756 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
757 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
758 ppc64_elf_unhandled_reloc),
5bd4f169 759
411e1bfb
AM
760 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
761 with values (sym+add)@dtpmod and zero, and computes the offset to the
762 first entry relative to the TOC base (r2). */
46807bf4
AM
763 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
764 ppc64_elf_unhandled_reloc),
5bd4f169 765
411e1bfb 766 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
767 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
768 ppc64_elf_unhandled_reloc),
5bd4f169 769
411e1bfb 770 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
771 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
772 ppc64_elf_unhandled_reloc),
5bd4f169 773
411e1bfb 774 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
775 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
776 ppc64_elf_unhandled_reloc),
5bd4f169 777
411e1bfb
AM
778 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
779 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
780 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
781 ppc64_elf_unhandled_reloc),
5bd4f169 782
411e1bfb 783 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
784 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
785 ppc64_elf_unhandled_reloc),
5bd4f169 786
411e1bfb 787 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
788 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
789 ppc64_elf_unhandled_reloc),
5bd4f169 790
411e1bfb 791 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
792 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
793 ppc64_elf_unhandled_reloc),
411e1bfb
AM
794
795 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
796 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
797 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
798 ppc64_elf_unhandled_reloc),
5bd4f169 799
411e1bfb 800 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
801 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
802 ppc64_elf_unhandled_reloc),
5bd4f169 803
411e1bfb 804 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
805 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
806 ppc64_elf_unhandled_reloc),
5bd4f169 807
411e1bfb 808 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
809 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
813 ppc64_elf_unhandled_reloc),
814
815 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
816 bfd_elf_generic_reloc),
e054468f 817
25f23106 818 /* A 16 bit relative relocation. */
46807bf4
AM
819 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
820 bfd_elf_generic_reloc),
25f23106
AM
821
822 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
823 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
824 bfd_elf_generic_reloc),
25f23106
AM
825
826 /* The high order 16 bits of a relative address. */
46807bf4
AM
827 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
828 bfd_elf_generic_reloc),
25f23106
AM
829
830 /* The high order 16 bits of a relative address, plus 1 if the contents of
831 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
832 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
833 ppc64_elf_ha_reloc),
25f23106 834
4a969973
AM
835 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
836 bfd_elf_generic_reloc),
837
838 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
839 ppc64_elf_ha_reloc),
840
841 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
842 bfd_elf_generic_reloc),
843
844 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
845 ppc64_elf_ha_reloc),
846
847 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
848 bfd_elf_generic_reloc),
849
850 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
851 ppc64_elf_ha_reloc),
852
a680de9a 853 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
854 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
855 ppc64_elf_ha_reloc),
a680de9a 856
7ba71655 857 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
858 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
859 ppc64_elf_ha_reloc),
7ba71655 860
f9c6b907 861 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
862 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
863 bfd_elf_generic_reloc),
f9c6b907
AM
864
865 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
866 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
867 ppc64_elf_ha_reloc),
f9c6b907
AM
868
869 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
870 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
871 ppc64_elf_unhandled_reloc),
f9c6b907
AM
872
873 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
874 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
875 ppc64_elf_unhandled_reloc),
f9c6b907
AM
876
877 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
878 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
879 ppc64_elf_unhandled_reloc),
f9c6b907
AM
880
881 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
882 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
883 ppc64_elf_unhandled_reloc),
f9c6b907 884
006589cf 885 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
886 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
887 bfd_elf_generic_reloc),
006589cf 888
45965137 889 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
890 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
45965137 892
5663e321
AM
893 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
900 bfd_elf_generic_reloc),
901
902 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_prefix_reloc),
916
917 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
923 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
924 ppc64_elf_unhandled_reloc),
925
c213164a
AM
926 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
941 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
942 ppc64_elf_unhandled_reloc),
943
5663e321
AM
944 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
945 bfd_elf_generic_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
948 ppc64_elf_ha_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
951 bfd_elf_generic_reloc),
952
953 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
954 ppc64_elf_ha_reloc),
955
956 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
957 bfd_elf_generic_reloc),
958
959 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
960 ppc64_elf_ha_reloc),
961
962 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
963 bfd_elf_generic_reloc),
964
965 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
966 ppc64_elf_ha_reloc),
967
968 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
969 ppc64_elf_prefix_reloc),
970
971 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
972 ppc64_elf_prefix_reloc),
973
5bd4f169 974 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
975 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
976 NULL),
5bd4f169
AM
977
978 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
979 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
980 NULL),
5bd4f169
AM
981};
982
983\f
984/* Initialize the ppc64_elf_howto_table, so that linear accesses can
985 be done. */
986
987static void
4ce794b7 988ppc_howto_init (void)
5bd4f169
AM
989{
990 unsigned int i, type;
991
a4b6fadd 992 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
993 {
994 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 995 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
996 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
997 }
998}
999
1000static reloc_howto_type *
f3185997 1001ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 1002 bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
1282 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1283 break;
1284 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1285 break;
1286 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1287 break;
1288 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7
AM
1319static reloc_howto_type *
1320ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1321 const char *r_name)
1322{
1323 unsigned int i;
1324
a4b6fadd 1325 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1326 if (ppc64_elf_howto_raw[i].name != NULL
1327 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1328 return &ppc64_elf_howto_raw[i];
1329
1330 return NULL;
1331}
1332
5bd4f169
AM
1333/* Set the howto pointer for a PowerPC ELF reloc. */
1334
f3185997 1335static bfd_boolean
4aef7643 1336ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1337 Elf_Internal_Rela *dst)
5bd4f169 1338{
65f38f15
AM
1339 unsigned int type;
1340
ef60b7ff 1341 /* Initialize howto table if needed. */
5bd4f169 1342 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1343 ppc_howto_init ();
1344
65f38f15 1345 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1346 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1347 {
695344c0 1348 /* xgettext:c-format */
0aa13fee 1349 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1350 abfd, type);
f3185997
NC
1351 bfd_set_error (bfd_error_bad_value);
1352 return FALSE;
d0fb9a8d 1353 }
65f38f15 1354 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1355 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1356 {
1357 /* xgettext:c-format */
1358 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1359 abfd, type);
1360 bfd_set_error (bfd_error_bad_value);
1361 return FALSE;
1362 }
2cdcc330 1363
f3185997 1364 return TRUE;
5bd4f169
AM
1365}
1366
04c9666a 1367/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1368
1369static bfd_reloc_status_type
4ce794b7
AM
1370ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1371 void *data, asection *input_section,
1372 bfd *output_bfd, char **error_message)
5bd4f169 1373{
a680de9a
PB
1374 enum elf_ppc64_reloc_type r_type;
1375 long insn;
1376 bfd_size_type octets;
3de43e7b 1377 bfd_vma value;
a680de9a 1378
805fc799
AM
1379 /* If this is a relocatable link (output_bfd test tells us), just
1380 call the generic function. Any adjustment will be done at final
1381 link time. */
1382 if (output_bfd != NULL)
cedb70c5 1383 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1384 input_section, output_bfd, error_message);
1385
5663e321
AM
1386 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1387 We won't actually be using the low bits, so trashing them
805fc799 1388 doesn't matter. */
a680de9a 1389 r_type = reloc_entry->howto->type;
5663e321
AM
1390 if (r_type == R_PPC64_ADDR16_HIGHERA34
1391 || r_type == R_PPC64_ADDR16_HIGHESTA34
1392 || r_type == R_PPC64_REL16_HIGHERA34
1393 || r_type == R_PPC64_REL16_HIGHESTA34)
1394 reloc_entry->addend += 1ULL << 33;
1395 else
1396 reloc_entry->addend += 1U << 15;
a680de9a
PB
1397 if (r_type != R_PPC64_REL16DX_HA)
1398 return bfd_reloc_continue;
1399
1400 value = 0;
1401 if (!bfd_is_com_section (symbol->section))
1402 value = symbol->value;
1403 value += (reloc_entry->addend
1404 + symbol->section->output_offset
1405 + symbol->section->output_section->vma);
1406 value -= (reloc_entry->address
1407 + input_section->output_offset
1408 + input_section->output_section->vma);
3de43e7b 1409 value = (bfd_signed_vma) value >> 16;
a680de9a 1410
bb294208 1411 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1412 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1413 insn &= ~0x1fffc1;
3de43e7b 1414 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1415 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1416 if (value + 0x8000 > 0xffff)
a680de9a
PB
1417 return bfd_reloc_overflow;
1418 return bfd_reloc_ok;
805fc799 1419}
5bd4f169 1420
2441e016
AM
1421static bfd_reloc_status_type
1422ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1423 void *data, asection *input_section,
1424 bfd *output_bfd, char **error_message)
1425{
1426 if (output_bfd != NULL)
1427 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1428 input_section, output_bfd, error_message);
1429
699733f6
AM
1430 if (strcmp (symbol->section->name, ".opd") == 0
1431 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1432 {
1433 bfd_vma dest = opd_entry_value (symbol->section,
1434 symbol->value + reloc_entry->addend,
aef36ac1 1435 NULL, NULL, FALSE);
2441e016
AM
1436 if (dest != (bfd_vma) -1)
1437 reloc_entry->addend = dest - (symbol->value
1438 + symbol->section->output_section->vma
1439 + symbol->section->output_offset);
1440 }
810d4e75
AM
1441 else
1442 {
1443 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1444
1445 if (symbol->section->owner != abfd
9f284bf9 1446 && symbol->section->owner != NULL
810d4e75
AM
1447 && abiversion (symbol->section->owner) >= 2)
1448 {
1449 unsigned int i;
1450
1451 for (i = 0; i < symbol->section->owner->symcount; ++i)
1452 {
1453 asymbol *symdef = symbol->section->owner->outsymbols[i];
1454
1455 if (strcmp (symdef->name, symbol->name) == 0)
1456 {
1457 elfsym = (elf_symbol_type *) symdef;
1458 break;
1459 }
1460 }
1461 }
1462 reloc_entry->addend
1463 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1464 }
2441e016
AM
1465 return bfd_reloc_continue;
1466}
1467
805fc799 1468static bfd_reloc_status_type
4ce794b7
AM
1469ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1470 void *data, asection *input_section,
1471 bfd *output_bfd, char **error_message)
805fc799
AM
1472{
1473 long insn;
04c9666a 1474 enum elf_ppc64_reloc_type r_type;
805fc799 1475 bfd_size_type octets;
794e51c0
AM
1476 /* Assume 'at' branch hints. */
1477 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1478
1479 /* If this is a relocatable link (output_bfd test tells us), just
1480 call the generic function. Any adjustment will be done at final
1481 link time. */
5bd4f169 1482 if (output_bfd != NULL)
cedb70c5 1483 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1484 input_section, output_bfd, error_message);
1485
bb294208 1486 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1487 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1488 insn &= ~(0x01 << 21);
4ce794b7 1489 r_type = reloc_entry->howto->type;
805fc799
AM
1490 if (r_type == R_PPC64_ADDR14_BRTAKEN
1491 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1492 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1493
794e51c0 1494 if (is_isa_v2)
5bd4f169 1495 {
805fc799
AM
1496 /* Set 'a' bit. This is 0b00010 in BO field for branch
1497 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1498 for branch on CTR insns (BO == 1a00t or 1a01t). */
1499 if ((insn & (0x14 << 21)) == (0x04 << 21))
1500 insn |= 0x02 << 21;
1501 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1502 insn |= 0x08 << 21;
1503 else
2441e016 1504 goto out;
5bd4f169 1505 }
805fc799
AM
1506 else
1507 {
1508 bfd_vma target = 0;
1509 bfd_vma from;
5bd4f169 1510
805fc799
AM
1511 if (!bfd_is_com_section (symbol->section))
1512 target = symbol->value;
1513 target += symbol->section->output_section->vma;
1514 target += symbol->section->output_offset;
1515 target += reloc_entry->addend;
5bd4f169 1516
805fc799
AM
1517 from = (reloc_entry->address
1518 + input_section->output_offset
1519 + input_section->output_section->vma);
5bd4f169 1520
805fc799
AM
1521 /* Invert 'y' bit if not the default. */
1522 if ((bfd_signed_vma) (target - from) < 0)
1523 insn ^= 0x01 << 21;
1524 }
4ce794b7 1525 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1526 out:
1527 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1528 input_section, output_bfd, error_message);
805fc799 1529}
5bd4f169 1530
805fc799 1531static bfd_reloc_status_type
4ce794b7
AM
1532ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1533 void *data, asection *input_section,
1534 bfd *output_bfd, char **error_message)
805fc799
AM
1535{
1536 /* If this is a relocatable link (output_bfd test tells us), just
1537 call the generic function. Any adjustment will be done at final
1538 link time. */
1539 if (output_bfd != NULL)
cedb70c5 1540 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1541 input_section, output_bfd, error_message);
5bd4f169 1542
805fc799
AM
1543 /* Subtract the symbol section base address. */
1544 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1545 return bfd_reloc_continue;
1546}
1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1558 input_section, output_bfd, error_message);
1559
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
1562
1563 /* Adjust the addend for sign extension of the low 16 bits. */
1564 reloc_entry->addend += 0x8000;
1565 return bfd_reloc_continue;
1566}
1567
1568static bfd_reloc_status_type
4ce794b7
AM
1569ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1570 void *data, asection *input_section,
1571 bfd *output_bfd, char **error_message)
805fc799
AM
1572{
1573 bfd_vma TOCstart;
1574
1575 /* If this is a relocatable link (output_bfd test tells us), just
1576 call the generic function. Any adjustment will be done at final
1577 link time. */
1578 if (output_bfd != NULL)
cedb70c5 1579 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1580 input_section, output_bfd, error_message);
1581
1582 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1583 if (TOCstart == 0)
1c865ab2 1584 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1585
1586 /* Subtract the TOC base address. */
1587 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1588 return bfd_reloc_continue;
1589}
1590
1591static bfd_reloc_status_type
4ce794b7
AM
1592ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1593 void *data, asection *input_section,
1594 bfd *output_bfd, char **error_message)
805fc799
AM
1595{
1596 bfd_vma TOCstart;
1597
1598 /* If this is a relocatable link (output_bfd test tells us), just
1599 call the generic function. Any adjustment will be done at final
1600 link time. */
1601 if (output_bfd != NULL)
cedb70c5 1602 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1603 input_section, output_bfd, error_message);
1604
1605 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1606 if (TOCstart == 0)
1c865ab2 1607 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1608
1609 /* Subtract the TOC base address. */
1610 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1611
1612 /* Adjust the addend for sign extension of the low 16 bits. */
1613 reloc_entry->addend += 0x8000;
1614 return bfd_reloc_continue;
1615}
1616
1617static bfd_reloc_status_type
4ce794b7
AM
1618ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1619 void *data, asection *input_section,
1620 bfd *output_bfd, char **error_message)
805fc799
AM
1621{
1622 bfd_vma TOCstart;
1623 bfd_size_type octets;
1624
1625 /* If this is a relocatable link (output_bfd test tells us), just
1626 call the generic function. Any adjustment will be done at final
1627 link time. */
1628 if (output_bfd != NULL)
cedb70c5 1629 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1630 input_section, output_bfd, error_message);
1631
1632 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1633 if (TOCstart == 0)
1c865ab2 1634 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1635
bb294208 1636 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1637 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1638 return bfd_reloc_ok;
1639}
1640
5663e321
AM
1641static bfd_reloc_status_type
1642ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1643 void *data, asection *input_section,
1644 bfd *output_bfd, char **error_message)
1645{
1646 uint64_t insn;
1647 bfd_vma targ;
1648
1649 if (output_bfd != NULL)
1650 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1651 input_section, output_bfd, error_message);
1652
1653 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1654 insn <<= 32;
1655 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1656
1657 targ = (symbol->section->output_section->vma
1658 + symbol->section->output_offset
1659 + reloc_entry->addend);
1660 if (!bfd_is_com_section (symbol->section))
1661 targ += symbol->value;
1662 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1663 targ += 1ULL << 33;
1664 if (reloc_entry->howto->pc_relative)
1665 {
1666 bfd_vma from = (reloc_entry->address
1667 + input_section->output_offset
1668 + input_section->output_section->vma);
1669 targ -=from;
1670 }
1671 targ >>= reloc_entry->howto->rightshift;
1672 insn &= ~reloc_entry->howto->dst_mask;
1673 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1674 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1675 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1676 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1677 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1678 >= 1ULL << reloc_entry->howto->bitsize))
1679 return bfd_reloc_overflow;
1680 return bfd_reloc_ok;
1681}
1682
805fc799 1683static bfd_reloc_status_type
4ce794b7
AM
1684ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1685 void *data, asection *input_section,
1686 bfd *output_bfd, char **error_message)
805fc799
AM
1687{
1688 /* If this is a relocatable link (output_bfd test tells us), just
1689 call the generic function. Any adjustment will be done at final
1690 link time. */
1691 if (output_bfd != NULL)
cedb70c5 1692 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1693 input_section, output_bfd, error_message);
1694
1695 if (error_message != NULL)
1696 {
1697 static char buf[60];
1698 sprintf (buf, "generic linker can't handle %s",
1699 reloc_entry->howto->name);
1700 *error_message = buf;
1701 }
1702 return bfd_reloc_dangerous;
1703}
1704
927be08e
AM
1705/* Track GOT entries needed for a given symbol. We might need more
1706 than one got entry per symbol. */
1707struct got_entry
1708{
1709 struct got_entry *next;
1710
1711 /* The symbol addend that we'll be placing in the GOT. */
1712 bfd_vma addend;
1713
1714 /* Unlike other ELF targets, we use separate GOT entries for the same
1715 symbol referenced from different input files. This is to support
1716 automatic multiple TOC/GOT sections, where the TOC base can vary
1717 from one input file to another. After partitioning into TOC groups
1718 we merge entries within the group.
1719
1720 Point to the BFD owning this GOT entry. */
1721 bfd *owner;
1722
1723 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1724 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1725 unsigned char tls_type;
927be08e
AM
1726
1727 /* Non-zero if got.ent points to real entry. */
f961d9dd 1728 unsigned char is_indirect;
927be08e
AM
1729
1730 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1731 union
2cdcc330
AM
1732 {
1733 bfd_signed_vma refcount;
1734 bfd_vma offset;
1735 struct got_entry *ent;
1736 } got;
927be08e
AM
1737};
1738
1739/* The same for PLT. */
1740struct plt_entry
1741{
1742 struct plt_entry *next;
1743
1744 bfd_vma addend;
1745
1746 union
2cdcc330
AM
1747 {
1748 bfd_signed_vma refcount;
1749 bfd_vma offset;
1750 } plt;
927be08e
AM
1751};
1752
e717da7e
AM
1753struct ppc64_elf_obj_tdata
1754{
1755 struct elf_obj_tdata elf;
1756
1757 /* Shortcuts to dynamic linker sections. */
1758 asection *got;
1759 asection *relgot;
1760
b3fac117
AM
1761 /* Used during garbage collection. We attach global symbols defined
1762 on removed .opd entries to this section so that the sym is removed. */
1763 asection *deleted_section;
81688140 1764
927be08e 1765 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1766 sections means we potentially need one of these for each input bfd. */
927be08e 1767 struct got_entry tlsld_got;
8860955f 1768
2cdcc330
AM
1769 union
1770 {
729eabd5
AM
1771 /* A copy of relocs before they are modified for --emit-relocs. */
1772 Elf_Internal_Rela *relocs;
1773
1774 /* Section contents. */
1775 bfd_byte *contents;
1776 } opd;
d77c8a4b
AM
1777
1778 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1779 the reloc to be in the range -32768 to 32767. */
98528052
AM
1780 unsigned int has_small_toc_reloc : 1;
1781
560c8763
AM
1782 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1783 instruction not one we handle. */
1784 unsigned int unexpected_toc_insn : 1;
066f4018 1785
903b777d
AM
1786 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1787 this file. */
1788 unsigned int has_optrel : 1;
e717da7e
AM
1789};
1790
1791#define ppc64_elf_tdata(bfd) \
1792 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1793
1794#define ppc64_tlsld_got(bfd) \
1795 (&ppc64_elf_tdata (bfd)->tlsld_got)
1796
0c8d6e5c
AM
1797#define is_ppc64_elf(bfd) \
1798 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1799 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1800
e717da7e
AM
1801/* Override the generic function because we store some extras. */
1802
1803static bfd_boolean
1804ppc64_elf_mkobject (bfd *abfd)
1805{
0ffa91dd 1806 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1807 PPC64_ELF_DATA);
e717da7e
AM
1808}
1809
feee612b 1810/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1811 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1812
b34976b6 1813static bfd_boolean
4ce794b7 1814ppc64_elf_object_p (bfd *abfd)
feee612b 1815{
14b57c7c
AM
1816 if (!abfd->arch_info->the_default)
1817 return TRUE;
1818
1819 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1820 {
1821 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1822
1823 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1824 {
1825 /* Relies on arch after 32 bit default being 64 bit default. */
1826 abfd->arch_info = abfd->arch_info->next;
1827 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1828 }
1829 }
14b57c7c 1830 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1831}
1832
d37c89e5
AM
1833/* Support for core dump NOTE sections. */
1834
1835static bfd_boolean
1836ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1837{
eea6121a 1838 size_t offset, size;
d37c89e5
AM
1839
1840 if (note->descsz != 504)
1841 return FALSE;
1842
1843 /* pr_cursig */
228e534f 1844 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1845
1846 /* pr_pid */
228e534f 1847 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1848
1849 /* pr_reg */
1850 offset = 112;
eea6121a 1851 size = 384;
d37c89e5
AM
1852
1853 /* Make a ".reg/999" section. */
1854 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1855 size, note->descpos + offset);
d37c89e5
AM
1856}
1857
1858static bfd_boolean
1859ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1860{
1861 if (note->descsz != 136)
1862 return FALSE;
1863
228e534f 1864 elf_tdata (abfd)->core->pid
bc989cdc 1865 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1866 elf_tdata (abfd)->core->program
d37c89e5 1867 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1868 elf_tdata (abfd)->core->command
d37c89e5
AM
1869 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1870
1871 return TRUE;
1872}
1873
183e98be
AM
1874static char *
1875ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1876 ...)
1877{
1878 switch (note_type)
1879 {
1880 default:
1881 return NULL;
1882
1883 case NT_PRPSINFO:
1884 {
9ef6d1e3 1885 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1886 va_list ap;
1887
1888 va_start (ap, note_type);
75cd47ed 1889 memset (data, 0, sizeof (data));
183e98be 1890 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1891#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1892 DIAGNOSTIC_PUSH;
be3e27bb 1893 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1894 -Wstringop-truncation:
1895 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1896 */
95da9854
L
1897 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1898#endif
183e98be 1899 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1900#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1901 DIAGNOSTIC_POP;
fe75810f 1902#endif
183e98be
AM
1903 va_end (ap);
1904 return elfcore_write_note (abfd, buf, bufsiz,
1905 "CORE", note_type, data, sizeof (data));
1906 }
1907
1908 case NT_PRSTATUS:
1909 {
1910 char data[504];
1911 va_list ap;
1912 long pid;
1913 int cursig;
1914 const void *greg;
1915
1916 va_start (ap, note_type);
1917 memset (data, 0, 112);
1918 pid = va_arg (ap, long);
1919 bfd_put_32 (abfd, pid, data + 32);
1920 cursig = va_arg (ap, int);
1921 bfd_put_16 (abfd, cursig, data + 12);
1922 greg = va_arg (ap, const void *);
1923 memcpy (data + 112, greg, 384);
1924 memset (data + 496, 0, 8);
1925 va_end (ap);
1926 return elfcore_write_note (abfd, buf, bufsiz,
1927 "CORE", note_type, data, sizeof (data));
1928 }
1929 }
1930}
1931
5d35169e
AM
1932/* Add extra PPC sections. */
1933
2cdcc330 1934static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1935{
07d6d2b8
AM
1936 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1937 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1938 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1939 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1940 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1941 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1942 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1943};
1944
7c8fe5c4
AM
1945enum _ppc64_sec_type {
1946 sec_normal = 0,
1947 sec_opd = 1,
1948 sec_toc = 2
1949};
1950
f0abc2a1
AM
1951struct _ppc64_elf_section_data
1952{
1953 struct bfd_elf_section_data elf;
411e1bfb 1954
f0abc2a1
AM
1955 union
1956 {
51aecdc5
AM
1957 /* An array with one entry for each opd function descriptor,
1958 and some spares since opd entries may be either 16 or 24 bytes. */
1959#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1960 struct _opd_sec_data
1961 {
1962 /* Points to the function code section for local opd entries. */
1963 asection **func_sec;
1964
1965 /* After editing .opd, adjust references to opd local syms. */
1966 long *adjust;
1967 } opd;
7c8fe5c4 1968
3a71aa26
AM
1969 /* An array for toc sections, indexed by offset/8. */
1970 struct _toc_sec_data
1971 {
1972 /* Specifies the relocation symbol index used at a given toc offset. */
1973 unsigned *symndx;
1974
1975 /* And the relocation addend. */
1976 bfd_vma *add;
1977 } toc;
7c8fe5c4
AM
1978 } u;
1979
1980 enum _ppc64_sec_type sec_type:2;
411e1bfb 1981
7c8fe5c4
AM
1982 /* Flag set when small branches are detected. Used to
1983 select suitable defaults for the stub group size. */
1984 unsigned int has_14bit_branch:1;
3e04d765
AM
1985
1986 /* Flag set when PLTCALL relocs are detected. */
1987 unsigned int has_pltcall:1;
066f4018 1988
903b777d
AM
1989 /* Flag set when section has PLT/GOT/TOC relocations that can be
1990 optimised. */
1991 unsigned int has_optrel:1;
f0abc2a1
AM
1992};
1993
1994#define ppc64_elf_section_data(sec) \
411e1bfb 1995 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1996
1997static bfd_boolean
4ce794b7 1998ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1999{
f592407e
AM
2000 if (!sec->used_by_bfd)
2001 {
2002 struct _ppc64_elf_section_data *sdata;
986f0783 2003 size_t amt = sizeof (*sdata);
f0abc2a1 2004
f592407e
AM
2005 sdata = bfd_zalloc (abfd, amt);
2006 if (sdata == NULL)
2007 return FALSE;
2008 sec->used_by_bfd = sdata;
2009 }
f0abc2a1
AM
2010
2011 return _bfd_elf_new_section_hook (abfd, sec);
2012}
4025353c 2013
74f0fb50 2014static struct _opd_sec_data *
4025353c
AM
2015get_opd_info (asection * sec)
2016{
2017 if (sec != NULL
2018 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2019 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2020 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2021 return NULL;
2022}
90e3cdf2
JJ
2023\f
2024/* Parameters for the qsort hook. */
90e3cdf2 2025static bfd_boolean synthetic_relocatable;
cd285db5 2026static asection *synthetic_opd;
90e3cdf2 2027
699733f6 2028/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2029
2030static int
2031compare_symbols (const void *ap, const void *bp)
2032{
2cdcc330
AM
2033 const asymbol *a = *(const asymbol **) ap;
2034 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2035
699733f6
AM
2036 /* Section symbols first. */
2037 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2038 return -1;
699733f6 2039 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2040 return 1;
2041
699733f6 2042 /* then .opd symbols. */
cd285db5
AM
2043 if (synthetic_opd != NULL)
2044 {
2045 if (strcmp (a->section->name, ".opd") == 0
2046 && strcmp (b->section->name, ".opd") != 0)
2047 return -1;
2048 if (strcmp (a->section->name, ".opd") != 0
2049 && strcmp (b->section->name, ".opd") == 0)
2050 return 1;
2051 }
90e3cdf2 2052
699733f6 2053 /* then other code symbols. */
2cdcc330
AM
2054 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2055 == (SEC_CODE | SEC_ALLOC))
2056 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2057 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2058 return -1;
2059
2cdcc330
AM
2060 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2061 != (SEC_CODE | SEC_ALLOC))
2062 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2063 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2064 return 1;
2065
2066 if (synthetic_relocatable)
2067 {
2068 if (a->section->id < b->section->id)
2069 return -1;
2070
2071 if (a->section->id > b->section->id)
2072 return 1;
2073 }
2074
2075 if (a->value + a->section->vma < b->value + b->section->vma)
2076 return -1;
2077
2078 if (a->value + a->section->vma > b->value + b->section->vma)
2079 return 1;
2080
4d35a0aa
AM
2081 /* For syms with the same value, prefer strong dynamic global function
2082 syms over other syms. */
2083 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2084 return -1;
2085
2086 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2087 return 1;
2088
2089 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2090 return -1;
2091
2092 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2093 return 1;
2094
2095 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2096 return -1;
2097
2098 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2099 return 1;
2100
2101 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2102 return -1;
2103
2104 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2105 return 1;
2106
dcea6a95
AM
2107 /* Finally, sort on where the symbol is in memory. The symbols will
2108 be in at most two malloc'd blocks, one for static syms, one for
2109 dynamic syms, and we distinguish the two blocks above by testing
2110 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2111 originally in the same order as the symbols (and we're not
2112 sorting the symbols themselves), this ensures a stable sort. */
2113 if (a < b)
2114 return -1;
2115 if (a > b)
2116 return 1;
2117 return 0;
90e3cdf2
JJ
2118}
2119
699733f6 2120/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2121
699733f6 2122static asymbol *
9ad9b810
AM
2123sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2124 bfd_vma value)
90e3cdf2 2125{
9ad9b810 2126 size_t mid;
90e3cdf2 2127
7292b3ac 2128 if (id == (unsigned) -1)
699733f6
AM
2129 {
2130 while (lo < hi)
2131 {
2132 mid = (lo + hi) >> 1;
2133 if (syms[mid]->value + syms[mid]->section->vma < value)
2134 lo = mid + 1;
2135 else if (syms[mid]->value + syms[mid]->section->vma > value)
2136 hi = mid;
2137 else
2138 return syms[mid];
2139 }
2140 }
2141 else
2142 {
2143 while (lo < hi)
2144 {
2145 mid = (lo + hi) >> 1;
2146 if (syms[mid]->section->id < id)
2147 lo = mid + 1;
2148 else if (syms[mid]->section->id > id)
2149 hi = mid;
2150 else if (syms[mid]->value < value)
2151 lo = mid + 1;
2152 else if (syms[mid]->value > value)
2153 hi = mid;
2154 else
2155 return syms[mid];
2156 }
2157 }
2158 return NULL;
90e3cdf2
JJ
2159}
2160
468392fb
AM
2161static bfd_boolean
2162section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2163{
2164 bfd_vma vma = *(bfd_vma *) ptr;
2165 return ((section->flags & SEC_ALLOC) != 0
2166 && section->vma <= vma
2167 && vma < section->vma + section->size);
2168}
2169
699733f6 2170/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2171 entry syms. Also generate @plt symbols for the glink branch table.
2172 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2173
2174static long
a7535cf3
AM
2175ppc64_elf_get_synthetic_symtab (bfd *abfd,
2176 long static_count, asymbol **static_syms,
2177 long dyn_count, asymbol **dyn_syms,
c9727e01 2178 asymbol **ret)
90e3cdf2
JJ
2179{
2180 asymbol *s;
0ccf57bd 2181 size_t i, j, count;
90e3cdf2 2182 char *names;
0ccf57bd 2183 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2184 asection *opd = NULL;
90e3cdf2 2185 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2186 asymbol **syms;
ee67d69a 2187 int abi = abiversion (abfd);
90e3cdf2
JJ
2188
2189 *ret = NULL;
2190
ee67d69a
AM
2191 if (abi < 2)
2192 {
2193 opd = bfd_get_section_by_name (abfd, ".opd");
2194 if (opd == NULL && abi == 1)
2195 return 0;
2196 }
90e3cdf2 2197
a5259595
AM
2198 syms = NULL;
2199 codesecsym = 0;
2200 codesecsymend = 0;
2201 secsymend = 0;
2202 opdsymend = 0;
2203 symcount = 0;
2204 if (opd != NULL)
c9727e01 2205 {
a5259595
AM
2206 symcount = static_count;
2207 if (!relocatable)
2208 symcount += dyn_count;
2209 if (symcount == 0)
2210 return 0;
c9727e01 2211
a5259595
AM
2212 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2213 if (syms == NULL)
2214 return -1;
90e3cdf2 2215
a5259595
AM
2216 if (!relocatable && static_count != 0 && dyn_count != 0)
2217 {
2218 /* Use both symbol tables. */
2219 memcpy (syms, static_syms, static_count * sizeof (*syms));
2220 memcpy (syms + static_count, dyn_syms,
2221 (dyn_count + 1) * sizeof (*syms));
2222 }
2223 else if (!relocatable && static_count == 0)
2224 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2225 else
2226 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2227
0ccf57bd
AM
2228 /* Trim uninteresting symbols. Interesting symbols are section,
2229 function, and notype symbols. */
2230 for (i = 0, j = 0; i < symcount; ++i)
2231 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2232 | BSF_RELC | BSF_SRELC)) == 0)
2233 syms[j++] = syms[i];
2234 symcount = j;
2235
a5259595
AM
2236 synthetic_relocatable = relocatable;
2237 synthetic_opd = opd;
2238 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2239
a5259595
AM
2240 if (!relocatable && symcount > 1)
2241 {
bfa5bd2a
PA
2242 /* Trim duplicate syms, since we may have merged the normal
2243 and dynamic symbols. Actually, we only care about syms
2244 that have different values, so trim any with the same
2245 value. Don't consider ifunc and ifunc resolver symbols
2246 duplicates however, because GDB wants to know whether a
2247 text symbol is an ifunc resolver. */
a5259595 2248 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2249 {
2250 const asymbol *s0 = syms[i - 1];
2251 const asymbol *s1 = syms[i];
2252
2253 if ((s0->value + s0->section->vma
2254 != s1->value + s1->section->vma)
2255 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2256 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2257 syms[j++] = syms[i];
2258 }
a5259595
AM
2259 symcount = j;
2260 }
699733f6 2261
a5259595
AM
2262 i = 0;
2263 /* Note that here and in compare_symbols we can't compare opd and
2264 sym->section directly. With separate debug info files, the
2265 symbols will be extracted from the debug file while abfd passed
2266 to this function is the real binary. */
0ccf57bd 2267 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2268 ++i;
2269 codesecsym = i;
2270
2271 for (; i < symcount; ++i)
2272 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2273 | SEC_THREAD_LOCAL))
2274 != (SEC_CODE | SEC_ALLOC))
2275 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2276 break;
2277 codesecsymend = i;
2278
2279 for (; i < symcount; ++i)
2280 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2281 break;
2282 secsymend = i;
2283
2284 for (; i < symcount; ++i)
2285 if (strcmp (syms[i]->section->name, ".opd") != 0)
2286 break;
2287 opdsymend = i;
2288
2289 for (; i < symcount; ++i)
2cdcc330
AM
2290 if (((syms[i]->section->flags
2291 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2292 != (SEC_CODE | SEC_ALLOC))
2293 break;
2294 symcount = i;
2295 }
c9727e01 2296 count = 0;
90e3cdf2 2297
699733f6 2298 if (relocatable)
90e3cdf2 2299 {
699733f6
AM
2300 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2301 arelent *r;
2302 size_t size;
0ccf57bd 2303 size_t relcount;
90e3cdf2 2304
468392fb
AM
2305 if (opdsymend == secsymend)
2306 goto done;
2307
699733f6 2308 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2309 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2310 if (relcount == 0)
c9727e01 2311 goto done;
90e3cdf2 2312
7356fed5
AM
2313 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2314 {
2315 count = -1;
2316 goto done;
2317 }
2318
699733f6 2319 size = 0;
595da8c5 2320 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2321 {
2322 asymbol *sym;
90e3cdf2 2323
595da8c5 2324 while (r < opd->relocation + relcount
699733f6
AM
2325 && r->address < syms[i]->value + opd->vma)
2326 ++r;
90e3cdf2 2327
595da8c5 2328 if (r == opd->relocation + relcount)
699733f6 2329 break;
90e3cdf2 2330
699733f6
AM
2331 if (r->address != syms[i]->value + opd->vma)
2332 continue;
90e3cdf2 2333
699733f6
AM
2334 if (r->howto->type != R_PPC64_ADDR64)
2335 continue;
90e3cdf2 2336
699733f6
AM
2337 sym = *r->sym_ptr_ptr;
2338 if (!sym_exists_at (syms, opdsymend, symcount,
2339 sym->section->id, sym->value + r->addend))
2340 {
2341 ++count;
2342 size += sizeof (asymbol);
2343 size += strlen (syms[i]->name) + 2;
2344 }
2345 }
90e3cdf2 2346
c4b0b099
AM
2347 if (size == 0)
2348 goto done;
699733f6
AM
2349 s = *ret = bfd_malloc (size);
2350 if (s == NULL)
2351 {
7356fed5 2352 count = -1;
c9727e01 2353 goto done;
699733f6 2354 }
90e3cdf2 2355
699733f6 2356 names = (char *) (s + count);
90e3cdf2 2357
595da8c5 2358 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2359 {
699733f6 2360 asymbol *sym;
90e3cdf2 2361
595da8c5 2362 while (r < opd->relocation + relcount
699733f6
AM
2363 && r->address < syms[i]->value + opd->vma)
2364 ++r;
90e3cdf2 2365
595da8c5 2366 if (r == opd->relocation + relcount)
699733f6
AM
2367 break;
2368
2369 if (r->address != syms[i]->value + opd->vma)
2370 continue;
2371
2372 if (r->howto->type != R_PPC64_ADDR64)
2373 continue;
90e3cdf2 2374
699733f6
AM
2375 sym = *r->sym_ptr_ptr;
2376 if (!sym_exists_at (syms, opdsymend, symcount,
2377 sym->section->id, sym->value + r->addend))
2378 {
2379 size_t len;
2380
2381 *s = *syms[i];
6ba2a415 2382 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2383 s->section = sym->section;
2384 s->value = sym->value + r->addend;
2385 s->name = names;
2386 *names++ = '.';
2387 len = strlen (syms[i]->name);
2388 memcpy (names, syms[i]->name, len + 1);
2389 names += len + 1;
6f610d07
UW
2390 /* Have udata.p point back to the original symbol this
2391 synthetic symbol was derived from. */
2392 s->udata.p = syms[i];
699733f6
AM
2393 s++;
2394 }
2395 }
2396 }
2397 else
90e3cdf2 2398 {
468392fb 2399 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2400 bfd_byte *contents = NULL;
699733f6 2401 size_t size;
0ccf57bd 2402 size_t plt_count = 0;
468392fb
AM
2403 bfd_vma glink_vma = 0, resolv_vma = 0;
2404 asection *dynamic, *glink = NULL, *relplt = NULL;
2405 arelent *p;
90e3cdf2 2406
ee67d69a 2407 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2408 {
c4b0b099
AM
2409 free_contents_and_exit_err:
2410 count = -1;
ee67d69a 2411 free_contents_and_exit:
699733f6 2412 if (contents)
ee67d69a 2413 free (contents);
c9727e01 2414 goto done;
699733f6 2415 }
90e3cdf2 2416
699733f6
AM
2417 size = 0;
2418 for (i = secsymend; i < opdsymend; ++i)
2419 {
2420 bfd_vma ent;
90e3cdf2 2421
5ef11c02
AM
2422 /* Ignore bogus symbols. */
2423 if (syms[i]->value > opd->size - 8)
2424 continue;
2425
699733f6
AM
2426 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2427 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2428 {
2429 ++count;
2430 size += sizeof (asymbol);
2431 size += strlen (syms[i]->name) + 2;
2432 }
2433 }
90e3cdf2 2434
468392fb 2435 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2436 if (dyn_count != 0
2437 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2438 {
2439 bfd_byte *dynbuf, *extdyn, *extdynend;
2440 size_t extdynsize;
2441 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2442
2443 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2444 goto free_contents_and_exit_err;
468392fb
AM
2445
2446 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2447 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2448
2449 extdyn = dynbuf;
2450 extdynend = extdyn + dynamic->size;
2451 for (; extdyn < extdynend; extdyn += extdynsize)
2452 {
2453 Elf_Internal_Dyn dyn;
2454 (*swap_dyn_in) (abfd, extdyn, &dyn);
2455
2456 if (dyn.d_tag == DT_NULL)
2457 break;
2458
2459 if (dyn.d_tag == DT_PPC64_GLINK)
2460 {
9e390558
AM
2461 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2462 See comment in ppc64_elf_finish_dynamic_sections. */
2463 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2464 /* The .glink section usually does not survive the final
2465 link; search for the section (usually .text) where the
2466 glink stubs now reside. */
2467 glink = bfd_sections_find_if (abfd, section_covers_vma,
2468 &glink_vma);
2469 break;
2470 }
2471 }
2472
2473 free (dynbuf);
2474 }
2475
2476 if (glink != NULL)
2477 {
2478 /* Determine __glink trampoline by reading the relative branch
2479 from the first glink stub. */
2480 bfd_byte buf[4];
b9e5796b
AM
2481 unsigned int off = 0;
2482
2483 while (bfd_get_section_contents (abfd, glink, buf,
2484 glink_vma + off - glink->vma, 4))
468392fb
AM
2485 {
2486 unsigned int insn = bfd_get_32 (abfd, buf);
2487 insn ^= B_DOT;
2488 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2489 {
2cdcc330
AM
2490 resolv_vma
2491 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2492 break;
2493 }
2494 off += 4;
2495 if (off > 4)
2496 break;
468392fb
AM
2497 }
2498
2499 if (resolv_vma)
2500 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2501
066ee829
AM
2502 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2503 if (relplt != NULL)
2504 {
2505 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2506 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2507 goto free_contents_and_exit_err;
68ffbac6 2508
066ee829
AM
2509 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2510 size += plt_count * sizeof (asymbol);
468392fb 2511
066ee829
AM
2512 p = relplt->relocation;
2513 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2514 {
2515 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2516 if (p->addend != 0)
2517 size += sizeof ("+0x") - 1 + 16;
2518 }
066ee829 2519 }
468392fb
AM
2520 }
2521
c4b0b099
AM
2522 if (size == 0)
2523 goto free_contents_and_exit;
699733f6
AM
2524 s = *ret = bfd_malloc (size);
2525 if (s == NULL)
c4b0b099 2526 goto free_contents_and_exit_err;
90e3cdf2 2527
468392fb 2528 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2529
699733f6 2530 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2531 {
699733f6 2532 bfd_vma ent;
90e3cdf2 2533
5ef11c02
AM
2534 if (syms[i]->value > opd->size - 8)
2535 continue;
2536
699733f6
AM
2537 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2538 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2539 {
0ccf57bd 2540 size_t lo, hi;
699733f6 2541 size_t len;
c9727e01 2542 asection *sec = abfd->sections;
90e3cdf2 2543
699733f6
AM
2544 *s = *syms[i];
2545 lo = codesecsym;
2546 hi = codesecsymend;
2547 while (lo < hi)
2548 {
0ccf57bd 2549 size_t mid = (lo + hi) >> 1;
699733f6
AM
2550 if (syms[mid]->section->vma < ent)
2551 lo = mid + 1;
2552 else if (syms[mid]->section->vma > ent)
2553 hi = mid;
2554 else
c9727e01
AM
2555 {
2556 sec = syms[mid]->section;
2557 break;
2558 }
699733f6
AM
2559 }
2560
c9727e01 2561 if (lo >= hi && lo > codesecsym)
699733f6 2562 sec = syms[lo - 1]->section;
699733f6
AM
2563
2564 for (; sec != NULL; sec = sec->next)
2565 {
2566 if (sec->vma > ent)
2567 break;
63524580
JK
2568 /* SEC_LOAD may not be set if SEC is from a separate debug
2569 info file. */
2570 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2571 break;
2572 if ((sec->flags & SEC_CODE) != 0)
2573 s->section = sec;
2574 }
6ba2a415 2575 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2576 s->value = ent - s->section->vma;
2577 s->name = names;
2578 *names++ = '.';
2579 len = strlen (syms[i]->name);
2580 memcpy (names, syms[i]->name, len + 1);
2581 names += len + 1;
6f610d07
UW
2582 /* Have udata.p point back to the original symbol this
2583 synthetic symbol was derived from. */
2584 s->udata.p = syms[i];
699733f6 2585 s++;
90e3cdf2 2586 }
90e3cdf2 2587 }
699733f6 2588 free (contents);
468392fb
AM
2589
2590 if (glink != NULL && relplt != NULL)
2591 {
2592 if (resolv_vma)
2593 {
2594 /* Add a symbol for the main glink trampoline. */
86a4952b 2595 memset (s, 0, sizeof *s);
468392fb 2596 s->the_bfd = abfd;
6ba2a415 2597 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2598 s->section = glink;
2599 s->value = resolv_vma - glink->vma;
2600 s->name = names;
2cdcc330
AM
2601 memcpy (names, "__glink_PLTresolve",
2602 sizeof ("__glink_PLTresolve"));
468392fb
AM
2603 names += sizeof ("__glink_PLTresolve");
2604 s++;
2605 count++;
2606 }
2607
2608 /* FIXME: It would be very much nicer to put sym@plt on the
2609 stub rather than on the glink branch table entry. The
2610 objdump disassembler would then use a sensible symbol
2611 name on plt calls. The difficulty in doing so is
2612 a) finding the stubs, and,
2613 b) matching stubs against plt entries, and,
2614 c) there can be multiple stubs for a given plt entry.
2615
2616 Solving (a) could be done by code scanning, but older
2617 ppc64 binaries used different stubs to current code.
2618 (b) is the tricky one since you need to known the toc
2619 pointer for at least one function that uses a pic stub to
2620 be able to calculate the plt address referenced.
2621 (c) means gdb would need to set multiple breakpoints (or
2622 find the glink branch itself) when setting breakpoints
2623 for pending shared library loads. */
2624 p = relplt->relocation;
2625 for (i = 0; i < plt_count; i++, p++)
2626 {
2627 size_t len;
2628
2629 *s = **p->sym_ptr_ptr;
2630 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2631 we are defining a symbol, ensure one of them is set. */
2632 if ((s->flags & BSF_LOCAL) == 0)
2633 s->flags |= BSF_GLOBAL;
6ba2a415 2634 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2635 s->section = glink;
2636 s->value = glink_vma - glink->vma;
2637 s->name = names;
2638 s->udata.p = NULL;
2639 len = strlen ((*p->sym_ptr_ptr)->name);
2640 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2641 names += len;
e054468f
AM
2642 if (p->addend != 0)
2643 {
2644 memcpy (names, "+0x", sizeof ("+0x") - 1);
2645 names += sizeof ("+0x") - 1;
2646 bfd_sprintf_vma (abfd, names, p->addend);
2647 names += strlen (names);
2648 }
468392fb
AM
2649 memcpy (names, "@plt", sizeof ("@plt"));
2650 names += sizeof ("@plt");
2651 s++;
b9e5796b
AM
2652 if (abi < 2)
2653 {
2654 glink_vma += 8;
2655 if (i >= 0x8000)
2656 glink_vma += 4;
2657 }
2658 else
468392fb
AM
2659 glink_vma += 4;
2660 }
2661 count += plt_count;
2662 }
90e3cdf2
JJ
2663 }
2664
c9727e01 2665 done:
a7535cf3 2666 free (syms);
90e3cdf2
JJ
2667 return count;
2668}
5bd4f169 2669\f
65f38f15
AM
2670/* The following functions are specific to the ELF linker, while
2671 functions above are used generally. Those named ppc64_elf_* are
2672 called by the main ELF linker code. They appear in this file more
2673 or less in the order in which they are called. eg.
2674 ppc64_elf_check_relocs is called early in the link process,
2675 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2676 called.
2677
2678 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2679 functions have both a function code symbol and a function descriptor
2680 symbol. A call to foo in a relocatable object file looks like:
2681
2682 . .text
2683 . x:
2684 . bl .foo
2685 . nop
2686
2687 The function definition in another object file might be:
2688
2689 . .section .opd
2690 . foo: .quad .foo
2691 . .quad .TOC.@tocbase
2692 . .quad 0
2693 .
2694 . .text
2695 . .foo: blr
2696
2697 When the linker resolves the call during a static link, the branch
2698 unsurprisingly just goes to .foo and the .opd information is unused.
2699 If the function definition is in a shared library, things are a little
2700 different: The call goes via a plt call stub, the opd information gets
2701 copied to the plt, and the linker patches the nop.
2702
2703 . x:
2704 . bl .foo_stub
2705 . ld 2,40(1)
2706 .
2707 .
2708 . .foo_stub:
71a39c98
AM
2709 . std 2,40(1) # in practice, the call stub
2710 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2711 . addi 11,11,Lfoo@toc@l # this is the general idea
2712 . ld 12,0(11)
2713 . ld 2,8(11)
2714 . mtctr 12
2715 . ld 11,16(11)
e86ce104
AM
2716 . bctr
2717 .
2718 . .section .plt
2719 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2720
2721 The "reloc ()" notation is supposed to indicate that the linker emits
2722 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2723 copying.
2724
2725 What are the difficulties here? Well, firstly, the relocations
2726 examined by the linker in check_relocs are against the function code
2727 sym .foo, while the dynamic relocation in the plt is emitted against
2728 the function descriptor symbol, foo. Somewhere along the line, we need
2729 to carefully copy dynamic link information from one symbol to the other.
2730 Secondly, the generic part of the elf linker will make .foo a dynamic
2731 symbol as is normal for most other backends. We need foo dynamic
2732 instead, at least for an application final link. However, when
2733 creating a shared library containing foo, we need to have both symbols
2734 dynamic so that references to .foo are satisfied during the early
2735 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2736 definition from some other object, eg. a static library.
2737
2738 Update: As of August 2004, we support a new convention. Function
2739 calls may use the function descriptor symbol, ie. "bl foo". This
2740 behaves exactly as "bl .foo". */
65f38f15 2741
7c8bbca5
AM
2742/* Of those relocs that might be copied as dynamic relocs, this
2743 function selects those that must be copied when linking a shared
2744 library or PIE, even when the symbol is local. */
65f38f15 2745
1d483afe
AM
2746static int
2747must_be_dyn_reloc (struct bfd_link_info *info,
2748 enum elf_ppc64_reloc_type r_type)
2749{
2750 switch (r_type)
2751 {
2752 default:
7c8bbca5
AM
2753 /* Only relative relocs can be resolved when the object load
2754 address isn't fixed. DTPREL64 is excluded because the
2755 dynamic linker needs to differentiate global dynamic from
2756 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2757 return 1;
2758
2759 case R_PPC64_REL32:
2760 case R_PPC64_REL64:
2761 case R_PPC64_REL30:
1bdd8fac
AM
2762 case R_PPC64_TOC16:
2763 case R_PPC64_TOC16_DS:
2764 case R_PPC64_TOC16_LO:
2765 case R_PPC64_TOC16_HI:
2766 case R_PPC64_TOC16_HA:
2767 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2768 return 0;
2769
2770 case R_PPC64_TPREL16:
2771 case R_PPC64_TPREL16_LO:
2772 case R_PPC64_TPREL16_HI:
2773 case R_PPC64_TPREL16_HA:
2774 case R_PPC64_TPREL16_DS:
2775 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2776 case R_PPC64_TPREL16_HIGH:
2777 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2778 case R_PPC64_TPREL16_HIGHER:
2779 case R_PPC64_TPREL16_HIGHERA:
2780 case R_PPC64_TPREL16_HIGHEST:
2781 case R_PPC64_TPREL16_HIGHESTA:
2782 case R_PPC64_TPREL64:
c213164a 2783 case R_PPC64_TPREL34:
7c8bbca5
AM
2784 /* These relocations are relative but in a shared library the
2785 linker doesn't know the thread pointer base. */
2786 return bfd_link_dll (info);
1d483afe
AM
2787 }
2788}
65f38f15 2789
f4656909 2790/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2791 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2792 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2793 shared lib. With code that gcc generates it is vital that this be
2794 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2795 actually the address of a function descriptor which resides in the
2796 .opd section. gcc uses the descriptor directly rather than going
2797 via the GOT as some other ABIs do, which means that initialized
2798 function pointers reference the descriptor. Thus, a function
2799 pointer initialized to the address of a function in a shared
2800 library will either require a .dynbss copy and a copy reloc, or a
2801 dynamic reloc. Using a .dynbss copy redefines the function
2802 descriptor symbol to point to the copy. This presents a problem as
2803 a PLT entry for that function is also initialized from the function
2804 descriptor symbol and the copy may not be initialized first. */
a23b6845 2805#define ELIMINATE_COPY_RELOCS 1
f4656909 2806
721956f4 2807/* Section name for stubs is the associated section name plus this
29942be8
NC
2808 string. */
2809#define STUB_SUFFIX ".stub"
721956f4
AM
2810
2811/* Linker stubs.
2812 ppc_stub_long_branch:
2813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2814 destination, but a 24 bit branch in a stub section will reach.
2815 . b dest
2816
2817 ppc_stub_plt_branch:
2818 Similar to the above, but a 24 bit branch in the stub section won't
2819 reach its destination.
6df4c9c2
AM
2820 . addis %r12,%r2,xxx@toc@ha
2821 . ld %r12,xxx@toc@l(%r12)
71a39c98 2822 . mtctr %r12
721956f4
AM
2823 . bctr
2824
2825 ppc_stub_plt_call:
2c66dc6c
AM
2826 Used to call a function in a shared library. If it so happens that
2827 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2829 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2830 . addis %r11,%r2,xxx@toc@ha
2831 . ld %r12,xxx+0@toc@l(%r11)
2832 . mtctr %r12
2833 . ld %r2,xxx+8@toc@l(%r11)
2834 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2835 . bctr
ad8e1ba5
AM
2836
2837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2838 code to adjust the value and save r2 to support multiple toc sections.
2839 A ppc_stub_long_branch with an r2 offset looks like:
2840 . std %r2,40(%r1)
2841 . addis %r2,%r2,off@ha
2842 . addi %r2,%r2,off@l
2843 . b dest
2844
2845 A ppc_stub_plt_branch with an r2 offset looks like:
2846 . std %r2,40(%r1)
6df4c9c2
AM
2847 . addis %r12,%r2,xxx@toc@ha
2848 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2849 . addis %r2,%r2,off@ha
2850 . addi %r2,%r2,off@l
71a39c98 2851 . mtctr %r12
ad8e1ba5 2852 . bctr
ac2df442 2853
05d0e962
AM
2854 All of the above stubs are shown as their ELFv1 variants. ELFv2
2855 variants exist too, simpler for plt calls since a new toc pointer
2856 and static chain are not loaded by the stub. In addition, ELFv2
2857 has some more complex stubs to handle calls marked with NOTOC
2858 relocs from functions where r2 is not a valid toc pointer. These
2859 come in two flavours, the ones shown below, and _both variants that
2860 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2861 one call is from a function where r2 is used as the toc pointer but
2862 needs a toc adjusting stub for small-model multi-toc, and another
2863 call is from a function where r2 is not valid.
2864 ppc_stub_long_branch_notoc:
2865 . mflr %r12
2866 . bcl 20,31,1f
2867 . 1:
2868 . mflr %r11
2869 . mtlr %r12
2cdcc330
AM
2870 . addis %r12,%r11,dest-1b@ha
2871 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2872 . b dest
2873
2874 ppc_stub_plt_branch_notoc:
2875 . mflr %r12
2876 . bcl 20,31,1f
2877 . 1:
2878 . mflr %r11
2879 . mtlr %r12
2880 . lis %r12,xxx-1b@highest
f891966f 2881 . ori %r12,%r12,xxx-1b@higher
05d0e962 2882 . sldi %r12,%r12,32
f891966f 2883 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2884 . ori %r12,%r12,xxx-1b@l
2885 . add %r12,%r11,%r12
2886 . mtctr %r12
2887 . bctr
2888
2889 ppc_stub_plt_call_notoc:
2890 . mflr %r12
2891 . bcl 20,31,1f
2892 . 1:
2893 . mflr %r11
2894 . mtlr %r12
2895 . lis %r12,xxx-1b@highest
f891966f 2896 . ori %r12,%r12,xxx-1b@higher
05d0e962 2897 . sldi %r12,%r12,32
f891966f 2898 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2899 . ori %r12,%r12,xxx-1b@l
2900 . ldx %r12,%r11,%r12
2901 . mtctr %r12
2902 . bctr
2903
04bdff6a
AM
2904 There are also ELFv1 powerxx variants of these stubs.
2905 ppc_stub_long_branch_notoc:
d4b87b1e 2906 . pla %r12,dest@pcrel
04bdff6a
AM
2907 . b dest
2908 ppc_stub_plt_branch_notoc:
2909 . lis %r11,(dest-1f)@highesta34
2910 . ori %r11,%r11,(dest-1f)@highera34
2911 . sldi %r11,%r11,34
d4b87b1e 2912 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916 ppc_stub_plt_call_notoc:
2917 . lis %r11,(xxx-1f)@highesta34
2918 . ori %r11,%r11,(xxx-1f)@highera34
2919 . sldi %r11,%r11,34
d4b87b1e 2920 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2921 . ldx %r12,%r11,%r12
2922 . mtctr %r12
2923 . bctr
2924
05d0e962
AM
2925 In cases where the high instructions would add zero, they are
2926 omitted and following instructions modified in some cases.
04bdff6a
AM
2927 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2928 to
2929 . pld %r12,xxx@pcrel
2930 . mtctr %r12
2931 . bctr
05d0e962
AM
2932
2933 For a given stub group (a set of sections all using the same toc
2934 pointer value) there will be just one stub type used for any
2935 particular function symbol. For example, if printf is called from
2936 code with the tocsave optimization (ie. r2 saved in function
2937 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2938 and from other code without the tocsave optimization requiring a
2939 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2940 type will be created. Calls with the tocsave optimization will
2941 enter this stub after the instruction saving r2. A similar
2942 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2943 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2944 to call an external function like printf. If other calls to printf
2945 require a ppc_stub_plt_call linkage stub then a single
2946 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2947 call. If other calls to printf require a ppc_stub_plt_call_r2save
2948 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2949 be created and calls not requiring r2 to be saved will enter the
2950 stub after the r2 save instruction. There is an analogous
2951 hierarchy of long branch and plt branch stubs for local call
2952 linkage. */
721956f4 2953
2cdcc330
AM
2954enum ppc_stub_type
2955{
721956f4
AM
2956 ppc_stub_none,
2957 ppc_stub_long_branch,
ad8e1ba5 2958 ppc_stub_long_branch_r2off,
05d0e962
AM
2959 ppc_stub_long_branch_notoc,
2960 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2961 ppc_stub_plt_branch,
ad8e1ba5 2962 ppc_stub_plt_branch_r2off,
05d0e962
AM
2963 ppc_stub_plt_branch_notoc,
2964 ppc_stub_plt_branch_both,
794e51c0 2965 ppc_stub_plt_call,
7341d5e2 2966 ppc_stub_plt_call_r2save,
05d0e962
AM
2967 ppc_stub_plt_call_notoc,
2968 ppc_stub_plt_call_both,
a4b6fadd
AM
2969 ppc_stub_global_entry,
2970 ppc_stub_save_res
721956f4
AM
2971};
2972
6f20ed8a
AM
2973/* Information on stub grouping. */
2974struct map_stub
2975{
2976 /* The stub section. */
2977 asection *stub_sec;
2978 /* This is the section to which stubs in the group will be attached. */
2979 asection *link_sec;
a4b6fadd
AM
2980 /* Next group. */
2981 struct map_stub *next;
2982 /* Whether to emit a copy of register save/restore functions in this
2983 group. */
2984 int needs_save_res;
df136d64
AM
2985 /* Current offset within stubs after the insn restoring lr in a
2986 _notoc or _both stub using bcl for pc-relative addressing, or
2987 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2988 unsigned int lr_restore;
2989 /* Accumulated size of EH info emitted to describe return address
2990 if stubs modify lr. Does not include 17 byte FDE header. */
2991 unsigned int eh_size;
2992 /* Offset in glink_eh_frame to the start of EH info for this group. */
2993 unsigned int eh_base;
6f20ed8a
AM
2994};
2995
2cdcc330
AM
2996struct ppc_stub_hash_entry
2997{
721956f4
AM
2998 /* Base hash table entry structure. */
2999 struct bfd_hash_entry root;
3000
ad8e1ba5
AM
3001 enum ppc_stub_type stub_type;
3002
6f20ed8a
AM
3003 /* Group information. */
3004 struct map_stub *group;
721956f4
AM
3005
3006 /* Offset within stub_sec of the beginning of this stub. */
3007 bfd_vma stub_offset;
3008
3009 /* Given the symbol's value and its section we can determine its final
3010 value when building the stubs (so the stub knows where to jump. */
3011 bfd_vma target_value;
3012 asection *target_section;
3013
721956f4
AM
3014 /* The symbol table entry, if any, that this was derived from. */
3015 struct ppc_link_hash_entry *h;
e054468f 3016 struct plt_entry *plt_ent;
721956f4 3017
2d7ad24e
AM
3018 /* Symbol type. */
3019 unsigned char symtype;
3020
6911b7dc
AM
3021 /* Symbol st_other. */
3022 unsigned char other;
721956f4
AM
3023};
3024
2cdcc330
AM
3025struct ppc_branch_hash_entry
3026{
721956f4
AM
3027 /* Base hash table entry structure. */
3028 struct bfd_hash_entry root;
3029
c456f082 3030 /* Offset within branch lookup table. */
721956f4
AM
3031 unsigned int offset;
3032
3033 /* Generation marker. */
3034 unsigned int iter;
3035};
65f38f15 3036
19e08130
AM
3037/* Used to track dynamic relocations for local symbols. */
3038struct ppc_dyn_relocs
3039{
3040 struct ppc_dyn_relocs *next;
3041
3042 /* The input section of the reloc. */
3043 asection *sec;
3044
3045 /* Total number of relocs copied for the input section. */
3046 unsigned int count : 31;
3047
3048 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3049 unsigned int ifunc : 1;
3050};
3051
65f38f15
AM
3052struct ppc_link_hash_entry
3053{
3054 struct elf_link_hash_entry elf;
3055
2cdcc330
AM
3056 union
3057 {
b3fac117
AM
3058 /* A pointer to the most recently used stub hash entry against this
3059 symbol. */
3060 struct ppc_stub_hash_entry *stub_cache;
3061
3062 /* A pointer to the next symbol starting with a '.' */
3063 struct ppc_link_hash_entry *next_dot_sym;
3064 } u;
721956f4 3065
65f38f15 3066 /* Track dynamic relocs copied for this symbol. */
6061a67d 3067 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3068
721956f4 3069 /* Link between function code and descriptor symbols. */
34814b9f 3070 struct ppc_link_hash_entry *oh;
721956f4 3071
e86ce104
AM
3072 /* Flag function code and descriptor symbols. */
3073 unsigned int is_func:1;
3074 unsigned int is_func_descriptor:1;
908b32fc 3075 unsigned int fake:1;
411e1bfb 3076
c5614fa4
AM
3077 /* Whether global opd/toc sym has been adjusted or not.
3078 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3079 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3080 unsigned int adjust_done:1;
3081
a4b6fadd
AM
3082 /* Set if this is an out-of-line register save/restore function,
3083 with non-standard calling convention. */
3084 unsigned int save_res:1;
3085
8b5f1ed8
AM
3086 /* Set if a duplicate symbol with non-zero localentry is detected,
3087 even when the duplicate symbol does not provide a definition. */
3088 unsigned int non_zero_localentry:1;
3089
411e1bfb 3090 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3091 Bits are or'd into the mask as the corresponding relocs are
3092 encountered during check_relocs, with TLS_TLS being set when any
3093 of the other TLS bits are set. tls_optimize clears bits when
3094 optimizing to indicate the corresponding GOT entry type is not
3095 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3096 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3097 These flags are also kept for local symbols. */
3098#define TLS_TLS 1 /* Any TLS reloc. */
3099#define TLS_GD 2 /* GD reloc. */
3100#define TLS_LD 4 /* LD reloc. */
3101#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3102#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3103#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3104#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3105#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3106 unsigned char tls_mask;
37da22e5
AM
3107
3108 /* The above field is also used to mark function symbols. In which
3109 case TLS_TLS will be 0. */
3110#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3111#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3112#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3113};
3114
ed7007c1
AM
3115static inline struct ppc_link_hash_entry *
3116ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3117{
3118 return (struct ppc_link_hash_entry *) ent;
3119}
3120
65f38f15
AM
3121/* ppc64 ELF linker hash table. */
3122
3123struct ppc_link_hash_table
3124{
3125 struct elf_link_hash_table elf;
3126
721956f4
AM
3127 /* The stub hash table. */
3128 struct bfd_hash_table stub_hash_table;
3129
3130 /* Another hash table for plt_branch stubs. */
3131 struct bfd_hash_table branch_hash_table;
3132
3b421ab3
AM
3133 /* Hash table for function prologue tocsave. */
3134 htab_t tocsave_htab;
3135
e7d1c40c
AM
3136 /* Various options and other info passed from the linker. */
3137 struct ppc64_elf_params *params;
721956f4 3138
6f20ed8a
AM
3139 /* The size of sec_info below. */
3140 unsigned int sec_info_arr_size;
3141
3142 /* Per-section array of extra section info. Done this way rather
3143 than as part of ppc64_elf_section_data so we have the info for
3144 non-ppc64 sections. */
3145 struct
3146 {
3147 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3148 bfd_vma toc_off;
6f20ed8a
AM
3149
3150 union
3151 {
3152 /* The section group that this section belongs to. */
3153 struct map_stub *group;
3154 /* A temp section list pointer. */
3155 asection *list;
3156 } u;
3157 } *sec_info;
721956f4 3158
a4b6fadd
AM
3159 /* Linked list of groups. */
3160 struct map_stub *group;
3161
ad8e1ba5
AM
3162 /* Temp used when calculating TOC pointers. */
3163 bfd_vma toc_curr;
bf102f86
AM
3164 bfd *toc_bfd;
3165 asection *toc_first_sec;
ad8e1ba5 3166
b3fac117
AM
3167 /* Used when adding symbols. */
3168 struct ppc_link_hash_entry *dot_syms;
3169
33e44f2e 3170 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3171 asection *glink;
9e390558 3172 asection *global_entry;
82bd7b59 3173 asection *sfpr;
2d7ad24e
AM
3174 asection *pltlocal;
3175 asection *relpltlocal;
4ce794b7
AM
3176 asection *brlt;
3177 asection *relbrlt;
58d180e8 3178 asection *glink_eh_frame;
ec338859 3179
8387904d
AM
3180 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3181 struct ppc_link_hash_entry *tls_get_addr;
3182 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3183 struct ppc_link_hash_entry *tga_desc;
3184 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3185 struct map_stub *tga_group;
411e1bfb 3186
927be08e
AM
3187 /* The size of reliplt used by got entry relocs. */
3188 bfd_size_type got_reli_size;
3189
9b5ecbd0 3190 /* Statistics. */
7341d5e2 3191 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3192
ee75fd95
AM
3193 /* Number of stubs against global syms. */
3194 unsigned long stub_globals;
3195
ee67d69a
AM
3196 /* Set if we're linking code with function descriptors. */
3197 unsigned int opd_abi:1;
3198
4c52953f 3199 /* Support for multiple toc sections. */
33c0ec9d 3200 unsigned int do_multi_toc:1;
4c52953f 3201 unsigned int multi_toc_needed:1;
927be08e 3202 unsigned int second_toc_pass:1;
67f0cbdb 3203 unsigned int do_toc_opt:1;
4c52953f 3204
9a23f96e
AM
3205 /* Set if tls optimization is enabled. */
3206 unsigned int do_tls_opt:1;
3207
3e04d765
AM
3208 /* Set if inline plt calls should be converted to direct calls. */
3209 unsigned int can_convert_all_inline_plt:1;
3210
5d1634d7 3211 /* Set on error. */
99877b66 3212 unsigned int stub_error:1;
721956f4 3213
8c5b4e52
AM
3214 /* Whether func_desc_adjust needs to be run over symbols. */
3215 unsigned int need_func_desc_adj:1;
721956f4 3216
82e66161
AM
3217 /* Whether there exist local gnu indirect function resolvers,
3218 referenced by dynamic relocations. */
3219 unsigned int local_ifunc_resolver:1;
3220 unsigned int maybe_local_ifunc_resolver:1;
3221
f378ab09
AM
3222 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3223 unsigned int has_plt_localentry0:1;
3224
5663e321
AM
3225 /* Whether calls are made via the PLT from NOTOC functions. */
3226 unsigned int notoc_plt:1;
3227
04bdff6a
AM
3228 /* Whether to use powerxx instructions in linkage stubs. */
3229 unsigned int powerxx_stubs:1;
3230
721956f4
AM
3231 /* Incremented every time we size stubs. */
3232 unsigned int stub_iteration;
5d1634d7 3233
87d72d41
AM
3234 /* Small local sym cache. */
3235 struct sym_cache sym_cache;
65f38f15
AM
3236};
3237
4c52953f
AM
3238/* Rename some of the generic section flags to better document how they
3239 are used here. */
b0dddeec
AM
3240
3241/* Nonzero if this section has TLS related relocations. */
3242#define has_tls_reloc sec_flg0
3243
9737e8af
AM
3244/* Nonzero if this section has a call to __tls_get_addr lacking marker
3245 relocations. */
3246#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3247
3248/* Nonzero if this section has any toc or got relocs. */
3249#define has_toc_reloc sec_flg2
3250
3251/* Nonzero if this section has a call to another section that uses
3252 the toc or got. */
d77c8a4b 3253#define makes_toc_func_call sec_flg3
b0dddeec
AM
3254
3255/* Recursion protection when determining above flag. */
d77c8a4b 3256#define call_check_in_progress sec_flg4
70cc837d 3257#define call_check_done sec_flg5
4c52953f 3258
65f38f15
AM
3259/* Get the ppc64 ELF linker hash table from a link_info structure. */
3260
3261#define ppc_hash_table(p) \
4dfe6ac6
NC
3262 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3263 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3264
721956f4
AM
3265#define ppc_stub_hash_lookup(table, string, create, copy) \
3266 ((struct ppc_stub_hash_entry *) \
3267 bfd_hash_lookup ((table), (string), (create), (copy)))
3268
3269#define ppc_branch_hash_lookup(table, string, create, copy) \
3270 ((struct ppc_branch_hash_entry *) \
3271 bfd_hash_lookup ((table), (string), (create), (copy)))
3272
3273/* Create an entry in the stub hash table. */
3274
3275static struct bfd_hash_entry *
4ce794b7
AM
3276stub_hash_newfunc (struct bfd_hash_entry *entry,
3277 struct bfd_hash_table *table,
3278 const char *string)
721956f4
AM
3279{
3280 /* Allocate the structure if it has not already been allocated by a
3281 subclass. */
3282 if (entry == NULL)
3283 {
3284 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3285 if (entry == NULL)
3286 return entry;
3287 }
3288
3289 /* Call the allocation method of the superclass. */
3290 entry = bfd_hash_newfunc (entry, table, string);
3291 if (entry != NULL)
3292 {
3293 struct ppc_stub_hash_entry *eh;
3294
3295 /* Initialize the local fields. */
3296 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3297 eh->stub_type = ppc_stub_none;
6f20ed8a 3298 eh->group = NULL;
721956f4
AM
3299 eh->stub_offset = 0;
3300 eh->target_value = 0;
3301 eh->target_section = NULL;
721956f4 3302 eh->h = NULL;
6911b7dc 3303 eh->plt_ent = NULL;
6911b7dc 3304 eh->other = 0;
721956f4
AM
3305 }
3306
3307 return entry;
3308}
3309
3310/* Create an entry in the branch hash table. */
3311
3312static struct bfd_hash_entry *
4ce794b7
AM
3313branch_hash_newfunc (struct bfd_hash_entry *entry,
3314 struct bfd_hash_table *table,
3315 const char *string)
721956f4
AM
3316{
3317 /* Allocate the structure if it has not already been allocated by a
3318 subclass. */
3319 if (entry == NULL)
3320 {
3321 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3322 if (entry == NULL)
3323 return entry;
3324 }
3325
3326 /* Call the allocation method of the superclass. */
3327 entry = bfd_hash_newfunc (entry, table, string);
3328 if (entry != NULL)
3329 {
3330 struct ppc_branch_hash_entry *eh;
3331
3332 /* Initialize the local fields. */
3333 eh = (struct ppc_branch_hash_entry *) entry;
3334 eh->offset = 0;
3335 eh->iter = 0;
3336 }
3337
3338 return entry;
3339}
3340
65f38f15
AM
3341/* Create an entry in a ppc64 ELF linker hash table. */
3342
3343static struct bfd_hash_entry *
4ce794b7
AM
3344link_hash_newfunc (struct bfd_hash_entry *entry,
3345 struct bfd_hash_table *table,
3346 const char *string)
65f38f15
AM
3347{
3348 /* Allocate the structure if it has not already been allocated by a
3349 subclass. */
3350 if (entry == NULL)
3351 {
3352 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3353 if (entry == NULL)
3354 return entry;
3355 }
3356
3357 /* Call the allocation method of the superclass. */
3358 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3359 if (entry != NULL)
3360 {
3361 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3362
b3fac117 3363 memset (&eh->u.stub_cache, 0,
908b32fc 3364 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3365 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3366
3367 /* When making function calls, old ABI code references function entry
3368 points (dot symbols), while new ABI code references the function
3369 descriptor symbol. We need to make any combination of reference and
3370 definition work together, without breaking archive linking.
3371
3372 For a defined function "foo" and an undefined call to "bar":
3373 An old object defines "foo" and ".foo", references ".bar" (possibly
3374 "bar" too).
3375 A new object defines "foo" and references "bar".
3376
3377 A new object thus has no problem with its undefined symbols being
3378 satisfied by definitions in an old object. On the other hand, the
3379 old object won't have ".bar" satisfied by a new object.
3380
3381 Keep a list of newly added dot-symbols. */
3382
3383 if (string[0] == '.')
3384 {
3385 struct ppc_link_hash_table *htab;
3386
3387 htab = (struct ppc_link_hash_table *) table;
3388 eh->u.next_dot_sym = htab->dot_syms;
3389 htab->dot_syms = eh;
3390 }
65f38f15
AM
3391 }
3392
3393 return entry;
3394}
3395
2cdcc330
AM
3396struct tocsave_entry
3397{
3b421ab3
AM
3398 asection *sec;
3399 bfd_vma offset;
3400};
3401
3402static hashval_t
3403tocsave_htab_hash (const void *p)
3404{
3405 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3406 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3407}
3408
3409static int
3410tocsave_htab_eq (const void *p1, const void *p2)
3411{
3412 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3413 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3414 return e1->sec == e2->sec && e1->offset == e2->offset;
3415}
3416
68faa637
AM
3417/* Destroy a ppc64 ELF linker hash table. */
3418
3419static void
d495ab0d 3420ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3421{
d495ab0d 3422 struct ppc_link_hash_table *htab;
68faa637 3423
d495ab0d 3424 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3425 if (htab->tocsave_htab)
3426 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3427 bfd_hash_table_free (&htab->branch_hash_table);
3428 bfd_hash_table_free (&htab->stub_hash_table);
3429 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3430}
3431
65f38f15
AM
3432/* Create a ppc64 ELF linker hash table. */
3433
3434static struct bfd_link_hash_table *
4ce794b7 3435ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3436{
3437 struct ppc_link_hash_table *htab;
986f0783 3438 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3439
4ce794b7 3440 htab = bfd_zmalloc (amt);
65f38f15
AM
3441 if (htab == NULL)
3442 return NULL;
3443
66eb6687 3444 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3445 sizeof (struct ppc_link_hash_entry),
3446 PPC64_ELF_DATA))
65f38f15 3447 {
e2d34d7d 3448 free (htab);
65f38f15
AM
3449 return NULL;
3450 }
3451
721956f4 3452 /* Init the stub hash table too. */
66eb6687
AM
3453 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3454 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3455 {
d495ab0d 3456 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3457 return NULL;
3458 }
721956f4
AM
3459
3460 /* And the branch hash table. */
66eb6687
AM
3461 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3462 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3463 {
3464 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3465 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3466 return NULL;
3467 }
721956f4 3468
3b421ab3
AM
3469 htab->tocsave_htab = htab_try_create (1024,
3470 tocsave_htab_hash,
3471 tocsave_htab_eq,
3472 NULL);
3473 if (htab->tocsave_htab == NULL)
2915c55b 3474 {
d495ab0d 3475 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3476 return NULL;
3477 }
d495ab0d 3478 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3479
3254fd24
AM
3480 /* Initializing two fields of the union is just cosmetic. We really
3481 only care about glist, but when compiled on a 32-bit host the
3482 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3483 debugger inspection of these fields look nicer. */
a6aa5195
AM
3484 htab->elf.init_got_refcount.refcount = 0;
3485 htab->elf.init_got_refcount.glist = NULL;
3486 htab->elf.init_plt_refcount.refcount = 0;
3487 htab->elf.init_plt_refcount.glist = NULL;
3488 htab->elf.init_got_offset.offset = 0;
3489 htab->elf.init_got_offset.glist = NULL;
3490 htab->elf.init_plt_offset.offset = 0;
3491 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3492
65f38f15
AM
3493 return &htab->elf.root;
3494}
3495
bfeb4a28
AM
3496/* Create sections for linker generated code. */
3497
3498static bfd_boolean
3499create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3500{
3501 struct ppc_link_hash_table *htab;
3502 flagword flags;
3503
3504 htab = ppc_hash_table (info);
3505
bfeb4a28
AM
3506 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3507 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3508 if (htab->params->save_restore_funcs)
3509 {
3510 /* Create .sfpr for code to save and restore fp regs. */
3511 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3512 flags);
3513 if (htab->sfpr == NULL
fd361982 3514 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3515 return FALSE;
3516 }
3517
3518 if (bfd_link_relocatable (info))
3519 return TRUE;
bfeb4a28
AM
3520
3521 /* Create .glink for lazy dynamic linking support. */
3522 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3523 flags);
3524 if (htab->glink == NULL
fd361982 3525 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3526 return FALSE;
3527
9e390558
AM
3528 /* The part of .glink used by global entry stubs, separate so that
3529 it can be aligned appropriately without affecting htab->glink. */
3530 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3531 flags);
3532 if (htab->global_entry == NULL
fd361982 3533 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3534 return FALSE;
3535
bfeb4a28
AM
3536 if (!info->no_ld_generated_unwind_info)
3537 {
3538 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3539 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3540 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3541 ".eh_frame",
3542 flags);
3543 if (htab->glink_eh_frame == NULL
fd361982 3544 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3545 return FALSE;
3546 }
3547
3548 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3549 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3550 if (htab->elf.iplt == NULL
fd361982 3551 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3552 return FALSE;
3553
3554 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3555 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3556 htab->elf.irelplt
3557 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3558 if (htab->elf.irelplt == NULL
fd361982 3559 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3560 return FALSE;
3561
3562 /* Create branch lookup table for plt_branch stubs. */
3563 flags = (SEC_ALLOC | SEC_LOAD
3564 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3565 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3566 flags);
3567 if (htab->brlt == NULL
fd361982 3568 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3569 return FALSE;
3570
2d7ad24e
AM
3571 /* Local plt entries, put in .branch_lt but a separate section for
3572 convenience. */
3573 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3574 flags);
3575 if (htab->pltlocal == NULL
fd361982 3576 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3577 return FALSE;
3578
0e1862bb 3579 if (!bfd_link_pic (info))
bfeb4a28
AM
3580 return TRUE;
3581
3582 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3583 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3584 htab->relbrlt
3585 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3586 if (htab->relbrlt == NULL
fd361982 3587 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3588 return FALSE;
3589
2d7ad24e
AM
3590 htab->relpltlocal
3591 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3592 if (htab->relpltlocal == NULL
fd361982 3593 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3594 return FALSE;
3595
bfeb4a28
AM
3596 return TRUE;
3597}
3598
e717da7e
AM
3599/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3600
bfeb4a28 3601bfd_boolean
e7d1c40c
AM
3602ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3603 struct ppc64_elf_params *params)
e717da7e
AM
3604{
3605 struct ppc_link_hash_table *htab;
3606
e7d1c40c 3607 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3608
3609/* Always hook our dynamic sections into the first bfd, which is the
3610 linker created stub bfd. This ensures that the GOT header is at
3611 the start of the output TOC section. */
3612 htab = ppc_hash_table (info);
e7d1c40c
AM
3613 htab->elf.dynobj = params->stub_bfd;
3614 htab->params = params;
bfeb4a28 3615
bfeb4a28 3616 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3617}
3618
721956f4
AM
3619/* Build a name for an entry in the stub hash table. */
3620
3621static char *
4ce794b7
AM
3622ppc_stub_name (const asection *input_section,
3623 const asection *sym_sec,
3624 const struct ppc_link_hash_entry *h,
3625 const Elf_Internal_Rela *rel)
721956f4
AM
3626{
3627 char *stub_name;
bcaa2f82 3628 ssize_t len;
721956f4
AM
3629
3630 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3631 offsets from a sym as a branch target? In fact, we could
3632 probably assume the addend is always zero. */
3633 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3634
3635 if (h)
3636 {
3637 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3638 stub_name = bfd_malloc (len);
46de2a7c
AM
3639 if (stub_name == NULL)
3640 return stub_name;
3641
bcaa2f82
AM
3642 len = sprintf (stub_name, "%08x.%s+%x",
3643 input_section->id & 0xffffffff,
3644 h->elf.root.root.string,
3645 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3646 }
3647 else
3648 {
ad8e1ba5 3649 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3650 stub_name = bfd_malloc (len);
46de2a7c
AM
3651 if (stub_name == NULL)
3652 return stub_name;
3653
bcaa2f82
AM
3654 len = sprintf (stub_name, "%08x.%x:%x+%x",
3655 input_section->id & 0xffffffff,
3656 sym_sec->id & 0xffffffff,
3657 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3658 (int) rel->r_addend & 0xffffffff);
721956f4 3659 }
bcaa2f82 3660 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3661 stub_name[len - 2] = 0;
721956f4
AM
3662 return stub_name;
3663}
3664
3665/* Look up an entry in the stub hash. Stub entries are cached because
3666 creating the stub name takes a bit of time. */
3667
3668static struct ppc_stub_hash_entry *
4ce794b7
AM
3669ppc_get_stub_entry (const asection *input_section,
3670 const asection *sym_sec,
039b3fef 3671 struct ppc_link_hash_entry *h,
4ce794b7
AM
3672 const Elf_Internal_Rela *rel,
3673 struct ppc_link_hash_table *htab)
721956f4
AM
3674{
3675 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3676 struct map_stub *group;
721956f4
AM
3677
3678 /* If this input section is part of a group of sections sharing one
3679 stub section, then use the id of the first section in the group.
3680 Stub names need to include a section id, as there may well be
3681 more than one stub used to reach say, printf, and we need to
3682 distinguish between them. */
6f20ed8a 3683 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3684 if (group == NULL)
3685 return NULL;
721956f4 3686
b3fac117
AM
3687 if (h != NULL && h->u.stub_cache != NULL
3688 && h->u.stub_cache->h == h
6f20ed8a 3689 && h->u.stub_cache->group == group)
721956f4 3690 {
b3fac117 3691 stub_entry = h->u.stub_cache;
721956f4
AM
3692 }
3693 else
3694 {
3695 char *stub_name;
3696
6f20ed8a 3697 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3698 if (stub_name == NULL)
3699 return NULL;
3700
3701 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3702 stub_name, FALSE, FALSE);
721956f4 3703 if (h != NULL)
b3fac117 3704 h->u.stub_cache = stub_entry;
721956f4
AM
3705
3706 free (stub_name);
3707 }
3708
3709 return stub_entry;
3710}
3711
3712/* Add a new stub entry to the stub hash. Not all fields of the new
3713 stub entry are initialised. */
3714
3715static struct ppc_stub_hash_entry *
4ce794b7
AM
3716ppc_add_stub (const char *stub_name,
3717 asection *section,
25f53a85 3718 struct bfd_link_info *info)
721956f4 3719{
25f53a85 3720 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3721 struct map_stub *group;
721956f4
AM
3722 asection *link_sec;
3723 asection *stub_sec;
3724 struct ppc_stub_hash_entry *stub_entry;
3725
6f20ed8a
AM
3726 group = htab->sec_info[section->id].u.group;
3727 link_sec = group->link_sec;
3728 stub_sec = group->stub_sec;
721956f4
AM
3729 if (stub_sec == NULL)
3730 {
6f20ed8a
AM
3731 size_t namelen;
3732 bfd_size_type len;
3733 char *s_name;
721956f4 3734
6f20ed8a
AM
3735 namelen = strlen (link_sec->name);
3736 len = namelen + sizeof (STUB_SUFFIX);
3737 s_name = bfd_alloc (htab->params->stub_bfd, len);
3738 if (s_name == NULL)
3739 return NULL;
721956f4 3740
6f20ed8a
AM
3741 memcpy (s_name, link_sec->name, namelen);
3742 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3743 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3744 if (stub_sec == NULL)
3745 return NULL;
3746 group->stub_sec = stub_sec;
721956f4
AM
3747 }
3748
3749 /* Enter this entry into the linker stub hash table. */
3750 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3751 TRUE, FALSE);
721956f4
AM
3752 if (stub_entry == NULL)
3753 {
695344c0 3754 /* xgettext:c-format */
cf97bcb0
AM
3755 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3756 section->owner, stub_name);
721956f4
AM
3757 return NULL;
3758 }
3759
6f20ed8a 3760 stub_entry->group = group;
721956f4 3761 stub_entry->stub_offset = 0;
721956f4
AM
3762 return stub_entry;
3763}
3764
e717da7e
AM
3765/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3766 not already done. */
65f38f15 3767
b34976b6 3768static bfd_boolean
e717da7e 3769create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3770{
e717da7e
AM
3771 asection *got, *relgot;
3772 flagword flags;
3773 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3774
0c8d6e5c 3775 if (!is_ppc64_elf (abfd))
0ffa91dd 3776 return FALSE;
4dfe6ac6
NC
3777 if (htab == NULL)
3778 return FALSE;
0ffa91dd 3779
33e44f2e
AM
3780 if (!htab->elf.sgot
3781 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3782 return FALSE;
e717da7e
AM
3783
3784 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3785 | SEC_LINKER_CREATED);
3786
c456f082 3787 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3788 if (!got
fd361982 3789 || !bfd_set_section_alignment (got, 3))
e717da7e 3790 return FALSE;
65f38f15 3791
c456f082
AM
3792 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3793 flags | SEC_READONLY);
e717da7e 3794 if (!relgot
fd361982 3795 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3796 return FALSE;
e717da7e
AM
3797
3798 ppc64_elf_tdata (abfd)->got = got;
3799 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3800 return TRUE;
65f38f15 3801}
5bd4f169 3802
b31867b6
AM
3803/* Follow indirect and warning symbol links. */
3804
3805static inline struct bfd_link_hash_entry *
3806follow_link (struct bfd_link_hash_entry *h)
3807{
3808 while (h->type == bfd_link_hash_indirect
3809 || h->type == bfd_link_hash_warning)
3810 h = h->u.i.link;
3811 return h;
3812}
3813
3814static inline struct elf_link_hash_entry *
3815elf_follow_link (struct elf_link_hash_entry *h)
3816{
3817 return (struct elf_link_hash_entry *) follow_link (&h->root);
3818}
3819
3820static inline struct ppc_link_hash_entry *
3821ppc_follow_link (struct ppc_link_hash_entry *h)
3822{
ed7007c1 3823 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3824}
3825
40d16e0b
AM
3826/* Merge PLT info on FROM with that on TO. */
3827
3828static void
3829move_plt_plist (struct ppc_link_hash_entry *from,
3830 struct ppc_link_hash_entry *to)
3831{
3832 if (from->elf.plt.plist != NULL)
3833 {
3834 if (to->elf.plt.plist != NULL)
3835 {
3836 struct plt_entry **entp;
3837 struct plt_entry *ent;
3838
3839 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3840 {
3841 struct plt_entry *dent;
3842
3843 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3844 if (dent->addend == ent->addend)
3845 {
3846 dent->plt.refcount += ent->plt.refcount;
3847 *entp = ent->next;
3848 break;
3849 }
3850 if (dent == NULL)
3851 entp = &ent->next;
3852 }
3853 *entp = to->elf.plt.plist;
3854 }
3855
3856 to->elf.plt.plist = from->elf.plt.plist;
3857 from->elf.plt.plist = NULL;
3858 }
3859}
3860
65f38f15
AM
3861/* Copy the extra info we tack onto an elf_link_hash_entry. */
3862
3863static void
fcfa13d2
AM
3864ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3865 struct elf_link_hash_entry *dir,
3866 struct elf_link_hash_entry *ind)
65f38f15
AM
3867{
3868 struct ppc_link_hash_entry *edir, *eind;
3869
ed7007c1
AM
3870 edir = ppc_elf_hash_entry (dir);
3871 eind = ppc_elf_hash_entry (ind);
65f38f15 3872
c79d6685
AM
3873 edir->is_func |= eind->is_func;
3874 edir->is_func_descriptor |= eind->is_func_descriptor;
3875 edir->tls_mask |= eind->tls_mask;
3876 if (eind->oh != NULL)
3877 edir->oh = ppc_follow_link (eind->oh);
3878
474436e6 3879 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3880 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3881 edir->elf.ref_regular |= eind->elf.ref_regular;
3882 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3883 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3884 edir->elf.needs_plt |= eind->elf.needs_plt;
3885 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3886
d311bc8b
AM
3887 /* If we were called to copy over info for a weak sym, don't copy
3888 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3889 in order to simplify readonly_dynrelocs and save a field in the
3890 symbol hash entry, but that means dyn_relocs can't be used in any
3891 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3892 are then tested. */
d311bc8b 3893 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3894 return;
d311bc8b 3895
411e1bfb 3896 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3897 if (eind->dyn_relocs != NULL)
65f38f15 3898 {
bbd7ec4a
AM
3899 if (edir->dyn_relocs != NULL)
3900 {
6061a67d
AM
3901 struct elf_dyn_relocs **pp;
3902 struct elf_dyn_relocs *p;
bbd7ec4a 3903
fcfa13d2 3904 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3905 list. Merge any entries against the same section. */
3906 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3907 {
6061a67d 3908 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3909
3910 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3911 if (q->sec == p->sec)
3912 {
3913 q->pc_count += p->pc_count;
3914 q->count += p->count;
3915 *pp = p->next;
3916 break;
3917 }
3918 if (q == NULL)
3919 pp = &p->next;
3920 }
3921 *pp = edir->dyn_relocs;
3922 }
3923
65f38f15
AM
3924 edir->dyn_relocs = eind->dyn_relocs;
3925 eind->dyn_relocs = NULL;
3926 }
65f38f15 3927
81848ca0
AM
3928 /* Copy over got entries that we may have already seen to the
3929 symbol which just became indirect. */
411e1bfb
AM
3930 if (eind->elf.got.glist != NULL)
3931 {
3932 if (edir->elf.got.glist != NULL)
3933 {
3934 struct got_entry **entp;
3935 struct got_entry *ent;
3936
3937 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3938 {
3939 struct got_entry *dent;
3940
3941 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3942 if (dent->addend == ent->addend
e717da7e 3943 && dent->owner == ent->owner
411e1bfb
AM
3944 && dent->tls_type == ent->tls_type)
3945 {
3946 dent->got.refcount += ent->got.refcount;
3947 *entp = ent->next;
3948 break;
3949 }
3950 if (dent == NULL)
3951 entp = &ent->next;
3952 }
3953 *entp = edir->elf.got.glist;
3954 }
3955
3956 edir->elf.got.glist = eind->elf.got.glist;
3957 eind->elf.got.glist = NULL;
3958 }
3959
3960 /* And plt entries. */
40d16e0b 3961 move_plt_plist (eind, edir);
411e1bfb 3962
fcfa13d2 3963 if (eind->elf.dynindx != -1)
411e1bfb 3964 {
fcfa13d2
AM
3965 if (edir->elf.dynindx != -1)
3966 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3967 edir->elf.dynstr_index);
411e1bfb
AM
3968 edir->elf.dynindx = eind->elf.dynindx;
3969 edir->elf.dynstr_index = eind->elf.dynstr_index;
3970 eind->elf.dynindx = -1;
3971 eind->elf.dynstr_index = 0;
3972 }
411e1bfb
AM
3973}
3974
8387904d
AM
3975/* Find the function descriptor hash entry from the given function code
3976 hash entry FH. Link the entries via their OH fields. */
3977
3978static struct ppc_link_hash_entry *
b31867b6 3979lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3980{
3981 struct ppc_link_hash_entry *fdh = fh->oh;
3982
3983 if (fdh == NULL)
3984 {
3985 const char *fd_name = fh->elf.root.root.string + 1;
3986
ed7007c1
AM
3987 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
3988 FALSE, FALSE, FALSE));
b31867b6
AM
3989 if (fdh == NULL)
3990 return fdh;
3991
3992 fdh->is_func_descriptor = 1;
3993 fdh->oh = fh;
3994 fh->is_func = 1;
3995 fh->oh = fdh;
8387904d
AM
3996 }
3997
8c5b4e52
AM
3998 fdh = ppc_follow_link (fdh);
3999 fdh->is_func_descriptor = 1;
4000 fdh->oh = fh;
4001 return fdh;
8387904d
AM
4002}
4003
8c5b4e52 4004/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4005
4006static struct ppc_link_hash_entry *
4007make_fdh (struct bfd_link_info *info,
908b32fc 4008 struct ppc_link_hash_entry *fh)
bb700d78 4009{
8c5b4e52
AM
4010 bfd *abfd = fh->elf.root.u.undef.abfd;
4011 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4012 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4013 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4014 ? BSF_WEAK
4015 : BSF_GLOBAL);
4016
4017 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4018 fh->elf.root.root.string + 1,
4019 flags, bfd_und_section_ptr, 0,
4020 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4021 return NULL;
4022
4023 fdh = (struct ppc_link_hash_entry *) bh;
4024 fdh->elf.non_elf = 0;
908b32fc
AM
4025 fdh->fake = 1;
4026 fdh->is_func_descriptor = 1;
4027 fdh->oh = fh;
4028 fh->is_func = 1;
4029 fh->oh = fdh;
bb700d78
AM
4030 return fdh;
4031}
4032
8387904d
AM
4033/* Fix function descriptor symbols defined in .opd sections to be
4034 function type. */
555cd476
AM
4035
4036static bfd_boolean
c16153ae 4037ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4038 struct bfd_link_info *info,
555cd476 4039 Elf_Internal_Sym *isym,
6911b7dc 4040 const char **name,
555cd476
AM
4041 flagword *flags ATTRIBUTE_UNUSED,
4042 asection **sec,
b53dfeb2 4043 bfd_vma *value)
555cd476 4044{
b53dfeb2 4045 if (*sec != NULL
f1885d1e 4046 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4047 {
4048 asection *code_sec;
4049
4050 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4051 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4052 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4053
4054 /* If the symbol is a function defined in .opd, and the function
4055 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4056 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4057 && (*sec)->reloc_count != 0
4058 && opd_entry_value (*sec, *value, &code_sec, NULL,
4059 FALSE) != (bfd_vma) -1
4060 && discarded_section (code_sec))
4061 {
4062 *sec = bfd_und_section_ptr;
4063 isym->st_shndx = SHN_UNDEF;
4064 }
4065 }
dbd1e97e
AM
4066 else if (*sec != NULL
4067 && strcmp ((*sec)->name, ".toc") == 0
4068 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4069 {
4070 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4071 if (htab != NULL)
4072 htab->params->object_in_toc = 1;
4073 }
433817dd 4074
6911b7dc
AM
4075 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4076 {
4077 if (abiversion (ibfd) == 0)
4078 set_abiversion (ibfd, 2);
4079 else if (abiversion (ibfd) == 1)
4080 {
cf97bcb0
AM
4081 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4082 " for ABI version 1"), *name);
6911b7dc
AM
4083 bfd_set_error (bfd_error_bad_value);
4084 return FALSE;
4085 }
4086 }
4087
555cd476
AM
4088 return TRUE;
4089}
4090
6911b7dc
AM
4091/* Merge non-visibility st_other attributes: local entry point. */
4092
4093static void
4094ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4095 const Elf_Internal_Sym *isym,
4096 bfd_boolean definition,
4097 bfd_boolean dynamic)
4098{
f378ab09 4099 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4100 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4101 | ELF_ST_VISIBILITY (h->other));
4102}
4103
8c5b4e52
AM
4104/* Hook called on merging a symbol. We use this to clear "fake" since
4105 we now have a real symbol. */
4106
4107static bfd_boolean
4108ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4109 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4110 asection **psec ATTRIBUTE_UNUSED,
4111 bfd_boolean newdef ATTRIBUTE_UNUSED,
4112 bfd_boolean olddef ATTRIBUTE_UNUSED,
4113 bfd *oldbfd ATTRIBUTE_UNUSED,
4114 const asection *oldsec ATTRIBUTE_UNUSED)
4115{
ed7007c1 4116 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4117 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4118 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4119 return TRUE;
4120}
4121
8387904d 4122/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4123 inclusion of a new ABI object archive that defines "bar".
4124 NAME is a symbol defined in an archive. Return a symbol in the hash
4125 table that might be satisfied by the archive symbols. */
8387904d
AM
4126
4127static struct elf_link_hash_entry *
4128ppc64_elf_archive_symbol_lookup (bfd *abfd,
4129 struct bfd_link_info *info,
4130 const char *name)
4131{
4132 struct elf_link_hash_entry *h;
4133 char *dot_name;
4134 size_t len;
4135
4136 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4137 if (h != NULL
4138 /* Don't return this sym if it is a fake function descriptor
4139 created by add_symbol_adjust. */
ed7007c1 4140 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4141 return h;
4142
4143 if (name[0] == '.')
4144 return h;
4145
4146 len = strlen (name);
4147 dot_name = bfd_alloc (abfd, len + 2);
4148 if (dot_name == NULL)
e99955cd 4149 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4150 dot_name[0] = '.';
4151 memcpy (dot_name + 1, name, len + 1);
4152 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4153 bfd_release (abfd, dot_name);
a804e476
AM
4154 if (h != NULL)
4155 return h;
4156
4157 if (strcmp (name, "__tls_get_addr_opt") == 0)
4158 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4159 return h;
4160}
4161
4162/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4163 new ABI object defines "bar". Well, at least, undefined dot symbols
4164 are made weak. This stops later archive searches from including an
4165 object if we already have a function descriptor definition. It also
35b0ce59
AM
4166 prevents the linker complaining about undefined symbols.
4167 We also check and correct mismatched symbol visibility here. The
4168 most restrictive visibility of the function descriptor and the
4169 function entry symbol is used. */
8387904d
AM
4170
4171static bfd_boolean
b3fac117 4172add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4173{
8387904d
AM
4174 struct ppc_link_hash_table *htab;
4175 struct ppc_link_hash_entry *fdh;
4176
b3fac117
AM
4177 if (eh->elf.root.type == bfd_link_hash_warning)
4178 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4179
8400d40d
AM
4180 if (eh->elf.root.type == bfd_link_hash_indirect)
4181 return TRUE;
4182
b3fac117
AM
4183 if (eh->elf.root.root.string[0] != '.')
4184 abort ();
8387904d 4185
b3fac117 4186 htab = ppc_hash_table (info);
4dfe6ac6
NC
4187 if (htab == NULL)
4188 return FALSE;
4189
b31867b6 4190 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4191 if (fdh == NULL
4192 && !bfd_link_relocatable (info)
4193 && (eh->elf.root.type == bfd_link_hash_undefined
4194 || eh->elf.root.type == bfd_link_hash_undefweak)
4195 && eh->elf.ref_regular)
4196 {
4197 /* Make an undefined function descriptor sym, in order to
4198 pull in an --as-needed shared lib. Archives are handled
4199 elsewhere. */
4200 fdh = make_fdh (info, eh);
4201 if (fdh == NULL)
4202 return FALSE;
bb700d78 4203 }
8c5b4e52
AM
4204
4205 if (fdh != NULL)
8387904d 4206 {
35b0ce59
AM
4207 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4208 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4209
4210 /* Make both descriptor and entry symbol have the most
4211 constraining visibility of either symbol. */
35b0ce59
AM
4212 if (entry_vis < descr_vis)
4213 fdh->elf.other += entry_vis - descr_vis;
4214 else if (entry_vis > descr_vis)
4215 eh->elf.other += descr_vis - entry_vis;
4216
8c5b4e52
AM
4217 /* Propagate reference flags from entry symbol to function
4218 descriptor symbol. */
bc4e12de 4219 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4220 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4221 fdh->elf.ref_regular |= eh->elf.ref_regular;
4222 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4223
4224 if (!fdh->elf.forced_local
4225 && fdh->elf.dynindx == -1
4226 && fdh->elf.versioned != versioned_hidden
4227 && (bfd_link_dll (info)
4228 || fdh->elf.def_dynamic
4229 || fdh->elf.ref_dynamic)
4230 && (eh->elf.ref_regular
4231 || eh->elf.def_regular))
4232 {
2cdcc330 4233 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4234 return FALSE;
35b0ce59 4235 }
8387904d 4236 }
99877b66 4237
8387904d
AM
4238 return TRUE;
4239}
4240
f6c7c3e8
AM
4241/* Set up opd section info and abiversion for IBFD, and process list
4242 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4243
8387904d 4244static bfd_boolean
f6c7c3e8 4245ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4246{
99877b66 4247 struct ppc_link_hash_table *htab;
b3fac117 4248 struct ppc_link_hash_entry **p, *eh;
459609d6 4249 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4250
459609d6 4251 if (opd != NULL && opd->size != 0)
b3fac117 4252 {
b9399fcf
AM
4253 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4254 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4255
459609d6
AM
4256 if (abiversion (ibfd) == 0)
4257 set_abiversion (ibfd, 1);
8a2058b5 4258 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4259 {
695344c0 4260 /* xgettext:c-format */
cf97bcb0
AM
4261 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4262 ibfd, abiversion (ibfd));
459609d6
AM
4263 bfd_set_error (bfd_error_bad_value);
4264 return FALSE;
f6c7c3e8 4265 }
b9399fcf 4266 }
f6c7c3e8 4267
b9399fcf
AM
4268 if (is_ppc64_elf (info->output_bfd))
4269 {
4270 /* For input files without an explicit abiversion in e_flags
4271 we should have flagged any with symbol st_other bits set
4272 as ELFv1 and above flagged those with .opd as ELFv2.
4273 Set the output abiversion if not yet set, and for any input
4274 still ambiguous, take its abiversion from the output.
4275 Differences in ABI are reported later. */
4276 if (abiversion (info->output_bfd) == 0)
4277 set_abiversion (info->output_bfd, abiversion (ibfd));
4278 else if (abiversion (ibfd) == 0)
4279 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4280 }
4281
459609d6
AM
4282 htab = ppc_hash_table (info);
4283 if (htab == NULL)
b9399fcf 4284 return TRUE;
459609d6 4285
b9399fcf
AM
4286 if (opd != NULL && opd->size != 0
4287 && (ibfd->flags & DYNAMIC) == 0
4288 && (opd->flags & SEC_RELOC) != 0
4289 && opd->reloc_count != 0
4290 && !bfd_is_abs_section (opd->output_section)
4291 && info->gc_sections)
4292 {
4293 /* Garbage collection needs some extra help with .opd sections.
4294 We don't want to necessarily keep everything referenced by
4295 relocs in .opd, as that would keep all functions. Instead,
4296 if we reference an .opd symbol (a function descriptor), we
4297 want to keep the function code symbol's section. This is
4298 easy for global symbols, but for local syms we need to keep
4299 information about the associated function section. */
4300 bfd_size_type amt;
4301 asection **opd_sym_map;
4302 Elf_Internal_Shdr *symtab_hdr;
4303 Elf_Internal_Rela *relocs, *rel_end, *rel;
4304
4305 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4306 opd_sym_map = bfd_zalloc (ibfd, amt);
4307 if (opd_sym_map == NULL)
4308 return FALSE;
4309 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4310 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4311 info->keep_memory);
4312 if (relocs == NULL)
4313 return FALSE;
4314 symtab_hdr = &elf_symtab_hdr (ibfd);
4315 rel_end = relocs + opd->reloc_count - 1;
4316 for (rel = relocs; rel < rel_end; rel++)
4317 {
4318 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4319 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4320
4321 if (r_type == R_PPC64_ADDR64
4322 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4323 && r_symndx < symtab_hdr->sh_info)
4324 {
4325 Elf_Internal_Sym *isym;
4326 asection *s;
4327
4328 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4329 if (isym == NULL)
4330 {
4331 if (elf_section_data (opd)->relocs != relocs)
4332 free (relocs);
4333 return FALSE;
4334 }
4335
4336 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4337 if (s != NULL && s != opd)
4338 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4339 }
4340 }
4341 if (elf_section_data (opd)->relocs != relocs)
4342 free (relocs);
4343 }
459609d6
AM
4344
4345 p = &htab->dot_syms;
4346 while ((eh = *p) != NULL)
4347 {
4348 *p = NULL;
4349 if (&eh->elf == htab->elf.hgot)
4350 ;
4351 else if (htab->elf.hgot == NULL
4352 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4353 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4354 else if (abiversion (ibfd) <= 1)
4355 {
4356 htab->need_func_desc_adj = 1;
4357 if (!add_symbol_adjust (eh, info))
4358 return FALSE;
4359 }
459609d6
AM
4360 p = &eh->u.next_dot_sym;
4361 }
b3fac117 4362 return TRUE;
8387904d
AM
4363}
4364
97fed1c9
JJ
4365/* Undo hash table changes when an --as-needed input file is determined
4366 not to be needed. */
4367
4368static bfd_boolean
e5034e59
AM
4369ppc64_elf_notice_as_needed (bfd *ibfd,
4370 struct bfd_link_info *info,
4371 enum notice_asneeded_action act)
97fed1c9 4372{
e5034e59
AM
4373 if (act == notice_not_needed)
4374 {
4375 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4376
e5034e59
AM
4377 if (htab == NULL)
4378 return FALSE;
4dfe6ac6 4379
e5034e59
AM
4380 htab->dot_syms = NULL;
4381 }
4382 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4383}
4384
aa374f67
AM
4385/* If --just-symbols against a final linked binary, then assume we need
4386 toc adjusting stubs when calling functions defined there. */
4387
4388static void
4389ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4390{
4391 if ((sec->flags & SEC_CODE) != 0
4392 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4393 && is_ppc64_elf (sec->owner))
4394 {
2c3f079f
AM
4395 if (abiversion (sec->owner) >= 2
4396 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4397 sec->has_toc_reloc = 1;
4398 }
4399 _bfd_elf_link_just_syms (sec, info);
4400}
4401
e054468f 4402static struct plt_entry **
4ce794b7
AM
4403update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4404 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4405{
4406 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4407 struct plt_entry **local_plt;
f961d9dd 4408 unsigned char *local_got_tls_masks;
411e1bfb
AM
4409
4410 if (local_got_ents == NULL)
4411 {
4412 bfd_size_type size = symtab_hdr->sh_info;
4413
e054468f
AM
4414 size *= (sizeof (*local_got_ents)
4415 + sizeof (*local_plt)
4416 + sizeof (*local_got_tls_masks));
4ce794b7 4417 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4418 if (local_got_ents == NULL)
e054468f 4419 return NULL;
411e1bfb
AM
4420 elf_local_got_ents (abfd) = local_got_ents;
4421 }
4422
37da22e5 4423 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4424 {
4425 struct got_entry *ent;
4426
4427 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4428 if (ent->addend == r_addend
4429 && ent->owner == abfd
4430 && ent->tls_type == tls_type)
411e1bfb
AM
4431 break;
4432 if (ent == NULL)
4433 {
986f0783 4434 size_t amt = sizeof (*ent);
4ce794b7 4435 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4436 if (ent == NULL)
4437 return FALSE;
4438 ent->next = local_got_ents[r_symndx];
4439 ent->addend = r_addend;
e717da7e 4440 ent->owner = abfd;
411e1bfb 4441 ent->tls_type = tls_type;
927be08e 4442 ent->is_indirect = FALSE;
411e1bfb
AM
4443 ent->got.refcount = 0;
4444 local_got_ents[r_symndx] = ent;
4445 }
4446 ent->got.refcount += 1;
4447 }
4448
e054468f 4449 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4450 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4451 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4452
4453 return local_plt + r_symndx;
65f38f15
AM
4454}
4455
411e1bfb 4456static bfd_boolean
e054468f 4457update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4458{
411e1bfb 4459 struct plt_entry *ent;
1e2f5b6e 4460
e054468f 4461 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4462 if (ent->addend == addend)
4463 break;
4464 if (ent == NULL)
1e2f5b6e 4465 {
986f0783 4466 size_t amt = sizeof (*ent);
4ce794b7 4467 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4468 if (ent == NULL)
4469 return FALSE;
e054468f 4470 ent->next = *plist;
411e1bfb
AM
4471 ent->addend = addend;
4472 ent->plt.refcount = 0;
e054468f 4473 *plist = ent;
1e2f5b6e 4474 }
411e1bfb 4475 ent->plt.refcount += 1;
b34976b6 4476 return TRUE;
1e2f5b6e
AM
4477}
4478
e054468f
AM
4479static bfd_boolean
4480is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4481{
4482 return (r_type == R_PPC64_REL24
05d0e962 4483 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4484 || r_type == R_PPC64_REL14
4485 || r_type == R_PPC64_REL14_BRTAKEN
4486 || r_type == R_PPC64_REL14_BRNTAKEN
4487 || r_type == R_PPC64_ADDR24
4488 || r_type == R_PPC64_ADDR14
4489 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4490 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4491 || r_type == R_PPC64_PLTCALL
4492 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4493}
4494
4495/* Relocs on inline plt call sequence insns prior to the call. */
4496
4497static bfd_boolean
4498is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4499{
4500 return (r_type == R_PPC64_PLT16_HA
4501 || r_type == R_PPC64_PLT16_HI
4502 || r_type == R_PPC64_PLT16_LO
4503 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4504 || r_type == R_PPC64_PLT_PCREL34
4505 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4506 || r_type == R_PPC64_PLTSEQ
4507 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4508}
4509
5bd4f169 4510/* Look through the relocs for a section during the first phase, and
65f38f15 4511 calculate needed space in the global offset table, procedure
5d1634d7 4512 linkage table, and dynamic reloc sections. */
5bd4f169 4513
b34976b6 4514static bfd_boolean
4ce794b7
AM
4515ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4516 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4517{
65f38f15 4518 struct ppc_link_hash_table *htab;
5bd4f169 4519 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4520 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4521 const Elf_Internal_Rela *rel;
4522 const Elf_Internal_Rela *rel_end;
5bd4f169 4523 asection *sreloc;
3a71aa26 4524 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4525 bfd_boolean is_opd;
5bd4f169 4526
0e1862bb 4527 if (bfd_link_relocatable (info))
b34976b6 4528 return TRUE;
5bd4f169 4529
680a3378
AM
4530 /* Don't do anything special with non-loaded, non-alloced sections.
4531 In particular, any relocs in such sections should not affect GOT
4532 and PLT reference counting (ie. we don't allow them to create GOT
4533 or PLT entries), there's no possibility or desire to optimize TLS
4534 relocs, and there's not much point in propagating relocs to shared
4535 libs that the dynamic linker won't relocate. */
4536 if ((sec->flags & SEC_ALLOC) == 0)
4537 return TRUE;
4538
0c8d6e5c 4539 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4540
65f38f15 4541 htab = ppc_hash_table (info);
4dfe6ac6
NC
4542 if (htab == NULL)
4543 return FALSE;
4544
3a71aa26
AM
4545 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4546 FALSE, FALSE, TRUE);
4547 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4548 FALSE, FALSE, TRUE);
0ffa91dd 4549 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4550 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4551 sreloc = NULL;
b9399fcf 4552 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4553 rel_end = relocs + sec->reloc_count;
4554 for (rel = relocs; rel < rel_end; rel++)
4555 {
4556 unsigned long r_symndx;
4557 struct elf_link_hash_entry *h;
04c9666a 4558 enum elf_ppc64_reloc_type r_type;
727fc41e 4559 int tls_type;
7c8fe5c4 4560 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4561 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4562
4563 r_symndx = ELF64_R_SYM (rel->r_info);
4564 if (r_symndx < symtab_hdr->sh_info)
4565 h = NULL;
4566 else
973a3492
L
4567 {
4568 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4569 h = elf_follow_link (h);
1c865ab2
AM
4570
4571 if (h == htab->elf.hgot)
4572 sec->has_toc_reloc = 1;
973a3492 4573 }
5bd4f169 4574
5663e321
AM
4575 r_type = ELF64_R_TYPE (rel->r_info);
4576 switch (r_type)
4577 {
04bdff6a
AM
4578 case R_PPC64_D34:
4579 case R_PPC64_D34_LO:
4580 case R_PPC64_D34_HI30:
4581 case R_PPC64_D34_HA30:
4582 case R_PPC64_D28:
c213164a
AM
4583 case R_PPC64_TPREL34:
4584 case R_PPC64_DTPREL34:
04bdff6a 4585 case R_PPC64_PCREL34:
5663e321 4586 case R_PPC64_GOT_PCREL34:
c213164a
AM
4587 case R_PPC64_GOT_TLSGD34:
4588 case R_PPC64_GOT_TLSLD34:
4589 case R_PPC64_GOT_TPREL34:
4590 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4591 case R_PPC64_PLT_PCREL34:
4592 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4593 case R_PPC64_PCREL28:
4594 htab->powerxx_stubs = 1;
133a1f60
AM
4595 break;
4596 default:
5663e321
AM
4597 break;
4598 }
903b777d
AM
4599
4600 switch (r_type)
4601 {
4602 case R_PPC64_PLT16_HA:
4603 case R_PPC64_GOT_TLSLD16_HA:
4604 case R_PPC64_GOT_TLSGD16_HA:
4605 case R_PPC64_GOT_TPREL16_HA:
4606 case R_PPC64_GOT_DTPREL16_HA:
4607 case R_PPC64_GOT16_HA:
4608 case R_PPC64_TOC16_HA:
4609 case R_PPC64_PLT16_LO:
4610 case R_PPC64_PLT16_LO_DS:
4611 case R_PPC64_GOT_TLSLD16_LO:
4612 case R_PPC64_GOT_TLSGD16_LO:
4613 case R_PPC64_GOT_TPREL16_LO_DS:
4614 case R_PPC64_GOT_DTPREL16_LO_DS:
4615 case R_PPC64_GOT16_LO:
4616 case R_PPC64_GOT16_LO_DS:
4617 case R_PPC64_TOC16_LO:
4618 case R_PPC64_TOC16_LO_DS:
4619 case R_PPC64_GOT_PCREL34:
4620 ppc64_elf_tdata (abfd)->has_optrel = 1;
4621 ppc64_elf_section_data (sec)->has_optrel = 1;
4622 break;
4623 default:
4624 break;
4625 }
4626
f749f26e 4627 ifunc = NULL;
25f23106
AM
4628 if (h != NULL)
4629 {
4630 if (h->type == STT_GNU_IFUNC)
4631 {
4632 h->needs_plt = 1;
4633 ifunc = &h->plt.plist;
4634 }
4635 }
4636 else
4637 {
4638 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4639 abfd, r_symndx);
4640 if (isym == NULL)
4641 return FALSE;
4642
4643 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4644 {
4645 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4646 rel->r_addend,
37da22e5 4647 NON_GOT | PLT_IFUNC);
25f23106
AM
4648 if (ifunc == NULL)
4649 return FALSE;
4650 }
4651 }
727fc41e 4652
f749f26e 4653 tls_type = 0;
a33d1f77 4654 switch (r_type)
5bd4f169 4655 {
727fc41e
AM
4656 case R_PPC64_TLSGD:
4657 case R_PPC64_TLSLD:
4658 /* These special tls relocs tie a call to __tls_get_addr with
4659 its parameter symbol. */
37da22e5 4660 if (h != NULL)
ed7007c1 4661 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4662 else
4663 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4664 rel->r_addend,
37da22e5
AM
4665 NON_GOT | TLS_TLS | TLS_MARK))
4666 return FALSE;
4667 sec->has_tls_reloc = 1;
727fc41e
AM
4668 break;
4669
411e1bfb
AM
4670 case R_PPC64_GOT_TLSLD16:
4671 case R_PPC64_GOT_TLSLD16_LO:
4672 case R_PPC64_GOT_TLSLD16_HI:
4673 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4674 case R_PPC64_GOT_TLSLD34:
951fd09b 4675 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4676 goto dogottls;
4677
4678 case R_PPC64_GOT_TLSGD16:
4679 case R_PPC64_GOT_TLSGD16_LO:
4680 case R_PPC64_GOT_TLSGD16_HI:
4681 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4682 case R_PPC64_GOT_TLSGD34:
951fd09b 4683 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4684 goto dogottls;
4685
4686 case R_PPC64_GOT_TPREL16_DS:
4687 case R_PPC64_GOT_TPREL16_LO_DS:
4688 case R_PPC64_GOT_TPREL16_HI:
4689 case R_PPC64_GOT_TPREL16_HA:
c213164a 4690 case R_PPC64_GOT_TPREL34:
7c8bbca5 4691 if (bfd_link_dll (info))
411e1bfb
AM
4692 info->flags |= DF_STATIC_TLS;
4693 tls_type = TLS_TLS | TLS_TPREL;
4694 goto dogottls;
4695
4696 case R_PPC64_GOT_DTPREL16_DS:
4697 case R_PPC64_GOT_DTPREL16_LO_DS:
4698 case R_PPC64_GOT_DTPREL16_HI:
4699 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4700 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4701 tls_type = TLS_TLS | TLS_DTPREL;
4702 dogottls:
4703 sec->has_tls_reloc = 1;
066f4018 4704 goto dogot;
411e1bfb 4705
903b777d
AM
4706 case R_PPC64_GOT16:
4707 case R_PPC64_GOT16_LO:
4708 case R_PPC64_GOT16_HI:
65f38f15 4709 case R_PPC64_GOT16_HA:
903b777d 4710 case R_PPC64_GOT16_DS:
066f4018 4711 case R_PPC64_GOT16_LO_DS:
4a421c53 4712 case R_PPC64_GOT_PCREL34:
066f4018 4713 dogot:
65f38f15 4714 /* This symbol requires a global offset table entry. */
4c52953f 4715 sec->has_toc_reloc = 1;
33c0ec9d
AM
4716 if (r_type == R_PPC64_GOT_TLSLD16
4717 || r_type == R_PPC64_GOT_TLSGD16
4718 || r_type == R_PPC64_GOT_TPREL16_DS
4719 || r_type == R_PPC64_GOT_DTPREL16_DS
4720 || r_type == R_PPC64_GOT16
4721 || r_type == R_PPC64_GOT16_DS)
4722 {
4723 htab->do_multi_toc = 1;
d77c8a4b 4724 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4725 }
4726
e717da7e
AM
4727 if (ppc64_elf_tdata (abfd)->got == NULL
4728 && !create_got_section (abfd, info))
b34976b6 4729 return FALSE;
5bd4f169
AM
4730
4731 if (h != NULL)
4732 {
411e1bfb
AM
4733 struct ppc_link_hash_entry *eh;
4734 struct got_entry *ent;
65f38f15 4735
ed7007c1 4736 eh = ppc_elf_hash_entry (h);
411e1bfb 4737 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4738 if (ent->addend == rel->r_addend
e717da7e 4739 && ent->owner == abfd
411e1bfb
AM
4740 && ent->tls_type == tls_type)
4741 break;
4742 if (ent == NULL)
5bd4f169 4743 {
986f0783 4744 size_t amt = sizeof (*ent);
4ce794b7 4745 ent = bfd_alloc (abfd, amt);
411e1bfb 4746 if (ent == NULL)
b34976b6 4747 return FALSE;
411e1bfb 4748 ent->next = eh->elf.got.glist;
133a1f60 4749 ent->addend = rel->r_addend;
e717da7e 4750 ent->owner = abfd;
411e1bfb 4751 ent->tls_type = tls_type;
927be08e 4752 ent->is_indirect = FALSE;
411e1bfb
AM
4753 ent->got.refcount = 0;
4754 eh->elf.got.glist = ent;
5bd4f169 4755 }
411e1bfb 4756 ent->got.refcount += 1;
e7b938ca 4757 eh->tls_mask |= tls_type;
5bd4f169 4758 }
411e1bfb
AM
4759 else
4760 /* This is a global offset table entry for a local symbol. */
4761 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4762 rel->r_addend, tls_type))
411e1bfb 4763 return FALSE;
a345bc8d
AM
4764
4765 /* We may also need a plt entry if the symbol turns out to be
4766 an ifunc. */
0e1862bb 4767 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4768 {
133a1f60 4769 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
a345bc8d
AM
4770 return FALSE;
4771 }
5bd4f169
AM
4772 break;
4773
5bd4f169 4774 case R_PPC64_PLT16_HA:
65f38f15
AM
4775 case R_PPC64_PLT16_HI:
4776 case R_PPC64_PLT16_LO:
08be3224 4777 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4778 case R_PPC64_PLT_PCREL34:
4779 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4780 case R_PPC64_PLT32:
4781 case R_PPC64_PLT64:
cbf95972
AM
4782 /* This symbol requires a procedure linkage table entry. */
4783 plt_list = ifunc;
4784 if (h != NULL)
e054468f 4785 {
e054468f
AM
4786 h->needs_plt = 1;
4787 if (h->root.root.string[0] == '.'
4788 && h->root.root.string[1] != '\0')
ed7007c1
AM
4789 ppc_elf_hash_entry (h)->is_func = 1;
4790 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4791 plt_list = &h->plt.plist;
4792 }
4793 if (plt_list == NULL)
2d7ad24e 4794 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4795 rel->r_addend,
2d7ad24e 4796 NON_GOT | PLT_KEEP);
133a1f60 4797 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4798 return FALSE;
5bd4f169
AM
4799 break;
4800
4801 /* The following relocations don't need to propagate the
4802 relocation if linking a shared object since they are
4803 section relative. */
4804 case R_PPC64_SECTOFF:
4805 case R_PPC64_SECTOFF_LO:
4806 case R_PPC64_SECTOFF_HI:
4807 case R_PPC64_SECTOFF_HA:
4808 case R_PPC64_SECTOFF_DS:
4809 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4810 case R_PPC64_DTPREL16:
4811 case R_PPC64_DTPREL16_LO:
4812 case R_PPC64_DTPREL16_HI:
4813 case R_PPC64_DTPREL16_HA:
4814 case R_PPC64_DTPREL16_DS:
4815 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4816 case R_PPC64_DTPREL16_HIGH:
4817 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4818 case R_PPC64_DTPREL16_HIGHER:
4819 case R_PPC64_DTPREL16_HIGHERA:
4820 case R_PPC64_DTPREL16_HIGHEST:
4821 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4822 break;
4823
ad8e1ba5 4824 /* Nor do these. */
25f23106
AM
4825 case R_PPC64_REL16:
4826 case R_PPC64_REL16_LO:
4827 case R_PPC64_REL16_HI:
4828 case R_PPC64_REL16_HA:
4a969973
AM
4829 case R_PPC64_REL16_HIGH:
4830 case R_PPC64_REL16_HIGHA:
4831 case R_PPC64_REL16_HIGHER:
4832 case R_PPC64_REL16_HIGHERA:
4833 case R_PPC64_REL16_HIGHEST:
4834 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4835 case R_PPC64_REL16_HIGHER34:
4836 case R_PPC64_REL16_HIGHERA34:
4837 case R_PPC64_REL16_HIGHEST34:
4838 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4839 case R_PPC64_REL16DX_HA:
25f23106
AM
4840 break;
4841
45965137
AM
4842 /* Not supported as a dynamic relocation. */
4843 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4844 if (bfd_link_pic (info))
45965137
AM
4845 {
4846 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4847 ppc_howto_init ();
695344c0 4848 /* xgettext:c-format */
174d0a74 4849 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4850 "in shared libraries and PIEs\n"),
45965137
AM
4851 abfd, sec, rel->r_offset,
4852 ppc64_elf_howto_table[r_type]->name);
4853 bfd_set_error (bfd_error_bad_value);
4854 return FALSE;
4855 }
4856 break;
4857
ad8e1ba5 4858 case R_PPC64_TOC16:
33c0ec9d
AM
4859 case R_PPC64_TOC16_DS:
4860 htab->do_multi_toc = 1;
d77c8a4b 4861 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4862 /* Fall through. */
ad8e1ba5
AM
4863 case R_PPC64_TOC16_LO:
4864 case R_PPC64_TOC16_HI:
4865 case R_PPC64_TOC16_HA:
ad8e1ba5 4866 case R_PPC64_TOC16_LO_DS:
4c52953f 4867 sec->has_toc_reloc = 1;
ec73ddcd 4868 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4869 {
4870 /* We may need a copy reloc. */
4871 h->non_got_ref = 1;
4872 /* Strongly prefer a copy reloc over a dynamic reloc.
4873 glibc ld.so as of 2019-08 will error out if one of
4874 these relocations is emitted. */
4875 h->needs_copy = 1;
4876 goto dodyn;
4877 }
ad8e1ba5
AM
4878 break;
4879
006589cf
AM
4880 /* Marker reloc. */
4881 case R_PPC64_ENTRY:
4882 break;
4883
5bd4f169
AM
4884 /* This relocation describes the C++ object vtable hierarchy.
4885 Reconstruct it for later use during GC. */
4886 case R_PPC64_GNU_VTINHERIT:
c152c796 4887 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4888 return FALSE;
5bd4f169
AM
4889 break;
4890
4891 /* This relocation describes which C++ vtable entries are actually
4892 used. Record for later use during GC. */
4893 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4894 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4895 return FALSE;
5bd4f169
AM
4896 break;
4897
721956f4
AM
4898 case R_PPC64_REL14:
4899 case R_PPC64_REL14_BRTAKEN:
4900 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4901 {
4902 asection *dest = NULL;
4903
4904 /* Heuristic: If jumping outside our section, chances are
4905 we are going to need a stub. */
4906 if (h != NULL)
4907 {
4908 /* If the sym is weak it may be overridden later, so
4909 don't assume we know where a weak sym lives. */
4910 if (h->root.type == bfd_link_hash_defined)
4911 dest = h->root.u.def.section;
4912 }
4913 else
87d72d41
AM
4914 {
4915 Elf_Internal_Sym *isym;
4916
4917 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4918 abfd, r_symndx);
4919 if (isym == NULL)
4920 return FALSE;
4921
4922 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4923 }
4924
220c76dd 4925 if (dest != sec)
7c8fe5c4 4926 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4927 }
3e04d765
AM
4928 goto rel24;
4929
4930 case R_PPC64_PLTCALL:
5663e321 4931 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4932 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4933 /* Fall through. */
4934
5d1634d7 4935 case R_PPC64_REL24:
05d0e962 4936 case R_PPC64_REL24_NOTOC:
3e04d765 4937 rel24:
cbf95972
AM
4938 plt_list = ifunc;
4939 if (h != NULL)
5d1634d7 4940 {
e054468f
AM
4941 h->needs_plt = 1;
4942 if (h->root.root.string[0] == '.'
4943 && h->root.root.string[1] != '\0')
ed7007c1 4944 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4945
3a71aa26 4946 if (h == tga || h == dottga)
cbf95972
AM
4947 {
4948 sec->has_tls_reloc = 1;
4949 if (rel != relocs
4950 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4951 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4952 /* We have a new-style __tls_get_addr call with
4953 a marker reloc. */
4954 ;
4955 else
4956 /* Mark this section as having an old-style call. */
9737e8af 4957 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4958 }
4959 plt_list = &h->plt.plist;
411e1bfb 4960 }
cbf95972
AM
4961
4962 /* We may need a .plt entry if the function this reloc
4963 refers to is in a shared lib. */
4964 if (plt_list
133a1f60 4965 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4966 return FALSE;
411e1bfb
AM
4967 break;
4968
cbf95972
AM
4969 case R_PPC64_ADDR14:
4970 case R_PPC64_ADDR14_BRNTAKEN:
4971 case R_PPC64_ADDR14_BRTAKEN:
4972 case R_PPC64_ADDR24:
4973 goto dodyn;
4974
411e1bfb
AM
4975 case R_PPC64_TPREL64:
4976 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4977 if (bfd_link_dll (info))
411e1bfb
AM
4978 info->flags |= DF_STATIC_TLS;
4979 goto dotlstoc;
4980
4981 case R_PPC64_DTPMOD64:
4982 if (rel + 1 < rel_end
4983 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4984 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4985 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4986 else
951fd09b 4987 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4988 goto dotlstoc;
4989
4990 case R_PPC64_DTPREL64:
4991 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4992 if (rel != relocs
4993 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4994 && rel[-1].r_offset == rel->r_offset - 8)
4995 /* This is the second reloc of a dtpmod, dtprel pair.
4996 Don't mark with TLS_DTPREL. */
4997 goto dodyn;
4998
4999 dotlstoc:
5000 sec->has_tls_reloc = 1;
5001 if (h != NULL)
ed7007c1 5002 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5003 else
5004 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5005 rel->r_addend, tls_type))
411e1bfb
AM
5006 return FALSE;
5007
7c8fe5c4
AM
5008 ppc64_sec = ppc64_elf_section_data (sec);
5009 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5010 {
3a71aa26
AM
5011 bfd_size_type amt;
5012
e7b938ca 5013 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5014 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5015 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5016 if (ppc64_sec->u.toc.symndx == NULL)
5017 return FALSE;
5018 amt = sec->size * sizeof (bfd_vma) / 8;
5019 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5020 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5021 return FALSE;
7c8fe5c4
AM
5022 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5023 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5024 }
5025 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5026 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5027 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5028
5029 /* Mark the second slot of a GD or LD entry.
5030 -1 to indicate GD and -2 to indicate LD. */
5031 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5032 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5033 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5034 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5035 goto dodyn;
5036
5037 case R_PPC64_TPREL16:
5038 case R_PPC64_TPREL16_LO:
5039 case R_PPC64_TPREL16_HI:
5040 case R_PPC64_TPREL16_HA:
5041 case R_PPC64_TPREL16_DS:
5042 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5043 case R_PPC64_TPREL16_HIGH:
5044 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5045 case R_PPC64_TPREL16_HIGHER:
5046 case R_PPC64_TPREL16_HIGHERA:
5047 case R_PPC64_TPREL16_HIGHEST:
5048 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5049 case R_PPC64_TPREL34:
7c8bbca5
AM
5050 if (bfd_link_dll (info))
5051 info->flags |= DF_STATIC_TLS;
5052 goto dodyn;
5d1634d7 5053
e86ce104 5054 case R_PPC64_ADDR64:
b9399fcf 5055 if (is_opd
1e2f5b6e 5056 && rel + 1 < rel_end
4ce794b7 5057 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5058 {
8387904d 5059 if (h != NULL)
ed7007c1 5060 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5061 }
e86ce104
AM
5062 /* Fall through. */
5063
65f38f15
AM
5064 case R_PPC64_ADDR16:
5065 case R_PPC64_ADDR16_DS:
5066 case R_PPC64_ADDR16_HA:
5067 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5068 case R_PPC64_ADDR16_HIGH:
5069 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5070 case R_PPC64_ADDR16_HIGHER:
5071 case R_PPC64_ADDR16_HIGHERA:
5072 case R_PPC64_ADDR16_HIGHEST:
5073 case R_PPC64_ADDR16_HIGHESTA:
5074 case R_PPC64_ADDR16_LO:
5075 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5076 case R_PPC64_D34:
5077 case R_PPC64_D34_LO:
5078 case R_PPC64_D34_HI30:
5079 case R_PPC64_D34_HA30:
5080 case R_PPC64_ADDR16_HIGHER34:
5081 case R_PPC64_ADDR16_HIGHERA34:
5082 case R_PPC64_ADDR16_HIGHEST34:
5083 case R_PPC64_ADDR16_HIGHESTA34:
5084 case R_PPC64_D28:
0e1862bb 5085 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5086 && rel->r_addend == 0)
5087 {
5088 /* We may need a .plt entry if this reloc refers to a
5089 function in a shared lib. */
5663e321 5090 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5091 return FALSE;
5092 h->pointer_equality_needed = 1;
5093 }
5094 /* Fall through. */
5095
5096 case R_PPC64_REL30:
5097 case R_PPC64_REL32:
5098 case R_PPC64_REL64:
65f38f15 5099 case R_PPC64_ADDR32:
65f38f15
AM
5100 case R_PPC64_UADDR16:
5101 case R_PPC64_UADDR32:
5102 case R_PPC64_UADDR64:
5bd4f169 5103 case R_PPC64_TOC:
ec73ddcd 5104 if (h != NULL && bfd_link_executable (info))
81848ca0 5105 /* We may need a copy reloc. */
f5385ebf 5106 h->non_got_ref = 1;
81848ca0 5107
41bd81ab 5108 /* Don't propagate .opd relocs. */
b9399fcf 5109 if (NO_OPD_RELOCS && is_opd)
e86ce104 5110 break;
e86ce104 5111
65f38f15
AM
5112 /* If we are creating a shared library, and this is a reloc
5113 against a global symbol, or a non PC relative reloc
5114 against a local symbol, then we need to copy the reloc
5115 into the shared library. However, if we are linking with
5116 -Bsymbolic, we do not need to copy a reloc against a
5117 global symbol which is defined in an object we are
5118 including in the link (i.e., DEF_REGULAR is set). At
5119 this point we have not seen all the input files, so it is
5120 possible that DEF_REGULAR is not set now but will be set
5121 later (it is never cleared). In case of a weak definition,
5122 DEF_REGULAR may be cleared later by a strong definition in
5123 a shared library. We account for that possibility below by
f4656909 5124 storing information in the dyn_relocs field of the hash
65f38f15
AM
5125 table entry. A similar situation occurs when creating
5126 shared libraries and symbol visibility changes render the
5127 symbol local.
5128
5129 If on the other hand, we are creating an executable, we
5130 may need to keep relocations for symbols satisfied by a
5131 dynamic library if we manage to avoid copy relocs for the
5132 symbol. */
411e1bfb 5133 dodyn:
ec73ddcd
AM
5134 if ((h != NULL
5135 && (h->root.type == bfd_link_hash_defweak
5136 || !h->def_regular))
5137 || (h != NULL
5138 && !bfd_link_executable (info)
5139 && !SYMBOLIC_BIND (info, h))
5140 || (bfd_link_pic (info)
5141 && must_be_dyn_reloc (info, r_type))
0e1862bb 5142 || (!bfd_link_pic (info)
25f23106 5143 && ifunc != NULL))
5bd4f169 5144 {
65f38f15
AM
5145 /* We must copy these reloc types into the output file.
5146 Create a reloc section in dynobj and make room for
5147 this reloc. */
5bd4f169
AM
5148 if (sreloc == NULL)
5149 {
83bac4b0
NC
5150 sreloc = _bfd_elf_make_dynamic_reloc_section
5151 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5152
5bd4f169 5153 if (sreloc == NULL)
83bac4b0 5154 return FALSE;
5bd4f169
AM
5155 }
5156
65f38f15
AM
5157 /* If this is a global symbol, we count the number of
5158 relocations we need for this symbol. */
5159 if (h != NULL)
5160 {
19e08130
AM
5161 struct elf_dyn_relocs *p;
5162 struct elf_dyn_relocs **head;
5163
ed7007c1 5164 head = &ppc_elf_hash_entry (h)->dyn_relocs;
19e08130
AM
5165 p = *head;
5166 if (p == NULL || p->sec != sec)
5167 {
5168 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5169 if (p == NULL)
5170 return FALSE;
5171 p->next = *head;
5172 *head = p;
5173 p->sec = sec;
5174 p->count = 0;
5175 p->pc_count = 0;
5176 }
5177 p->count += 1;
5178 if (!must_be_dyn_reloc (info, r_type))
5179 p->pc_count += 1;
65f38f15
AM
5180 }
5181 else
5182 {
ec338859
AM
5183 /* Track dynamic relocs needed for local syms too.
5184 We really need local syms available to do this
5185 easily. Oh well. */
19e08130
AM
5186 struct ppc_dyn_relocs *p;
5187 struct ppc_dyn_relocs **head;
5188 bfd_boolean is_ifunc;
ec338859 5189 asection *s;
6edfbbad 5190 void *vpp;
87d72d41 5191 Elf_Internal_Sym *isym;
6edfbbad 5192
87d72d41
AM
5193 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5194 abfd, r_symndx);
5195 if (isym == NULL)
b34976b6 5196 return FALSE;
ec338859 5197
87d72d41
AM
5198 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5199 if (s == NULL)
5200 s = sec;
5201
6edfbbad 5202 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5203 head = (struct ppc_dyn_relocs **) vpp;
5204 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5205 p = *head;
5206 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5207 p = p->next;
5208 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5209 {
5210 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5211 if (p == NULL)
5212 return FALSE;
5213 p->next = *head;
5214 *head = p;
5215 p->sec = sec;
5216 p->ifunc = is_ifunc;
5217 p->count = 0;
5218 }
5219 p->count += 1;
ec338859 5220 }
65f38f15 5221 }
5bd4f169 5222 break;
65f38f15
AM
5223
5224 default:
96e0dda4 5225 break;
5bd4f169
AM
5226 }
5227 }
5228
b34976b6 5229 return TRUE;
5bd4f169
AM
5230}
5231
ee67d69a
AM
5232/* Merge backend specific data from an object file to the output
5233 object file when linking. */
5234
5235static bfd_boolean
50e03d47 5236ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5237{
50e03d47 5238 bfd *obfd = info->output_bfd;
ee67d69a
AM
5239 unsigned long iflags, oflags;
5240
5241 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5242 return TRUE;
5243
5244 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5245 return TRUE;
5246
50e03d47 5247 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5248 return FALSE;
5249
5250 iflags = elf_elfheader (ibfd)->e_flags;
5251 oflags = elf_elfheader (obfd)->e_flags;
5252
f6c7c3e8 5253 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5254 {
4eca0228 5255 _bfd_error_handler
695344c0 5256 /* xgettext:c-format */
871b3ab2 5257 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5258 bfd_set_error (bfd_error_bad_value);
5259 return FALSE;
5260 }
f6c7c3e8 5261 else if (iflags != oflags && iflags != 0)
ee67d69a 5262 {
4eca0228 5263 _bfd_error_handler
695344c0 5264 /* xgettext:c-format */
871b3ab2 5265 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5266 ibfd, iflags, oflags);
5267 bfd_set_error (bfd_error_bad_value);
5268 return FALSE;
5269 }
5270
4a91d0ba
AM
5271 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5272 return FALSE;
005d79fd 5273
ee67d69a 5274 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5275 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5276}
5277
5278static bfd_boolean
5279ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5280{
5281 /* Print normal ELF private data. */
5282 _bfd_elf_print_private_bfd_data (abfd, ptr);
5283
5284 if (elf_elfheader (abfd)->e_flags != 0)
5285 {
5286 FILE *file = ptr;
5287
ee67d69a
AM
5288 fprintf (file, _("private flags = 0x%lx:"),
5289 elf_elfheader (abfd)->e_flags);
5290
5291 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5292 fprintf (file, _(" [abiv%ld]"),
5293 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5294 fputc ('\n', file);
5295 }
5296
5297 return TRUE;
5298}
5299
8387904d 5300/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5301 of the code entry point, and its section, which must be in the same
5302 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5303
5304static bfd_vma
5305opd_entry_value (asection *opd_sec,
5306 bfd_vma offset,
5307 asection **code_sec,
aef36ac1
AM
5308 bfd_vma *code_off,
5309 bfd_boolean in_code_sec)
8387904d
AM
5310{
5311 bfd *opd_bfd = opd_sec->owner;
8860955f 5312 Elf_Internal_Rela *relocs;
8387904d 5313 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5314 bfd_vma val;
8387904d 5315
9f296da3
AM
5316 /* No relocs implies we are linking a --just-symbols object, or looking
5317 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5318 if (opd_sec->reloc_count == 0)
5319 {
729eabd5 5320 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5321
729eabd5
AM
5322 if (contents == NULL)
5323 {
5324 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5325 return (bfd_vma) -1;
5326 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5327 }
ee1e4ede 5328
dbb3fbbb 5329 /* PR 17512: file: 64b9dfbb. */
451dfd38 5330 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5331 return (bfd_vma) -1;
5332
729eabd5 5333 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5334 if (code_sec != NULL)
5335 {
5336 asection *sec, *likely = NULL;
ee1e4ede 5337
aef36ac1 5338 if (in_code_sec)
4b85d634 5339 {
aef36ac1
AM
5340 sec = *code_sec;
5341 if (sec->vma <= val
5342 && val < sec->vma + sec->size)
5343 likely = sec;
5344 else
5345 val = -1;
5346 }
5347 else
5348 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5349 if (sec->vma <= val
5350 && (sec->flags & SEC_LOAD) != 0
5351 && (sec->flags & SEC_ALLOC) != 0)
5352 likely = sec;
5353 if (likely != NULL)
5354 {
5355 *code_sec = likely;
5356 if (code_off != NULL)
5357 *code_off = val - likely->vma;
4b85d634
AM
5358 }
5359 }
aef36ac1 5360 return val;
4b85d634
AM
5361 }
5362
0c8d6e5c 5363 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5364
729eabd5 5365 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5366 if (relocs == NULL)
5367 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5368 /* PR 17512: file: df8e1fd6. */
5369 if (relocs == NULL)
5370 return (bfd_vma) -1;
645ea6a9 5371
8387904d 5372 /* Go find the opd reloc at the sym address. */
8860955f 5373 lo = relocs;
8387904d 5374 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5375 val = (bfd_vma) -1;
8387904d
AM
5376 while (lo < hi)
5377 {
5378 look = lo + (hi - lo) / 2;
5379 if (look->r_offset < offset)
5380 lo = look + 1;
5381 else if (look->r_offset > offset)
5382 hi = look;
5383 else
5384 {
0ffa91dd
NC
5385 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5386
8387904d
AM
5387 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5388 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5389 {
5390 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5391 asection *sec = NULL;
8387904d 5392
b53dfeb2
AM
5393 if (symndx >= symtab_hdr->sh_info
5394 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5395 {
5396 struct elf_link_hash_entry **sym_hashes;
5397 struct elf_link_hash_entry *rh;
5398
5399 sym_hashes = elf_sym_hashes (opd_bfd);
5400 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5401 if (rh != NULL)
5402 {
5403 rh = elf_follow_link (rh);
bb854a36
AM
5404 if (rh->root.type != bfd_link_hash_defined
5405 && rh->root.type != bfd_link_hash_defweak)
5406 break;
5407 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5408 {
bb854a36
AM
5409 val = rh->root.u.def.value;
5410 sec = rh->root.u.def.section;
b53dfeb2
AM
5411 }
5412 }
5413 }
5414
5415 if (sec == NULL)
5416 {
5417 Elf_Internal_Sym *sym;
5418
5419 if (symndx < symtab_hdr->sh_info)
5420 {
5421 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5422 if (sym == NULL)
5423 {
5424 size_t symcnt = symtab_hdr->sh_info;
5425 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5426 symcnt, 0,
5427 NULL, NULL, NULL);
5428 if (sym == NULL)
5429 break;
5430 symtab_hdr->contents = (bfd_byte *) sym;
5431 }
5432 sym += symndx;
128205bb
AM
5433 }
5434 else
5435 {
b53dfeb2
AM
5436 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5437 1, symndx,
5438 NULL, NULL, NULL);
128205bb
AM
5439 if (sym == NULL)
5440 break;
128205bb 5441 }
b53dfeb2
AM
5442 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5443 if (sec == NULL)
5444 break;
5445 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5446 val = sym->st_value;
8387904d 5447 }
b53dfeb2 5448
8387904d
AM
5449 val += look->r_addend;
5450 if (code_off != NULL)
5451 *code_off = val;
5452 if (code_sec != NULL)
aef36ac1
AM
5453 {
5454 if (in_code_sec && *code_sec != sec)
5455 return -1;
5456 else
5457 *code_sec = sec;
5458 }
b53dfeb2 5459 if (sec->output_section != NULL)
8387904d 5460 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5461 }
5462 break;
5463 }
5464 }
645ea6a9 5465
645ea6a9 5466 return val;
8387904d
AM
5467}
5468
aef36ac1
AM
5469/* If the ELF symbol SYM might be a function in SEC, return the
5470 function size and set *CODE_OFF to the function's entry point,
5471 otherwise return zero. */
9f296da3 5472
aef36ac1
AM
5473static bfd_size_type
5474ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5475 bfd_vma *code_off)
9f296da3 5476{
aef36ac1
AM
5477 bfd_size_type size;
5478
5479 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5480 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5481 return 0;
5482
5483 size = 0;
5484 if (!(sym->flags & BSF_SYNTHETIC))
5485 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5486
5487 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5488 {
b07bca4e
AM
5489 struct _opd_sec_data *opd = get_opd_info (sym->section);
5490 bfd_vma symval = sym->value;
5491
5492 if (opd != NULL
5493 && opd->adjust != NULL
5494 && elf_section_data (sym->section)->relocs != NULL)
5495 {
5496 /* opd_entry_value will use cached relocs that have been
5497 adjusted, but with raw symbols. That means both local
5498 and global symbols need adjusting. */
5499 long adjust = opd->adjust[OPD_NDX (symval)];
5500 if (adjust == -1)
5501 return 0;
5502 symval += adjust;
5503 }
5504
5505 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5506 &sec, code_off, TRUE) == (bfd_vma) -1)
5507 return 0;
5508 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5509 symbol. This size has nothing to do with the code size of the
5510 function, which is what we're supposed to return, but the
5511 code size isn't available without looking up the dot-sym.
5512 However, doing that would be a waste of time particularly
5513 since elf_find_function will look at the dot-sym anyway.
5514 Now, elf_find_function will keep the largest size of any
5515 function sym found at the code address of interest, so return
5516 1 here to avoid it incorrectly caching a larger function size
5517 for a small function. This does mean we return the wrong
5518 size for a new-ABI function of size 24, but all that does is
5519 disable caching for such functions. */
5520 if (size == 24)
5521 size = 1;
9f296da3 5522 }
aef36ac1
AM
5523 else
5524 {
5525 if (sym->section != sec)
5526 return 0;
5527 *code_off = sym->value;
5528 }
5529 if (size == 0)
5530 size = 1;
5531 return size;
9f296da3
AM
5532}
5533
f378ab09
AM
5534/* Return true if symbol is a strong function defined in an ELFv2
5535 object with st_other localentry bits of zero, ie. its local entry
5536 point coincides with its global entry point. */
5537
5538static bfd_boolean
5539is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5540{
5541 return (h != NULL
5542 && h->type == STT_FUNC
5543 && h->root.type == bfd_link_hash_defined
5544 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5545 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5546 && is_ppc64_elf (h->root.u.def.section->owner)
5547 && abiversion (h->root.u.def.section->owner) >= 2);
5548}
5549
854b41e7
AM
5550/* Return true if symbol is defined in a regular object file. */
5551
5552static bfd_boolean
5553is_static_defined (struct elf_link_hash_entry *h)
5554{
5555 return ((h->root.type == bfd_link_hash_defined
5556 || h->root.type == bfd_link_hash_defweak)
5557 && h->root.u.def.section != NULL
5558 && h->root.u.def.section->output_section != NULL);
5559}
5560
b31867b6
AM
5561/* If FDH is a function descriptor symbol, return the associated code
5562 entry symbol if it is defined. Return NULL otherwise. */
5563
5564static struct ppc_link_hash_entry *
5565defined_code_entry (struct ppc_link_hash_entry *fdh)
5566{
5567 if (fdh->is_func_descriptor)
5568 {
5569 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5570 if (fh->elf.root.type == bfd_link_hash_defined
5571 || fh->elf.root.type == bfd_link_hash_defweak)
5572 return fh;
5573 }
5574 return NULL;
5575}
5576
5577/* If FH is a function code entry symbol, return the associated
5578 function descriptor symbol if it is defined. Return NULL otherwise. */
5579
5580static struct ppc_link_hash_entry *
5581defined_func_desc (struct ppc_link_hash_entry *fh)
5582{
5583 if (fh->oh != NULL
5584 && fh->oh->is_func_descriptor)
5585 {
5586 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5587 if (fdh->elf.root.type == bfd_link_hash_defined
5588 || fdh->elf.root.type == bfd_link_hash_defweak)
5589 return fdh;
5590 }
5591 return NULL;
5592}
5593
ed7007c1
AM
5594/* Given H is a symbol that satisfies is_static_defined, return the
5595 value in the output file. */
5596
5597static bfd_vma
5598defined_sym_val (struct elf_link_hash_entry *h)
5599{
5600 return (h->root.u.def.section->output_section->vma
5601 + h->root.u.def.section->output_offset
5602 + h->root.u.def.value);
5603}
5604
5605/* Return true if H matches __tls_get_addr or one of its variants. */
5606
5607static bfd_boolean
5608is_tls_get_addr (struct elf_link_hash_entry *h,
5609 struct ppc_link_hash_table *htab)
5610{
9e7028aa
AM
5611 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5612 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
ed7007c1
AM
5613}
5614
8c5b4e52
AM
5615static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5616
5617/* Garbage collect sections, after first dealing with dot-symbols. */
5618
5619static bfd_boolean
5620ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5621{
5622 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5623
5624 if (htab != NULL && htab->need_func_desc_adj)
5625 {
5626 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5627 htab->need_func_desc_adj = 0;
5628 }
5629 return bfd_elf_gc_sections (abfd, info);
5630}
5631
74f0fb50
AM
5632/* Mark all our entry sym sections, both opd and code section. */
5633
5634static void
5635ppc64_elf_gc_keep (struct bfd_link_info *info)
5636{
5637 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5638 struct bfd_sym_chain *sym;
5639
4dfe6ac6
NC
5640 if (htab == NULL)
5641 return;
5642
74f0fb50
AM
5643 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5644 {
b31867b6 5645 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5646 asection *sec;
5647
ed7007c1
AM
5648 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5649 FALSE, FALSE, TRUE));
74f0fb50
AM
5650 if (eh == NULL)
5651 continue;
5652 if (eh->elf.root.type != bfd_link_hash_defined
5653 && eh->elf.root.type != bfd_link_hash_defweak)
5654 continue;
5655
b31867b6
AM
5656 fh = defined_code_entry (eh);
5657 if (fh != NULL)
74f0fb50 5658 {
b31867b6 5659 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5660 sec->flags |= SEC_KEEP;
5661 }
5662 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5663 && opd_entry_value (eh->elf.root.u.def.section,
5664 eh->elf.root.u.def.value,
aef36ac1 5665 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5666 sec->flags |= SEC_KEEP;
5667
5668 sec = eh->elf.root.u.def.section;
5669 sec->flags |= SEC_KEEP;
5670 }
5671}
5672
64d03ab5
AM
5673/* Mark sections containing dynamically referenced symbols. When
5674 building shared libraries, we must assume that any visible symbol is
5675 referenced. */
5676
5677static bfd_boolean
5678ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5679{
5680 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5681 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5682 struct ppc_link_hash_entry *fdh;
b407645f 5683 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5684
64d03ab5 5685 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5686 fdh = defined_func_desc (eh);
5687 if (fdh != NULL)
5688 eh = fdh;
64d03ab5
AM
5689
5690 if ((eh->elf.root.type == bfd_link_hash_defined
5691 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5692 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5693 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5694 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5695 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5696 && (!bfd_link_executable (info)
e278ae05 5697 || info->gc_keep_exported
b407645f
AM
5698 || info->export_dynamic
5699 || (eh->elf.dynamic
5700 && d != NULL
2cdcc330
AM
5701 && (*d->match) (&d->head, NULL,
5702 eh->elf.root.root.string)))
e278ae05 5703 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5704 || !bfd_hide_sym_by_version (info->version_info,
5705 eh->elf.root.root.string)))))
64d03ab5
AM
5706 {
5707 asection *code_sec;
b31867b6 5708 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5709
5710 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5711
5712 /* Function descriptor syms cause the associated
5713 function code sym section to be marked. */
b31867b6
AM
5714 fh = defined_code_entry (eh);
5715 if (fh != NULL)
5716 {
5717 code_sec = fh->elf.root.u.def.section;
5718 code_sec->flags |= SEC_KEEP;
5719 }
64d03ab5
AM
5720 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5721 && opd_entry_value (eh->elf.root.u.def.section,
5722 eh->elf.root.u.def.value,
aef36ac1 5723 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5724 code_sec->flags |= SEC_KEEP;
5725 }
5726
5727 return TRUE;
5728}
5729
5bd4f169
AM
5730/* Return the section that should be marked against GC for a given
5731 relocation. */
5732
5733static asection *
4ce794b7 5734ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5735 struct bfd_link_info *info,
4ce794b7
AM
5736 Elf_Internal_Rela *rel,
5737 struct elf_link_hash_entry *h,
5738 Elf_Internal_Sym *sym)
5bd4f169 5739{
ccfa59ea
AM
5740 asection *rsec;
5741
ccfa59ea
AM
5742 /* Syms return NULL if we're marking .opd, so we avoid marking all
5743 function sections, as all functions are referenced in .opd. */
5744 rsec = NULL;
5745 if (get_opd_info (sec) != NULL)
5746 return rsec;
1e2f5b6e 5747
5bd4f169
AM
5748 if (h != NULL)
5749 {
04c9666a 5750 enum elf_ppc64_reloc_type r_type;
b31867b6 5751 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5752
4ce794b7 5753 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5754 switch (r_type)
5bd4f169
AM
5755 {
5756 case R_PPC64_GNU_VTINHERIT:
5757 case R_PPC64_GNU_VTENTRY:
5758 break;
5759
5760 default:
5761 switch (h->root.type)
5762 {
5763 case bfd_link_hash_defined:
5764 case bfd_link_hash_defweak:
ed7007c1 5765 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5766 fdh = defined_func_desc (eh);
5767 if (fdh != NULL)
8c5b4e52
AM
5768 {
5769 /* -mcall-aixdesc code references the dot-symbol on
5770 a call reloc. Mark the function descriptor too
5771 against garbage collection. */
5772 fdh->elf.mark = 1;
60d67dc8
AM
5773 if (fdh->elf.is_weakalias)
5774 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5775 eh = fdh;
5776 }
1e2f5b6e
AM
5777
5778 /* Function descriptor syms cause the associated
5779 function code sym section to be marked. */
b31867b6
AM
5780 fh = defined_code_entry (eh);
5781 if (fh != NULL)
ccfa59ea
AM
5782 {
5783 /* They also mark their opd section. */
74f0fb50 5784 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5785
b31867b6 5786 rsec = fh->elf.root.u.def.section;
ccfa59ea 5787 }
8387904d
AM
5788 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5789 && opd_entry_value (eh->elf.root.u.def.section,
5790 eh->elf.root.u.def.value,
aef36ac1 5791 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5792 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5793 else
1e2f5b6e
AM
5794 rsec = h->root.u.def.section;
5795 break;
5bd4f169
AM
5796
5797 case bfd_link_hash_common:
1e2f5b6e
AM
5798 rsec = h->root.u.c.p->section;
5799 break;
5bd4f169
AM
5800
5801 default:
fb34365b 5802 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5803 }
5804 }
5805 }
5806 else
5807 {
74f0fb50 5808 struct _opd_sec_data *opd;
1e2f5b6e
AM
5809
5810 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5811 opd = get_opd_info (rsec);
5812 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5813 {
74f0fb50 5814 rsec->gc_mark = 1;
ccfa59ea 5815
51aecdc5 5816 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5817 }
5bd4f169
AM
5818 }
5819
1e2f5b6e 5820 return rsec;
5bd4f169
AM
5821}
5822
deb0e272
AM
5823/* The maximum size of .sfpr. */
5824#define SFPR_MAX (218*4)
5825
5826struct sfpr_def_parms
5827{
699733f6
AM
5828 const char name[12];
5829 unsigned char lo, hi;
2cdcc330
AM
5830 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5831 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5832};
5833
a4b6fadd
AM
5834/* Auto-generate _save*, _rest* functions in .sfpr.
5835 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5836 instead. */
deb0e272 5837
4dfe6ac6 5838static bfd_boolean
a4b6fadd
AM
5839sfpr_define (struct bfd_link_info *info,
5840 const struct sfpr_def_parms *parm,
5841 asection *stub_sec)
deb0e272
AM
5842{
5843 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5844 unsigned int i;
5845 size_t len = strlen (parm->name);
5846 bfd_boolean writing = FALSE;
699733f6 5847 char sym[16];
deb0e272 5848
4dfe6ac6
NC
5849 if (htab == NULL)
5850 return FALSE;
5851
deb0e272
AM
5852 memcpy (sym, parm->name, len);
5853 sym[len + 2] = 0;
5854
5855 for (i = parm->lo; i <= parm->hi; i++)
5856 {
a4b6fadd 5857 struct ppc_link_hash_entry *h;
deb0e272
AM
5858
5859 sym[len + 0] = i / 10 + '0';
5860 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5861 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5862 writing, TRUE, TRUE));
a4b6fadd 5863 if (stub_sec != NULL)
deb0e272 5864 {
a4b6fadd
AM
5865 if (h != NULL
5866 && h->elf.root.type == bfd_link_hash_defined
5867 && h->elf.root.u.def.section == htab->sfpr)
5868 {
5869 struct elf_link_hash_entry *s;
5870 char buf[32];
5871 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5872 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5873 if (s == NULL)
5874 return FALSE;
779f2ae7 5875 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5876 {
5877 s->root.type = bfd_link_hash_defined;
5878 s->root.u.def.section = stub_sec;
7dda8d3c 5879 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5880 + h->elf.root.u.def.value);
5881 s->ref_regular = 1;
5882 s->def_regular = 1;
5883 s->ref_regular_nonweak = 1;
5884 s->forced_local = 1;
5885 s->non_elf = 0;
5886 s->root.linker_def = 1;
5887 }
5888 }
5889 continue;
5890 }
5891 if (h != NULL)
5892 {
5893 h->save_res = 1;
5894 if (!h->elf.def_regular)
deb0e272 5895 {
a4b6fadd
AM
5896 h->elf.root.type = bfd_link_hash_defined;
5897 h->elf.root.u.def.section = htab->sfpr;
5898 h->elf.root.u.def.value = htab->sfpr->size;
5899 h->elf.type = STT_FUNC;
5900 h->elf.def_regular = 1;
b32547cd 5901 h->elf.non_elf = 0;
a4b6fadd
AM
5902 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5903 writing = TRUE;
deb0e272 5904 if (htab->sfpr->contents == NULL)
a4b6fadd 5905 {
2cdcc330
AM
5906 htab->sfpr->contents
5907 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5908 if (htab->sfpr->contents == NULL)
5909 return FALSE;
5910 }
deb0e272
AM
5911 }
5912 }
5913 if (writing)
5914 {
5915 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5916 if (i != parm->hi)
5917 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5918 else
5919 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5920 htab->sfpr->size = p - htab->sfpr->contents;
5921 }
5922 }
5923
5924 return TRUE;
5925}
5926
5927static bfd_byte *
5928savegpr0 (bfd *abfd, bfd_byte *p, int r)
5929{
5930 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5931 return p + 4;
5932}
5933
5934static bfd_byte *
5935savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5936{
5937 p = savegpr0 (abfd, p, r);
a078d95a 5938 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5939 p = p + 4;
5940 bfd_put_32 (abfd, BLR, p);
5941 return p + 4;
5942}
5943
5944static bfd_byte *
5945restgpr0 (bfd *abfd, bfd_byte *p, int r)
5946{
5947 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5948 return p + 4;
5949}
5950
5951static bfd_byte *
5952restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5953{
a078d95a 5954 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5955 p = p + 4;
5956 p = restgpr0 (abfd, p, r);
5957 bfd_put_32 (abfd, MTLR_R0, p);
5958 p = p + 4;
5959 if (r == 29)
5960 {
5961 p = restgpr0 (abfd, p, 30);
5962 p = restgpr0 (abfd, p, 31);
5963 }
5964 bfd_put_32 (abfd, BLR, p);
5965 return p + 4;
5966}
5967
5968static bfd_byte *
5969savegpr1 (bfd *abfd, bfd_byte *p, int r)
5970{
5971 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5972 return p + 4;
5973}
5974
5975static bfd_byte *
5976savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5977{
5978 p = savegpr1 (abfd, p, r);
5979 bfd_put_32 (abfd, BLR, p);
5980 return p + 4;
5981}
5982
5983static bfd_byte *
5984restgpr1 (bfd *abfd, bfd_byte *p, int r)
5985{
5986 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5987 return p + 4;
5988}
5989
5990static bfd_byte *
5991restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5992{
5993 p = restgpr1 (abfd, p, r);
5994 bfd_put_32 (abfd, BLR, p);
5995 return p + 4;
5996}
5997
5998static bfd_byte *
5999savefpr (bfd *abfd, bfd_byte *p, int r)
6000{
6001 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6002 return p + 4;
6003}
6004
6005static bfd_byte *
6006savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6007{
6008 p = savefpr (abfd, p, r);
a078d95a 6009 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6010 p = p + 4;
6011 bfd_put_32 (abfd, BLR, p);
6012 return p + 4;
6013}
6014
6015static bfd_byte *
6016restfpr (bfd *abfd, bfd_byte *p, int r)
6017{
6018 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6019 return p + 4;
6020}
6021
6022static bfd_byte *
6023restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6024{
a078d95a 6025 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6026 p = p + 4;
6027 p = restfpr (abfd, p, r);
6028 bfd_put_32 (abfd, MTLR_R0, p);
6029 p = p + 4;
6030 if (r == 29)
6031 {
6032 p = restfpr (abfd, p, 30);
6033 p = restfpr (abfd, p, 31);
6034 }
6035 bfd_put_32 (abfd, BLR, p);
6036 return p + 4;
6037}
6038
6039static bfd_byte *
6040savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6041{
6042 p = savefpr (abfd, p, r);
6043 bfd_put_32 (abfd, BLR, p);
6044 return p + 4;
6045}
6046
6047static bfd_byte *
6048restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6049{
6050 p = restfpr (abfd, p, r);
6051 bfd_put_32 (abfd, BLR, p);
6052 return p + 4;
6053}
6054
6055static bfd_byte *
6056savevr (bfd *abfd, bfd_byte *p, int r)
6057{
6058 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6059 p = p + 4;
6060 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6061 return p + 4;
6062}
6063
6064static bfd_byte *
6065savevr_tail (bfd *abfd, bfd_byte *p, int r)
6066{
6067 p = savevr (abfd, p, r);
6068 bfd_put_32 (abfd, BLR, p);
6069 return p + 4;
6070}
6071
6072static bfd_byte *
6073restvr (bfd *abfd, bfd_byte *p, int r)
6074{
6075 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6076 p = p + 4;
6077 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6078 return p + 4;
6079}
6080
6081static bfd_byte *
6082restvr_tail (bfd *abfd, bfd_byte *p, int r)
6083{
6084 p = restvr (abfd, p, r);
6085 bfd_put_32 (abfd, BLR, p);
6086 return p + 4;
6087}
6088
9e7028aa
AM
6089#define STDU_R1_0R1 0xf8210001
6090#define ADDI_R1_R1 0x38210000
6091
6092/* Emit prologue of wrapper preserving regs around a call to
6093 __tls_get_addr_opt. */
6094
6095static bfd_byte *
6096tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6097{
6098 unsigned int i;
6099
6100 bfd_put_32 (obfd, MFLR_R0, p);
6101 p += 4;
6102 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6103 p += 4;
6104
6105 if (htab->opd_abi)
6106 {
6107 for (i = 4; i < 12; i++)
6108 {
6109 bfd_put_32 (obfd,
6110 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6111 p += 4;
6112 }
6113 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6114 p += 4;
6115 }
6116 else
6117 {
6118 for (i = 4; i < 12; i++)
6119 {
6120 bfd_put_32 (obfd,
6121 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6122 p += 4;
6123 }
6124 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6125 p += 4;
6126 }
6127 return p;
6128}
6129
6130/* Emit epilogue of wrapper preserving regs around a call to
6131 __tls_get_addr_opt. */
6132
6133static bfd_byte *
6134tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6135{
6136 unsigned int i;
6137
6138 if (htab->opd_abi)
6139 {
6140 for (i = 4; i < 12; i++)
6141 {
6142 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6143 p += 4;
6144 }
6145 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6146 p += 4;
6147 }
6148 else
6149 {
6150 for (i = 4; i < 12; i++)
6151 {
6152 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6153 p += 4;
6154 }
6155 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6156 p += 4;
6157 }
6158 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6159 p += 4;
6160 bfd_put_32 (obfd, MTLR_R0, p);
6161 p += 4;
6162 bfd_put_32 (obfd, BLR, p);
6163 p += 4;
6164 return p;
6165}
6166
e86ce104
AM
6167/* Called via elf_link_hash_traverse to transfer dynamic linking
6168 information on function code symbol entries to their corresponding
6169 function descriptor symbol entries. */
deb0e272 6170
b34976b6 6171static bfd_boolean
4ce794b7 6172func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6173{
e86ce104 6174 struct bfd_link_info *info;
65f38f15 6175 struct ppc_link_hash_table *htab;
50bc7936
AM
6176 struct ppc_link_hash_entry *fh;
6177 struct ppc_link_hash_entry *fdh;
6178 bfd_boolean force_local;
5bd4f169 6179
ed7007c1 6180 fh = ppc_elf_hash_entry (h);
50bc7936 6181 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6182 return TRUE;
e86ce104 6183
8c5b4e52
AM
6184 if (!fh->is_func)
6185 return TRUE;
6186
6187 if (fh->elf.root.root.string[0] != '.'
6188 || fh->elf.root.root.string[1] == '\0')
6189 return TRUE;
6190
4ce794b7 6191 info = inf;
65f38f15 6192 htab = ppc_hash_table (info);
4dfe6ac6
NC
6193 if (htab == NULL)
6194 return FALSE;
5bd4f169 6195
8c5b4e52
AM
6196 /* Find the corresponding function descriptor symbol. */
6197 fdh = lookup_fdh (fh, htab);
6198
c09bdfe5
AM
6199 /* Resolve undefined references to dot-symbols as the value
6200 in the function descriptor, if we have one in a regular object.
6201 This is to satisfy cases like ".quad .foo". Calls to functions
6202 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6203 if ((fh->elf.root.type == bfd_link_hash_undefined
6204 || fh->elf.root.type == bfd_link_hash_undefweak)
6205 && (fdh->elf.root.type == bfd_link_hash_defined
6206 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6207 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6208 && opd_entry_value (fdh->elf.root.u.def.section,
6209 fdh->elf.root.u.def.value,
c09bdfe5 6210 &fh->elf.root.u.def.section,
aef36ac1 6211 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6212 {
b31867b6 6213 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6214 fh->elf.forced_local = 1;
b31867b6
AM
6215 fh->elf.def_regular = fdh->elf.def_regular;
6216 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6217 }
6218
8c5b4e52
AM
6219 if (!fh->elf.dynamic)
6220 {
6221 struct plt_entry *ent;
5bd4f169 6222
8c5b4e52
AM
6223 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6224 if (ent->plt.refcount > 0)
6225 break;
6226 if (ent == NULL)
6227 return TRUE;
6228 }
5bd4f169 6229
8c5b4e52 6230 /* Create a descriptor as undefined if necessary. */
50bc7936 6231 if (fdh == NULL
0e1862bb 6232 && !bfd_link_executable (info)
50bc7936
AM
6233 && (fh->elf.root.type == bfd_link_hash_undefined
6234 || fh->elf.root.type == bfd_link_hash_undefweak))
6235 {
908b32fc 6236 fdh = make_fdh (info, fh);
bb700d78
AM
6237 if (fdh == NULL)
6238 return FALSE;
50bc7936 6239 }
648cca2c 6240
8c5b4e52 6241 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6242 if (fdh != NULL
6243 && fdh->fake
8c5b4e52
AM
6244 && (fh->elf.root.type == bfd_link_hash_defined
6245 || fh->elf.root.type == bfd_link_hash_defweak))
6246 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6247
8c5b4e52
AM
6248 /* Transfer dynamic linking information to the function descriptor. */
6249 if (fdh != NULL)
6250 {
f5385ebf
AM
6251 fdh->elf.ref_regular |= fh->elf.ref_regular;
6252 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6253 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6254 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6255 fdh->elf.dynamic |= fh->elf.dynamic;
6256 fdh->elf.needs_plt |= (fh->elf.needs_plt
6257 || fh->elf.type == STT_FUNC
6258 || fh->elf.type == STT_GNU_IFUNC);
6259 move_plt_plist (fh, fdh);
6260
6261 if (!fdh->elf.forced_local
6262 && fh->elf.dynindx != -1)
6263 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6264 return FALSE;
e86ce104
AM
6265 }
6266
50bc7936
AM
6267 /* Now that the info is on the function descriptor, clear the
6268 function code sym info. Any function code syms for which we
6269 don't have a definition in a regular file, we force local.
6270 This prevents a shared library from exporting syms that have
6271 been imported from another library. Function code syms that
6272 are really in the library we must leave global to prevent the
6273 linker dragging in a definition from a static library. */
93f3fa99
AM
6274 force_local = (!fh->elf.def_regular
6275 || fdh == NULL
6276 || !fdh->elf.def_regular
6277 || fdh->elf.forced_local);
50bc7936
AM
6278 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6279
b34976b6 6280 return TRUE;
e86ce104 6281}
40b8271b 6282
a4b6fadd
AM
6283static const struct sfpr_def_parms save_res_funcs[] =
6284 {
6285 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6286 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6287 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6288 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6289 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6290 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6291 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6292 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6293 { "._savef", 14, 31, savefpr, savefpr1_tail },
6294 { "._restf", 14, 31, restfpr, restfpr1_tail },
6295 { "_savevr_", 20, 31, savevr, savevr_tail },
6296 { "_restvr_", 20, 31, restvr, restvr_tail }
6297 };
6298
e86ce104 6299/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6300 this hook to a) provide some gcc support functions, and b) transfer
6301 dynamic linking information gathered so far on function code symbol
6302 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6303
b34976b6 6304static bfd_boolean
4ce794b7
AM
6305ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6306 struct bfd_link_info *info)
e86ce104
AM
6307{
6308 struct ppc_link_hash_table *htab;
6309
6310 htab = ppc_hash_table (info);
4dfe6ac6
NC
6311 if (htab == NULL)
6312 return FALSE;
6313
b32547cd
AM
6314 /* Provide any missing _save* and _rest* functions. */
6315 if (htab->sfpr != NULL)
6316 {
6317 unsigned int i;
6318
6319 htab->sfpr->size = 0;
6320 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6321 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6322 return FALSE;
6323 if (htab->sfpr->size == 0)
6324 htab->sfpr->flags |= SEC_EXCLUDE;
6325 }
6326
6327 if (bfd_link_relocatable (info))
6328 return TRUE;
6329
6330 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6331 {
6332 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6333 /* Make .TOC. defined so as to prevent it being made dynamic.
6334 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6335 if (!htab->elf.hgot->def_regular
6336 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6337 {
6338 htab->elf.hgot->root.type = bfd_link_hash_defined;
6339 htab->elf.hgot->root.u.def.value = 0;
6340 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6341 htab->elf.hgot->def_regular = 1;
6342 htab->elf.hgot->root.linker_def = 1;
6343 }
dba6fa9b 6344 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6345 htab->elf.hgot->other
6346 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6347 }
c66bb0ee 6348
8c5b4e52
AM
6349 if (htab->need_func_desc_adj)
6350 {
6351 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6352 htab->need_func_desc_adj = 0;
6353 }
805fc799 6354
b34976b6 6355 return TRUE;
e86ce104
AM
6356}
6357
98bbb1b8 6358/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6359
98bbb1b8 6360static asection *
a345bc8d
AM
6361readonly_dynrelocs (struct elf_link_hash_entry *h)
6362{
ed7007c1 6363 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
a345bc8d
AM
6364 struct elf_dyn_relocs *p;
6365
a345bc8d
AM
6366 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6367 {
6368 asection *s = p->sec->output_section;
6369
6370 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6371 return p->sec;
a345bc8d 6372 }
98bbb1b8 6373 return NULL;
a345bc8d
AM
6374}
6375
d311bc8b 6376/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6377 aliases, that apply to read-only sections. Cannot be used after
6378 size_dynamic_sections. */
d311bc8b
AM
6379
6380static bfd_boolean
6381alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6382{
ed7007c1 6383 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6384 do
6385 {
6386 if (readonly_dynrelocs (&eh->elf))
6387 return TRUE;
ed7007c1 6388 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6389 }
6390 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6391
6392 return FALSE;
6393}
8a2058b5 6394
8a9e8e72
AM
6395/* Return whether EH has pc-relative dynamic relocs. */
6396
6397static bfd_boolean
6398pc_dynrelocs (struct ppc_link_hash_entry *eh)
6399{
6400 struct elf_dyn_relocs *p;
6401
6402 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6403 if (p->pc_count != 0)
6404 return TRUE;
6405 return FALSE;
6406}
6407
8a2058b5
AM
6408/* Return true if a global entry stub will be created for H. Valid
6409 for ELFv2 before plt entries have been allocated. */
6410
6411static bfd_boolean
6412global_entry_stub (struct elf_link_hash_entry *h)
6413{
6414 struct plt_entry *pent;
6415
6416 if (!h->pointer_equality_needed
6417 || h->def_regular)
6418 return FALSE;
6419
6420 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6421 if (pent->plt.refcount > 0
6422 && pent->addend == 0)
6423 return TRUE;
6424
6425 return FALSE;
6426}
6427
e86ce104
AM
6428/* Adjust a symbol defined by a dynamic object and referenced by a
6429 regular object. The current definition is in some section of the
6430 dynamic object, but we're not including those sections. We have to
6431 change the definition to something the rest of the link can
6432 understand. */
6433
b34976b6 6434static bfd_boolean
4ce794b7
AM
6435ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6436 struct elf_link_hash_entry *h)
e86ce104
AM
6437{
6438 struct ppc_link_hash_table *htab;
5474d94f 6439 asection *s, *srel;
e86ce104
AM
6440
6441 htab = ppc_hash_table (info);
4dfe6ac6
NC
6442 if (htab == NULL)
6443 return FALSE;
e86ce104
AM
6444
6445 /* Deal with function syms. */
6446 if (h->type == STT_FUNC
e054468f 6447 || h->type == STT_GNU_IFUNC
f5385ebf 6448 || h->needs_plt)
e86ce104 6449 {
ed7007c1 6450 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6451 || SYMBOL_CALLS_LOCAL (info, h)
6452 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6453 /* Discard dyn_relocs when non-pic if we've decided that a
6454 function symbol is local and not an ifunc. We keep dynamic
6455 relocs for ifuncs when local rather than always emitting a
6456 plt call stub for them and defining the symbol on the call
6457 stub. We can't do that for ELFv1 anyway (a function symbol
6458 is defined on a descriptor, not code) and it can be faster at
6459 run-time due to not needing to bounce through a stub. The
6460 dyn_relocs for ifuncs will be applied even in a static
6461 executable. */
6462 if (!bfd_link_pic (info)
6463 && h->type != STT_GNU_IFUNC
6464 && local)
ed7007c1 6465 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 6466
e86ce104
AM
6467 /* Clear procedure linkage table information for any symbol that
6468 won't need a .plt entry. */
411e1bfb
AM
6469 struct plt_entry *ent;
6470 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6471 if (ent->plt.refcount > 0)
6472 break;
8387904d 6473 if (ent == NULL
2d7ad24e
AM
6474 || (h->type != STT_GNU_IFUNC
6475 && local
3e04d765 6476 && (htab->can_convert_all_inline_plt
ed7007c1 6477 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6478 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6479 {
411e1bfb 6480 h->plt.plist = NULL;
f5385ebf 6481 h->needs_plt = 0;
d1eca1e4 6482 h->pointer_equality_needed = 0;
40b8271b 6483 }
8a2058b5 6484 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6485 {
d1eca1e4
AM
6486 /* Taking a function's address in a read/write section
6487 doesn't require us to define the function symbol in the
6488 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6489 be used instead. The reason we prefer a few more dynamic
6490 relocs is that calling via a global entry stub costs a
6491 few more instructions, and pointer_equality_needed causes
6492 extra work in ld.so when resolving these symbols. */
529fe20e 6493 if (global_entry_stub (h))
d1eca1e4 6494 {
ab2477e1 6495 if (!readonly_dynrelocs (h))
529fe20e
AM
6496 {
6497 h->pointer_equality_needed = 0;
04383fd1
AM
6498 /* If we haven't seen a branch reloc and the symbol
6499 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6500 if (!h->needs_plt)
6501 h->plt.plist = NULL;
6502 }
6503 else if (!bfd_link_pic (info))
6504 /* We are going to be defining the function symbol on the
6505 plt stub, so no dyn_relocs needed when non-pic. */
ed7007c1 6506 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
d1eca1e4
AM
6507 }
6508
3988aed5
AM
6509 /* ELFv2 function symbols can't have copy relocs. */
6510 return TRUE;
6511 }
6512 else if (!h->needs_plt
ab2477e1 6513 && !readonly_dynrelocs (h))
3988aed5 6514 {
04383fd1
AM
6515 /* If we haven't seen a branch reloc and the symbol isn't an
6516 ifunc then we don't need a plt entry. */
3988aed5
AM
6517 h->plt.plist = NULL;
6518 h->pointer_equality_needed = 0;
a345bc8d
AM
6519 return TRUE;
6520 }
5bd4f169 6521 }
bbd7ec4a 6522 else
411e1bfb 6523 h->plt.plist = NULL;
5bd4f169
AM
6524
6525 /* If this is a weak symbol, and there is a real definition, the
6526 processor independent code will have arranged for us to see the
6527 real definition first, and we can just use the same value. */
60d67dc8 6528 if (h->is_weakalias)
5bd4f169 6529 {
60d67dc8
AM
6530 struct elf_link_hash_entry *def = weakdef (h);
6531 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6532 h->root.u.def.section = def->root.u.def.section;
6533 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6534 if (def->root.u.def.section == htab->elf.sdynbss
6535 || def->root.u.def.section == htab->elf.sdynrelro)
ed7007c1 6536 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
b34976b6 6537 return TRUE;
5bd4f169
AM
6538 }
6539
5bd4f169
AM
6540 /* If we are creating a shared library, we must presume that the
6541 only references to the symbol are via the global offset table.
6542 For such cases we need not do anything here; the relocations will
6543 be handled correctly by relocate_section. */
ec73ddcd 6544 if (!bfd_link_executable (info))
b34976b6 6545 return TRUE;
5bd4f169 6546
65f38f15
AM
6547 /* If there are no references to this symbol that do not use the
6548 GOT, we don't need to generate a copy reloc. */
f5385ebf 6549 if (!h->non_got_ref)
b34976b6 6550 return TRUE;
65f38f15 6551
b186458a 6552 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6553 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6554
d93d1c80
AM
6555 /* If -z nocopyreloc was given, don't generate them either. */
6556 || info->nocopyreloc
a127494f 6557
dce2246a 6558 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6559 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6560 || (ELIMINATE_COPY_RELOCS
6561 && !h->needs_copy
6562 && !alias_readonly_dynrelocs (h))
65f38f15 6563
d93d1c80
AM
6564 /* Protected variables do not work with .dynbss. The copy in
6565 .dynbss won't be used by the shared library with the protected
6566 definition for the variable. Text relocations are preferable
6567 to an incorrect program. */
6568 || h->protected_def)
529fe20e 6569 return TRUE;
a127494f 6570
e1c6cf61
AM
6571 if (h->type == STT_FUNC
6572 || h->type == STT_GNU_IFUNC)
97b639ba 6573 {
e1c6cf61
AM
6574 /* .dynbss copies of function symbols only work if we have
6575 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6576 use dot-symbols and set the function symbol size to the text
6577 size of the function rather than the size of the descriptor.
6578 That's wrong for copying a descriptor. */
ed7007c1 6579 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6580 || !(h->size == 24 || h->size == 16))
6581 return TRUE;
6582
6583 /* We should never get here, but unfortunately there are old
6584 versions of gcc (circa gcc-3.2) that improperly for the
6585 ELFv1 ABI put initialized function pointers, vtable refs and
6586 suchlike in read-only sections. Allow them to proceed, but
6587 warn that this might break at runtime. */
25f53a85 6588 info->callbacks->einfo
c1c8c1ef 6589 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6590 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6591 h->root.root.string);
6592 }
5d35169e
AM
6593
6594 /* This is a reference to a symbol defined by a dynamic object which
6595 is not a function. */
6596
5bd4f169
AM
6597 /* We must allocate the symbol in our .dynbss section, which will
6598 become part of the .bss section of the executable. There will be
6599 an entry for this symbol in the .dynsym section. The dynamic
6600 object will contain position independent code, so all references
6601 from the dynamic object to this symbol will go through the global
6602 offset table. The dynamic linker will use the .dynsym entry to
6603 determine the address it must put in the global offset table, so
6604 both the dynamic object and the regular object will refer to the
6605 same memory location for the variable. */
5474d94f
AM
6606 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6607 {
6608 s = htab->elf.sdynrelro;
6609 srel = htab->elf.sreldynrelro;
6610 }
6611 else
6612 {
6613 s = htab->elf.sdynbss;
6614 srel = htab->elf.srelbss;
6615 }
1d7e9d18 6616 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6617 {
4a7e5234
AM
6618 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6619 linker to copy the initial value out of the dynamic object
6620 and into the runtime process image. */
5474d94f 6621 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6622 h->needs_copy = 1;
5bd4f169
AM
6623 }
6624
529fe20e 6625 /* We no longer want dyn_relocs. */
ed7007c1 6626 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 6627 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6628}
6629
e86ce104
AM
6630/* If given a function descriptor symbol, hide both the function code
6631 sym and the descriptor. */
6632static void
4ce794b7
AM
6633ppc64_elf_hide_symbol (struct bfd_link_info *info,
6634 struct elf_link_hash_entry *h,
6635 bfd_boolean force_local)
e86ce104 6636{
34814b9f 6637 struct ppc_link_hash_entry *eh;
e86ce104
AM
6638 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6639
87469ba2
AM
6640 if (ppc_hash_table (info) == NULL)
6641 return;
6642
ed7007c1 6643 eh = ppc_elf_hash_entry (h);
34814b9f 6644 if (eh->is_func_descriptor)
e86ce104 6645 {
34814b9f 6646 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6647
721956f4 6648 if (fh == NULL)
d1329ca3
AM
6649 {
6650 const char *p, *q;
b8ac2841 6651 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6652 char save;
6653
6654 /* We aren't supposed to use alloca in BFD because on
6655 systems which do not have alloca the version in libiberty
6656 calls xmalloc, which might cause the program to crash
6657 when it runs out of memory. This function doesn't have a
6658 return status, so there's no way to gracefully return an
6659 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6660 accessed; It's either a string in an ELF string table,
6661 or allocated in an objalloc structure. */
d1329ca3 6662
34814b9f 6663 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6664 save = *p;
6665 *(char *) p = '.';
ed7007c1
AM
6666 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6667 FALSE, FALSE));
d1329ca3
AM
6668 *(char *) p = save;
6669
6670 /* Unfortunately, if it so happens that the string we were
6671 looking for was allocated immediately before this string,
6672 then we overwrote the string terminator. That's the only
6673 reason the lookup should fail. */
6674 if (fh == NULL)
6675 {
34814b9f
AM
6676 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6677 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6678 --q, --p;
34814b9f 6679 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6680 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6681 FALSE, FALSE));
d1329ca3
AM
6682 }
6683 if (fh != NULL)
6684 {
34814b9f
AM
6685 eh->oh = fh;
6686 fh->oh = eh;
d1329ca3
AM
6687 }
6688 }
e86ce104 6689 if (fh != NULL)
34814b9f 6690 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6691 }
6692}
6693
411e1bfb 6694static bfd_boolean
8843416a
AM
6695get_sym_h (struct elf_link_hash_entry **hp,
6696 Elf_Internal_Sym **symp,
6697 asection **symsecp,
f961d9dd 6698 unsigned char **tls_maskp,
8843416a
AM
6699 Elf_Internal_Sym **locsymsp,
6700 unsigned long r_symndx,
6701 bfd *ibfd)
411e1bfb 6702{
0ffa91dd 6703 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6704
6705 if (r_symndx >= symtab_hdr->sh_info)
6706 {
6707 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6708 struct elf_link_hash_entry *h;
6709
6710 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6711 h = elf_follow_link (h);
411e1bfb
AM
6712
6713 if (hp != NULL)
6714 *hp = h;
6715
6716 if (symp != NULL)
6717 *symp = NULL;
6718
6719 if (symsecp != NULL)
6720 {
6721 asection *symsec = NULL;
6722 if (h->root.type == bfd_link_hash_defined
6723 || h->root.type == bfd_link_hash_defweak)
6724 symsec = h->root.u.def.section;
6725 *symsecp = symsec;
6726 }
6727
e7b938ca 6728 if (tls_maskp != NULL)
ed7007c1 6729 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6730 }
6731 else
6732 {
6733 Elf_Internal_Sym *sym;
6734 Elf_Internal_Sym *locsyms = *locsymsp;
6735
6736 if (locsyms == NULL)
6737 {
6738 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6739 if (locsyms == NULL)
6740 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6741 symtab_hdr->sh_info,
6742 0, NULL, NULL, NULL);
6743 if (locsyms == NULL)
6744 return FALSE;
6745 *locsymsp = locsyms;
6746 }
6747 sym = locsyms + r_symndx;
6748
6749 if (hp != NULL)
6750 *hp = NULL;
6751
6752 if (symp != NULL)
6753 *symp = sym;
6754
6755 if (symsecp != NULL)
cb33740c 6756 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6757
e7b938ca 6758 if (tls_maskp != NULL)
411e1bfb
AM
6759 {
6760 struct got_entry **lgot_ents;
f961d9dd 6761 unsigned char *tls_mask;
411e1bfb 6762
e7b938ca 6763 tls_mask = NULL;
411e1bfb
AM
6764 lgot_ents = elf_local_got_ents (ibfd);
6765 if (lgot_ents != NULL)
6766 {
e054468f
AM
6767 struct plt_entry **local_plt = (struct plt_entry **)
6768 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6769 unsigned char *lgot_masks = (unsigned char *)
e054468f 6770 (local_plt + symtab_hdr->sh_info);
e7b938ca 6771 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6772 }
e7b938ca 6773 *tls_maskp = tls_mask;
411e1bfb
AM
6774 }
6775 }
6776 return TRUE;
6777}
6778
e7b938ca 6779/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6780 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6781 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6782
6783static int
f961d9dd 6784get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6785 unsigned long *toc_symndx,
6786 bfd_vma *toc_addend,
0d4792f7 6787 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6788 const Elf_Internal_Rela *rel,
6789 bfd *ibfd)
411e1bfb
AM
6790{
6791 unsigned long r_symndx;
0d4792f7 6792 int next_r;
411e1bfb
AM
6793 struct elf_link_hash_entry *h;
6794 Elf_Internal_Sym *sym;
6795 asection *sec;
6796 bfd_vma off;
6797
6798 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6799 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6800 return 0;
411e1bfb 6801
37da22e5
AM
6802 if ((*tls_maskp != NULL
6803 && (**tls_maskp & TLS_TLS) != 0
6804 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6805 || sec == NULL
6bee8834 6806 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6807 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6808 return 1;
411e1bfb
AM
6809
6810 /* Look inside a TOC section too. */
6811 if (h != NULL)
6812 {
6813 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6814 off = h->root.u.def.value;
6815 }
6816 else
6817 off = sym->st_value;
6818 off += rel->r_addend;
6819 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6820 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6821 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6822 if (toc_symndx != NULL)
6823 *toc_symndx = r_symndx;
3a71aa26
AM
6824 if (toc_addend != NULL)
6825 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6826 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6827 return 0;
854b41e7 6828 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6829 && (next_r == -1 || next_r == -2))
6830 return 1 - next_r;
951fd09b 6831 return 1;
411e1bfb
AM
6832}
6833
3b421ab3
AM
6834/* Find (or create) an entry in the tocsave hash table. */
6835
6836static struct tocsave_entry *
6837tocsave_find (struct ppc_link_hash_table *htab,
6838 enum insert_option insert,
6839 Elf_Internal_Sym **local_syms,
6840 const Elf_Internal_Rela *irela,
6841 bfd *ibfd)
6842{
6843 unsigned long r_indx;
6844 struct elf_link_hash_entry *h;
6845 Elf_Internal_Sym *sym;
6846 struct tocsave_entry ent, *p;
6847 hashval_t hash;
6848 struct tocsave_entry **slot;
6849
6850 r_indx = ELF64_R_SYM (irela->r_info);
6851 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6852 return NULL;
6853 if (ent.sec == NULL || ent.sec->output_section == NULL)
6854 {
4eca0228 6855 _bfd_error_handler
871b3ab2 6856 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6857 return NULL;
6858 }
6859
6860 if (h != NULL)
6861 ent.offset = h->root.u.def.value;
6862 else
6863 ent.offset = sym->st_value;
6864 ent.offset += irela->r_addend;
6865
6866 hash = tocsave_htab_hash (&ent);
6867 slot = ((struct tocsave_entry **)
6868 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6869 if (slot == NULL)
6870 return NULL;
6871
6872 if (*slot == NULL)
6873 {
6874 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6875 if (p == NULL)
6876 return NULL;
6877 *p = ent;
6878 *slot = p;
6879 }
6880 return *slot;
6881}
6882
754021d0 6883/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6884 code for the old ABI, these will already have been done. */
754021d0
AM
6885
6886static bfd_boolean
6887adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6888{
6889 struct ppc_link_hash_entry *eh;
6890 asection *sym_sec;
74f0fb50 6891 struct _opd_sec_data *opd;
754021d0
AM
6892
6893 if (h->root.type == bfd_link_hash_indirect)
6894 return TRUE;
6895
754021d0
AM
6896 if (h->root.type != bfd_link_hash_defined
6897 && h->root.type != bfd_link_hash_defweak)
6898 return TRUE;
6899
ed7007c1 6900 eh = ppc_elf_hash_entry (h);
754021d0
AM
6901 if (eh->adjust_done)
6902 return TRUE;
6903
6904 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6905 opd = get_opd_info (sym_sec);
6906 if (opd != NULL && opd->adjust != NULL)
754021d0 6907 {
51aecdc5 6908 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6909 if (adjust == -1)
6910 {
6911 /* This entry has been deleted. */
b3fac117 6912 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6913 if (dsec == NULL)
6914 {
6915 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6916 if (discarded_section (dsec))
81688140 6917 {
b3fac117 6918 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6919 break;
6920 }
6921 }
4025353c 6922 eh->elf.root.u.def.value = 0;
81688140 6923 eh->elf.root.u.def.section = dsec;
4025353c
AM
6924 }
6925 else
6926 eh->elf.root.u.def.value += adjust;
754021d0
AM
6927 eh->adjust_done = 1;
6928 }
6929 return TRUE;
6930}
6931
8c1d1bb8 6932/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6933 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6934 have already been determined. */
6935
6936static bfd_boolean
6937dec_dynrel_count (bfd_vma r_info,
6938 asection *sec,
6939 struct bfd_link_info *info,
6940 Elf_Internal_Sym **local_syms,
6941 struct elf_link_hash_entry *h,
19e08130 6942 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6943{
6944 enum elf_ppc64_reloc_type r_type;
19e08130 6945 asection *sym_sec = NULL;
8c1d1bb8
AM
6946
6947 /* Can this reloc be dynamic? This switch, and later tests here
6948 should be kept in sync with the code in check_relocs. */
6949 r_type = ELF64_R_TYPE (r_info);
6950 switch (r_type)
6951 {
6952 default:
6953 return TRUE;
6954
1bdd8fac
AM
6955 case R_PPC64_TOC16:
6956 case R_PPC64_TOC16_DS:
6957 case R_PPC64_TOC16_LO:
6958 case R_PPC64_TOC16_HI:
6959 case R_PPC64_TOC16_HA:
6960 case R_PPC64_TOC16_LO_DS:
6961 if (h == NULL)
6962 return TRUE;
6963 break;
6964
8c1d1bb8
AM
6965 case R_PPC64_TPREL16:
6966 case R_PPC64_TPREL16_LO:
6967 case R_PPC64_TPREL16_HI:
6968 case R_PPC64_TPREL16_HA:
6969 case R_PPC64_TPREL16_DS:
6970 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6971 case R_PPC64_TPREL16_HIGH:
6972 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6973 case R_PPC64_TPREL16_HIGHER:
6974 case R_PPC64_TPREL16_HIGHERA:
6975 case R_PPC64_TPREL16_HIGHEST:
6976 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6977 case R_PPC64_TPREL64:
c213164a 6978 case R_PPC64_TPREL34:
8c1d1bb8
AM
6979 case R_PPC64_DTPMOD64:
6980 case R_PPC64_DTPREL64:
6981 case R_PPC64_ADDR64:
6982 case R_PPC64_REL30:
6983 case R_PPC64_REL32:
6984 case R_PPC64_REL64:
6985 case R_PPC64_ADDR14:
6986 case R_PPC64_ADDR14_BRNTAKEN:
6987 case R_PPC64_ADDR14_BRTAKEN:
6988 case R_PPC64_ADDR16:
6989 case R_PPC64_ADDR16_DS:
6990 case R_PPC64_ADDR16_HA:
6991 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6992 case R_PPC64_ADDR16_HIGH:
6993 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6994 case R_PPC64_ADDR16_HIGHER:
6995 case R_PPC64_ADDR16_HIGHERA:
6996 case R_PPC64_ADDR16_HIGHEST:
6997 case R_PPC64_ADDR16_HIGHESTA:
6998 case R_PPC64_ADDR16_LO:
6999 case R_PPC64_ADDR16_LO_DS:
7000 case R_PPC64_ADDR24:
7001 case R_PPC64_ADDR32:
7002 case R_PPC64_UADDR16:
7003 case R_PPC64_UADDR32:
7004 case R_PPC64_UADDR64:
7005 case R_PPC64_TOC:
5663e321
AM
7006 case R_PPC64_D34:
7007 case R_PPC64_D34_LO:
7008 case R_PPC64_D34_HI30:
7009 case R_PPC64_D34_HA30:
7010 case R_PPC64_ADDR16_HIGHER34:
7011 case R_PPC64_ADDR16_HIGHERA34:
7012 case R_PPC64_ADDR16_HIGHEST34:
7013 case R_PPC64_ADDR16_HIGHESTA34:
7014 case R_PPC64_D28:
8c1d1bb8
AM
7015 break;
7016 }
7017
7018 if (local_syms != NULL)
7019 {
7020 unsigned long r_symndx;
8c1d1bb8
AM
7021 bfd *ibfd = sec->owner;
7022
7023 r_symndx = ELF64_R_SYM (r_info);
7024 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7025 return FALSE;
7026 }
7027
ec73ddcd
AM
7028 if ((h != NULL
7029 && (h->root.type == bfd_link_hash_defweak
7030 || !h->def_regular))
7031 || (h != NULL
7032 && !bfd_link_executable (info)
7033 && !SYMBOLIC_BIND (info, h))
7034 || (bfd_link_pic (info)
7035 && must_be_dyn_reloc (info, r_type))
7036 || (!bfd_link_pic (info)
7037 && (h != NULL
7038 ? h->type == STT_GNU_IFUNC
7039 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7040 ;
7041 else
7042 return TRUE;
7043
7044 if (h != NULL)
6edfbbad 7045 {
19e08130
AM
7046 struct elf_dyn_relocs *p;
7047 struct elf_dyn_relocs **pp;
ed7007c1 7048 pp = &ppc_elf_hash_entry (h)->dyn_relocs;
19e08130
AM
7049
7050 /* elf_gc_sweep may have already removed all dyn relocs associated
7051 with local syms for a given section. Also, symbol flags are
7052 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7053 report a dynreloc miscount. */
7054 if (*pp == NULL && info->gc_sections)
7055 return TRUE;
7056
7057 while ((p = *pp) != NULL)
60124e18 7058 {
19e08130
AM
7059 if (p->sec == sec)
7060 {
7061 if (!must_be_dyn_reloc (info, r_type))
7062 p->pc_count -= 1;
7063 p->count -= 1;
7064 if (p->count == 0)
7065 *pp = p->next;
7066 return TRUE;
7067 }
7068 pp = &p->next;
60124e18 7069 }
6edfbbad 7070 }
19e08130
AM
7071 else
7072 {
7073 struct ppc_dyn_relocs *p;
7074 struct ppc_dyn_relocs **pp;
7075 void *vpp;
7076 bfd_boolean is_ifunc;
8c1d1bb8 7077
19e08130
AM
7078 if (local_syms == NULL)
7079 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7080 if (sym_sec == NULL)
7081 sym_sec = sec;
c57da1a7 7082
19e08130
AM
7083 vpp = &elf_section_data (sym_sec)->local_dynrel;
7084 pp = (struct ppc_dyn_relocs **) vpp;
7085
7086 if (*pp == NULL && info->gc_sections)
7087 return TRUE;
7088
7089 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7090 while ((p = *pp) != NULL)
8c1d1bb8 7091 {
19e08130
AM
7092 if (p->sec == sec && p->ifunc == is_ifunc)
7093 {
7094 p->count -= 1;
7095 if (p->count == 0)
7096 *pp = p->next;
7097 return TRUE;
7098 }
7099 pp = &p->next;
8c1d1bb8 7100 }
8c1d1bb8
AM
7101 }
7102
695344c0 7103 /* xgettext:c-format */
cf97bcb0
AM
7104 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7105 sec->owner, sec);
8c1d1bb8
AM
7106 bfd_set_error (bfd_error_bad_value);
7107 return FALSE;
7108}
7109
754021d0
AM
7110/* Remove unused Official Procedure Descriptor entries. Currently we
7111 only remove those associated with functions in discarded link-once
7112 sections, or weakly defined functions that have been overridden. It
7113 would be possible to remove many more entries for statically linked
7114 applications. */
7115
b34976b6 7116bfd_boolean
e7d1c40c 7117ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7118{
7119 bfd *ibfd;
754021d0 7120 bfd_boolean some_edited = FALSE;
3f764659 7121 asection *need_pad = NULL;
e7d1c40c
AM
7122 struct ppc_link_hash_table *htab;
7123
7124 htab = ppc_hash_table (info);
7125 if (htab == NULL)
7126 return FALSE;
1e2f5b6e 7127
c72f2fb2 7128 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7129 {
7130 asection *sec;
7131 Elf_Internal_Rela *relstart, *rel, *relend;
7132 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7133 Elf_Internal_Sym *local_syms;
74f0fb50 7134 struct _opd_sec_data *opd;
51aecdc5 7135 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7136 bfd_size_type cnt_16b = 0;
1e2f5b6e 7137
854b41e7
AM
7138 if (!is_ppc64_elf (ibfd))
7139 continue;
7140
1e2f5b6e 7141 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7142 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7143 continue;
7144
dbaa2011 7145 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7146 continue;
7147
1e2f5b6e
AM
7148 if (sec->output_section == bfd_abs_section_ptr)
7149 continue;
7150
7151 /* Look through the section relocs. */
7152 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7153 continue;
7154
6cdc0ccc 7155 local_syms = NULL;
0ffa91dd 7156 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7157
7158 /* Read the relocations. */
4ce794b7 7159 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7160 info->keep_memory);
1e2f5b6e 7161 if (relstart == NULL)
b34976b6 7162 return FALSE;
1e2f5b6e
AM
7163
7164 /* First run through the relocs to check they are sane, and to
7165 determine whether we need to edit this opd section. */
b34976b6 7166 need_edit = FALSE;
51aecdc5 7167 broken = FALSE;
3f764659 7168 need_pad = sec;
1e2f5b6e 7169 relend = relstart + sec->reloc_count;
50bc7936 7170 for (rel = relstart; rel < relend; )
1e2f5b6e 7171 {
04c9666a 7172 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7173 unsigned long r_symndx;
7174 asection *sym_sec;
7175 struct elf_link_hash_entry *h;
7176 Elf_Internal_Sym *sym;
51aecdc5 7177 bfd_vma offset;
1e2f5b6e 7178
51aecdc5 7179 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7180 only interested in the reloc pointing to a function entry
7181 point. */
51aecdc5
AM
7182 offset = rel->r_offset;
7183 if (rel + 1 == relend
7184 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7185 {
7186 /* If someone messes with .opd alignment then after a
7187 "ld -r" we might have padding in the middle of .opd.
7188 Also, there's nothing to prevent someone putting
7189 something silly in .opd with the assembler. No .opd
b34976b6 7190 optimization for them! */
3f764659 7191 broken_opd:
4eca0228 7192 _bfd_error_handler
871b3ab2 7193 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7194 broken = TRUE;
1e2f5b6e
AM
7195 break;
7196 }
7197
50bc7936
AM
7198 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7199 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7200 {
4eca0228 7201 _bfd_error_handler
695344c0 7202 /* xgettext:c-format */
871b3ab2 7203 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7204 ibfd, r_type);
51aecdc5 7205 broken = TRUE;
50bc7936
AM
7206 break;
7207 }
7208
1e2f5b6e 7209 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7210 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7211 r_symndx, ibfd))
50bc7936 7212 goto error_ret;
1e2f5b6e
AM
7213
7214 if (sym_sec == NULL || sym_sec->owner == NULL)
7215 {
411e1bfb
AM
7216 const char *sym_name;
7217 if (h != NULL)
7218 sym_name = h->root.root.string;
7219 else
26c61ae5
L
7220 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7221 sym_sec);
411e1bfb 7222
4eca0228 7223 _bfd_error_handler
695344c0 7224 /* xgettext:c-format */
871b3ab2 7225 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7226 ibfd, sym_name);
51aecdc5 7227 broken = TRUE;
1e2f5b6e
AM
7228 break;
7229 }
7230
51020317
AM
7231 /* opd entries are always for functions defined in the
7232 current input bfd. If the symbol isn't defined in the
7233 input bfd, then we won't be using the function in this
7234 bfd; It must be defined in a linkonce section in another
7235 bfd, or is weak. It's also possible that we are
7236 discarding the function due to a linker script /DISCARD/,
7237 which we test for via the output_section. */
7238 if (sym_sec->owner != ibfd
7239 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7240 need_edit = TRUE;
1e2f5b6e 7241
50bc7936 7242 rel += 2;
51aecdc5
AM
7243 if (rel + 1 == relend
7244 || (rel + 2 < relend
7245 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7246 ++rel;
7247
7248 if (rel == relend)
3f764659
JJ
7249 {
7250 if (sec->size == offset + 24)
7251 {
7252 need_pad = NULL;
7253 break;
7254 }
51aecdc5 7255 if (sec->size == offset + 16)
3f764659
JJ
7256 {
7257 cnt_16b++;
7258 break;
7259 }
7260 goto broken_opd;
7261 }
3f764659
JJ
7262 else if (rel + 1 < relend
7263 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7264 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7265 {
51aecdc5
AM
7266 if (rel[0].r_offset == offset + 16)
7267 cnt_16b++;
7268 else if (rel[0].r_offset != offset + 24)
7269 goto broken_opd;
3f764659
JJ
7270 }
7271 else
7272 goto broken_opd;
1e2f5b6e
AM
7273 }
7274
e7d1c40c 7275 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7276
51aecdc5 7277 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7278 {
7279 Elf_Internal_Rela *write_rel;
d4730f92 7280 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7281 bfd_byte *rptr, *wptr;
983bddc8 7282 bfd_byte *new_contents;
74f0fb50
AM
7283 bfd_size_type amt;
7284
983bddc8 7285 new_contents = NULL;
51aecdc5 7286 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7287 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7288 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7289 if (opd->adjust == NULL)
7290 return FALSE;
1e2f5b6e
AM
7291
7292 /* This seems a waste of time as input .opd sections are all
7293 zeros as generated by gcc, but I suppose there's no reason
7294 this will always be so. We might start putting something in
7295 the third word of .opd entries. */
7296 if ((sec->flags & SEC_IN_MEMORY) == 0)
7297 {
eea6121a
AM
7298 bfd_byte *loc;
7299 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7300 {
eea6121a
AM
7301 if (loc != NULL)
7302 free (loc);
50bc7936 7303 error_ret:
6cdc0ccc
AM
7304 if (local_syms != NULL
7305 && symtab_hdr->contents != (unsigned char *) local_syms)
7306 free (local_syms);
6cdc0ccc
AM
7307 if (elf_section_data (sec)->relocs != relstart)
7308 free (relstart);
b34976b6 7309 return FALSE;
6cdc0ccc 7310 }
1e2f5b6e
AM
7311 sec->contents = loc;
7312 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7313 }
7314
7315 elf_section_data (sec)->relocs = relstart;
7316
3f764659 7317 new_contents = sec->contents;
3f764659
JJ
7318 if (add_aux_fields)
7319 {
7320 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7321 if (new_contents == NULL)
7322 return FALSE;
51aecdc5 7323 need_pad = NULL;
3f764659 7324 }
b4f4e59f
AM
7325 wptr = new_contents;
7326 rptr = sec->contents;
1e2f5b6e 7327 write_rel = relstart;
51aecdc5 7328 for (rel = relstart; rel < relend; )
1e2f5b6e 7329 {
50bc7936
AM
7330 unsigned long r_symndx;
7331 asection *sym_sec;
7332 struct elf_link_hash_entry *h;
51aecdc5 7333 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7334 Elf_Internal_Sym *sym;
51aecdc5
AM
7335 long opd_ent_size;
7336 Elf_Internal_Rela *next_rel;
7337 bfd_boolean skip;
50bc7936
AM
7338
7339 r_symndx = ELF64_R_SYM (rel->r_info);
7340 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7341 r_symndx, ibfd))
50bc7936
AM
7342 goto error_ret;
7343
51aecdc5
AM
7344 next_rel = rel + 2;
7345 if (next_rel + 1 == relend
7346 || (next_rel + 2 < relend
7347 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7348 ++next_rel;
7349
7350 /* See if the .opd entry is full 24 byte or
7351 16 byte (with fd_aux entry overlapped with next
7352 fd_func). */
7353 opd_ent_size = 24;
7354 if (next_rel == relend)
1e2f5b6e 7355 {
51aecdc5 7356 if (sec->size == rel->r_offset + 16)
3f764659 7357 opd_ent_size = 16;
51aecdc5
AM
7358 }
7359 else if (next_rel->r_offset == rel->r_offset + 16)
7360 opd_ent_size = 16;
3f764659 7361
51aecdc5
AM
7362 if (h != NULL
7363 && h->root.root.string[0] == '.')
7364 {
ed7007c1 7365 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7366 if (fdh != NULL)
7367 {
7368 fdh = ppc_follow_link (fdh);
7369 if (fdh->elf.root.type != bfd_link_hash_defined
7370 && fdh->elf.root.type != bfd_link_hash_defweak)
7371 fdh = NULL;
7372 }
51aecdc5 7373 }
1e2f5b6e 7374
51aecdc5
AM
7375 skip = (sym_sec->owner != ibfd
7376 || sym_sec->output_section == bfd_abs_section_ptr);
7377 if (skip)
7378 {
7379 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7380 {
51aecdc5
AM
7381 /* Arrange for the function descriptor sym
7382 to be dropped. */
7383 fdh->elf.root.u.def.value = 0;
7384 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7385 }
51aecdc5 7386 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7387
0e1862bb 7388 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7389 rel = next_rel;
7390 else
7391 while (1)
7392 {
7393 if (!dec_dynrel_count (rel->r_info, sec, info,
7394 NULL, h, sym))
7395 goto error_ret;
754021d0 7396
51aecdc5
AM
7397 if (++rel == next_rel)
7398 break;
1e2f5b6e 7399
51aecdc5
AM
7400 r_symndx = ELF64_R_SYM (rel->r_info);
7401 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7402 r_symndx, ibfd))
7403 goto error_ret;
7404 }
50bc7936
AM
7405 }
7406 else
1e2f5b6e 7407 {
51aecdc5
AM
7408 /* We'll be keeping this opd entry. */
7409 long adjust;
7410
7411 if (fdh != NULL)
7412 {
7413 /* Redefine the function descriptor symbol to
7414 this location in the opd section. It is
7415 necessary to update the value here rather
7416 than using an array of adjustments as we do
7417 for local symbols, because various places
7418 in the generic ELF code use the value
7419 stored in u.def.value. */
7420 fdh->elf.root.u.def.value = wptr - new_contents;
7421 fdh->adjust_done = 1;
7422 }
7423
7424 /* Local syms are a bit tricky. We could
7425 tweak them as they can be cached, but
7426 we'd need to look through the local syms
7427 for the function descriptor sym which we
7428 don't have at the moment. So keep an
7429 array of adjustments. */
7430 adjust = (wptr - new_contents) - (rptr - sec->contents);
7431 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7432
7433 if (wptr != rptr)
7434 memcpy (wptr, rptr, opd_ent_size);
7435 wptr += opd_ent_size;
7436 if (add_aux_fields && opd_ent_size == 16)
7437 {
7438 memset (wptr, '\0', 8);
7439 wptr += 8;
7440 }
7441
50bc7936 7442 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7443 new opd entries. */
7444 for ( ; rel != next_rel; ++rel)
7445 {
7446 rel->r_offset += adjust;
7447 if (write_rel != rel)
7448 memcpy (write_rel, rel, sizeof (*rel));
7449 ++write_rel;
7450 }
1e2f5b6e 7451 }
51aecdc5
AM
7452
7453 rptr += opd_ent_size;
1e2f5b6e
AM
7454 }
7455
3f764659 7456 sec->size = wptr - new_contents;
1e2f5b6e 7457 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7458 if (add_aux_fields)
7459 {
7460 free (sec->contents);
7461 sec->contents = new_contents;
7462 }
7463
05bf9422 7464 /* Fudge the header size too, as this is used later in
cdcf6e38 7465 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7466 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7467 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7468 some_edited = TRUE;
1e2f5b6e 7469 }
6cdc0ccc 7470 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7471 free (relstart);
6cdc0ccc 7472
411e1bfb
AM
7473 if (local_syms != NULL
7474 && symtab_hdr->contents != (unsigned char *) local_syms)
7475 {
7476 if (!info->keep_memory)
7477 free (local_syms);
7478 else
7479 symtab_hdr->contents = (unsigned char *) local_syms;
7480 }
7481 }
7482
754021d0
AM
7483 if (some_edited)
7484 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7485
3f764659
JJ
7486 /* If we are doing a final link and the last .opd entry is just 16 byte
7487 long, add a 8 byte padding after it. */
0e1862bb 7488 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7489 {
7490 bfd_byte *p;
7491
7492 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7493 {
7494 BFD_ASSERT (need_pad->size > 0);
7495
7496 p = bfd_malloc (need_pad->size + 8);
7497 if (p == NULL)
7498 return FALSE;
699733f6 7499
2cdcc330
AM
7500 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7501 p, 0, need_pad->size))
3f764659
JJ
7502 return FALSE;
7503
7504 need_pad->contents = p;
7505 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7506 }
7507 else
7508 {
7509 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7510 if (p == NULL)
7511 return FALSE;
7512
7513 need_pad->contents = p;
7514 }
7515
7516 memset (need_pad->contents + need_pad->size, 0, 8);
7517 need_pad->size += 8;
7518 }
7519
411e1bfb
AM
7520 return TRUE;
7521}
7522
3e04d765
AM
7523/* Analyze inline PLT call relocations to see whether calls to locally
7524 defined functions can be converted to direct calls. */
7525
7526bfd_boolean
7527ppc64_elf_inline_plt (struct bfd_link_info *info)
7528{
7529 struct ppc_link_hash_table *htab;
7530 bfd *ibfd;
7531 asection *sec;
7532 bfd_vma low_vma, high_vma, limit;
7533
7534 htab = ppc_hash_table (info);
7535 if (htab == NULL)
7536 return FALSE;
7537
7538 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7539 reduced somewhat to cater for possible stubs that might be added
7540 between the call and its destination. */
7541 if (htab->params->group_size < 0)
7542 {
7543 limit = -htab->params->group_size;
7544 if (limit == 1)
7545 limit = 0x1e00000;
7546 }
7547 else
7548 {
7549 limit = htab->params->group_size;
7550 if (limit == 1)
7551 limit = 0x1c00000;
7552 }
7553
7554 low_vma = -1;
7555 high_vma = 0;
7556 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7557 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7558 {
7559 if (low_vma > sec->vma)
7560 low_vma = sec->vma;
7561 if (high_vma < sec->vma + sec->size)
7562 high_vma = sec->vma + sec->size;
7563 }
7564
7565 /* If a "bl" can reach anywhere in local code sections, then we can
7566 convert all inline PLT sequences to direct calls when the symbol
7567 is local. */
7568 if (high_vma - low_vma < limit)
7569 {
7570 htab->can_convert_all_inline_plt = 1;
7571 return TRUE;
7572 }
7573
7574 /* Otherwise, go looking through relocs for cases where a direct
7575 call won't reach. Mark the symbol on any such reloc to disable
7576 the optimization and keep the PLT entry as it seems likely that
7577 this will be better than creating trampolines. Note that this
7578 will disable the optimization for all inline PLT calls to a
7579 particular symbol, not just those that won't reach. The
7580 difficulty in doing a more precise optimization is that the
7581 linker needs to make a decision depending on whether a
7582 particular R_PPC64_PLTCALL insn can be turned into a direct
7583 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7584 the sequence, and there is nothing that ties those relocs
7585 together except their symbol. */
7586
7587 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7588 {
7589 Elf_Internal_Shdr *symtab_hdr;
7590 Elf_Internal_Sym *local_syms;
7591
7592 if (!is_ppc64_elf (ibfd))
7593 continue;
7594
7595 local_syms = NULL;
7596 symtab_hdr = &elf_symtab_hdr (ibfd);
7597
7598 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7599 if (ppc64_elf_section_data (sec)->has_pltcall
7600 && !bfd_is_abs_section (sec->output_section))
7601 {
7602 Elf_Internal_Rela *relstart, *rel, *relend;
7603
7604 /* Read the relocations. */
7605 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7606 info->keep_memory);
7607 if (relstart == NULL)
7608 return FALSE;
7609
7610 relend = relstart + sec->reloc_count;
7611 for (rel = relstart; rel < relend; )
7612 {
7613 enum elf_ppc64_reloc_type r_type;
7614 unsigned long r_symndx;
7615 asection *sym_sec;
7616 struct elf_link_hash_entry *h;
7617 Elf_Internal_Sym *sym;
7618 unsigned char *tls_maskp;
7619
7620 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7621 if (r_type != R_PPC64_PLTCALL
7622 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7623 continue;
7624
7625 r_symndx = ELF64_R_SYM (rel->r_info);
7626 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7627 r_symndx, ibfd))
7628 {
7629 if (elf_section_data (sec)->relocs != relstart)
7630 free (relstart);
7631 if (local_syms != NULL
2cdcc330 7632 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7633 free (local_syms);
7634 return FALSE;
7635 }
7636
7637 if (sym_sec != NULL && sym_sec->output_section != NULL)
7638 {
7639 bfd_vma from, to;
7640 if (h != NULL)
7641 to = h->root.u.def.value;
7642 else
7643 to = sym->st_value;
7644 to += (rel->r_addend
7645 + sym_sec->output_offset
7646 + sym_sec->output_section->vma);
7647 from = (rel->r_offset
7648 + sec->output_offset
7649 + sec->output_section->vma);
5663e321
AM
7650 if (to - from + limit < 2 * limit
7651 && !(r_type == R_PPC64_PLTCALL_NOTOC
7652 && (((h ? h->other : sym->st_other)
7653 & STO_PPC64_LOCAL_MASK)
4a4e7361 7654 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7655 *tls_maskp &= ~PLT_KEEP;
7656 }
7657 }
7658 if (elf_section_data (sec)->relocs != relstart)
7659 free (relstart);
7660 }
7661
7662 if (local_syms != NULL
7663 && symtab_hdr->contents != (unsigned char *) local_syms)
7664 {
7665 if (!info->keep_memory)
7666 free (local_syms);
7667 else
7668 symtab_hdr->contents = (unsigned char *) local_syms;
7669 }
7670 }
7671
7672 return TRUE;
7673}
7674
e1918d23 7675/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7676
e1918d23 7677asection *
e7d1c40c 7678ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7679{
411e1bfb 7680 struct ppc_link_hash_table *htab;
9e7028aa 7681 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7682
411e1bfb 7683 htab = ppc_hash_table (info);
4dfe6ac6
NC
7684 if (htab == NULL)
7685 return NULL;
7686
ee67d69a
AM
7687 if (abiversion (info->output_bfd) == 1)
7688 htab->opd_abi = 1;
7689
e7d1c40c 7690 if (htab->params->no_multi_toc)
33c0ec9d
AM
7691 htab->do_multi_toc = 0;
7692 else if (!htab->do_multi_toc)
e7d1c40c 7693 htab->params->no_multi_toc = 1;
33c0ec9d 7694
8b5f1ed8
AM
7695 /* Default to --no-plt-localentry, as this option can cause problems
7696 with symbol interposition. For example, glibc libpthread.so and
7697 libc.so duplicate many pthread symbols, with a fallback
7698 implementation in libc.so. In some cases the fallback does more
7699 work than the pthread implementation. __pthread_condattr_destroy
7700 is one such symbol: the libpthread.so implementation is
7701 localentry:0 while the libc.so implementation is localentry:8.
7702 An app that "cleverly" uses dlopen to only load necessary
7703 libraries at runtime may omit loading libpthread.so when not
7704 running multi-threaded, which then results in the libc.so
7705 fallback symbols being used and ld.so complaining. Now there
7706 are workarounds in ld (see non_zero_localentry) to detect the
7707 pthread situation, but that may not be the only case where
7708 --plt-localentry can cause trouble. */
f378ab09 7709 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7710 htab->params->plt_localentry0 = 0;
d44c746a
AM
7711 if (htab->params->plt_localentry0
7712 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7713 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7714 _bfd_error_handler
7715 (_("warning: --plt-localentry is especially dangerous without "
7716 "ld.so support to detect ABI violations"));
f378ab09 7717
9e7028aa
AM
7718 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7719 FALSE, FALSE, TRUE);
7720 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7721
a7f2871e 7722 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7723 if (tga != NULL)
7724 func_desc_adjust (tga, info);
7725 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7726 FALSE, FALSE, TRUE);
7727 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7728
7729 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7730 FALSE, FALSE, TRUE);
7731 htab->tga_desc = ppc_elf_hash_entry (desc);
7732 if (desc != NULL)
7733 func_desc_adjust (desc, info);
7734 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7735 FALSE, FALSE, TRUE);
7736 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7737
7c9cf415 7738 if (htab->params->tls_get_addr_opt)
a7f2871e 7739 {
9e7028aa 7740 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7741
7742 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7743 FALSE, FALSE, TRUE);
7744 if (opt != NULL)
7745 func_desc_adjust (opt, info);
7746 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7747 FALSE, FALSE, TRUE);
7748 if (opt_fd != NULL
7749 && (opt_fd->root.type == bfd_link_hash_defined
7750 || opt_fd->root.type == bfd_link_hash_defweak))
7751 {
7752 /* If glibc supports an optimized __tls_get_addr call stub,
7753 signalled by the presence of __tls_get_addr_opt, and we'll
7754 be calling __tls_get_addr via a plt call stub, then
7755 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7756 if (!(htab->elf.dynamic_sections_created
7757 && tga_fd != NULL
7758 && (tga_fd->type == STT_FUNC
7759 || tga_fd->needs_plt)
7760 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7761 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7762 tga_fd = NULL;
7763 if (!(htab->elf.dynamic_sections_created
7764 && desc_fd != NULL
7765 && (desc_fd->type == STT_FUNC
7766 || desc_fd->needs_plt)
7767 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7768 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7769 desc_fd = NULL;
7770
7771 if (tga_fd != NULL || desc_fd != NULL)
7772 {
7773 struct plt_entry *ent = NULL;
7774
7775 if (tga_fd != NULL)
7776 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7777 if (ent->plt.refcount > 0)
7778 break;
7779 if (ent == NULL && desc_fd != NULL)
7780 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7781 if (ent->plt.refcount > 0)
7782 break;
a7f2871e
AM
7783 if (ent != NULL)
7784 {
9e7028aa
AM
7785 if (tga_fd != NULL)
7786 {
7787 tga_fd->root.type = bfd_link_hash_indirect;
7788 tga_fd->root.u.i.link = &opt_fd->root;
7789 tga_fd->root.u.i.warning = NULL;
7790 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7791 }
7792 if (desc_fd != NULL)
7793 {
7794 desc_fd->root.type = bfd_link_hash_indirect;
7795 desc_fd->root.u.i.link = &opt_fd->root;
7796 desc_fd->root.u.i.warning = NULL;
7797 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7798 }
b531344c 7799 opt_fd->mark = 1;
a7f2871e
AM
7800 if (opt_fd->dynindx != -1)
7801 {
7802 /* Use __tls_get_addr_opt in dynamic relocations. */
7803 opt_fd->dynindx = -1;
7804 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7805 opt_fd->dynstr_index);
7806 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7807 return NULL;
a7f2871e 7808 }
9e7028aa 7809 if (tga_fd != NULL)
a7f2871e 7810 {
9e7028aa
AM
7811 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7812 tga = &htab->tls_get_addr->elf;
7813 if (opt != NULL && tga != NULL)
7814 {
7815 tga->root.type = bfd_link_hash_indirect;
7816 tga->root.u.i.link = &opt->root;
7817 tga->root.u.i.warning = NULL;
7818 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7819 opt->mark = 1;
7820 _bfd_elf_link_hash_hide_symbol (info, opt,
7821 tga->forced_local);
7822 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7823 }
7824 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7825 htab->tls_get_addr_fd->is_func_descriptor = 1;
7826 if (htab->tls_get_addr != NULL)
7827 {
7828 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7829 htab->tls_get_addr->is_func = 1;
7830 }
a7f2871e 7831 }
9e7028aa 7832 if (desc_fd != NULL)
a7f2871e 7833 {
9e7028aa
AM
7834 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7835 if (opt != NULL && desc != NULL)
7836 {
7837 desc->root.type = bfd_link_hash_indirect;
7838 desc->root.u.i.link = &opt->root;
7839 desc->root.u.i.warning = NULL;
7840 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7841 opt->mark = 1;
7842 _bfd_elf_link_hash_hide_symbol (info, opt,
7843 desc->forced_local);
7844 htab->tga_desc = ppc_elf_hash_entry (opt);
7845 }
7846 htab->tga_desc_fd->oh = htab->tga_desc;
7847 htab->tga_desc_fd->is_func_descriptor = 1;
7848 if (htab->tga_desc != NULL)
7849 {
7850 htab->tga_desc->oh = htab->tga_desc_fd;
7851 htab->tga_desc->is_func = 1;
7852 }
a7f2871e
AM
7853 }
7854 }
7855 }
7856 }
7c9cf415
AM
7857 else if (htab->params->tls_get_addr_opt < 0)
7858 htab->params->tls_get_addr_opt = 0;
a7f2871e 7859 }
9e7028aa
AM
7860
7861 if (htab->tga_desc_fd != NULL
7862 && htab->params->tls_get_addr_opt
7863 && htab->params->no_tls_get_addr_regsave == -1)
7864 htab->params->no_tls_get_addr_regsave = 0;
7865
33c0ec9d 7866 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7867}
8387904d 7868
3a71aa26 7869/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7870 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7871
3a71aa26
AM
7872static bfd_boolean
7873branch_reloc_hash_match (const bfd *ibfd,
7874 const Elf_Internal_Rela *rel,
7875 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7876 const struct ppc_link_hash_entry *hash2,
7877 const struct ppc_link_hash_entry *hash3,
7878 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7879{
7880 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7881 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7882 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7883
e054468f 7884 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7885 {
3a71aa26
AM
7886 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7887 struct elf_link_hash_entry *h;
8387904d 7888
3a71aa26 7889 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7890 h = elf_follow_link (h);
9e7028aa
AM
7891 if (h == &hash1->elf || h == &hash2->elf
7892 || h == &hash3->elf || h == &hash4->elf)
3a71aa26 7893 return TRUE;
a48ebf4d 7894 }
3a71aa26 7895 return FALSE;
951fd09b 7896}
411e1bfb 7897
951fd09b
AM
7898/* Run through all the TLS relocs looking for optimization
7899 opportunities. The linker has been hacked (see ppc64elf.em) to do
7900 a preliminary section layout so that we know the TLS segment
7901 offsets. We can't optimize earlier because some optimizations need
7902 to know the tp offset, and we need to optimize before allocating
7903 dynamic relocations. */
7904
7905bfd_boolean
33c0ec9d 7906ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7907{
7908 bfd *ibfd;
7909 asection *sec;
7910 struct ppc_link_hash_table *htab;
663a1470 7911 unsigned char *toc_ref;
102890f0 7912 int pass;
951fd09b 7913
3cbc1e5e 7914 if (!bfd_link_executable (info))
411e1bfb
AM
7915 return TRUE;
7916
951fd09b 7917 htab = ppc_hash_table (info);
4dfe6ac6
NC
7918 if (htab == NULL)
7919 return FALSE;
7920
663a1470
AM
7921 /* Make two passes over the relocs. On the first pass, mark toc
7922 entries involved with tls relocs, and check that tls relocs
7923 involved in setting up a tls_get_addr call are indeed followed by
7924 such a call. If they are not, we can't do any tls optimization.
7925 On the second pass twiddle tls_mask flags to notify
7926 relocate_section that optimization can be done, and adjust got
7927 and plt refcounts. */
7928 toc_ref = NULL;
7929 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7930 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7931 {
7932 Elf_Internal_Sym *locsyms = NULL;
7933 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7934
102890f0
AM
7935 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7936 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7937 {
7938 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7939 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7940
102890f0
AM
7941 /* Read the relocations. */
7942 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7943 info->keep_memory);
7944 if (relstart == NULL)
2915c55b
JK
7945 {
7946 free (toc_ref);
7947 return FALSE;
7948 }
411e1bfb 7949
102890f0
AM
7950 relend = relstart + sec->reloc_count;
7951 for (rel = relstart; rel < relend; rel++)
7952 {
7953 enum elf_ppc64_reloc_type r_type;
7954 unsigned long r_symndx;
7955 struct elf_link_hash_entry *h;
7956 Elf_Internal_Sym *sym;
7957 asection *sym_sec;
f961d9dd 7958 unsigned char *tls_mask;
46e9995a 7959 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7960 bfd_vma value;
7961 bfd_boolean ok_tprel, is_local;
7962 long toc_ref_index = 0;
7963 int expecting_tls_get_addr = 0;
663a1470 7964 bfd_boolean ret = FALSE;
411e1bfb 7965
102890f0
AM
7966 r_symndx = ELF64_R_SYM (rel->r_info);
7967 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7968 r_symndx, ibfd))
7969 {
7970 err_free_rel:
7971 if (elf_section_data (sec)->relocs != relstart)
7972 free (relstart);
7973 if (toc_ref != NULL)
7974 free (toc_ref);
7975 if (locsyms != NULL
0ffa91dd 7976 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7977 != (unsigned char *) locsyms))
7978 free (locsyms);
663a1470 7979 return ret;
102890f0 7980 }
411e1bfb 7981
102890f0
AM
7982 if (h != NULL)
7983 {
766bc656
AM
7984 if (h->root.type == bfd_link_hash_defined
7985 || h->root.type == bfd_link_hash_defweak)
7986 value = h->root.u.def.value;
7987 else if (h->root.type == bfd_link_hash_undefweak)
7988 value = 0;
7989 else
663a1470
AM
7990 {
7991 found_tls_get_addr_arg = 0;
7992 continue;
7993 }
102890f0
AM
7994 }
7995 else
7996 /* Symbols referenced by TLS relocs must be of type
7997 STT_TLS. So no need for .opd local sym adjust. */
7998 value = sym->st_value;
7999
8000 ok_tprel = FALSE;
f749f26e
AM
8001 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
8002 if (is_local)
102890f0 8003 {
766bc656
AM
8004 if (h != NULL
8005 && h->root.type == bfd_link_hash_undefweak)
8006 ok_tprel = TRUE;
c27b8c2a
AM
8007 else if (sym_sec != NULL
8008 && sym_sec->output_section != NULL)
766bc656
AM
8009 {
8010 value += sym_sec->output_offset;
8011 value += sym_sec->output_section->vma;
0b147428 8012 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
8013 /* Note that even though the prefix insns
8014 allow a 1<<33 offset we use the same test
8015 as for addis;addi. There may be a mix of
8016 pcrel and non-pcrel code and the decision
8017 to optimise is per symbol, not per TLS
8018 sequence. */
0b147428 8019 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 8020 }
102890f0 8021 }
951fd09b 8022
102890f0 8023 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8024 /* If this section has old-style __tls_get_addr calls
8025 without marker relocs, then check that each
8026 __tls_get_addr call reloc is preceded by a reloc
8027 that conceivably belongs to the __tls_get_addr arg
8028 setup insn. If we don't find matching arg setup
8029 relocs, don't do any tls optimization. */
8030 if (pass == 0
9737e8af 8031 && sec->nomark_tls_get_addr
663a1470 8032 && h != NULL
ed7007c1 8033 && is_tls_get_addr (h, htab)
663a1470
AM
8034 && !found_tls_get_addr_arg
8035 && is_branch_reloc (r_type))
8036 {
25f53a85 8037 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8038 "TLS optimization disabled\n"),
8039 ibfd, sec, rel->r_offset);
8040 ret = TRUE;
8041 goto err_free_rel;
8042 }
8043
8044 found_tls_get_addr_arg = 0;
102890f0
AM
8045 switch (r_type)
8046 {
8047 case R_PPC64_GOT_TLSLD16:
8048 case R_PPC64_GOT_TLSLD16_LO:
c213164a 8049 case R_PPC64_GOT_TLSLD34:
102890f0 8050 expecting_tls_get_addr = 1;
663a1470 8051 found_tls_get_addr_arg = 1;
1a0670f3 8052 /* Fall through. */
102890f0
AM
8053
8054 case R_PPC64_GOT_TLSLD16_HI:
8055 case R_PPC64_GOT_TLSLD16_HA:
8056 /* These relocs should never be against a symbol
8057 defined in a shared lib. Leave them alone if
8058 that turns out to be the case. */
8059 if (!is_local)
8060 continue;
411e1bfb 8061
102890f0 8062 /* LD -> LE */
411e1bfb 8063 tls_set = 0;
102890f0
AM
8064 tls_clear = TLS_LD;
8065 tls_type = TLS_TLS | TLS_LD;
8066 break;
411e1bfb 8067
102890f0
AM
8068 case R_PPC64_GOT_TLSGD16:
8069 case R_PPC64_GOT_TLSGD16_LO:
c213164a 8070 case R_PPC64_GOT_TLSGD34:
102890f0 8071 expecting_tls_get_addr = 1;
663a1470 8072 found_tls_get_addr_arg = 1;
1a0670f3 8073 /* Fall through. */
102890f0
AM
8074
8075 case R_PPC64_GOT_TLSGD16_HI:
8076 case R_PPC64_GOT_TLSGD16_HA:
8077 if (ok_tprel)
8078 /* GD -> LE */
411e1bfb 8079 tls_set = 0;
102890f0
AM
8080 else
8081 /* GD -> IE */
b00a0a86 8082 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8083 tls_clear = TLS_GD;
8084 tls_type = TLS_TLS | TLS_GD;
8085 break;
8086
c213164a 8087 case R_PPC64_GOT_TPREL34:
102890f0
AM
8088 case R_PPC64_GOT_TPREL16_DS:
8089 case R_PPC64_GOT_TPREL16_LO_DS:
8090 case R_PPC64_GOT_TPREL16_HI:
8091 case R_PPC64_GOT_TPREL16_HA:
8092 if (ok_tprel)
8093 {
8094 /* IE -> LE */
8095 tls_set = 0;
8096 tls_clear = TLS_TPREL;
8097 tls_type = TLS_TLS | TLS_TPREL;
8098 break;
8099 }
411e1bfb
AM
8100 continue;
8101
727fc41e 8102 case R_PPC64_TLSLD:
7d04a20a
AM
8103 if (!is_local)
8104 continue;
8105 /* Fall through. */
8106 case R_PPC64_TLSGD:
23cedd1d
AM
8107 if (rel + 1 < relend
8108 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8109 {
8110 if (pass != 0
2cdcc330 8111 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8112 != R_PPC64_PLTSEQ)
8113 && (ELF64_R_TYPE (rel[1].r_info)
8114 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8115 {
8116 r_symndx = ELF64_R_SYM (rel[1].r_info);
8117 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8118 r_symndx, ibfd))
23cedd1d
AM
8119 goto err_free_rel;
8120 if (h != NULL)
8121 {
8122 struct plt_entry *ent = NULL;
8123
8124 for (ent = h->plt.plist;
8125 ent != NULL;
8126 ent = ent->next)
8127 if (ent->addend == rel[1].r_addend)
8128 break;
8129
8130 if (ent != NULL
8131 && ent->plt.refcount > 0)
8132 ent->plt.refcount -= 1;
8133 }
8134 }
8135 continue;
8136 }
663a1470 8137 found_tls_get_addr_arg = 1;
1a0670f3 8138 /* Fall through. */
663a1470
AM
8139
8140 case R_PPC64_TLS:
8141 case R_PPC64_TOC16:
8142 case R_PPC64_TOC16_LO:
102890f0
AM
8143 if (sym_sec == NULL || sym_sec != toc)
8144 continue;
8145
8146 /* Mark this toc entry as referenced by a TLS
8147 code sequence. We can do that now in the
8148 case of R_PPC64_TLS, and after checking for
8149 tls_get_addr for the TOC16 relocs. */
8150 if (toc_ref == NULL)
2cdcc330
AM
8151 toc_ref
8152 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8153 if (toc_ref == NULL)
8154 goto err_free_rel;
8155
102890f0
AM
8156 if (h != NULL)
8157 value = h->root.u.def.value;
8158 else
8159 value = sym->st_value;
8160 value += rel->r_addend;
73242275
AM
8161 if (value % 8 != 0)
8162 continue;
8163 BFD_ASSERT (value < toc->size
8164 && toc->output_offset % 8 == 0);
663a1470 8165 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8166 if (r_type == R_PPC64_TLS
8167 || r_type == R_PPC64_TLSGD
8168 || r_type == R_PPC64_TLSLD)
102890f0
AM
8169 {
8170 toc_ref[toc_ref_index] = 1;
8171 continue;
8172 }
8173
8174 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8175 continue;
8176
8177 tls_set = 0;
8178 tls_clear = 0;
8179 expecting_tls_get_addr = 2;
8180 break;
8181
8182 case R_PPC64_TPREL64:
8183 if (pass == 0
8184 || sec != toc
8185 || toc_ref == NULL
663a1470 8186 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8187 continue;
8188 if (ok_tprel)
8189 {
8190 /* IE -> LE */
8191 tls_set = TLS_EXPLICIT;
8192 tls_clear = TLS_TPREL;
8193 break;
8194 }
8195 continue;
8196
8197 case R_PPC64_DTPMOD64:
8198 if (pass == 0
8199 || sec != toc
8200 || toc_ref == NULL
663a1470 8201 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8202 continue;
8203 if (rel + 1 < relend
8204 && (rel[1].r_info
8205 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8206 && rel[1].r_offset == rel->r_offset + 8)
8207 {
8208 if (ok_tprel)
8209 /* GD -> LE */
8210 tls_set = TLS_EXPLICIT | TLS_GD;
8211 else
8212 /* GD -> IE */
b00a0a86 8213 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8214 tls_clear = TLS_GD;
8215 }
8216 else
8217 {
8218 if (!is_local)
8219 continue;
8220
8221 /* LD -> LE */
8222 tls_set = TLS_EXPLICIT;
8223 tls_clear = TLS_LD;
8224 }
8225 break;
8226
8227 default:
8228 continue;
8229 }
8230
8231 if (pass == 0)
8232 {
727fc41e 8233 if (!expecting_tls_get_addr
9737e8af 8234 || !sec->nomark_tls_get_addr)
102890f0
AM
8235 continue;
8236
3a71aa26
AM
8237 if (rel + 1 < relend
8238 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8239 htab->tls_get_addr_fd,
8240 htab->tga_desc_fd,
3a71aa26 8241 htab->tls_get_addr,
9e7028aa 8242 htab->tga_desc))
102890f0 8243 {
3a71aa26 8244 if (expecting_tls_get_addr == 2)
102890f0 8245 {
3a71aa26 8246 /* Check for toc tls entries. */
f961d9dd 8247 unsigned char *toc_tls;
3a71aa26
AM
8248 int retval;
8249
8250 retval = get_tls_mask (&toc_tls, NULL, NULL,
8251 &locsyms,
8252 rel, ibfd);
8253 if (retval == 0)
8254 goto err_free_rel;
663a1470
AM
8255 if (toc_tls != NULL)
8256 {
37da22e5
AM
8257 if ((*toc_tls & TLS_TLS) != 0
8258 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8259 found_tls_get_addr_arg = 1;
8260 if (retval > 1)
8261 toc_ref[toc_ref_index] = 1;
8262 }
102890f0 8263 }
3a71aa26 8264 continue;
102890f0
AM
8265 }
8266
102890f0
AM
8267 /* Uh oh, we didn't find the expected call. We
8268 could just mark this symbol to exclude it
8269 from tls optimization but it's safer to skip
663a1470 8270 the entire optimization. */
695344c0 8271 /* xgettext:c-format */
25f53a85 8272 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8273 "TLS optimization disabled\n"),
8274 ibfd, sec, rel->r_offset);
8275 ret = TRUE;
8276 goto err_free_rel;
102890f0
AM
8277 }
8278
37da22e5
AM
8279 /* If we don't have old-style __tls_get_addr calls
8280 without TLSGD/TLSLD marker relocs, and we haven't
8281 found a new-style __tls_get_addr call with a
8282 marker for this symbol, then we either have a
8283 broken object file or an -mlongcall style
8284 indirect call to __tls_get_addr without a marker.
8285 Disable optimization in this case. */
8286 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8287 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8288 && !sec->nomark_tls_get_addr
37da22e5
AM
8289 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8290 != (TLS_TLS | TLS_MARK)))
8291 continue;
8292
7d04a20a 8293 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8294 {
23cedd1d
AM
8295 struct plt_entry *ent = NULL;
8296
9e7028aa
AM
8297 if (htab->tls_get_addr_fd != NULL)
8298 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8299 ent != NULL;
8300 ent = ent->next)
8301 if (ent->addend == 0)
8302 break;
8303
8304 if (ent == NULL && htab->tga_desc_fd != NULL)
8305 for (ent = htab->tga_desc_fd->elf.plt.plist;
8306 ent != NULL;
8307 ent = ent->next)
8308 if (ent->addend == 0)
8309 break;
8310
8311 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8312 for (ent = htab->tls_get_addr->elf.plt.plist;
8313 ent != NULL;
8314 ent = ent->next)
8315 if (ent->addend == 0)
102890f0 8316 break;
411e1bfb 8317
9e7028aa
AM
8318 if (ent == NULL && htab->tga_desc != NULL)
8319 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8320 ent != NULL;
8321 ent = ent->next)
8322 if (ent->addend == 0)
102890f0 8323 break;
23cedd1d
AM
8324
8325 if (ent != NULL
8326 && ent->plt.refcount > 0)
8327 ent->plt.refcount -= 1;
102890f0 8328 }
411e1bfb 8329
102890f0 8330 if (tls_clear == 0)
30038c59
AM
8331 continue;
8332
102890f0
AM
8333 if ((tls_set & TLS_EXPLICIT) == 0)
8334 {
8335 struct got_entry *ent;
411e1bfb 8336
102890f0
AM
8337 /* Adjust got entry for this reloc. */
8338 if (h != NULL)
8339 ent = h->got.glist;
8340 else
8341 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8342
102890f0
AM
8343 for (; ent != NULL; ent = ent->next)
8344 if (ent->addend == rel->r_addend
8345 && ent->owner == ibfd
8346 && ent->tls_type == tls_type)
8347 break;
8348 if (ent == NULL)
8349 abort ();
411e1bfb 8350
102890f0
AM
8351 if (tls_set == 0)
8352 {
8353 /* We managed to get rid of a got entry. */
8354 if (ent->got.refcount > 0)
8355 ent->got.refcount -= 1;
8356 }
8357 }
8358 else
8359 {
8360 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8361 we'll lose one or two dyn relocs. */
8362 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8363 NULL, h, sym))
102890f0 8364 return FALSE;
411e1bfb 8365
102890f0
AM
8366 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8367 {
8368 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8369 NULL, h, sym))
102890f0
AM
8370 return FALSE;
8371 }
8372 }
411e1bfb 8373
46e9995a 8374 *tls_mask |= tls_set & 0xff;
102890f0
AM
8375 *tls_mask &= ~tls_clear;
8376 }
8c1d1bb8 8377
102890f0
AM
8378 if (elf_section_data (sec)->relocs != relstart)
8379 free (relstart);
8380 }
411e1bfb 8381
663a1470
AM
8382 if (locsyms != NULL
8383 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8384 {
8385 if (!info->keep_memory)
8386 free (locsyms);
8387 else
8388 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8389 }
8390 }
411e1bfb 8391
663a1470
AM
8392 if (toc_ref != NULL)
8393 free (toc_ref);
9a23f96e 8394 htab->do_tls_opt = 1;
b34976b6 8395 return TRUE;
1e2f5b6e 8396}
b34976b6 8397
c5614fa4
AM
8398/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8399 the values of any global symbols in a toc section that has been
8400 edited. Globals in toc sections should be a rarity, so this function
8401 sets a flag if any are found in toc sections other than the one just
de194d85 8402 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8403
8404struct adjust_toc_info
8405{
8406 asection *toc;
8407 unsigned long *skip;
8408 bfd_boolean global_toc_syms;
8409};
8410
ba761f19
AM
8411enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8412
c5614fa4
AM
8413static bfd_boolean
8414adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8415{
8416 struct ppc_link_hash_entry *eh;
8417 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8418 unsigned long i;
c5614fa4 8419
c5614fa4
AM
8420 if (h->root.type != bfd_link_hash_defined
8421 && h->root.type != bfd_link_hash_defweak)
8422 return TRUE;
8423
ed7007c1 8424 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8425 if (eh->adjust_done)
8426 return TRUE;
8427
8428 if (eh->elf.root.u.def.section == toc_inf->toc)
8429 {
854b41e7
AM
8430 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8431 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8432 else
854b41e7
AM
8433 i = eh->elf.root.u.def.value >> 3;
8434
ba761f19 8435 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8436 {
4eca0228 8437 _bfd_error_handler
854b41e7
AM
8438 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8439 do
8440 ++i;
ba761f19 8441 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8442 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8443 }
854b41e7
AM
8444
8445 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8446 eh->adjust_done = 1;
8447 }
8448 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8449 toc_inf->global_toc_syms = TRUE;
8450
8451 return TRUE;
8452}
8453
39eeab25
AM
8454/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8455 on a _LO variety toc/got reloc. */
560c8763
AM
8456
8457static bfd_boolean
39eeab25 8458ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8459{
2365f8d7
AM
8460 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8461 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8462 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8463 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8464 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8465 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8466 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8467 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8468 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8469 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8470 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8471 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8472 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8473 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8474 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8475 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8476 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8477 /* Exclude lfqu by testing reloc. If relocs are ever
8478 defined for the reduced D field in psq_lu then those
8479 will need testing too. */
8480 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8481 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8482 && (insn & 1) == 0)
2365f8d7
AM
8483 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8484 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8485 /* Exclude stfqu. psq_stu as above for psq_lu. */
8486 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8487 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8488 && (insn & 1) == 0));
560c8763
AM
8489}
8490
4a421c53
AM
8491/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8492 pld ra,symbol@got@pcrel
dd9b12c2 8493 load/store rt,off(ra)
4a421c53 8494 or
d4b87b1e 8495 pla ra,symbol@pcrel
dd9b12c2 8496 load/store rt,off(ra)
4a421c53 8497 may be translated to
dd9b12c2 8498 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8499 nop.
8500 This function returns true if the optimization is possible, placing
dd9b12c2 8501 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8502
8503 On entry to this function, the linker has already determined that
d4b87b1e 8504 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8505 while *PINSN2 is the second instruction. */
8506
8507static bfd_boolean
dd9b12c2 8508xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8509{
77486630
AM
8510 uint64_t insn1 = *pinsn1;
8511 uint64_t insn2 = *pinsn2;
dd9b12c2 8512 bfd_signed_vma off;
4a421c53 8513
77486630
AM
8514 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8515 {
8516 /* Check that regs match. */
8517 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8518 return FALSE;
8519
8520 /* P8LS or PMLS form, non-pcrel. */
8521 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8522 return FALSE;
8523
8524 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8525 *pinsn2 = PNOP;
8526 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8527 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8528 return TRUE;
8529 }
8530
8531 insn2 >>= 32;
8532
4a421c53 8533 /* Check that regs match. */
77486630 8534 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8535 return FALSE;
8536
8537 switch ((insn2 >> 26) & 63)
8538 {
8539 default:
8540 return FALSE;
8541
8542 case 32: /* lwz */
8543 case 34: /* lbz */
8544 case 36: /* stw */
8545 case 38: /* stb */
8546 case 40: /* lhz */
8547 case 42: /* lha */
8548 case 44: /* sth */
8549 case 48: /* lfs */
8550 case 50: /* lfd */
8551 case 52: /* stfs */
8552 case 54: /* stfd */
8553 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8554 on the insn. */
77486630 8555 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8556 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8557 off = insn2 & 0xffff;
4a421c53
AM
8558 break;
8559
8560 case 58: /* lwa, ld */
dd9b12c2 8561 if ((insn2 & 1) != 0)
4a421c53 8562 return FALSE;
77486630 8563 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8564 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8565 | (insn2 & (31ULL << 21)));
dd9b12c2 8566 off = insn2 & 0xfffc;
4a421c53
AM
8567 break;
8568
8569 case 57: /* lxsd, lxssp */
dd9b12c2 8570 if ((insn2 & 3) < 2)
4a421c53 8571 return FALSE;
77486630 8572 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8573 | ((40ULL | (insn2 & 3)) << 26)
8574 | (insn2 & (31ULL << 21)));
dd9b12c2 8575 off = insn2 & 0xfffc;
4a421c53
AM
8576 break;
8577
8578 case 61: /* stxsd, stxssp, lxv, stxv */
8579 if ((insn2 & 3) == 0)
8580 return FALSE;
8581 else if ((insn2 & 3) >= 2)
8582 {
77486630 8583 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8584 | ((44ULL | (insn2 & 3)) << 26)
8585 | (insn2 & (31ULL << 21)));
dd9b12c2 8586 off = insn2 & 0xfffc;
4a421c53
AM
8587 }
8588 else
8589 {
77486630 8590 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8591 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8592 | (insn2 & (31ULL << 21)));
dd9b12c2 8593 off = insn2 & 0xfff0;
4a421c53
AM
8594 }
8595 break;
8596
8597 case 56: /* lq */
77486630 8598 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8599 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8600 off = insn2 & 0xffff;
4a421c53
AM
8601 break;
8602
8603 case 62: /* std, stq */
dd9b12c2 8604 if ((insn2 & 1) != 0)
4a421c53 8605 return FALSE;
77486630 8606 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8607 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8608 | (insn2 & (31ULL << 21)));
dd9b12c2 8609 off = insn2 & 0xfffc;
4a421c53
AM
8610 break;
8611 }
8612
77486630 8613 *pinsn1 = insn1;
4a421c53 8614 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8615 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8616 return TRUE;
8617}
8618
c5614fa4
AM
8619/* Examine all relocs referencing .toc sections in order to remove
8620 unused .toc entries. */
8621
8622bfd_boolean
33c0ec9d 8623ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8624{
8625 bfd *ibfd;
8626 struct adjust_toc_info toc_inf;
67f0cbdb 8627 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8628
67f0cbdb 8629 htab->do_toc_opt = 1;
c5614fa4 8630 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8631 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8632 {
8633 asection *toc, *sec;
8634 Elf_Internal_Shdr *symtab_hdr;
8635 Elf_Internal_Sym *local_syms;
425b145b 8636 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8637 unsigned long *skip, *drop;
8638 unsigned char *used;
8639 unsigned char *keep, last, some_unused;
8640
854b41e7
AM
8641 if (!is_ppc64_elf (ibfd))
8642 continue;
8643
c5614fa4
AM
8644 toc = bfd_get_section_by_name (ibfd, ".toc");
8645 if (toc == NULL
92b7a70f 8646 || toc->size == 0
dbaa2011
AM
8647 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8648 || discarded_section (toc))
c5614fa4
AM
8649 continue;
8650
425b145b 8651 toc_relocs = NULL;
c5614fa4 8652 local_syms = NULL;
0ffa91dd 8653 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8654
8655 /* Look at sections dropped from the final link. */
8656 skip = NULL;
8657 relstart = NULL;
8658 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8659 {
8660 if (sec->reloc_count == 0
dbaa2011 8661 || !discarded_section (sec)
c5614fa4
AM
8662 || get_opd_info (sec)
8663 || (sec->flags & SEC_ALLOC) == 0
8664 || (sec->flags & SEC_DEBUGGING) != 0)
8665 continue;
8666
8667 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8668 if (relstart == NULL)
8669 goto error_ret;
8670
8671 /* Run through the relocs to see which toc entries might be
8672 unused. */
8673 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8674 {
8675 enum elf_ppc64_reloc_type r_type;
8676 unsigned long r_symndx;
8677 asection *sym_sec;
8678 struct elf_link_hash_entry *h;
8679 Elf_Internal_Sym *sym;
8680 bfd_vma val;
8681
8682 r_type = ELF64_R_TYPE (rel->r_info);
8683 switch (r_type)
8684 {
8685 default:
8686 continue;
8687
8688 case R_PPC64_TOC16:
8689 case R_PPC64_TOC16_LO:
8690 case R_PPC64_TOC16_HI:
8691 case R_PPC64_TOC16_HA:
8692 case R_PPC64_TOC16_DS:
8693 case R_PPC64_TOC16_LO_DS:
8694 break;
8695 }
8696
8697 r_symndx = ELF64_R_SYM (rel->r_info);
8698 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8699 r_symndx, ibfd))
8700 goto error_ret;
8701
8702 if (sym_sec != toc)
8703 continue;
8704
8705 if (h != NULL)
8706 val = h->root.u.def.value;
8707 else
8708 val = sym->st_value;
8709 val += rel->r_addend;
8710
8711 if (val >= toc->size)
8712 continue;
8713
8714 /* Anything in the toc ought to be aligned to 8 bytes.
8715 If not, don't mark as unused. */
8716 if (val & 7)
8717 continue;
8718
8719 if (skip == NULL)
8720 {
854b41e7 8721 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8722 if (skip == NULL)
8723 goto error_ret;
8724 }
8725
ba761f19 8726 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8727 }
8728
8729 if (elf_section_data (sec)->relocs != relstart)
8730 free (relstart);
8731 }
8732
ba761f19
AM
8733 /* For largetoc loads of address constants, we can convert
8734 . addis rx,2,addr@got@ha
8735 . ld ry,addr@got@l(rx)
8736 to
8737 . addis rx,2,addr@toc@ha
8738 . addi ry,rx,addr@toc@l
8739 when addr is within 2G of the toc pointer. This then means
8740 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8741
ba761f19
AM
8742 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8743 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8744 && toc->reloc_count != 0)
8745 {
8746 /* Read toc relocs. */
425b145b
AM
8747 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8748 info->keep_memory);
8749 if (toc_relocs == NULL)
ba761f19
AM
8750 goto error_ret;
8751
425b145b 8752 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8753 {
8754 enum elf_ppc64_reloc_type r_type;
8755 unsigned long r_symndx;
8756 asection *sym_sec;
8757 struct elf_link_hash_entry *h;
8758 Elf_Internal_Sym *sym;
8759 bfd_vma val, addr;
8760
8761 r_type = ELF64_R_TYPE (rel->r_info);
8762 if (r_type != R_PPC64_ADDR64)
8763 continue;
8764
8765 r_symndx = ELF64_R_SYM (rel->r_info);
8766 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8767 r_symndx, ibfd))
8768 goto error_ret;
8769
425b145b 8770 if (sym_sec == NULL
c27b8c2a 8771 || sym_sec->output_section == NULL
dbaa2011 8772 || discarded_section (sym_sec))
425b145b
AM
8773 continue;
8774
afe397ea 8775 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8776 continue;
8777
8778 if (h != NULL)
bddc25c9
AM
8779 {
8780 if (h->type == STT_GNU_IFUNC)
8781 continue;
8782 val = h->root.u.def.value;
8783 }
ba761f19 8784 else
bddc25c9
AM
8785 {
8786 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8787 continue;
8788 val = sym->st_value;
8789 }
ba761f19
AM
8790 val += rel->r_addend;
8791 val += sym_sec->output_section->vma + sym_sec->output_offset;
8792
8793 /* We don't yet know the exact toc pointer value, but we
8794 know it will be somewhere in the toc section. Don't
8795 optimize if the difference from any possible toc
8796 pointer is outside [ff..f80008000, 7fff7fff]. */
8797 addr = toc->output_section->vma + TOC_BASE_OFF;
8798 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8799 continue;
8800
8801 addr = toc->output_section->vma + toc->output_section->rawsize;
8802 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8803 continue;
8804
8805 if (skip == NULL)
8806 {
8807 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8808 if (skip == NULL)
8809 goto error_ret;
8810 }
8811
8812 skip[rel->r_offset >> 3]
425b145b 8813 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8814 }
ba761f19
AM
8815 }
8816
c5614fa4
AM
8817 if (skip == NULL)
8818 continue;
8819
8820 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8821 if (used == NULL)
8822 {
8823 error_ret:
8824 if (local_syms != NULL
8825 && symtab_hdr->contents != (unsigned char *) local_syms)
8826 free (local_syms);
8827 if (sec != NULL
8828 && relstart != NULL
8829 && elf_section_data (sec)->relocs != relstart)
8830 free (relstart);
425b145b
AM
8831 if (toc_relocs != NULL
8832 && elf_section_data (toc)->relocs != toc_relocs)
8833 free (toc_relocs);
c5614fa4
AM
8834 if (skip != NULL)
8835 free (skip);
8836 return FALSE;
8837 }
8838
30038c59
AM
8839 /* Now check all kept sections that might reference the toc.
8840 Check the toc itself last. */
8841 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8842 : ibfd->sections);
c5614fa4 8843 sec != NULL;
c5614fa4 8844 sec = (sec == toc ? NULL
c5614fa4 8845 : sec->next == NULL ? toc
30038c59 8846 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8847 : sec->next))
8848 {
8849 int repeat;
8850
8851 if (sec->reloc_count == 0
dbaa2011 8852 || discarded_section (sec)
c5614fa4
AM
8853 || get_opd_info (sec)
8854 || (sec->flags & SEC_ALLOC) == 0
8855 || (sec->flags & SEC_DEBUGGING) != 0)
8856 continue;
8857
854b41e7
AM
8858 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8859 info->keep_memory);
c5614fa4 8860 if (relstart == NULL)
2915c55b
JK
8861 {
8862 free (used);
8863 goto error_ret;
8864 }
c5614fa4
AM
8865
8866 /* Mark toc entries referenced as used. */
c5614fa4 8867 do
d4f1ee75
AM
8868 {
8869 repeat = 0;
8870 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8871 {
8872 enum elf_ppc64_reloc_type r_type;
8873 unsigned long r_symndx;
8874 asection *sym_sec;
8875 struct elf_link_hash_entry *h;
8876 Elf_Internal_Sym *sym;
8877 bfd_vma val;
98528052 8878
d4f1ee75 8879 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8880 switch (r_type)
8881 {
8882 case R_PPC64_TOC16:
8883 case R_PPC64_TOC16_LO:
8884 case R_PPC64_TOC16_HI:
8885 case R_PPC64_TOC16_HA:
8886 case R_PPC64_TOC16_DS:
8887 case R_PPC64_TOC16_LO_DS:
8888 /* In case we're taking addresses of toc entries. */
8889 case R_PPC64_ADDR64:
8890 break;
c5614fa4 8891
d4f1ee75
AM
8892 default:
8893 continue;
8894 }
c5614fa4 8895
d4f1ee75
AM
8896 r_symndx = ELF64_R_SYM (rel->r_info);
8897 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8898 r_symndx, ibfd))
8899 {
8900 free (used);
8901 goto error_ret;
8902 }
c5614fa4 8903
d4f1ee75
AM
8904 if (sym_sec != toc)
8905 continue;
c5614fa4 8906
d4f1ee75
AM
8907 if (h != NULL)
8908 val = h->root.u.def.value;
8909 else
8910 val = sym->st_value;
8911 val += rel->r_addend;
ba761f19 8912
d4f1ee75
AM
8913 if (val >= toc->size)
8914 continue;
ba761f19 8915
d4f1ee75
AM
8916 if ((skip[val >> 3] & can_optimize) != 0)
8917 {
8918 bfd_vma off;
8919 unsigned char opc;
8920
8921 switch (r_type)
8922 {
8923 case R_PPC64_TOC16_HA:
ba761f19 8924 break;
ba761f19 8925
d4f1ee75
AM
8926 case R_PPC64_TOC16_LO_DS:
8927 off = rel->r_offset;
8928 off += (bfd_big_endian (ibfd) ? -2 : 3);
8929 if (!bfd_get_section_contents (ibfd, sec, &opc,
8930 off, 1))
8931 {
8932 free (used);
8933 goto error_ret;
8934 }
8935 if ((opc & (0x3f << 2)) == (58u << 2))
8936 break;
1a0670f3 8937 /* Fall through. */
ba761f19 8938
d4f1ee75
AM
8939 default:
8940 /* Wrong sort of reloc, or not a ld. We may
8941 as well clear ref_from_discarded too. */
8942 skip[val >> 3] = 0;
8943 }
8944 }
8945
8946 if (sec != toc)
8947 used[val >> 3] = 1;
8948 /* For the toc section, we only mark as used if this
8949 entry itself isn't unused. */
8950 else if ((used[rel->r_offset >> 3]
8951 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8952 && !used[val >> 3])
8953 {
8954 /* Do all the relocs again, to catch reference
8955 chains. */
8956 repeat = 1;
8957 used[val >> 3] = 1;
8958 }
8959 }
8960 }
c5614fa4 8961 while (repeat);
854b41e7
AM
8962
8963 if (elf_section_data (sec)->relocs != relstart)
8964 free (relstart);
c5614fa4
AM
8965 }
8966
8967 /* Merge the used and skip arrays. Assume that TOC
8968 doublewords not appearing as either used or unused belong
de194d85 8969 to an entry more than one doubleword in size. */
c5614fa4
AM
8970 for (drop = skip, keep = used, last = 0, some_unused = 0;
8971 drop < skip + (toc->size + 7) / 8;
8972 ++drop, ++keep)
8973 {
8974 if (*keep)
8975 {
ba761f19
AM
8976 *drop &= ~ref_from_discarded;
8977 if ((*drop & can_optimize) != 0)
8978 some_unused = 1;
c5614fa4
AM
8979 last = 0;
8980 }
b140b010 8981 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8982 {
8983 some_unused = 1;
ba761f19 8984 last = ref_from_discarded;
c5614fa4
AM
8985 }
8986 else
8987 *drop = last;
8988 }
8989
8990 free (used);
8991
8992 if (some_unused)
8993 {
8994 bfd_byte *contents, *src;
8995 unsigned long off;
d62b3684 8996 Elf_Internal_Sym *sym;
ba761f19 8997 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8998
8999 /* Shuffle the toc contents, and at the same time convert the
9000 skip array from booleans into offsets. */
9001 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9002 goto error_ret;
9003
9004 elf_section_data (toc)->this_hdr.contents = contents;
9005
9006 for (src = contents, off = 0, drop = skip;
9007 src < contents + toc->size;
9008 src += 8, ++drop)
9009 {
ba761f19
AM
9010 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9011 off += 8;
c5614fa4
AM
9012 else if (off != 0)
9013 {
9014 *drop = off;
9015 memcpy (src - off, src, 8);
9016 }
9017 }
854b41e7 9018 *drop = off;
c5614fa4
AM
9019 toc->rawsize = toc->size;
9020 toc->size = src - contents - off;
9021
ba761f19
AM
9022 /* Adjust addends for relocs against the toc section sym,
9023 and optimize any accesses we can. */
c5614fa4
AM
9024 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9025 {
9026 if (sec->reloc_count == 0
dbaa2011 9027 || discarded_section (sec))
c5614fa4
AM
9028 continue;
9029
9030 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9031 info->keep_memory);
c5614fa4
AM
9032 if (relstart == NULL)
9033 goto error_ret;
9034
9035 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9036 {
9037 enum elf_ppc64_reloc_type r_type;
9038 unsigned long r_symndx;
9039 asection *sym_sec;
9040 struct elf_link_hash_entry *h;
854b41e7 9041 bfd_vma val;
c5614fa4
AM
9042
9043 r_type = ELF64_R_TYPE (rel->r_info);
9044 switch (r_type)
9045 {
9046 default:
9047 continue;
9048
9049 case R_PPC64_TOC16:
9050 case R_PPC64_TOC16_LO:
9051 case R_PPC64_TOC16_HI:
9052 case R_PPC64_TOC16_HA:
9053 case R_PPC64_TOC16_DS:
9054 case R_PPC64_TOC16_LO_DS:
9055 case R_PPC64_ADDR64:
9056 break;
9057 }
9058
9059 r_symndx = ELF64_R_SYM (rel->r_info);
9060 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9061 r_symndx, ibfd))
9062 goto error_ret;
9063
ba761f19 9064 if (sym_sec != toc)
c5614fa4
AM
9065 continue;
9066
ba761f19
AM
9067 if (h != NULL)
9068 val = h->root.u.def.value;
9069 else
9070 {
9071 val = sym->st_value;
9072 if (val != 0)
9073 local_toc_syms = TRUE;
9074 }
9075
9076 val += rel->r_addend;
854b41e7
AM
9077
9078 if (val > toc->rawsize)
9079 val = toc->rawsize;
ba761f19
AM
9080 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9081 continue;
9082 else if ((skip[val >> 3] & can_optimize) != 0)
9083 {
9084 Elf_Internal_Rela *tocrel
425b145b 9085 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9086 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9087
9088 switch (r_type)
9089 {
9090 case R_PPC64_TOC16_HA:
9091 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9092 break;
9093
9094 case R_PPC64_TOC16_LO_DS:
9095 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9096 break;
9097
9098 default:
28942f62
AM
9099 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9100 ppc_howto_init ();
b140b010 9101 info->callbacks->einfo
695344c0 9102 /* xgettext:c-format */
174d0a74 9103 (_("%H: %s references "
b140b010
AM
9104 "optimized away TOC entry\n"),
9105 ibfd, sec, rel->r_offset,
9106 ppc64_elf_howto_table[r_type]->name);
9107 bfd_set_error (bfd_error_bad_value);
9108 goto error_ret;
ba761f19
AM
9109 }
9110 rel->r_addend = tocrel->r_addend;
9111 elf_section_data (sec)->relocs = relstart;
9112 continue;
9113 }
9114
9115 if (h != NULL || sym->st_value != 0)
9116 continue;
854b41e7
AM
9117
9118 rel->r_addend -= skip[val >> 3];
9119 elf_section_data (sec)->relocs = relstart;
c5614fa4 9120 }
854b41e7
AM
9121
9122 if (elf_section_data (sec)->relocs != relstart)
9123 free (relstart);
c5614fa4
AM
9124 }
9125
9126 /* We shouldn't have local or global symbols defined in the TOC,
9127 but handle them anyway. */
df22d223
AM
9128 if (local_syms != NULL)
9129 for (sym = local_syms;
9130 sym < local_syms + symtab_hdr->sh_info;
9131 ++sym)
9132 if (sym->st_value != 0
9133 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9134 {
9135 unsigned long i;
854b41e7 9136
df22d223
AM
9137 if (sym->st_value > toc->rawsize)
9138 i = toc->rawsize >> 3;
9139 else
9140 i = sym->st_value >> 3;
854b41e7 9141
df22d223
AM
9142 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9143 {
9144 if (local_toc_syms)
4eca0228 9145 _bfd_error_handler
df22d223
AM
9146 (_("%s defined on removed toc entry"),
9147 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9148 do
9149 ++i;
9150 while ((skip[i] & (ref_from_discarded | can_optimize)));
9151 sym->st_value = (bfd_vma) i << 3;
9152 }
d62b3684 9153
df22d223
AM
9154 sym->st_value -= skip[i];
9155 symtab_hdr->contents = (unsigned char *) local_syms;
9156 }
c5614fa4 9157
854b41e7 9158 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9159 if (toc_inf.global_toc_syms)
9160 {
9161 toc_inf.toc = toc;
9162 toc_inf.skip = skip;
9163 toc_inf.global_toc_syms = FALSE;
9164 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9165 &toc_inf);
9166 }
854b41e7
AM
9167
9168 if (toc->reloc_count != 0)
9169 {
d4730f92 9170 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9171 Elf_Internal_Rela *wrel;
9172 bfd_size_type sz;
9173
854b41e7 9174 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9175 if (toc_relocs == NULL)
9176 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9177 info->keep_memory);
9178 if (toc_relocs == NULL)
9179 goto error_ret;
9180
425b145b
AM
9181 wrel = toc_relocs;
9182 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9183 if ((skip[rel->r_offset >> 3]
9184 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9185 {
9186 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9187 wrel->r_info = rel->r_info;
9188 wrel->r_addend = rel->r_addend;
9189 ++wrel;
9190 }
9191 else if (!dec_dynrel_count (rel->r_info, toc, info,
9192 &local_syms, NULL, NULL))
9193 goto error_ret;
9194
425b145b
AM
9195 elf_section_data (toc)->relocs = toc_relocs;
9196 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9197 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9198 sz = rel_hdr->sh_entsize;
9199 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9200 }
c5614fa4 9201 }
28be611c
AM
9202 else if (toc_relocs != NULL
9203 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 9204 free (toc_relocs);
c5614fa4
AM
9205
9206 if (local_syms != NULL
9207 && symtab_hdr->contents != (unsigned char *) local_syms)
9208 {
9209 if (!info->keep_memory)
9210 free (local_syms);
9211 else
9212 symtab_hdr->contents = (unsigned char *) local_syms;
9213 }
9214 free (skip);
9215 }
9216
066f4018 9217 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9218 a GOT relative or PC relative access, possibly reducing the
9219 number of GOT entries. */
066f4018
AM
9220 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9221 {
9222 asection *sec;
9223 Elf_Internal_Shdr *symtab_hdr;
9224 Elf_Internal_Sym *local_syms;
9225 Elf_Internal_Rela *relstart, *rel;
9226 bfd_vma got;
9227
9228 if (!is_ppc64_elf (ibfd))
9229 continue;
9230
903b777d 9231 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9232 continue;
9233
9234 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9235 got = 0;
9236 if (sec != NULL)
9237 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9238
9239 local_syms = NULL;
9240 symtab_hdr = &elf_symtab_hdr (ibfd);
9241
9242 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9243 {
9244 if (sec->reloc_count == 0
903b777d 9245 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9246 || discarded_section (sec))
9247 continue;
9248
9249 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9250 info->keep_memory);
9251 if (relstart == NULL)
9252 {
9253 got_error_ret:
9254 if (local_syms != NULL
9255 && symtab_hdr->contents != (unsigned char *) local_syms)
9256 free (local_syms);
9257 if (sec != NULL
9258 && relstart != NULL
9259 && elf_section_data (sec)->relocs != relstart)
9260 free (relstart);
9261 return FALSE;
9262 }
9263
9264 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9265 {
9266 enum elf_ppc64_reloc_type r_type;
9267 unsigned long r_symndx;
9268 Elf_Internal_Sym *sym;
9269 asection *sym_sec;
9270 struct elf_link_hash_entry *h;
9271 struct got_entry *ent;
133a1f60 9272 bfd_vma val, pc;
4a421c53 9273 unsigned char buf[8];
066f4018 9274 unsigned int insn;
903b777d 9275 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9276
9277 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9278 switch (r_type)
9279 {
9280 default:
9281 insn_check = no_check;
9282 break;
9283
9284 case R_PPC64_PLT16_HA:
9285 case R_PPC64_GOT_TLSLD16_HA:
9286 case R_PPC64_GOT_TLSGD16_HA:
9287 case R_PPC64_GOT_TPREL16_HA:
9288 case R_PPC64_GOT_DTPREL16_HA:
9289 case R_PPC64_GOT16_HA:
9290 case R_PPC64_TOC16_HA:
9291 insn_check = check_ha;
9292 break;
9293
9294 case R_PPC64_PLT16_LO:
9295 case R_PPC64_PLT16_LO_DS:
9296 case R_PPC64_GOT_TLSLD16_LO:
9297 case R_PPC64_GOT_TLSGD16_LO:
9298 case R_PPC64_GOT_TPREL16_LO_DS:
9299 case R_PPC64_GOT_DTPREL16_LO_DS:
9300 case R_PPC64_GOT16_LO:
9301 case R_PPC64_GOT16_LO_DS:
9302 case R_PPC64_TOC16_LO:
9303 case R_PPC64_TOC16_LO_DS:
9304 insn_check = check_lo;
9305 break;
9306 }
9307
9308 if (insn_check != no_check)
9309 {
9310 bfd_vma off = rel->r_offset & ~3;
9311
9312 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9313 goto got_error_ret;
9314
9315 insn = bfd_get_32 (ibfd, buf);
9316 if (insn_check == check_lo
9317 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9318 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9319 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9320 {
9321 char str[12];
9322
9323 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9324 sprintf (str, "%#08x", insn);
9325 info->callbacks->einfo
9326 /* xgettext:c-format */
9327 (_("%H: got/toc optimization is not supported for"
9328 " %s instruction\n"),
9329 ibfd, sec, rel->r_offset & ~3, str);
9330 continue;
9331 }
9332 }
9333
066f4018
AM
9334 switch (r_type)
9335 {
bb22a418
AM
9336 /* Note that we don't delete GOT entries for
9337 R_PPC64_GOT16_DS since we'd need a lot more
9338 analysis. For starters, the preliminary layout is
9339 before the GOT, PLT, dynamic sections and stubs are
9340 laid out. Then we'd need to allow for changes in
9341 distance between sections caused by alignment. */
066f4018
AM
9342 default:
9343 continue;
9344
066f4018
AM
9345 case R_PPC64_GOT16_HA:
9346 case R_PPC64_GOT16_LO_DS:
4a421c53 9347 case R_PPC64_GOT_PCREL34:
066f4018
AM
9348 break;
9349 }
9350
9351 r_symndx = ELF64_R_SYM (rel->r_info);
9352 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9353 r_symndx, ibfd))
9354 goto got_error_ret;
9355
6d5554a6
AM
9356 if (sym_sec == NULL
9357 || sym_sec->output_section == NULL
9358 || discarded_section (sym_sec))
9359 continue;
9360
066f4018
AM
9361 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9362 continue;
9363
9364 if (h != NULL)
9365 val = h->root.u.def.value;
9366 else
9367 val = sym->st_value;
133a1f60 9368 val += rel->r_addend;
066f4018
AM
9369 val += sym_sec->output_section->vma + sym_sec->output_offset;
9370
bb22a418
AM
9371/* Fudge factor to allow for the fact that the preliminary layout
9372 isn't exact. Reduce limits by this factor. */
9373#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9374
066f4018
AM
9375 switch (r_type)
9376 {
9377 default:
9378 continue;
9379
066f4018 9380 case R_PPC64_GOT16_HA:
bb22a418
AM
9381 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9382 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9383 continue;
9384
9385 if (!bfd_get_section_contents (ibfd, sec, buf,
9386 rel->r_offset & ~3, 4))
9387 goto got_error_ret;
9388 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9389 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9390 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9391 continue;
9392 break;
9393
9394 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9395 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9396 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9397 continue;
9398 if (!bfd_get_section_contents (ibfd, sec, buf,
9399 rel->r_offset & ~3, 4))
9400 goto got_error_ret;
9401 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9402 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9403 continue;
9404 break;
4a421c53
AM
9405
9406 case R_PPC64_GOT_PCREL34:
9407 pc = rel->r_offset;
9408 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9409 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9410 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9411 continue;
9412 if (!bfd_get_section_contents (ibfd, sec, buf,
9413 rel->r_offset & ~3, 8))
9414 goto got_error_ret;
9415 insn = bfd_get_32 (ibfd, buf);
9416 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9417 continue;
9418 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9419 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9420 continue;
9421 break;
066f4018 9422 }
bb22a418 9423#undef LIMIT_ADJUST
066f4018
AM
9424
9425 if (h != NULL)
9426 ent = h->got.glist;
9427 else
9428 {
9429 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9430 ent = local_got_ents[r_symndx];
9431 }
9432 for (; ent != NULL; ent = ent->next)
133a1f60 9433 if (ent->addend == rel->r_addend
066f4018
AM
9434 && ent->owner == ibfd
9435 && ent->tls_type == 0)
9436 break;
9437 BFD_ASSERT (ent && ent->got.refcount > 0);
9438 ent->got.refcount -= 1;
9439 }
9440
9441 if (elf_section_data (sec)->relocs != relstart)
9442 free (relstart);
9443 }
9444
9445 if (local_syms != NULL
9446 && symtab_hdr->contents != (unsigned char *) local_syms)
9447 {
9448 if (!info->keep_memory)
9449 free (local_syms);
9450 else
9451 symtab_hdr->contents = (unsigned char *) local_syms;
9452 }
9453 }
9454
c5614fa4
AM
9455 return TRUE;
9456}
9457
1bbe0902
AM
9458/* Return true iff input section I references the TOC using
9459 instructions limited to +/-32k offsets. */
9460
9461bfd_boolean
9462ppc64_elf_has_small_toc_reloc (asection *i)
9463{
9464 return (is_ppc64_elf (i->owner)
9465 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9466}
9467
927be08e
AM
9468/* Allocate space for one GOT entry. */
9469
9470static void
9471allocate_got (struct elf_link_hash_entry *h,
9472 struct bfd_link_info *info,
9473 struct got_entry *gent)
9474{
9475 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9476 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9477 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9478 ? 16 : 8);
9479 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9480 ? 2 : 1) * sizeof (Elf64_External_Rela);
9481 asection *got = ppc64_elf_tdata (gent->owner)->got;
9482
9483 gent->got.offset = got->size;
9484 got->size += entsize;
9485
19e08130 9486 if (h->type == STT_GNU_IFUNC)
927be08e 9487 {
33e44f2e 9488 htab->elf.irelplt->size += rentsize;
19e08130 9489 htab->got_reli_size += rentsize;
927be08e 9490 }
f15d0b54 9491 else if (((bfd_link_pic (info)
f749f26e 9492 && !(gent->tls_type != 0
f15d0b54
AM
9493 && bfd_link_executable (info)
9494 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9495 || (htab->elf.dynamic_sections_created
9496 && h->dynindx != -1
9497 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9498 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9499 {
19e08130 9500 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9501 relgot->size += rentsize;
927be08e
AM
9502 }
9503}
9504
7865406b
AM
9505/* This function merges got entries in the same toc group. */
9506
9507static void
9508merge_got_entries (struct got_entry **pent)
9509{
9510 struct got_entry *ent, *ent2;
9511
9512 for (ent = *pent; ent != NULL; ent = ent->next)
9513 if (!ent->is_indirect)
9514 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9515 if (!ent2->is_indirect
9516 && ent2->addend == ent->addend
9517 && ent2->tls_type == ent->tls_type
9518 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9519 {
9520 ent2->is_indirect = TRUE;
9521 ent2->got.ent = ent;
9522 }
9523}
9524
46434633 9525/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9526
9527static bfd_boolean
46434633
AM
9528ensure_undef_dynamic (struct bfd_link_info *info,
9529 struct elf_link_hash_entry *h)
f0158f44
AM
9530{
9531 struct elf_link_hash_table *htab = elf_hash_table (info);
9532
9533 if (htab->dynamic_sections_created
46434633
AM
9534 && ((info->dynamic_undefined_weak != 0
9535 && h->root.type == bfd_link_hash_undefweak)
9536 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9537 && h->dynindx == -1
9538 && !h->forced_local
9539 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9540 return bfd_elf_link_record_dynamic_symbol (info, h);
9541 return TRUE;
9542}
9543
65f38f15
AM
9544/* Allocate space in .plt, .got and associated reloc sections for
9545 dynamic relocs. */
5bd4f169 9546
b34976b6 9547static bfd_boolean
4ce794b7 9548allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9549{
65f38f15
AM
9550 struct bfd_link_info *info;
9551 struct ppc_link_hash_table *htab;
5bd4f169 9552 asection *s;
65f38f15 9553 struct ppc_link_hash_entry *eh;
0b8bcf0d 9554 struct got_entry **pgent, *gent;
5bd4f169 9555
e92d460e 9556 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9557 return TRUE;
5bd4f169 9558
65f38f15
AM
9559 info = (struct bfd_link_info *) inf;
9560 htab = ppc_hash_table (info);
4dfe6ac6
NC
9561 if (htab == NULL)
9562 return FALSE;
5bd4f169 9563
ed7007c1 9564 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9565 /* Run through the TLS GD got entries first if we're changing them
9566 to TPREL. */
b00a0a86 9567 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9568 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9569 if (gent->got.refcount > 0
9570 && (gent->tls_type & TLS_GD) != 0)
9571 {
9572 /* This was a GD entry that has been converted to TPREL. If
9573 there happens to be a TPREL entry we can use that one. */
9574 struct got_entry *ent;
9575 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9576 if (ent->got.refcount > 0
9577 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9578 && ent->addend == gent->addend
9579 && ent->owner == gent->owner)
951fd09b
AM
9580 {
9581 gent->got.refcount = 0;
9582 break;
9583 }
9584
9585 /* If not, then we'll be using our own TPREL entry. */
9586 if (gent->got.refcount != 0)
9587 gent->tls_type = TLS_TLS | TLS_TPREL;
9588 }
9589
7865406b
AM
9590 /* Remove any list entry that won't generate a word in the GOT before
9591 we call merge_got_entries. Otherwise we risk merging to empty
9592 entries. */
0b8bcf0d
AM
9593 pgent = &h->got.glist;
9594 while ((gent = *pgent) != NULL)
411e1bfb 9595 if (gent->got.refcount > 0)
7865406b
AM
9596 {
9597 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9598 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9599 {
9600 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9601 *pgent = gent->next;
9602 }
9603 else
9604 pgent = &gent->next;
9605 }
9606 else
9607 *pgent = gent->next;
9608
9609 if (!htab->do_multi_toc)
9610 merge_got_entries (&h->got.glist);
9611
9612 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9613 if (!gent->is_indirect)
411e1bfb 9614 {
ec73ddcd
AM
9615 /* Ensure we catch all the cases where this symbol should
9616 be made dynamic. */
46434633 9617 if (!ensure_undef_dynamic (info, h))
f0158f44 9618 return FALSE;
65f38f15 9619
0c8d6e5c 9620 if (!is_ppc64_elf (gent->owner))
927be08e 9621 abort ();
0ffa91dd 9622
927be08e 9623 allocate_got (h, info, gent);
411e1bfb 9624 }
65f38f15 9625
954b63d4
AM
9626 /* If no dynamic sections we can't have dynamic relocs, except for
9627 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9628 if (!htab->elf.dynamic_sections_created
9629 && h->type != STT_GNU_IFUNC)
9630 eh->dyn_relocs = NULL;
9631
529fe20e
AM
9632 /* Discard relocs on undefined symbols that must be local. */
9633 else if (h->root.type == bfd_link_hash_undefined
9634 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9635 eh->dyn_relocs = NULL;
9636
954b63d4
AM
9637 /* Also discard relocs on undefined weak syms with non-default
9638 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9639 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9640 eh->dyn_relocs = NULL;
9641
8a2058b5 9642 if (eh->dyn_relocs != NULL)
65f38f15 9643 {
8a2058b5
AM
9644 struct elf_dyn_relocs *p, **pp;
9645
57e7d118
AM
9646 /* In the shared -Bsymbolic case, discard space allocated for
9647 dynamic pc-relative relocs against symbols which turn out to
9648 be defined in regular objects. For the normal shared case,
9649 discard space for relocs that have become local due to symbol
9650 visibility changes. */
57e7d118 9651 if (bfd_link_pic (info))
65f38f15 9652 {
57e7d118
AM
9653 /* Relocs that use pc_count are those that appear on a call
9654 insn, or certain REL relocs (see must_be_dyn_reloc) that
9655 can be generated via assembly. We want calls to
9656 protected symbols to resolve directly to the function
9657 rather than going via the plt. If people want function
9658 pointer comparisons to work as expected then they should
9659 avoid writing weird assembly. */
9660 if (SYMBOL_CALLS_LOCAL (info, h))
9661 {
57e7d118
AM
9662 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9663 {
9664 p->count -= p->pc_count;
9665 p->pc_count = 0;
9666 if (p->count == 0)
9667 *pp = p->next;
9668 else
9669 pp = &p->next;
9670 }
9671 }
65f38f15 9672
954b63d4 9673 if (eh->dyn_relocs != NULL)
5bd4f169 9674 {
ec73ddcd
AM
9675 /* Ensure we catch all the cases where this symbol
9676 should be made dynamic. */
46434633 9677 if (!ensure_undef_dynamic (info, h))
f0158f44 9678 return FALSE;
5bd4f169 9679 }
65f38f15 9680 }
ec73ddcd
AM
9681
9682 /* For a fixed position executable, discard space for
9683 relocs against symbols which are not dynamic. */
9684 else if (h->type != STT_GNU_IFUNC)
57e7d118 9685 {
529fe20e
AM
9686 if (h->dynamic_adjusted
9687 && !h->def_regular
9688 && !ELF_COMMON_DEF_P (h))
f0158f44 9689 {
ec73ddcd
AM
9690 /* Ensure we catch all the cases where this symbol
9691 should be made dynamic. */
46434633 9692 if (!ensure_undef_dynamic (info, h))
f0158f44 9693 return FALSE;
dfbb6ac9 9694
ec73ddcd 9695 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9696 if (h->dynindx == -1)
9697 eh->dyn_relocs = NULL;
9698 }
9699 else
8a2058b5 9700 eh->dyn_relocs = NULL;
57e7d118
AM
9701 }
9702
9703 /* Finally, allocate space. */
9704 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9705 {
9706 asection *sreloc = elf_section_data (p->sec)->sreloc;
9707 if (eh->elf.type == STT_GNU_IFUNC)
9708 sreloc = htab->elf.irelplt;
9709 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9710 }
65f38f15 9711 }
57e7d118 9712
2d7ad24e
AM
9713 /* We might need a PLT entry when the symbol
9714 a) is dynamic, or
9715 b) is an ifunc, or
9716 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9717 d) has plt16 relocs and we are linking statically. */
9718 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9719 || h->type == STT_GNU_IFUNC
9720 || (h->needs_plt && h->dynamic_adjusted)
9721 || (h->needs_plt
9722 && h->def_regular
9723 && !htab->elf.dynamic_sections_created
3e04d765 9724 && !htab->can_convert_all_inline_plt
ed7007c1 9725 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9726 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9727 {
57e7d118
AM
9728 struct plt_entry *pent;
9729 bfd_boolean doneone = FALSE;
9730 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9731 if (pent->plt.refcount > 0)
9732 {
9733 if (!htab->elf.dynamic_sections_created
9734 || h->dynindx == -1)
9735 {
2d7ad24e
AM
9736 if (h->type == STT_GNU_IFUNC)
9737 {
9738 s = htab->elf.iplt;
9739 pent->plt.offset = s->size;
9740 s->size += PLT_ENTRY_SIZE (htab);
9741 s = htab->elf.irelplt;
9742 }
9743 else
9744 {
9745 s = htab->pltlocal;
9746 pent->plt.offset = s->size;
9747 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9748 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9749 }
57e7d118
AM
9750 }
9751 else
9752 {
9753 /* If this is the first .plt entry, make room for the special
9754 first entry. */
9755 s = htab->elf.splt;
9756 if (s->size == 0)
9757 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9758
57e7d118 9759 pent->plt.offset = s->size;
65f38f15 9760
57e7d118
AM
9761 /* Make room for this entry. */
9762 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9763
57e7d118
AM
9764 /* Make room for the .glink code. */
9765 s = htab->glink;
9766 if (s->size == 0)
9e390558 9767 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9768 if (htab->opd_abi)
9769 {
9770 /* We need bigger stubs past index 32767. */
9e390558 9771 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9772 s->size += 4;
9773 s->size += 2*4;
9774 }
9775 else
9776 s->size += 4;
65f38f15 9777
57e7d118
AM
9778 /* We also need to make an entry in the .rela.plt section. */
9779 s = htab->elf.srelplt;
9780 }
2d7ad24e
AM
9781 if (s != NULL)
9782 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9783 doneone = TRUE;
9784 }
9785 else
9786 pent->plt.offset = (bfd_vma) -1;
9787 if (!doneone)
9788 {
9789 h->plt.plist = NULL;
9790 h->needs_plt = 0;
9791 }
65f38f15 9792 }
57e7d118 9793 else
65f38f15 9794 {
57e7d118
AM
9795 h->plt.plist = NULL;
9796 h->needs_plt = 0;
65f38f15
AM
9797 }
9798
b34976b6 9799 return TRUE;
65f38f15
AM
9800}
9801
9e390558
AM
9802#define PPC_LO(v) ((v) & 0xffff)
9803#define PPC_HI(v) (((v) >> 16) & 0xffff)
9804#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9805#define D34(v) \
9806 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9807#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9808
a345bc8d
AM
9809/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9810 to set up space for global entry stubs. These are put in glink,
9811 after the branch table. */
65f38f15 9812
b34976b6 9813static bfd_boolean
a345bc8d 9814size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9815{
a345bc8d
AM
9816 struct bfd_link_info *info;
9817 struct ppc_link_hash_table *htab;
9818 struct plt_entry *pent;
9e390558 9819 asection *s, *plt;
65f38f15 9820
a345bc8d
AM
9821 if (h->root.type == bfd_link_hash_indirect)
9822 return TRUE;
65f38f15 9823
a345bc8d
AM
9824 if (!h->pointer_equality_needed)
9825 return TRUE;
65f38f15 9826
a345bc8d
AM
9827 if (h->def_regular)
9828 return TRUE;
65f38f15 9829
a345bc8d
AM
9830 info = inf;
9831 htab = ppc_hash_table (info);
9832 if (htab == NULL)
9833 return FALSE;
9834
9e390558
AM
9835 s = htab->global_entry;
9836 plt = htab->elf.splt;
a345bc8d
AM
9837 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9838 if (pent->plt.offset != (bfd_vma) -1
9839 && pent->addend == 0)
9840 {
afe397ea
AM
9841 /* For ELFv2, if this symbol is not defined in a regular file
9842 and we are not generating a shared library or pie, then we
9843 need to define the symbol in the executable on a call stub.
9844 This is to avoid text relocations. */
9e390558
AM
9845 bfd_vma off, stub_align, stub_off, stub_size;
9846 unsigned int align_power;
9847
9848 stub_size = 16;
9849 stub_off = s->size;
9850 if (htab->params->plt_stub_align >= 0)
9851 align_power = htab->params->plt_stub_align;
9852 else
9853 align_power = -htab->params->plt_stub_align;
9854 /* Setting section alignment is delayed until we know it is
9855 non-empty. Otherwise the .text output section will be
9856 aligned at least to plt_stub_align even when no global
9857 entry stubs are needed. */
9858 if (s->alignment_power < align_power)
9859 s->alignment_power = align_power;
9860 stub_align = (bfd_vma) 1 << align_power;
9861 if (htab->params->plt_stub_align >= 0
9862 || ((((stub_off + stub_size - 1) & -stub_align)
9863 - (stub_off & -stub_align))
9864 > ((stub_size - 1) & -stub_align)))
9865 stub_off = (stub_off + stub_align - 1) & -stub_align;
9866 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9867 off -= stub_off + s->output_offset + s->output_section->vma;
9868 /* Note that for --plt-stub-align negative we have a possible
9869 dependency between stub offset and size. Break that
9870 dependency by assuming the max stub size when calculating
9871 the stub offset. */
9872 if (PPC_HA (off) == 0)
9873 stub_size -= 4;
8a2058b5 9874 h->root.type = bfd_link_hash_defined;
afe397ea 9875 h->root.u.def.section = s;
9e390558
AM
9876 h->root.u.def.value = stub_off;
9877 s->size = stub_off + stub_size;
a345bc8d
AM
9878 break;
9879 }
9880 return TRUE;
9881}
9882
9883/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9884 read-only sections. */
9885
9886static bfd_boolean
98bbb1b8 9887maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9888{
98bbb1b8
AM
9889 asection *sec;
9890
a345bc8d
AM
9891 if (h->root.type == bfd_link_hash_indirect)
9892 return TRUE;
9893
98bbb1b8
AM
9894 sec = readonly_dynrelocs (h);
9895 if (sec != NULL)
a345bc8d 9896 {
98bbb1b8
AM
9897 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9898
9899 info->flags |= DF_TEXTREL;
2cdcc330
AM
9900 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9901 " in read-only section `%pA'\n"),
9902 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9903
9904 /* Not an error, just cut short the traversal. */
9905 return FALSE;
65f38f15 9906 }
b34976b6 9907 return TRUE;
65f38f15
AM
9908}
9909
9910/* Set the sizes of the dynamic sections. */
9911
b34976b6 9912static bfd_boolean
ee67d69a 9913ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9914 struct bfd_link_info *info)
65f38f15
AM
9915{
9916 struct ppc_link_hash_table *htab;
9917 bfd *dynobj;
9918 asection *s;
b34976b6 9919 bfd_boolean relocs;
65f38f15 9920 bfd *ibfd;
7865406b 9921 struct got_entry *first_tlsld;
65f38f15
AM
9922
9923 htab = ppc_hash_table (info);
4dfe6ac6
NC
9924 if (htab == NULL)
9925 return FALSE;
9926
65f38f15
AM
9927 dynobj = htab->elf.dynobj;
9928 if (dynobj == NULL)
9929 abort ();
9930
9931 if (htab->elf.dynamic_sections_created)
9932 {
9933 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9934 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9935 {
3d4d4302 9936 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9937 if (s == NULL)
9938 abort ();
eea6121a 9939 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9940 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9941 }
9942 }
9943
9944 /* Set up .got offsets for local syms, and space for local dynamic
9945 relocs. */
c72f2fb2 9946 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9947 {
411e1bfb
AM
9948 struct got_entry **lgot_ents;
9949 struct got_entry **end_lgot_ents;
e054468f
AM
9950 struct plt_entry **local_plt;
9951 struct plt_entry **end_local_plt;
f961d9dd 9952 unsigned char *lgot_masks;
65f38f15
AM
9953 bfd_size_type locsymcount;
9954 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9955
0c8d6e5c 9956 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9957 continue;
9958
9959 for (s = ibfd->sections; s != NULL; s = s->next)
9960 {
19e08130 9961 struct ppc_dyn_relocs *p;
65f38f15 9962
6edfbbad 9963 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9964 {
ec338859
AM
9965 if (!bfd_is_abs_section (p->sec)
9966 && bfd_is_abs_section (p->sec->output_section))
9967 {
9968 /* Input section has been discarded, either because
9969 it is a copy of a linkonce section or due to
9970 linker script /DISCARD/, so we'll be discarding
9971 the relocs too. */
9972 }
248866a8 9973 else if (p->count != 0)
ec338859 9974 {
19e08130
AM
9975 asection *srel = elf_section_data (p->sec)->sreloc;
9976 if (p->ifunc)
33e44f2e 9977 srel = htab->elf.irelplt;
eea6121a 9978 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9979 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9980 info->flags |= DF_TEXTREL;
ec338859 9981 }
65f38f15
AM
9982 }
9983 }
9984
411e1bfb
AM
9985 lgot_ents = elf_local_got_ents (ibfd);
9986 if (!lgot_ents)
65f38f15
AM
9987 continue;
9988
0ffa91dd 9989 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9990 locsymcount = symtab_hdr->sh_info;
411e1bfb 9991 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9992 local_plt = (struct plt_entry **) end_lgot_ents;
9993 end_local_plt = local_plt + locsymcount;
f961d9dd 9994 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9995 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9996 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9997 {
0b8bcf0d 9998 struct got_entry **pent, *ent;
411e1bfb 9999
0b8bcf0d
AM
10000 pent = lgot_ents;
10001 while ((ent = *pent) != NULL)
411e1bfb
AM
10002 if (ent->got.refcount > 0)
10003 {
e7b938ca 10004 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10005 {
927be08e 10006 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10007 *pent = ent->next;
411e1bfb
AM
10008 }
10009 else
10010 {
19e08130
AM
10011 unsigned int ent_size = 8;
10012 unsigned int rel_size = sizeof (Elf64_External_Rela);
10013
eea6121a 10014 ent->got.offset = s->size;
e7b938ca 10015 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10016 {
19e08130
AM
10017 ent_size *= 2;
10018 rel_size *= 2;
10019 }
10020 s->size += ent_size;
37da22e5 10021 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10022 {
33e44f2e 10023 htab->elf.irelplt->size += rel_size;
19e08130
AM
10024 htab->got_reli_size += rel_size;
10025 }
93370e8e
AM
10026 else if (bfd_link_pic (info)
10027 && !(ent->tls_type != 0
10028 && bfd_link_executable (info)))
19e08130
AM
10029 {
10030 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10031 srel->size += rel_size;
927be08e 10032 }
0b8bcf0d 10033 pent = &ent->next;
411e1bfb
AM
10034 }
10035 }
10036 else
0b8bcf0d 10037 *pent = ent->next;
65f38f15 10038 }
e054468f 10039
2d7ad24e
AM
10040 /* Allocate space for plt calls to local syms. */
10041 lgot_masks = (unsigned char *) end_local_plt;
10042 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10043 {
10044 struct plt_entry *ent;
10045
10046 for (ent = *local_plt; ent != NULL; ent = ent->next)
10047 if (ent->plt.refcount > 0)
10048 {
2d7ad24e
AM
10049 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10050 {
10051 s = htab->elf.iplt;
10052 ent->plt.offset = s->size;
10053 s->size += PLT_ENTRY_SIZE (htab);
10054 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10055 }
3e04d765
AM
10056 else if (htab->can_convert_all_inline_plt
10057 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10058 ent->plt.offset = (bfd_vma) -1;
10059 else
10060 {
10061 s = htab->pltlocal;
10062 ent->plt.offset = s->size;
10063 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10064 if (bfd_link_pic (info))
10065 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10066 }
e054468f
AM
10067 }
10068 else
10069 ent->plt.offset = (bfd_vma) -1;
10070 }
65f38f15
AM
10071 }
10072
10073 /* Allocate global sym .plt and .got entries, and space for global
10074 sym dynamic relocs. */
4ce794b7 10075 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10076
0e1862bb 10077 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10078 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10079
7865406b 10080 first_tlsld = NULL;
c72f2fb2 10081 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10082 {
7865406b
AM
10083 struct got_entry *ent;
10084
0c8d6e5c 10085 if (!is_ppc64_elf (ibfd))
102890f0
AM
10086 continue;
10087
7865406b
AM
10088 ent = ppc64_tlsld_got (ibfd);
10089 if (ent->got.refcount > 0)
102890f0 10090 {
7865406b 10091 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10092 {
7865406b
AM
10093 ent->is_indirect = TRUE;
10094 ent->got.ent = first_tlsld;
10095 }
10096 else
10097 {
10098 if (first_tlsld == NULL)
10099 first_tlsld = ent;
10100 s = ppc64_elf_tdata (ibfd)->got;
10101 ent->got.offset = s->size;
10102 ent->owner = ibfd;
10103 s->size += 16;
f749f26e 10104 if (bfd_link_dll (info))
7865406b
AM
10105 {
10106 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10107 srel->size += sizeof (Elf64_External_Rela);
10108 }
102890f0
AM
10109 }
10110 }
10111 else
7865406b 10112 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10113 }
10114
65f38f15
AM
10115 /* We now have determined the sizes of the various dynamic sections.
10116 Allocate memory for them. */
b34976b6 10117 relocs = FALSE;
65f38f15
AM
10118 for (s = dynobj->sections; s != NULL; s = s->next)
10119 {
10120 if ((s->flags & SEC_LINKER_CREATED) == 0)
10121 continue;
10122
4ce794b7 10123 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10124 /* These haven't been allocated yet; don't strip. */
10125 continue;
33e44f2e
AM
10126 else if (s == htab->elf.sgot
10127 || s == htab->elf.splt
10128 || s == htab->elf.iplt
2d7ad24e 10129 || s == htab->pltlocal
c456f082 10130 || s == htab->glink
9e390558 10131 || s == htab->global_entry
5474d94f
AM
10132 || s == htab->elf.sdynbss
10133 || s == htab->elf.sdynrelro)
65f38f15
AM
10134 {
10135 /* Strip this section if we don't need it; see the
10136 comment below. */
5bd4f169 10137 }
58d180e8
AM
10138 else if (s == htab->glink_eh_frame)
10139 {
10140 if (!bfd_is_abs_section (s->output_section))
10141 /* Not sized yet. */
10142 continue;
10143 }
70cc837d 10144 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10145 {
c456f082 10146 if (s->size != 0)
5bd4f169 10147 {
33e44f2e 10148 if (s != htab->elf.srelplt)
b34976b6 10149 relocs = TRUE;
5bd4f169
AM
10150
10151 /* We use the reloc_count field as a counter if we need
10152 to copy relocs into the output file. */
10153 s->reloc_count = 0;
10154 }
10155 }
65f38f15 10156 else
5bd4f169
AM
10157 {
10158 /* It's not one of our sections, so don't allocate space. */
10159 continue;
10160 }
10161
eea6121a 10162 if (s->size == 0)
5bd4f169 10163 {
c456f082
AM
10164 /* If we don't need this section, strip it from the
10165 output file. This is mostly to handle .rela.bss and
10166 .rela.plt. We must create both sections in
10167 create_dynamic_sections, because they must be created
10168 before the linker maps input sections to output
10169 sections. The linker does that before
10170 adjust_dynamic_symbol is called, and it is that
10171 function which decides whether anything needs to go
10172 into these sections. */
8423293d 10173 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10174 continue;
10175 }
10176
06bcf541
AM
10177 if (bfd_is_abs_section (s->output_section))
10178 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10179 s->name);
10180
c456f082 10181 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10182 continue;
10183
65f38f15
AM
10184 /* Allocate memory for the section contents. We use bfd_zalloc
10185 here in case unused entries are not reclaimed before the
10186 section's contents are written out. This should not happen,
411e1bfb
AM
10187 but this way if it does we get a R_PPC64_NONE reloc in .rela
10188 sections instead of garbage.
10189 We also rely on the section contents being zero when writing
5474d94f 10190 the GOT and .dynrelro. */
eea6121a 10191 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10192 if (s->contents == NULL)
b34976b6 10193 return FALSE;
5bd4f169
AM
10194 }
10195
c72f2fb2 10196 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10197 {
0c8d6e5c 10198 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10199 continue;
10200
e717da7e 10201 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10202 if (s != NULL && s != htab->elf.sgot)
e717da7e 10203 {
eea6121a 10204 if (s->size == 0)
8423293d 10205 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10206 else
10207 {
eea6121a 10208 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10209 if (s->contents == NULL)
10210 return FALSE;
10211 }
10212 }
10213 s = ppc64_elf_tdata (ibfd)->relgot;
10214 if (s != NULL)
10215 {
eea6121a 10216 if (s->size == 0)
8423293d 10217 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10218 else
10219 {
eea6121a 10220 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10221 if (s->contents == NULL)
10222 return FALSE;
10223 relocs = TRUE;
10224 s->reloc_count = 0;
10225 }
10226 }
10227 }
10228
e86ce104 10229 if (htab->elf.dynamic_sections_created)
5bd4f169 10230 {
e8910a83
AM
10231 bfd_boolean tls_opt;
10232
5bd4f169
AM
10233 /* Add some entries to the .dynamic section. We fill in the
10234 values later, in ppc64_elf_finish_dynamic_sections, but we
10235 must add the entries now so that we get the correct size for
10236 the .dynamic section. The DT_DEBUG entry is filled in by the
10237 dynamic linker and used by the debugger. */
dc810e39 10238#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10239 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10240
0e1862bb 10241 if (bfd_link_executable (info))
5bd4f169 10242 {
dc810e39 10243 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10244 return FALSE;
5bd4f169
AM
10245 }
10246
33e44f2e 10247 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10248 {
dc810e39
AM
10249 if (!add_dynamic_entry (DT_PLTGOT, 0)
10250 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10251 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10252 || !add_dynamic_entry (DT_JMPREL, 0)
10253 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10254 return FALSE;
5bd4f169
AM
10255 }
10256
ee67d69a 10257 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10258 {
10259 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10260 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10261 return FALSE;
19397422
AM
10262 }
10263
7c9cf415 10264 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10265 && ((htab->tls_get_addr_fd != NULL
10266 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10267 || (htab->tga_desc_fd != NULL
10268 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10269 if (tls_opt || !htab->opd_abi)
10270 {
10271 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10272 return FALSE;
10273 }
a7f2871e 10274
5bd4f169
AM
10275 if (relocs)
10276 {
dc810e39
AM
10277 if (!add_dynamic_entry (DT_RELA, 0)
10278 || !add_dynamic_entry (DT_RELASZ, 0)
10279 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10280 return FALSE;
5bd4f169 10281
65f38f15
AM
10282 /* If any dynamic relocs apply to a read-only section,
10283 then we need a DT_TEXTREL entry. */
248866a8 10284 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10285 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10286
65f38f15 10287 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10288 {
65f38f15 10289 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10290 return FALSE;
5bd4f169 10291 }
5bd4f169 10292 }
5bd4f169 10293 }
65f38f15 10294#undef add_dynamic_entry
5bd4f169 10295
b34976b6 10296 return TRUE;
5bd4f169
AM
10297}
10298
a345bc8d
AM
10299/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10300
10301static bfd_boolean
10302ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10303{
10304 if (h->plt.plist != NULL
10305 && !h->def_regular
10306 && !h->pointer_equality_needed)
10307 return FALSE;
10308
10309 return _bfd_elf_hash_symbol (h);
10310}
10311
721956f4 10312/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10313
4ce794b7
AM
10314static inline enum ppc_stub_type
10315ppc_type_of_stub (asection *input_sec,
10316 const Elf_Internal_Rela *rel,
10317 struct ppc_link_hash_entry **hash,
e054468f 10318 struct plt_entry **plt_ent,
6911b7dc
AM
10319 bfd_vma destination,
10320 unsigned long local_off)
5bd4f169 10321{
721956f4
AM
10322 struct ppc_link_hash_entry *h = *hash;
10323 bfd_vma location;
10324 bfd_vma branch_offset;
10325 bfd_vma max_branch_offset;
4ce794b7 10326 enum elf_ppc64_reloc_type r_type;
5bd4f169 10327
721956f4
AM
10328 if (h != NULL)
10329 {
e054468f 10330 struct plt_entry *ent;
7fe2b9a6 10331 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10332 if (h->oh != NULL
10333 && h->oh->is_func_descriptor)
7b8f6675
AM
10334 {
10335 fdh = ppc_follow_link (h->oh);
10336 *hash = fdh;
10337 }
8387904d 10338
e054468f
AM
10339 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10340 if (ent->addend == rel->r_addend
10341 && ent->plt.offset != (bfd_vma) -1)
10342 {
e054468f
AM
10343 *plt_ent = ent;
10344 return ppc_stub_plt_call;
10345 }
5bd4f169 10346
7fe2b9a6
AM
10347 /* Here, we know we don't have a plt entry. If we don't have a
10348 either a defined function descriptor or a defined entry symbol
10349 in a regular object file, then it is pointless trying to make
10350 any other type of stub. */
854b41e7
AM
10351 if (!is_static_defined (&fdh->elf)
10352 && !is_static_defined (&h->elf))
721956f4 10353 return ppc_stub_none;
5d1634d7 10354 }
e054468f
AM
10355 else if (elf_local_got_ents (input_sec->owner) != NULL)
10356 {
10357 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10358 struct plt_entry **local_plt = (struct plt_entry **)
10359 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10360 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10361
10362 if (local_plt[r_symndx] != NULL)
10363 {
10364 struct plt_entry *ent;
10365
10366 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10367 if (ent->addend == rel->r_addend
10368 && ent->plt.offset != (bfd_vma) -1)
10369 {
10370 *plt_ent = ent;
10371 return ppc_stub_plt_call;
10372 }
10373 }
10374 }
5d1634d7 10375
721956f4
AM
10376 /* Determine where the call point is. */
10377 location = (input_sec->output_offset
10378 + input_sec->output_section->vma
10379 + rel->r_offset);
5d1634d7 10380
721956f4
AM
10381 branch_offset = destination - location;
10382 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10383
721956f4
AM
10384 /* Determine if a long branch stub is needed. */
10385 max_branch_offset = 1 << 25;
23cedd1d
AM
10386 if (r_type == R_PPC64_REL14
10387 || r_type == R_PPC64_REL14_BRTAKEN
10388 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10389 max_branch_offset = 1 << 15;
5d1634d7 10390
6911b7dc 10391 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10392 /* We need a stub. Figure out whether a long_branch or plt_branch
10393 is needed later. */
10394 return ppc_stub_long_branch;
5d1634d7 10395
721956f4 10396 return ppc_stub_none;
5d1634d7
AM
10397}
10398
f891966f
AM
10399/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10400 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10401 . mflr %r12
10402 . bcl 20,31,1f
10403 .1: mflr %r11
10404 . mtlr %r12
05d0e962 10405 . lis %r12,xxx-1b@highest
f891966f 10406 . ori %r12,%r12,xxx-1b@higher
05d0e962 10407 . sldi %r12,%r12,32
f891966f 10408 . oris %r12,%r12,xxx-1b@high
05d0e962 10409 . ori %r12,%r12,xxx-1b@l
f891966f 10410 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10411
10412static bfd_byte *
10413build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10414{
f891966f
AM
10415 bfd_put_32 (abfd, MFLR_R12, p);
10416 p += 4;
10417 bfd_put_32 (abfd, BCL_20_31, p);
10418 p += 4;
10419 bfd_put_32 (abfd, MFLR_R11, p);
10420 p += 4;
10421 bfd_put_32 (abfd, MTLR_R12, p);
10422 p += 4;
05d0e962
AM
10423 if (off + 0x8000 < 0x10000)
10424 {
10425 if (load)
10426 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10427 else
10428 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10429 p += 4;
10430 }
10431 else if (off + 0x80008000ULL < 0x100000000ULL)
10432 {
10433 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10434 p += 4;
10435 if (load)
10436 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10437 else
10438 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10439 p += 4;
10440 }
10441 else
10442 {
10443 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10444 {
10445 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10446 p += 4;
10447 }
10448 else
10449 {
10450 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10451 p += 4;
10452 if (((off >> 32) & 0xffff) != 0)
10453 {
10454 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10455 p += 4;
10456 }
10457 }
10458 if (((off >> 32) & 0xffffffffULL) != 0)
10459 {
10460 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10461 p += 4;
10462 }
10463 if (PPC_HI (off) != 0)
10464 {
10465 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10466 p += 4;
10467 }
10468 if (PPC_LO (off) != 0)
10469 {
10470 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10471 p += 4;
10472 }
10473 if (load)
10474 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10475 else
10476 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10477 p += 4;
10478 }
10479 return p;
10480}
10481
10482static unsigned int
10483size_offset (bfd_vma off)
10484{
10485 unsigned int size;
10486 if (off + 0x8000 < 0x10000)
10487 size = 4;
10488 else if (off + 0x80008000ULL < 0x100000000ULL)
10489 size = 8;
10490 else
10491 {
10492 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10493 size = 4;
10494 else
10495 {
10496 size = 4;
10497 if (((off >> 32) & 0xffff) != 0)
10498 size += 4;
10499 }
10500 if (((off >> 32) & 0xffffffffULL) != 0)
10501 size += 4;
10502 if (PPC_HI (off) != 0)
10503 size += 4;
10504 if (PPC_LO (off) != 0)
10505 size += 4;
10506 size += 4;
10507 }
f891966f 10508 return size + 16;
05d0e962
AM
10509}
10510
3d58e1fc
AM
10511static unsigned int
10512num_relocs_for_offset (bfd_vma off)
10513{
10514 unsigned int num_rel;
10515 if (off + 0x8000 < 0x10000)
10516 num_rel = 1;
10517 else if (off + 0x80008000ULL < 0x100000000ULL)
10518 num_rel = 2;
10519 else
10520 {
10521 num_rel = 1;
10522 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10523 && ((off >> 32) & 0xffff) != 0)
10524 num_rel += 1;
10525 if (PPC_HI (off) != 0)
10526 num_rel += 1;
10527 if (PPC_LO (off) != 0)
10528 num_rel += 1;
10529 }
10530 return num_rel;
10531}
10532
10533static Elf_Internal_Rela *
10534emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10535 bfd_vma roff, bfd_vma targ, bfd_vma off)
10536{
10537 bfd_vma relative_targ = targ - (roff - 8);
10538 if (bfd_big_endian (info->output_bfd))
10539 roff += 2;
10540 r->r_offset = roff;
10541 r->r_addend = relative_targ + roff;
10542 if (off + 0x8000 < 0x10000)
10543 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10544 else if (off + 0x80008000ULL < 0x100000000ULL)
10545 {
10546 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10547 ++r;
10548 roff += 4;
10549 r->r_offset = roff;
10550 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10551 r->r_addend = relative_targ + roff;
10552 }
10553 else
10554 {
10555 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10556 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10557 else
10558 {
10559 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10560 if (((off >> 32) & 0xffff) != 0)
10561 {
10562 ++r;
10563 roff += 4;
10564 r->r_offset = roff;
10565 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10566 r->r_addend = relative_targ + roff;
10567 }
10568 }
10569 if (((off >> 32) & 0xffffffffULL) != 0)
10570 roff += 4;
10571 if (PPC_HI (off) != 0)
10572 {
10573 ++r;
10574 roff += 4;
10575 r->r_offset = roff;
10576 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10577 r->r_addend = relative_targ + roff;
10578 }
10579 if (PPC_LO (off) != 0)
10580 {
10581 ++r;
10582 roff += 4;
10583 r->r_offset = roff;
10584 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10585 r->r_addend = relative_targ + roff;
10586 }
10587 }
10588 return r;
10589}
10590
04bdff6a
AM
10591static bfd_byte *
10592build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10593 bfd_boolean load)
10594{
10595 uint64_t insn;
10596 if (off - odd + (1ULL << 33) < 1ULL << 34)
10597 {
10598 off -= odd;
10599 if (odd)
10600 {
10601 bfd_put_32 (abfd, NOP, p);
10602 p += 4;
10603 }
10604 if (load)
10605 insn = PLD_R12_PC;
10606 else
10607 insn = PADDI_R12_PC;
10608 insn |= D34 (off);
10609 bfd_put_32 (abfd, insn >> 32, p);
10610 p += 4;
10611 bfd_put_32 (abfd, insn, p);
10612 }
10613 /* The minimum value for paddi is -0x200000000. The minimum value
10614 for li is -0x8000, which when shifted by 34 and added gives a
10615 minimum value of -0x2000200000000. The maximum value is
10616 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10617 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10618 {
10619 off -= 8 - odd;
10620 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10621 p += 4;
10622 if (!odd)
10623 {
10624 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10625 p += 4;
10626 }
10627 insn = PADDI_R12_PC | D34 (off);
10628 bfd_put_32 (abfd, insn >> 32, p);
10629 p += 4;
10630 bfd_put_32 (abfd, insn, p);
10631 p += 4;
10632 if (odd)
10633 {
10634 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10635 p += 4;
10636 }
10637 if (load)
10638 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10639 else
10640 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10641 }
10642 else
10643 {
10644 off -= odd + 8;
10645 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10646 p += 4;
10647 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10648 p += 4;
10649 if (odd)
10650 {
10651 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10652 p += 4;
10653 }
10654 insn = PADDI_R12_PC | D34 (off);
10655 bfd_put_32 (abfd, insn >> 32, p);
10656 p += 4;
10657 bfd_put_32 (abfd, insn, p);
10658 p += 4;
10659 if (!odd)
10660 {
10661 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10662 p += 4;
10663 }
10664 if (load)
10665 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10666 else
10667 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10668 }
10669 p += 4;
10670 return p;
10671}
10672
10673static unsigned int
10674size_powerxx_offset (bfd_vma off, int odd)
10675{
10676 if (off - odd + (1ULL << 33) < 1ULL << 34)
10677 return odd + 8;
10678 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10679 return 20;
10680 else
10681 return 24;
10682}
10683
10684static unsigned int
10685num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10686{
10687 if (off - odd + (1ULL << 33) < 1ULL << 34)
10688 return 1;
10689 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10690 return 2;
10691 else
10692 return 3;
10693}
10694
10695static Elf_Internal_Rela *
10696emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10697 Elf_Internal_Rela *r, bfd_vma roff,
10698 bfd_vma targ, bfd_vma off, int odd)
10699{
10700 if (off - odd + (1ULL << 33) < 1ULL << 34)
10701 roff += odd;
10702 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10703 {
10704 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10705 r->r_offset = roff + d_offset;
10706 r->r_addend = targ + 8 - odd - d_offset;
10707 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10708 ++r;
10709 roff += 8 - odd;
10710 }
10711 else
10712 {
10713 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10714 r->r_offset = roff + d_offset;
10715 r->r_addend = targ + 8 + odd - d_offset;
10716 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10717 ++r;
10718 roff += 4;
10719 r->r_offset = roff + d_offset;
10720 r->r_addend = targ + 4 + odd - d_offset;
10721 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10722 ++r;
10723 roff += 4 + odd;
10724 }
10725 r->r_offset = roff;
10726 r->r_addend = targ;
10727 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10728 return r;
10729}
10730
df136d64
AM
10731/* Emit .eh_frame opcode to advance pc by DELTA. */
10732
10733static bfd_byte *
10734eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10735{
10736 delta /= 4;
10737 if (delta < 64)
10738 *eh++ = DW_CFA_advance_loc + delta;
10739 else if (delta < 256)
10740 {
10741 *eh++ = DW_CFA_advance_loc1;
10742 *eh++ = delta;
10743 }
10744 else if (delta < 65536)
10745 {
10746 *eh++ = DW_CFA_advance_loc2;
10747 bfd_put_16 (abfd, delta, eh);
10748 eh += 2;
10749 }
10750 else
10751 {
10752 *eh++ = DW_CFA_advance_loc4;
10753 bfd_put_32 (abfd, delta, eh);
10754 eh += 4;
10755 }
10756 return eh;
10757}
10758
10759/* Size of required .eh_frame opcode to advance pc by DELTA. */
10760
10761static unsigned int
10762eh_advance_size (unsigned int delta)
10763{
10764 if (delta < 64 * 4)
10765 /* DW_CFA_advance_loc+[1..63]. */
10766 return 1;
10767 if (delta < 256 * 4)
10768 /* DW_CFA_advance_loc1, byte. */
10769 return 2;
10770 if (delta < 65536 * 4)
10771 /* DW_CFA_advance_loc2, 2 bytes. */
10772 return 3;
10773 /* DW_CFA_advance_loc4, 4 bytes. */
10774 return 5;
10775}
10776
794e51c0
AM
10777/* With power7 weakly ordered memory model, it is possible for ld.so
10778 to update a plt entry in one thread and have another thread see a
10779 stale zero toc entry. To avoid this we need some sort of acquire
10780 barrier in the call stub. One solution is to make the load of the
10781 toc word seem to appear to depend on the load of the function entry
10782 word. Another solution is to test for r2 being zero, and branch to
10783 the appropriate glink entry if so.
10784
10785 . fake dep barrier compare
71a39c98
AM
10786 . ld 12,xxx(2) ld 12,xxx(2)
10787 . mtctr 12 mtctr 12
10788 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10789 . add 2,2,11 cmpldi 2,0
10790 . ld 2,xxx+8(2) bnectr+
10791 . bctr b <glink_entry>
10792
10793 The solution involving the compare turns out to be faster, so
10794 that's what we use unless the branch won't reach. */
10795
10796#define ALWAYS_USE_FAKE_DEP 0
10797#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10798
794e51c0
AM
10799static inline unsigned int
10800plt_stub_size (struct ppc_link_hash_table *htab,
10801 struct ppc_stub_hash_entry *stub_entry,
10802 bfd_vma off)
10803{
05d0e962 10804 unsigned size;
b9e5796b 10805
05d0e962
AM
10806 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10807 {
04bdff6a
AM
10808 if (htab->powerxx_stubs)
10809 {
10810 bfd_vma start = (stub_entry->stub_offset
10811 + stub_entry->group->stub_sec->output_offset
10812 + stub_entry->group->stub_sec->output_section->vma);
10813 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10814 start += 4;
10815 size = 8 + size_powerxx_offset (off, start & 4);
10816 }
10817 else
10818 size = 8 + size_offset (off - 8);
05d0e962
AM
10819 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10820 size += 4;
10821 return size;
10822 }
10823
10824 size = 12;
b9e5796b
AM
10825 if (ALWAYS_EMIT_R2SAVE
10826 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10827 size += 4;
10828 if (PPC_HA (off) != 0)
794e51c0 10829 size += 4;
b9e5796b
AM
10830 if (htab->opd_abi)
10831 {
10832 size += 4;
e7d1c40c 10833 if (htab->params->plt_static_chain)
b9e5796b 10834 size += 4;
bd4d2eaa
AM
10835 if (htab->params->plt_thread_safe
10836 && htab->elf.dynamic_sections_created
10837 && stub_entry->h != NULL
10838 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10839 size += 8;
e7d1c40c 10840 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10841 size += 4;
10842 }
794e51c0 10843 if (stub_entry->h != NULL
ed7007c1 10844 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10845 && htab->params->tls_get_addr_opt)
f378ab09 10846 {
9e7028aa
AM
10847 if (htab->params->no_tls_get_addr_regsave)
10848 {
10849 size += 7 * 4;
10850 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10851 size += 6 * 4;
10852 }
10853 else
10854 {
10855 size += 30 * 4;
10856 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10857 size += 4;
10858 }
f378ab09 10859 }
794e51c0
AM
10860 return size;
10861}
10862
2420fff6
AM
10863/* Depending on the sign of plt_stub_align:
10864 If positive, return the padding to align to a 2**plt_stub_align
10865 boundary.
10866 If negative, if this stub would cross fewer 2**plt_stub_align
10867 boundaries if we align, then return the padding needed to do so. */
10868
794e51c0
AM
10869static inline unsigned int
10870plt_stub_pad (struct ppc_link_hash_table *htab,
10871 struct ppc_stub_hash_entry *stub_entry,
10872 bfd_vma plt_off)
10873{
2420fff6 10874 int stub_align;
1aa42141 10875 unsigned stub_size;
6f20ed8a 10876 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10877
2420fff6
AM
10878 if (htab->params->plt_stub_align >= 0)
10879 {
10880 stub_align = 1 << htab->params->plt_stub_align;
10881 if ((stub_off & (stub_align - 1)) != 0)
10882 return stub_align - (stub_off & (stub_align - 1));
10883 return 0;
10884 }
10885
10886 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10887 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10888 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10889 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10890 return stub_align - (stub_off & (stub_align - 1));
10891 return 0;
10892}
10893
10894/* Build a .plt call stub. */
10895
10896static inline bfd_byte *
10897build_plt_stub (struct ppc_link_hash_table *htab,
10898 struct ppc_stub_hash_entry *stub_entry,
10899 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10900{
e7d1c40c 10901 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10902 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10903 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10904 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10905 && htab->elf.dynamic_sections_created
10906 && stub_entry->h != NULL
10907 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10908 bfd_boolean use_fake_dep = plt_thread_safe;
10909 bfd_vma cmp_branch_off = 0;
10910
10911 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10912 && plt_load_toc
794e51c0 10913 && plt_thread_safe
ed7007c1 10914 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10915 && htab->params->tls_get_addr_opt))
794e51c0
AM
10916 {
10917 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10918 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10919 / PLT_ENTRY_SIZE (htab));
9e390558 10920 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10921 bfd_vma to, from;
10922
68d62958
AM
10923 if (pltindex > 32768)
10924 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10925 to = (glinkoff
10926 + htab->glink->output_offset
10927 + htab->glink->output_section->vma);
6f20ed8a 10928 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10929 + 4 * (ALWAYS_EMIT_R2SAVE
10930 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10931 + 4 * (PPC_HA (offset) != 0)
10932 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10933 != PPC_HA (offset))
10934 + 4 * (plt_static_chain != 0)
10935 + 20
6f20ed8a
AM
10936 + stub_entry->group->stub_sec->output_offset
10937 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10938 cmp_branch_off = to - from;
10939 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10940 }
10941
ac2df442
AM
10942 if (PPC_HA (offset) != 0)
10943 {
176a0d42
AM
10944 if (r != NULL)
10945 {
794e51c0
AM
10946 if (ALWAYS_EMIT_R2SAVE
10947 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10948 r[0].r_offset += 4;
176a0d42 10949 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10950 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10951 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10952 r[1].r_addend = r[0].r_addend;
b9e5796b 10953 if (plt_load_toc)
176a0d42 10954 {
b9e5796b 10955 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10956 {
b9e5796b
AM
10957 r[2].r_offset = r[1].r_offset + 4;
10958 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10959 r[2].r_addend = r[0].r_addend;
10960 }
10961 else
10962 {
10963 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10964 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10965 r[2].r_addend = r[0].r_addend + 8;
10966 if (plt_static_chain)
10967 {
10968 r[3].r_offset = r[2].r_offset + 4;
10969 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10970 r[3].r_addend = r[0].r_addend + 16;
10971 }
c7131b65 10972 }
176a0d42
AM
10973 }
10974 }
794e51c0
AM
10975 if (ALWAYS_EMIT_R2SAVE
10976 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10977 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10978 if (plt_load_toc)
10979 {
10980 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10981 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10982 }
10983 else
10984 {
10985 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10986 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10987 }
b9e5796b
AM
10988 if (plt_load_toc
10989 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10990 {
71a39c98 10991 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10992 offset = 0;
10993 }
71a39c98 10994 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10995 if (plt_load_toc)
794e51c0 10996 {
b9e5796b
AM
10997 if (use_fake_dep)
10998 {
10999 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
11000 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
11001 }
11002 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
11003 if (plt_static_chain)
11004 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 11005 }
ac2df442
AM
11006 }
11007 else
11008 {
176a0d42
AM
11009 if (r != NULL)
11010 {
794e51c0
AM
11011 if (ALWAYS_EMIT_R2SAVE
11012 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11013 r[0].r_offset += 4;
176a0d42 11014 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 11015 if (plt_load_toc)
176a0d42 11016 {
b9e5796b 11017 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 11018 {
b9e5796b
AM
11019 r[1].r_offset = r[0].r_offset + 4;
11020 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11021 r[1].r_addend = r[0].r_addend;
11022 }
11023 else
11024 {
11025 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11026 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11027 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11028 if (plt_static_chain)
11029 {
11030 r[2].r_offset = r[1].r_offset + 4;
11031 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11032 r[2].r_addend = r[0].r_addend + 8;
11033 }
c7131b65 11034 }
176a0d42
AM
11035 }
11036 }
794e51c0
AM
11037 if (ALWAYS_EMIT_R2SAVE
11038 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11039 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 11040 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
11041 if (plt_load_toc
11042 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
11043 {
11044 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11045 offset = 0;
11046 }
71a39c98 11047 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11048 if (plt_load_toc)
794e51c0 11049 {
b9e5796b
AM
11050 if (use_fake_dep)
11051 {
11052 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11053 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11054 }
11055 if (plt_static_chain)
11056 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11057 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11058 }
ac2df442 11059 }
b9e5796b 11060 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11061 {
11062 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11063 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11064 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11065 }
11066 else
407aa07c 11067 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11068 return p;
11069}
11070
a7f2871e
AM
11071/* Build a special .plt call stub for __tls_get_addr. */
11072
b9ca1af6 11073#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11074#define LD_R12_0R3 0xe9830000
11075#define MR_R0_R3 0x7c601b78
b9ca1af6 11076#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11077#define ADD_R3_R12_R13 0x7c6c6a14
11078#define BEQLR 0x4d820020
11079#define MR_R3_R0 0x7c030378
a7f2871e 11080#define BCTRL 0x4e800421
a7f2871e
AM
11081
11082static inline bfd_byte *
794e51c0
AM
11083build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11084 struct ppc_stub_hash_entry *stub_entry,
11085 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11086{
e7d1c40c 11087 bfd *obfd = htab->params->stub_bfd;
df136d64 11088 bfd_byte *loc = p;
9e7028aa 11089 unsigned int i;
794e51c0 11090
b9ca1af6 11091 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11092 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11093 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11094 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11095 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11096 bfd_put_32 (obfd, BEQLR, p), p += 4;
11097 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa
AM
11098 if (htab->params->no_tls_get_addr_regsave)
11099 {
11100 if (r != NULL)
11101 r[0].r_offset += 7 * 4;
11102 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11103 return build_plt_stub (htab, stub_entry, p, offset, r);
11104
11105 bfd_put_32 (obfd, MFLR_R0, p);
11106 p += 4;
11107 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11108 p += 4;
11109
11110 if (r != NULL)
11111 r[0].r_offset += 2 * 4;
11112 p = build_plt_stub (htab, stub_entry, p, offset, r);
11113 bfd_put_32 (obfd, BCTRL, p - 4);
11114
11115 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11116 p += 4;
11117 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11118 p += 4;
11119 bfd_put_32 (obfd, MTLR_R0, p);
11120 p += 4;
11121 bfd_put_32 (obfd, BLR, p);
11122 p += 4;
11123 }
11124 else
11125 {
11126 p = tls_get_addr_prologue (obfd, p, htab);
f378ab09 11127
9e7028aa
AM
11128 if (r != NULL)
11129 r[0].r_offset += 18 * 4;
a7f2871e 11130
9e7028aa
AM
11131 p = build_plt_stub (htab, stub_entry, p, offset, r);
11132 bfd_put_32 (obfd, BCTRL, p - 4);
11133
11134 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11135 {
11136 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11137 p += 4;
11138 }
a7f2871e 11139
9e7028aa
AM
11140 p = tls_get_addr_epilogue (obfd, p, htab);
11141 }
a7f2871e 11142
df136d64
AM
11143 if (htab->glink_eh_frame != NULL
11144 && htab->glink_eh_frame->size != 0)
11145 {
11146 bfd_byte *base, *eh;
df136d64
AM
11147
11148 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11149 eh = base + stub_entry->group->eh_size;
9e7028aa
AM
11150 if (htab->params->no_tls_get_addr_regsave)
11151 {
11152 unsigned int lr_used, delta;
11153 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11154 delta = lr_used - stub_entry->group->lr_restore;
11155 stub_entry->group->lr_restore = lr_used + 16;
11156 eh = eh_advance (htab->elf.dynobj, eh, delta);
11157 *eh++ = DW_CFA_offset_extended_sf;
11158 *eh++ = 65;
11159 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11160 *eh++ = DW_CFA_advance_loc + 4;
11161 }
11162 else
11163 {
11164 unsigned int cfa_updt, delta;
11165 /* After the bctrl, lr has been modified so we need to emit
11166 .eh_frame info saying the return address is on the stack. In
11167 fact we must put the EH info at or before the call rather
11168 than after it, because the EH info for a call needs to be
11169 specified by that point.
11170 See libgcc/unwind-dw2.c execute_cfa_program.
11171 Any stack pointer update must be described immediately after
11172 the instruction making the change, and since the stdu occurs
11173 after saving regs we put all the reg saves and the cfa
11174 change there. */
11175 cfa_updt = stub_entry->stub_offset + 18 * 4;
11176 delta = cfa_updt - stub_entry->group->lr_restore;
11177 stub_entry->group->lr_restore
11178 = stub_entry->stub_offset + (p - loc) - 4;
11179 eh = eh_advance (htab->elf.dynobj, eh, delta);
11180 *eh++ = DW_CFA_def_cfa_offset;
11181 if (htab->opd_abi)
11182 {
11183 *eh++ = 128;
11184 *eh++ = 1;
11185 }
11186 else
11187 *eh++ = 96;
11188 *eh++ = DW_CFA_offset_extended_sf;
11189 *eh++ = 65;
11190 *eh++ = (-16 / 8) & 0x7f;
11191 for (i = 4; i < 12; i++)
11192 {
11193 *eh++ = DW_CFA_offset + i;
11194 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11195 }
11196 *eh++ = (DW_CFA_advance_loc
11197 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11198 *eh++ = DW_CFA_def_cfa_offset;
11199 *eh++ = 0;
11200 for (i = 4; i < 12; i++)
11201 *eh++ = DW_CFA_restore + i;
11202 *eh++ = DW_CFA_advance_loc + 2;
11203 }
df136d64
AM
11204 *eh++ = DW_CFA_restore_extended;
11205 *eh++ = 65;
11206 stub_entry->group->eh_size = eh - base;
11207 }
a7f2871e
AM
11208 return p;
11209}
11210
176a0d42
AM
11211static Elf_Internal_Rela *
11212get_relocs (asection *sec, int count)
11213{
11214 Elf_Internal_Rela *relocs;
11215 struct bfd_elf_section_data *elfsec_data;
11216
11217 elfsec_data = elf_section_data (sec);
11218 relocs = elfsec_data->relocs;
11219 if (relocs == NULL)
11220 {
11221 bfd_size_type relsize;
11222 relsize = sec->reloc_count * sizeof (*relocs);
11223 relocs = bfd_alloc (sec->owner, relsize);
11224 if (relocs == NULL)
11225 return NULL;
11226 elfsec_data->relocs = relocs;
d4730f92
BS
11227 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11228 sizeof (Elf_Internal_Shdr));
11229 if (elfsec_data->rela.hdr == NULL)
11230 return NULL;
11231 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11232 * sizeof (Elf64_External_Rela));
11233 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11234 sec->reloc_count = 0;
11235 }
11236 relocs += sec->reloc_count;
11237 sec->reloc_count += count;
11238 return relocs;
11239}
11240
3d58e1fc
AM
11241/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11242 forms, to the equivalent relocs against the global symbol given by
11243 STUB_ENTRY->H. */
11244
11245static bfd_boolean
11246use_global_in_relocs (struct ppc_link_hash_table *htab,
11247 struct ppc_stub_hash_entry *stub_entry,
11248 Elf_Internal_Rela *r, unsigned int num_rel)
11249{
11250 struct elf_link_hash_entry **hashes;
11251 unsigned long symndx;
11252 struct ppc_link_hash_entry *h;
11253 bfd_vma symval;
11254
11255 /* Relocs are always against symbols in their own object file. Fake
11256 up global sym hashes for the stub bfd (which has no symbols). */
11257 hashes = elf_sym_hashes (htab->params->stub_bfd);
11258 if (hashes == NULL)
11259 {
11260 bfd_size_type hsize;
11261
11262 /* When called the first time, stub_globals will contain the
11263 total number of symbols seen during stub sizing. After
11264 allocating, stub_globals is used as an index to fill the
11265 hashes array. */
11266 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11267 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11268 if (hashes == NULL)
11269 return FALSE;
11270 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11271 htab->stub_globals = 1;
11272 }
11273 symndx = htab->stub_globals++;
11274 h = stub_entry->h;
11275 hashes[symndx] = &h->elf;
11276 if (h->oh != NULL && h->oh->is_func)
11277 h = ppc_follow_link (h->oh);
11278 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11279 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11280 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11281 while (num_rel-- != 0)
11282 {
11283 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11284 if (h->elf.root.u.def.section != stub_entry->target_section)
11285 {
11286 /* H is an opd symbol. The addend must be zero, and the
11287 branch reloc is the only one we can convert. */
11288 r->r_addend = 0;
11289 break;
11290 }
11291 else
11292 r->r_addend -= symval;
11293 --r;
11294 }
11295 return TRUE;
11296}
11297
aa374f67 11298static bfd_vma
25f53a85 11299get_r2off (struct bfd_link_info *info,
aa374f67
AM
11300 struct ppc_stub_hash_entry *stub_entry)
11301{
25f53a85 11302 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11303 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11304
11305 if (r2off == 0)
11306 {
11307 /* Support linking -R objects. Get the toc pointer from the
11308 opd entry. */
11309 char buf[8];
b9e5796b
AM
11310 if (!htab->opd_abi)
11311 return r2off;
aa374f67
AM
11312 asection *opd = stub_entry->h->elf.root.u.def.section;
11313 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11314
11315 if (strcmp (opd->name, ".opd") != 0
11316 || opd->reloc_count != 0)
11317 {
2cdcc330
AM
11318 info->callbacks->einfo
11319 (_("%P: cannot find opd entry toc for `%pT'\n"),
11320 stub_entry->h->elf.root.root.string);
aa374f67 11321 bfd_set_error (bfd_error_bad_value);
a7c49797 11322 return (bfd_vma) -1;
aa374f67
AM
11323 }
11324 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11325 return (bfd_vma) -1;
aa374f67 11326 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11327 r2off -= elf_gp (info->output_bfd);
aa374f67 11328 }
6f20ed8a 11329 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11330 return r2off;
11331}
11332
b34976b6 11333static bfd_boolean
4ce794b7 11334ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11335{
721956f4
AM
11336 struct ppc_stub_hash_entry *stub_entry;
11337 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11338 struct bfd_link_info *info;
11339 struct ppc_link_hash_table *htab;
721956f4 11340 bfd_byte *loc;
3d58e1fc 11341 bfd_byte *p, *relp;
1aa42141 11342 bfd_vma targ, off;
176a0d42 11343 Elf_Internal_Rela *r;
e054468f 11344 asection *plt;
3d58e1fc 11345 int num_rel;
04bdff6a 11346 int odd;
5d1634d7 11347
721956f4
AM
11348 /* Massage our args to the form they really have. */
11349 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11350 info = in_arg;
5d1634d7 11351
5d1634d7 11352 htab = ppc_hash_table (info);
4dfe6ac6
NC
11353 if (htab == NULL)
11354 return FALSE;
5d1634d7 11355
1aa42141 11356 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11357 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11358
4ce794b7 11359 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11360 switch (stub_entry->stub_type)
5d1634d7 11361 {
721956f4 11362 case ppc_stub_long_branch:
ad8e1ba5 11363 case ppc_stub_long_branch_r2off:
721956f4 11364 /* Branches are relative. This is where we are going to. */
1aa42141 11365 targ = (stub_entry->target_value
6911b7dc
AM
11366 + stub_entry->target_section->output_offset
11367 + stub_entry->target_section->output_section->vma);
1aa42141 11368 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11369
721956f4 11370 /* And this is where we are coming from. */
1aa42141
AM
11371 off = (stub_entry->stub_offset
11372 + stub_entry->group->stub_sec->output_offset
11373 + stub_entry->group->stub_sec->output_section->vma);
11374 off = targ - off;
e86ce104 11375
9e390558 11376 p = loc;
ac2df442 11377 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11378 {
25f53a85 11379 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11380
a7c49797 11381 if (r2off == (bfd_vma) -1)
aa374f67
AM
11382 {
11383 htab->stub_error = TRUE;
11384 return FALSE;
11385 }
9e390558
AM
11386 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11387 p += 4;
ac2df442
AM
11388 if (PPC_HA (r2off) != 0)
11389 {
e7d1c40c 11390 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11391 ADDIS_R2_R2 | PPC_HA (r2off), p);
11392 p += 4;
a7c49797
AM
11393 }
11394 if (PPC_LO (r2off) != 0)
11395 {
11396 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11397 ADDI_R2_R2 | PPC_LO (r2off), p);
11398 p += 4;
ac2df442 11399 }
9e390558 11400 off -= p - loc;
ad8e1ba5 11401 }
9e390558
AM
11402 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11403 p += 4;
ad8e1ba5 11404
5c3dead3
AM
11405 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11406 {
cf97bcb0
AM
11407 _bfd_error_handler
11408 (_("long branch stub `%s' offset overflow"),
bc30df16 11409 stub_entry->root.string);
5c3dead3
AM
11410 htab->stub_error = TRUE;
11411 return FALSE;
11412 }
ee75fd95
AM
11413
11414 if (info->emitrelocations)
11415 {
6f20ed8a 11416 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11417 if (r == NULL)
11418 return FALSE;
9e390558 11419 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11420 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11421 r->r_addend = targ;
3d58e1fc
AM
11422 if (stub_entry->h != NULL
11423 && !use_global_in_relocs (htab, stub_entry, r, 1))
11424 return FALSE;
ee75fd95 11425 }
721956f4 11426 break;
e86ce104 11427
721956f4 11428 case ppc_stub_plt_branch:
ad8e1ba5 11429 case ppc_stub_plt_branch_r2off:
721956f4
AM
11430 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11431 stub_entry->root.string + 9,
b34976b6 11432 FALSE, FALSE);
721956f4
AM
11433 if (br_entry == NULL)
11434 {
cf97bcb0
AM
11435 _bfd_error_handler (_("can't find branch stub `%s'"),
11436 stub_entry->root.string);
b34976b6
AM
11437 htab->stub_error = TRUE;
11438 return FALSE;
721956f4
AM
11439 }
11440
1aa42141 11441 targ = (stub_entry->target_value
176a0d42
AM
11442 + stub_entry->target_section->output_offset
11443 + stub_entry->target_section->output_section->vma);
6911b7dc 11444 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11445 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11446
1aa42141 11447 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11448 htab->brlt->contents + br_entry->offset);
721956f4 11449
f94498ff 11450 if (br_entry->iter == htab->stub_iteration)
721956f4 11451 {
f94498ff 11452 br_entry->iter = 0;
84f5d08e 11453
f94498ff 11454 if (htab->relbrlt != NULL)
84f5d08e 11455 {
f94498ff
AM
11456 /* Create a reloc for the branch lookup table entry. */
11457 Elf_Internal_Rela rela;
11458 bfd_byte *rl;
11459
11460 rela.r_offset = (br_entry->offset
11461 + htab->brlt->output_offset
11462 + htab->brlt->output_section->vma);
11463 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11464 rela.r_addend = targ;
f94498ff
AM
11465
11466 rl = htab->relbrlt->contents;
11467 rl += (htab->relbrlt->reloc_count++
11468 * sizeof (Elf64_External_Rela));
11469 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11470 }
11471 else if (info->emitrelocations)
11472 {
176a0d42
AM
11473 r = get_relocs (htab->brlt, 1);
11474 if (r == NULL)
11475 return FALSE;
11476 /* brlt, being SEC_LINKER_CREATED does not go through the
11477 normal reloc processing. Symbols and offsets are not
11478 translated from input file to output file form, so
11479 set up the offset per the output file. */
f94498ff
AM
11480 r->r_offset = (br_entry->offset
11481 + htab->brlt->output_offset
11482 + htab->brlt->output_section->vma);
11483 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11484 r->r_addend = targ;
84f5d08e 11485 }
84f5d08e 11486 }
721956f4 11487
1aa42141 11488 targ = (br_entry->offset
176a0d42
AM
11489 + htab->brlt->output_offset
11490 + htab->brlt->output_section->vma);
11491
1aa42141
AM
11492 off = (elf_gp (info->output_bfd)
11493 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11494 off = targ - off;
721956f4 11495
ad8e1ba5 11496 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11497 {
25f53a85 11498 info->callbacks->einfo
c1c8c1ef 11499 (_("%P: linkage table error against `%pT'\n"),
721956f4 11500 stub_entry->root.string);
5d1634d7 11501 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11502 htab->stub_error = TRUE;
11503 return FALSE;
5d1634d7 11504 }
41bd81ab 11505
176a0d42
AM
11506 if (info->emitrelocations)
11507 {
6f20ed8a 11508 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11509 if (r == NULL)
11510 return FALSE;
6f20ed8a 11511 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11512 if (bfd_big_endian (info->output_bfd))
11513 r[0].r_offset += 2;
00f412ee 11514 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11515 r[0].r_offset += 4;
11516 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11517 r[0].r_addend = targ;
176a0d42
AM
11518 if (PPC_HA (off) != 0)
11519 {
11520 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11521 r[1].r_offset = r[0].r_offset + 4;
11522 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11523 r[1].r_addend = r[0].r_addend;
11524 }
11525 }
11526
9e390558 11527 p = loc;
00f412ee 11528 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11529 {
176a0d42 11530 if (PPC_HA (off) != 0)
ac2df442 11531 {
e7d1c40c 11532 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11533 ADDIS_R12_R2 | PPC_HA (off), p);
11534 p += 4;
e7d1c40c 11535 bfd_put_32 (htab->params->stub_bfd,
9e390558 11536 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11537 }
11538 else
9e390558
AM
11539 bfd_put_32 (htab->params->stub_bfd,
11540 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11541 }
11542 else
11543 {
25f53a85 11544 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11545
a7c49797 11546 if (r2off == (bfd_vma) -1)
aa374f67
AM
11547 {
11548 htab->stub_error = TRUE;
11549 return FALSE;
11550 }
ad8e1ba5 11551
9e390558
AM
11552 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11553 p += 4;
176a0d42 11554 if (PPC_HA (off) != 0)
ac2df442 11555 {
e7d1c40c 11556 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11557 ADDIS_R12_R2 | PPC_HA (off), p);
11558 p += 4;
e7d1c40c 11559 bfd_put_32 (htab->params->stub_bfd,
9e390558 11560 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11561 }
11562 else
9e390558 11563 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11564
11565 if (PPC_HA (r2off) != 0)
11566 {
9e390558 11567 p += 4;
e7d1c40c 11568 bfd_put_32 (htab->params->stub_bfd,
9e390558 11569 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11570 }
11571 if (PPC_LO (r2off) != 0)
11572 {
9e390558 11573 p += 4;
e7d1c40c 11574 bfd_put_32 (htab->params->stub_bfd,
9e390558 11575 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11576 }
ad8e1ba5 11577 }
9e390558
AM
11578 p += 4;
11579 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11580 p += 4;
407aa07c
AM
11581 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11582 p += 4;
721956f4 11583 break;
5d1634d7 11584
05d0e962
AM
11585 case ppc_stub_long_branch_notoc:
11586 case ppc_stub_long_branch_both:
11587 case ppc_stub_plt_branch_notoc:
11588 case ppc_stub_plt_branch_both:
11589 case ppc_stub_plt_call_notoc:
11590 case ppc_stub_plt_call_both:
11591 p = loc;
f891966f 11592 off = (stub_entry->stub_offset
05d0e962
AM
11593 + stub_entry->group->stub_sec->output_offset
11594 + stub_entry->group->stub_sec->output_section->vma);
11595 if (stub_entry->stub_type == ppc_stub_long_branch_both
11596 || stub_entry->stub_type == ppc_stub_plt_branch_both
11597 || stub_entry->stub_type == ppc_stub_plt_call_both)
11598 {
11599 off += 4;
11600 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11601 p += 4;
11602 }
11603 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11604 {
11605 targ = stub_entry->plt_ent->plt.offset & ~1;
11606 if (targ >= (bfd_vma) -2)
11607 abort ();
11608
11609 plt = htab->elf.splt;
11610 if (!htab->elf.dynamic_sections_created
11611 || stub_entry->h == NULL
11612 || stub_entry->h->elf.dynindx == -1)
11613 {
11614 if (stub_entry->symtype == STT_GNU_IFUNC)
11615 plt = htab->elf.iplt;
11616 else
11617 plt = htab->pltlocal;
11618 }
11619 targ += plt->output_offset + plt->output_section->vma;
11620 }
11621 else
11622 targ = (stub_entry->target_value
11623 + stub_entry->target_section->output_offset
11624 + stub_entry->target_section->output_section->vma);
04bdff6a 11625 odd = off & 4;
05d0e962 11626 off = targ - off;
f891966f 11627
3d58e1fc
AM
11628 relp = p;
11629 num_rel = 0;
04bdff6a
AM
11630 if (htab->powerxx_stubs)
11631 {
11632 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11633 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11634 }
11635 else
11636 {
11637 /* The notoc stubs calculate their target (either a PLT entry or
11638 the global entry point of a function) relative to the PC
11639 returned by the "bcl" two instructions past the start of the
11640 sequence emitted by build_offset. The offset is therefore 8
11641 less than calculated from the start of the sequence. */
11642 off -= 8;
11643 p = build_offset (htab->params->stub_bfd, p, off,
11644 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11645 }
11646
f891966f 11647 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11648 {
f891966f 11649 bfd_vma from;
3d58e1fc 11650 num_rel = 1;
f891966f
AM
11651 from = (stub_entry->stub_offset
11652 + stub_entry->group->stub_sec->output_offset
11653 + stub_entry->group->stub_sec->output_section->vma
11654 + (p - loc));
05d0e962 11655 bfd_put_32 (htab->params->stub_bfd,
f891966f 11656 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11657 }
11658 else
11659 {
11660 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11661 p += 4;
11662 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11663 }
11664 p += 4;
df136d64 11665
3d58e1fc
AM
11666 if (info->emitrelocations)
11667 {
04bdff6a
AM
11668 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11669 if (htab->powerxx_stubs)
11670 num_rel += num_relocs_for_powerxx_offset (off, odd);
11671 else
11672 {
11673 num_rel += num_relocs_for_offset (off);
11674 roff += 16;
11675 }
3d58e1fc
AM
11676 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11677 if (r == NULL)
11678 return FALSE;
04bdff6a
AM
11679 if (htab->powerxx_stubs)
11680 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11681 else
11682 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11683 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11684 || stub_entry->stub_type == ppc_stub_long_branch_both)
11685 {
11686 ++r;
11687 roff = p - 4 - stub_entry->group->stub_sec->contents;
11688 r->r_offset = roff;
11689 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11690 r->r_addend = targ;
11691 if (stub_entry->h != NULL
11692 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11693 return FALSE;
11694 }
11695 }
11696
04bdff6a
AM
11697 if (!htab->powerxx_stubs
11698 && htab->glink_eh_frame != NULL
11699 && htab->glink_eh_frame->size != 0)
df136d64
AM
11700 {
11701 bfd_byte *base, *eh;
11702 unsigned int lr_used, delta;
11703
11704 base = (htab->glink_eh_frame->contents
11705 + stub_entry->group->eh_base + 17);
11706 eh = base + stub_entry->group->eh_size;
11707 lr_used = stub_entry->stub_offset + 8;
11708 if (stub_entry->stub_type == ppc_stub_long_branch_both
11709 || stub_entry->stub_type == ppc_stub_plt_branch_both
11710 || stub_entry->stub_type == ppc_stub_plt_call_both)
11711 lr_used += 4;
11712 delta = lr_used - stub_entry->group->lr_restore;
11713 stub_entry->group->lr_restore = lr_used + 8;
11714 eh = eh_advance (htab->elf.dynobj, eh, delta);
11715 *eh++ = DW_CFA_register;
11716 *eh++ = 65;
11717 *eh++ = 12;
11718 *eh++ = DW_CFA_advance_loc + 2;
11719 *eh++ = DW_CFA_restore_extended;
11720 *eh++ = 65;
11721 stub_entry->group->eh_size = eh - base;
11722 }
05d0e962
AM
11723 break;
11724
721956f4 11725 case ppc_stub_plt_call:
794e51c0 11726 case ppc_stub_plt_call_r2save:
e054468f 11727 if (stub_entry->h != NULL
b31867b6
AM
11728 && stub_entry->h->is_func_descriptor
11729 && stub_entry->h->oh != NULL)
c862ae31 11730 {
b31867b6
AM
11731 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11732
11733 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11734 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11735 if (fh->elf.root.type == bfd_link_hash_undefined
11736 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11737 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11738 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11739 }
11740
721956f4 11741 /* Now build the stub. */
1aa42141
AM
11742 targ = stub_entry->plt_ent->plt.offset & ~1;
11743 if (targ >= (bfd_vma) -2)
721956f4
AM
11744 abort ();
11745
33e44f2e 11746 plt = htab->elf.splt;
25f23106
AM
11747 if (!htab->elf.dynamic_sections_created
11748 || stub_entry->h == NULL
11749 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11750 {
11751 if (stub_entry->symtype == STT_GNU_IFUNC)
11752 plt = htab->elf.iplt;
11753 else
11754 plt = htab->pltlocal;
11755 }
1aa42141 11756 targ += plt->output_offset + plt->output_section->vma;
e054468f 11757
1aa42141
AM
11758 off = (elf_gp (info->output_bfd)
11759 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11760 off = targ - off;
721956f4 11761
ad8e1ba5 11762 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11763 {
25f53a85 11764 info->callbacks->einfo
695344c0 11765 /* xgettext:c-format */
c1c8c1ef 11766 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11767 stub_entry->h != NULL
11768 ? stub_entry->h->elf.root.root.string
11769 : "<local sym>");
721956f4 11770 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11771 htab->stub_error = TRUE;
11772 return FALSE;
721956f4
AM
11773 }
11774
176a0d42
AM
11775 r = NULL;
11776 if (info->emitrelocations)
11777 {
6f20ed8a 11778 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11779 ((PPC_HA (off) != 0)
11780 + (htab->opd_abi
e7d1c40c 11781 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11782 && PPC_HA (off + 16) == PPC_HA (off))
11783 : 1)));
176a0d42
AM
11784 if (r == NULL)
11785 return FALSE;
6f20ed8a 11786 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11787 if (bfd_big_endian (info->output_bfd))
11788 r[0].r_offset += 2;
1aa42141 11789 r[0].r_addend = targ;
176a0d42 11790 }
a7f2871e 11791 if (stub_entry->h != NULL
ed7007c1 11792 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 11793 && htab->params->tls_get_addr_opt)
794e51c0 11794 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11795 else
794e51c0 11796 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11797 break;
11798
a4b6fadd
AM
11799 case ppc_stub_save_res:
11800 return TRUE;
11801
721956f4
AM
11802 default:
11803 BFD_FAIL ();
b34976b6 11804 return FALSE;
721956f4
AM
11805 }
11806
1aa42141 11807 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11808
e7d1c40c 11809 if (htab->params->emit_stub_syms)
97b639ba
AM
11810 {
11811 struct elf_link_hash_entry *h;
ee75fd95
AM
11812 size_t len1, len2;
11813 char *name;
11814 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11815 "long_branch",
11816 "long_branch",
3f6ff479
AM
11817 "long_branch",
11818 "plt_branch",
ee75fd95 11819 "plt_branch",
05d0e962
AM
11820 "plt_branch",
11821 "plt_branch",
11822 "plt_call",
11823 "plt_call",
794e51c0 11824 "plt_call",
ee75fd95
AM
11825 "plt_call" };
11826
11827 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11828 len2 = strlen (stub_entry->root.string);
11829 name = bfd_malloc (len1 + len2 + 2);
11830 if (name == NULL)
11831 return FALSE;
11832 memcpy (name, stub_entry->root.string, 9);
11833 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11834 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11835 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11836 if (h == NULL)
11837 return FALSE;
11838 if (h->root.type == bfd_link_hash_new)
11839 {
11840 h->root.type = bfd_link_hash_defined;
6f20ed8a 11841 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11842 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11843 h->ref_regular = 1;
11844 h->def_regular = 1;
11845 h->ref_regular_nonweak = 1;
11846 h->forced_local = 1;
11847 h->non_elf = 0;
2ec55de3 11848 h->root.linker_def = 1;
97b639ba
AM
11849 }
11850 }
11851
b34976b6 11852 return TRUE;
721956f4
AM
11853}
11854
11855/* As above, but don't actually build the stub. Just bump offset so
11856 we know stub section sizes, and select plt_branch stubs where
11857 long_branch stubs won't do. */
11858
b34976b6 11859static bfd_boolean
4ce794b7 11860ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11861{
11862 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11863 struct bfd_link_info *info;
721956f4 11864 struct ppc_link_hash_table *htab;
f891966f
AM
11865 asection *plt;
11866 bfd_vma targ, off, r2off;
04bdff6a 11867 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11868
11869 /* Massage our args to the form they really have. */
11870 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11871 info = in_arg;
11872
11873 htab = ppc_hash_table (info);
4dfe6ac6
NC
11874 if (htab == NULL)
11875 return FALSE;
721956f4 11876
1aa42141
AM
11877 /* Make a note of the offset within the stubs for this entry. */
11878 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11879
a4b6fadd
AM
11880 if (stub_entry->h != NULL
11881 && stub_entry->h->save_res
11882 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11883 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11884 {
11885 /* Don't make stubs to out-of-line register save/restore
11886 functions. Instead, emit copies of the functions. */
11887 stub_entry->group->needs_save_res = 1;
11888 stub_entry->stub_type = ppc_stub_save_res;
11889 return TRUE;
11890 }
11891
f891966f 11892 switch (stub_entry->stub_type)
721956f4 11893 {
f891966f
AM
11894 case ppc_stub_plt_branch:
11895 case ppc_stub_plt_branch_r2off:
11896 /* Reset the stub type from the plt branch variant in case we now
11897 can reach with a shorter stub. */
11898 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11899 /* Fall through. */
11900 case ppc_stub_long_branch:
11901 case ppc_stub_long_branch_r2off:
1aa42141
AM
11902 targ = (stub_entry->target_value
11903 + stub_entry->target_section->output_offset
11904 + stub_entry->target_section->output_section->vma);
f891966f 11905 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11906 off = (stub_entry->stub_offset
11907 + stub_entry->group->stub_sec->output_offset
11908 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11909
ad8e1ba5 11910 size = 4;
f891966f 11911 r2off = 0;
ad8e1ba5
AM
11912 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11913 {
25f53a85 11914 r2off = get_r2off (info, stub_entry);
a7c49797 11915 if (r2off == (bfd_vma) -1)
aa374f67
AM
11916 {
11917 htab->stub_error = TRUE;
11918 return FALSE;
11919 }
a7c49797 11920 size = 8;
ac2df442 11921 if (PPC_HA (r2off) != 0)
a7c49797
AM
11922 size += 4;
11923 if (PPC_LO (r2off) != 0)
11924 size += 4;
1aa42141 11925 off += size - 4;
ad8e1ba5 11926 }
1aa42141 11927 off = targ - off;
ad8e1ba5 11928
f891966f
AM
11929 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11930 Do the same for -R objects without function descriptors. */
11931 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11932 && r2off == 0
11933 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11934 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11935 {
f891966f 11936 struct ppc_branch_hash_entry *br_entry;
df136d64 11937
f891966f
AM
11938 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11939 stub_entry->root.string + 9,
11940 TRUE, FALSE);
11941 if (br_entry == NULL)
721956f4 11942 {
f891966f
AM
11943 _bfd_error_handler (_("can't build branch stub `%s'"),
11944 stub_entry->root.string);
11945 htab->stub_error = TRUE;
11946 return FALSE;
721956f4
AM
11947 }
11948
f891966f 11949 if (br_entry->iter != htab->stub_iteration)
721956f4 11950 {
f891966f
AM
11951 br_entry->iter = htab->stub_iteration;
11952 br_entry->offset = htab->brlt->size;
11953 htab->brlt->size += 8;
63bc6f6c 11954
f891966f
AM
11955 if (htab->relbrlt != NULL)
11956 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11957 else if (info->emitrelocations)
84f5d08e 11958 {
f891966f
AM
11959 htab->brlt->reloc_count += 1;
11960 htab->brlt->flags |= SEC_RELOC;
05d0e962 11961 }
f891966f 11962 }
ac2df442 11963
f891966f
AM
11964 targ = (br_entry->offset
11965 + htab->brlt->output_offset
11966 + htab->brlt->output_section->vma);
11967 off = (elf_gp (info->output_bfd)
11968 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11969 off = targ - off;
176a0d42 11970
f891966f
AM
11971 if (info->emitrelocations)
11972 {
11973 stub_entry->group->stub_sec->reloc_count
11974 += 1 + (PPC_HA (off) != 0);
11975 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11976 }
05d0e962 11977
f891966f
AM
11978 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11979 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11980 {
11981 size = 12;
11982 if (PPC_HA (off) != 0)
11983 size = 16;
ac2df442 11984 }
f891966f 11985 else
ac2df442 11986 {
f891966f
AM
11987 size = 16;
11988 if (PPC_HA (off) != 0)
11989 size += 4;
11990
11991 if (PPC_HA (r2off) != 0)
11992 size += 4;
11993 if (PPC_LO (r2off) != 0)
11994 size += 4;
ac2df442 11995 }
721956f4 11996 }
f891966f
AM
11997 else if (info->emitrelocations)
11998 {
11999 stub_entry->group->stub_sec->reloc_count += 1;
12000 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12001 }
12002 break;
12003
12004 case ppc_stub_plt_branch_notoc:
12005 case ppc_stub_plt_branch_both:
12006 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12007 /* Fall through. */
12008 case ppc_stub_long_branch_notoc:
12009 case ppc_stub_long_branch_both:
12010 off = (stub_entry->stub_offset
12011 + stub_entry->group->stub_sec->output_offset
12012 + stub_entry->group->stub_sec->output_section->vma);
12013 size = 0;
12014 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12015 size = 4;
12016 off += size;
12017 targ = (stub_entry->target_value
12018 + stub_entry->target_section->output_offset
12019 + stub_entry->target_section->output_section->vma);
04bdff6a 12020 odd = off & 4;
f891966f
AM
12021 off = targ - off;
12022
3d58e1fc
AM
12023 if (info->emitrelocations)
12024 {
04bdff6a
AM
12025 unsigned int num_rel;
12026 if (htab->powerxx_stubs)
12027 num_rel = num_relocs_for_powerxx_offset (off, odd);
12028 else
12029 num_rel = num_relocs_for_offset (off - 8);
12030 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12031 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12032 }
12033
04bdff6a
AM
12034 if (htab->powerxx_stubs)
12035 extra = size_powerxx_offset (off, odd);
12036 else
12037 extra = size_offset (off - 8);
f891966f
AM
12038 /* Include branch insn plus those in the offset sequence. */
12039 size += 4 + extra;
12040 /* The branch insn is at the end, or "extra" bytes along. So
12041 its offset will be "extra" bytes less that that already
12042 calculated. */
12043 off -= extra;
12044
04bdff6a
AM
12045 if (!htab->powerxx_stubs)
12046 {
12047 /* After the bcl, lr has been modified so we need to emit
12048 .eh_frame info saying the return address is in r12. */
12049 lr_used = stub_entry->stub_offset + 8;
12050 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12051 lr_used += 4;
12052 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12053 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12054 DW_CFA_restore_extended 65. */
12055 delta = lr_used - stub_entry->group->lr_restore;
12056 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12057 stub_entry->group->lr_restore = lr_used + 8;
12058 }
f891966f
AM
12059
12060 /* If the branch can't reach, use a plt_branch. */
12061 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12062 {
12063 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12064 - ppc_stub_long_branch_notoc);
12065 size += 4;
12066 }
3d58e1fc
AM
12067 else if (info->emitrelocations)
12068 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12069 break;
12070
12071 case ppc_stub_plt_call_notoc:
12072 case ppc_stub_plt_call_both:
12073 off = (stub_entry->stub_offset
12074 + stub_entry->group->stub_sec->output_offset
12075 + stub_entry->group->stub_sec->output_section->vma);
12076 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12077 off += 4;
12078 targ = stub_entry->plt_ent->plt.offset & ~1;
12079 if (targ >= (bfd_vma) -2)
12080 abort ();
12081
12082 plt = htab->elf.splt;
12083 if (!htab->elf.dynamic_sections_created
12084 || stub_entry->h == NULL
12085 || stub_entry->h->elf.dynindx == -1)
12086 {
12087 if (stub_entry->symtype == STT_GNU_IFUNC)
12088 plt = htab->elf.iplt;
12089 else
12090 plt = htab->pltlocal;
12091 }
12092 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 12093 odd = off & 4;
f891966f
AM
12094 off = targ - off;
12095
12096 if (htab->params->plt_stub_align != 0)
12097 {
12098 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12099
12100 stub_entry->group->stub_sec->size += pad;
12101 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12102 off -= pad;
12103 }
12104
3d58e1fc
AM
12105 if (info->emitrelocations)
12106 {
04bdff6a
AM
12107 unsigned int num_rel;
12108 if (htab->powerxx_stubs)
12109 num_rel = num_relocs_for_powerxx_offset (off, odd);
12110 else
12111 num_rel = num_relocs_for_offset (off - 8);
12112 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12113 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12114 }
12115
f891966f
AM
12116 size = plt_stub_size (htab, stub_entry, off);
12117
04bdff6a
AM
12118 if (!htab->powerxx_stubs)
12119 {
12120 /* After the bcl, lr has been modified so we need to emit
12121 .eh_frame info saying the return address is in r12. */
12122 lr_used = stub_entry->stub_offset + 8;
12123 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12124 lr_used += 4;
12125 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12126 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12127 DW_CFA_restore_extended 65. */
12128 delta = lr_used - stub_entry->group->lr_restore;
12129 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12130 stub_entry->group->lr_restore = lr_used + 8;
12131 }
f891966f
AM
12132 break;
12133
12134 case ppc_stub_plt_call:
12135 case ppc_stub_plt_call_r2save:
12136 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12137 if (targ >= (bfd_vma) -2)
12138 abort ();
12139 plt = htab->elf.splt;
12140 if (!htab->elf.dynamic_sections_created
12141 || stub_entry->h == NULL
12142 || stub_entry->h->elf.dynindx == -1)
12143 {
12144 if (stub_entry->symtype == STT_GNU_IFUNC)
12145 plt = htab->elf.iplt;
12146 else
12147 plt = htab->pltlocal;
12148 }
12149 targ += plt->output_offset + plt->output_section->vma;
12150
12151 off = (elf_gp (info->output_bfd)
12152 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12153 off = targ - off;
12154
12155 if (htab->params->plt_stub_align != 0)
12156 {
12157 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12158
12159 stub_entry->group->stub_sec->size += pad;
12160 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12161 }
12162
12163 if (info->emitrelocations)
12164 {
12165 stub_entry->group->stub_sec->reloc_count
12166 += ((PPC_HA (off) != 0)
12167 + (htab->opd_abi
12168 ? 2 + (htab->params->plt_static_chain
12169 && PPC_HA (off + 16) == PPC_HA (off))
12170 : 1));
12171 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12172 }
12173
12174 size = plt_stub_size (htab, stub_entry, off);
12175
12176 if (stub_entry->h != NULL
ed7007c1 12177 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12178 && htab->params->tls_get_addr_opt
12179 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12180 {
9e7028aa
AM
12181 if (htab->params->no_tls_get_addr_regsave)
12182 {
12183 lr_used = stub_entry->stub_offset + size - 20;
12184 /* The eh_frame info will consist of a DW_CFA_advance_loc
12185 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12186 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12187 delta = lr_used - stub_entry->group->lr_restore;
12188 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12189 }
12190 else
12191 {
12192 /* Adjustments to r1 need to be described. */
12193 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12194 delta = cfa_updt - stub_entry->group->lr_restore;
12195 stub_entry->group->eh_size += eh_advance_size (delta);
12196 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12197 }
f891966f
AM
12198 stub_entry->group->lr_restore = size - 4;
12199 }
12200 break;
12201
12202 default:
12203 BFD_FAIL ();
12204 return FALSE;
721956f4
AM
12205 }
12206
6f20ed8a 12207 stub_entry->group->stub_sec->size += size;
b34976b6 12208 return TRUE;
721956f4
AM
12209}
12210
12211/* Set up various things so that we can make a list of input sections
12212 for each output section included in the link. Returns -1 on error,
cedb70c5 12213 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12214
12215int
e7d1c40c 12216ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12217{
6f20ed8a 12218 unsigned int id;
986f0783 12219 size_t amt;
721956f4
AM
12220 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12221
4dfe6ac6
NC
12222 if (htab == NULL)
12223 return -1;
4c52953f 12224
7cf7fcc8 12225 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12226 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12227 htab->sec_info = bfd_zmalloc (amt);
12228 if (htab->sec_info == NULL)
721956f4
AM
12229 return -1;
12230
3d6f9012
AM
12231 /* Set toc_off for com, und, abs and ind sections. */
12232 for (id = 0; id < 3; id++)
6f20ed8a 12233 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12234
721956f4
AM
12235 return 1;
12236}
12237
927be08e
AM
12238/* Set up for first pass at multitoc partitioning. */
12239
12240void
12241ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12242{
12243 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12244
1c865ab2 12245 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12246 htab->toc_bfd = NULL;
12247 htab->toc_first_sec = NULL;
12248}
12249
e717da7e
AM
12250/* The linker repeatedly calls this function for each TOC input section
12251 and linker generated GOT section. Group input bfds such that the toc
927be08e 12252 within a group is less than 64k in size. */
ad8e1ba5 12253
927be08e 12254bfd_boolean
4ce794b7 12255ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12256{
12257 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12258 bfd_vma addr, off, limit;
ad8e1ba5 12259
4dfe6ac6
NC
12260 if (htab == NULL)
12261 return FALSE;
12262
927be08e 12263 if (!htab->second_toc_pass)
4c52953f 12264 {
927be08e 12265 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12266 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12267
12268 if (new_bfd)
bf102f86
AM
12269 {
12270 htab->toc_bfd = isec->owner;
12271 htab->toc_first_sec = isec;
12272 }
927be08e 12273
bf102f86
AM
12274 addr = isec->output_offset + isec->output_section->vma;
12275 off = addr - htab->toc_curr;
d77c8a4b
AM
12276 limit = 0x80008000;
12277 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12278 limit = 0x10000;
12279 if (off + isec->size > limit)
bf102f86
AM
12280 {
12281 addr = (htab->toc_first_sec->output_offset
12282 + htab->toc_first_sec->output_section->vma);
12283 htab->toc_curr = addr;
a27e685f 12284 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12285 }
99877b66 12286
927be08e
AM
12287 /* toc_curr is the base address of this toc group. Set elf_gp
12288 for the input section to be the offset relative to the
12289 output toc base plus 0x8000. Making the input elf_gp an
12290 offset allows us to move the toc as a whole without
12291 recalculating input elf_gp. */
06bcf541 12292 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12293 off += TOC_BASE_OFF;
12294
12295 /* Die if someone uses a linker script that doesn't keep input
12296 file .toc and .got together. */
a4fd3de5
AM
12297 if (new_bfd
12298 && elf_gp (isec->owner) != 0
927be08e
AM
12299 && elf_gp (isec->owner) != off)
12300 return FALSE;
12301
12302 elf_gp (isec->owner) = off;
12303 return TRUE;
4c52953f 12304 }
927be08e
AM
12305
12306 /* During the second pass toc_first_sec points to the start of
12307 a toc group, and toc_curr is used to track the old elf_gp.
12308 We use toc_bfd to ensure we only look at each bfd once. */
12309 if (htab->toc_bfd == isec->owner)
12310 return TRUE;
12311 htab->toc_bfd = isec->owner;
12312
12313 if (htab->toc_first_sec == NULL
12314 || htab->toc_curr != elf_gp (isec->owner))
12315 {
12316 htab->toc_curr = elf_gp (isec->owner);
12317 htab->toc_first_sec = isec;
12318 }
12319 addr = (htab->toc_first_sec->output_offset
12320 + htab->toc_first_sec->output_section->vma);
06bcf541 12321 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12322 elf_gp (isec->owner) = off;
12323
12324 return TRUE;
ad8e1ba5
AM
12325}
12326
927be08e
AM
12327/* Called via elf_link_hash_traverse to merge GOT entries for global
12328 symbol H. */
12329
12330static bfd_boolean
12331merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12332{
12333 if (h->root.type == bfd_link_hash_indirect)
12334 return TRUE;
12335
927be08e
AM
12336 merge_got_entries (&h->got.glist);
12337
12338 return TRUE;
12339}
12340
12341/* Called via elf_link_hash_traverse to allocate GOT entries for global
12342 symbol H. */
12343
12344static bfd_boolean
12345reallocate_got (struct elf_link_hash_entry *h, void *inf)
12346{
12347 struct got_entry *gent;
12348
12349 if (h->root.type == bfd_link_hash_indirect)
12350 return TRUE;
12351
927be08e
AM
12352 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12353 if (!gent->is_indirect)
12354 allocate_got (h, (struct bfd_link_info *) inf, gent);
12355 return TRUE;
12356}
12357
12358/* Called on the first multitoc pass after the last call to
12359 ppc64_elf_next_toc_section. This function removes duplicate GOT
12360 entries. */
12361
12362bfd_boolean
12363ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12364{
12365 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12366 struct bfd *ibfd, *ibfd2;
12367 bfd_boolean done_something;
12368
12369 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12370
7865406b
AM
12371 if (!htab->do_multi_toc)
12372 return FALSE;
12373
d0fae19d 12374 /* Merge global sym got entries within a toc group. */
927be08e
AM
12375 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12376
12377 /* And tlsld_got. */
c72f2fb2 12378 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12379 {
12380 struct got_entry *ent, *ent2;
12381
12382 if (!is_ppc64_elf (ibfd))
12383 continue;
12384
12385 ent = ppc64_tlsld_got (ibfd);
12386 if (!ent->is_indirect
12387 && ent->got.offset != (bfd_vma) -1)
12388 {
c72f2fb2 12389 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12390 {
12391 if (!is_ppc64_elf (ibfd2))
12392 continue;
12393
12394 ent2 = ppc64_tlsld_got (ibfd2);
12395 if (!ent2->is_indirect
12396 && ent2->got.offset != (bfd_vma) -1
12397 && elf_gp (ibfd2) == elf_gp (ibfd))
12398 {
12399 ent2->is_indirect = TRUE;
12400 ent2->got.ent = ent;
12401 }
12402 }
12403 }
12404 }
12405
12406 /* Zap sizes of got sections. */
33e44f2e
AM
12407 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12408 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12409 htab->got_reli_size = 0;
12410
c72f2fb2 12411 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12412 {
12413 asection *got, *relgot;
12414
12415 if (!is_ppc64_elf (ibfd))
12416 continue;
12417
12418 got = ppc64_elf_tdata (ibfd)->got;
12419 if (got != NULL)
12420 {
12421 got->rawsize = got->size;
12422 got->size = 0;
12423 relgot = ppc64_elf_tdata (ibfd)->relgot;
12424 relgot->rawsize = relgot->size;
12425 relgot->size = 0;
12426 }
12427 }
12428
12429 /* Now reallocate the got, local syms first. We don't need to
12430 allocate section contents again since we never increase size. */
c72f2fb2 12431 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12432 {
12433 struct got_entry **lgot_ents;
12434 struct got_entry **end_lgot_ents;
12435 struct plt_entry **local_plt;
12436 struct plt_entry **end_local_plt;
f961d9dd 12437 unsigned char *lgot_masks;
927be08e
AM
12438 bfd_size_type locsymcount;
12439 Elf_Internal_Shdr *symtab_hdr;
19e08130 12440 asection *s;
927be08e
AM
12441
12442 if (!is_ppc64_elf (ibfd))
12443 continue;
12444
12445 lgot_ents = elf_local_got_ents (ibfd);
12446 if (!lgot_ents)
12447 continue;
12448
12449 symtab_hdr = &elf_symtab_hdr (ibfd);
12450 locsymcount = symtab_hdr->sh_info;
12451 end_lgot_ents = lgot_ents + locsymcount;
12452 local_plt = (struct plt_entry **) end_lgot_ents;
12453 end_local_plt = local_plt + locsymcount;
f961d9dd 12454 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12455 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12456 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12457 {
12458 struct got_entry *ent;
12459
12460 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12461 {
19e08130
AM
12462 unsigned int ent_size = 8;
12463 unsigned int rel_size = sizeof (Elf64_External_Rela);
12464
d0fae19d
AM
12465 ent->got.offset = s->size;
12466 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12467 {
19e08130
AM
12468 ent_size *= 2;
12469 rel_size *= 2;
12470 }
12471 s->size += ent_size;
37da22e5 12472 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12473 {
33e44f2e 12474 htab->elf.irelplt->size += rel_size;
19e08130
AM
12475 htab->got_reli_size += rel_size;
12476 }
6a3858a6 12477 else if (bfd_link_pic (info)
f749f26e 12478 && !(ent->tls_type != 0
6a3858a6 12479 && bfd_link_executable (info)))
19e08130
AM
12480 {
12481 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12482 srel->size += rel_size;
d0fae19d
AM
12483 }
12484 }
927be08e
AM
12485 }
12486 }
12487
12488 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12489
c72f2fb2 12490 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12491 {
12492 struct got_entry *ent;
12493
12494 if (!is_ppc64_elf (ibfd))
12495 continue;
12496
12497 ent = ppc64_tlsld_got (ibfd);
12498 if (!ent->is_indirect
12499 && ent->got.offset != (bfd_vma) -1)
12500 {
12501 asection *s = ppc64_elf_tdata (ibfd)->got;
12502 ent->got.offset = s->size;
12503 s->size += 16;
f749f26e 12504 if (bfd_link_dll (info))
927be08e
AM
12505 {
12506 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12507 srel->size += sizeof (Elf64_External_Rela);
12508 }
12509 }
12510 }
12511
33e44f2e 12512 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12513 if (!done_something)
c72f2fb2 12514 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12515 {
12516 asection *got;
12517
12518 if (!is_ppc64_elf (ibfd))
12519 continue;
12520
12521 got = ppc64_elf_tdata (ibfd)->got;
12522 if (got != NULL)
12523 {
12524 done_something = got->rawsize != got->size;
12525 if (done_something)
12526 break;
12527 }
12528 }
12529
12530 if (done_something)
e7d1c40c 12531 (*htab->params->layout_sections_again) ();
927be08e
AM
12532
12533 /* Set up for second pass over toc sections to recalculate elf_gp
12534 on input sections. */
12535 htab->toc_bfd = NULL;
12536 htab->toc_first_sec = NULL;
12537 htab->second_toc_pass = TRUE;
12538 return done_something;
12539}
12540
12541/* Called after second pass of multitoc partitioning. */
12542
12543void
12544ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12545{
12546 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12547
12548 /* After the second pass, toc_curr tracks the TOC offset used
12549 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12550 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12551}
12552
9b5ecbd0
AM
12553/* No toc references were found in ISEC. If the code in ISEC makes no
12554 calls, then there's no need to use toc adjusting stubs when branching
12555 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12556 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12557 needed, and 2 if a cyclical call-graph was found but no other reason
12558 for a stub was detected. If called from the top level, a return of
12559 2 means the same as a return of 0. */
9b5ecbd0
AM
12560
12561static int
4ce794b7 12562toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12563{
9b5ecbd0 12564 int ret;
70cc837d
AM
12565
12566 /* Mark this section as checked. */
12567 isec->call_check_done = 1;
9b5ecbd0 12568
772119ce
AM
12569 /* We know none of our code bearing sections will need toc stubs. */
12570 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12571 return 0;
12572
eea6121a 12573 if (isec->size == 0)
082c50f8
AM
12574 return 0;
12575
4c52953f
AM
12576 if (isec->output_section == NULL)
12577 return 0;
12578
4c52953f 12579 ret = 0;
70cc837d 12580 if (isec->reloc_count != 0)
9b5ecbd0 12581 {
70cc837d
AM
12582 Elf_Internal_Rela *relstart, *rel;
12583 Elf_Internal_Sym *local_syms;
12584 struct ppc_link_hash_table *htab;
2917689a 12585
70cc837d
AM
12586 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12587 info->keep_memory);
12588 if (relstart == NULL)
12589 return -1;
90aecf7a 12590
70cc837d
AM
12591 /* Look for branches to outside of this section. */
12592 local_syms = NULL;
12593 htab = ppc_hash_table (info);
12594 if (htab == NULL)
12595 return -1;
4c52953f 12596
70cc837d 12597 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12598 {
70cc837d
AM
12599 enum elf_ppc64_reloc_type r_type;
12600 unsigned long r_symndx;
12601 struct elf_link_hash_entry *h;
12602 struct ppc_link_hash_entry *eh;
12603 Elf_Internal_Sym *sym;
12604 asection *sym_sec;
12605 struct _opd_sec_data *opd;
12606 bfd_vma sym_value;
12607 bfd_vma dest;
12608
12609 r_type = ELF64_R_TYPE (rel->r_info);
12610 if (r_type != R_PPC64_REL24
05d0e962 12611 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12612 && r_type != R_PPC64_REL14
12613 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12614 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12615 && r_type != R_PPC64_PLTCALL
12616 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12617 continue;
4c52953f 12618
70cc837d
AM
12619 r_symndx = ELF64_R_SYM (rel->r_info);
12620 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12621 isec->owner))
4c52953f 12622 {
70cc837d
AM
12623 ret = -1;
12624 break;
12625 }
4c52953f 12626
70cc837d
AM
12627 /* Calls to dynamic lib functions go through a plt call stub
12628 that uses r2. */
ed7007c1 12629 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12630 if (eh != NULL
12631 && (eh->elf.plt.plist != NULL
12632 || (eh->oh != NULL
12633 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12634 {
12635 ret = 1;
12636 break;
4c52953f
AM
12637 }
12638
70cc837d
AM
12639 if (sym_sec == NULL)
12640 /* Ignore other undefined symbols. */
4c52953f 12641 continue;
4c52953f 12642
70cc837d
AM
12643 /* Assume branches to other sections not included in the
12644 link need stubs too, to cover -R and absolute syms. */
12645 if (sym_sec->output_section == NULL)
12646 {
12647 ret = 1;
12648 break;
12649 }
4c52953f 12650
70cc837d
AM
12651 if (h == NULL)
12652 sym_value = sym->st_value;
12653 else
12654 {
12655 if (h->root.type != bfd_link_hash_defined
12656 && h->root.type != bfd_link_hash_defweak)
12657 abort ();
12658 sym_value = h->root.u.def.value;
12659 }
12660 sym_value += rel->r_addend;
4c52953f 12661
70cc837d
AM
12662 /* If this branch reloc uses an opd sym, find the code section. */
12663 opd = get_opd_info (sym_sec);
12664 if (opd != NULL)
12665 {
12666 if (h == NULL && opd->adjust != NULL)
12667 {
12668 long adjust;
4c52953f 12669
92a9c616 12670 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12671 if (adjust == -1)
12672 /* Assume deleted functions won't ever be called. */
12673 continue;
12674 sym_value += adjust;
12675 }
4c52953f 12676
aef36ac1
AM
12677 dest = opd_entry_value (sym_sec, sym_value,
12678 &sym_sec, NULL, FALSE);
70cc837d
AM
12679 if (dest == (bfd_vma) -1)
12680 continue;
12681 }
12682 else
12683 dest = (sym_value
12684 + sym_sec->output_offset
12685 + sym_sec->output_section->vma);
4c52953f 12686
70cc837d
AM
12687 /* Ignore branch to self. */
12688 if (sym_sec == isec)
12689 continue;
4c52953f 12690
70cc837d
AM
12691 /* If the called function uses the toc, we need a stub. */
12692 if (sym_sec->has_toc_reloc
12693 || sym_sec->makes_toc_func_call)
4c52953f 12694 {
70cc837d 12695 ret = 1;
4c52953f
AM
12696 break;
12697 }
70cc837d
AM
12698
12699 /* Assume any branch that needs a long branch stub might in fact
12700 need a plt_branch stub. A plt_branch stub uses r2. */
12701 else if (dest - (isec->output_offset
12702 + isec->output_section->vma
6911b7dc
AM
12703 + rel->r_offset) + (1 << 25)
12704 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12705 ? h->other
12706 : sym->st_other))
4c52953f 12707 {
70cc837d
AM
12708 ret = 1;
12709 break;
12710 }
12711
12712 /* If calling back to a section in the process of being
12713 tested, we can't say for sure that no toc adjusting stubs
12714 are needed, so don't return zero. */
12715 else if (sym_sec->call_check_in_progress)
12716 ret = 2;
12717
12718 /* Branches to another section that itself doesn't have any TOC
12719 references are OK. Recursively call ourselves to check. */
12720 else if (!sym_sec->call_check_done)
12721 {
12722 int recur;
12723
12724 /* Mark current section as indeterminate, so that other
12725 sections that call back to current won't be marked as
12726 known. */
12727 isec->call_check_in_progress = 1;
12728 recur = toc_adjusting_stub_needed (info, sym_sec);
12729 isec->call_check_in_progress = 0;
12730
4c52953f
AM
12731 if (recur != 0)
12732 {
70cc837d
AM
12733 ret = recur;
12734 if (recur != 2)
12735 break;
4c52953f
AM
12736 }
12737 }
4c52953f 12738 }
70cc837d
AM
12739
12740 if (local_syms != NULL
12741 && (elf_symtab_hdr (isec->owner).contents
12742 != (unsigned char *) local_syms))
12743 free (local_syms);
12744 if (elf_section_data (isec)->relocs != relstart)
12745 free (relstart);
9b5ecbd0
AM
12746 }
12747
70cc837d
AM
12748 if ((ret & 1) == 0
12749 && isec->map_head.s != NULL
12750 && (strcmp (isec->output_section->name, ".init") == 0
12751 || strcmp (isec->output_section->name, ".fini") == 0))
12752 {
12753 if (isec->map_head.s->has_toc_reloc
12754 || isec->map_head.s->makes_toc_func_call)
12755 ret = 1;
12756 else if (!isec->map_head.s->call_check_done)
12757 {
12758 int recur;
12759 isec->call_check_in_progress = 1;
12760 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12761 isec->call_check_in_progress = 0;
12762 if (recur != 0)
12763 ret = recur;
12764 }
12765 }
12766
12767 if (ret == 1)
12768 isec->makes_toc_func_call = 1;
4c52953f 12769
9b5ecbd0
AM
12770 return ret;
12771}
12772
721956f4
AM
12773/* The linker repeatedly calls this function for each input section,
12774 in the order that input sections are linked into output sections.
12775 Build lists of input sections to determine groupings between which
12776 we may insert linker stubs. */
12777
9b5ecbd0 12778bfd_boolean
4ce794b7 12779ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12780{
12781 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12782
4dfe6ac6
NC
12783 if (htab == NULL)
12784 return FALSE;
12785
734b6cf9 12786 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12787 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12788 {
3d6f9012
AM
12789 /* This happens to make the list in reverse order,
12790 which is what we want. */
6f20ed8a
AM
12791 htab->sec_info[isec->id].u.list
12792 = htab->sec_info[isec->output_section->id].u.list;
12793 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12794 }
ad8e1ba5 12795
4c52953f 12796 if (htab->multi_toc_needed)
9b5ecbd0 12797 {
8b974ba3
AM
12798 /* Analyse sections that aren't already flagged as needing a
12799 valid toc pointer. Exclude .fixup for the linux kernel.
12800 .fixup contains branches, but only back to the function that
12801 hit an exception. */
12802 if (!(isec->has_toc_reloc
12803 || (isec->flags & SEC_CODE) == 0
12804 || strcmp (isec->name, ".fixup") == 0
12805 || isec->call_check_done))
12806 {
12807 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12808 return FALSE;
8b974ba3
AM
12809 }
12810 /* Make all sections use the TOC assigned for this object file.
12811 This will be wrong for pasted sections; We fix that in
12812 check_pasted_section(). */
12813 if (elf_gp (isec->owner) != 0)
12814 htab->toc_curr = elf_gp (isec->owner);
12815 }
12816
6f20ed8a 12817 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12818 return TRUE;
721956f4
AM
12819}
12820
70cc837d
AM
12821/* Check that all .init and .fini sections use the same toc, if they
12822 have toc relocs. */
12823
12824static bfd_boolean
12825check_pasted_section (struct bfd_link_info *info, const char *name)
12826{
12827 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12828
12829 if (o != NULL)
12830 {
12831 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12832 bfd_vma toc_off = 0;
12833 asection *i;
12834
12835 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12836 if (i->has_toc_reloc)
12837 {
12838 if (toc_off == 0)
6f20ed8a
AM
12839 toc_off = htab->sec_info[i->id].toc_off;
12840 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12841 return FALSE;
12842 }
6683a28d
AM
12843
12844 if (toc_off == 0)
12845 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12846 if (i->makes_toc_func_call)
12847 {
6f20ed8a 12848 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12849 break;
12850 }
12851
70cc837d
AM
12852 /* Make sure the whole pasted function uses the same toc offset. */
12853 if (toc_off != 0)
12854 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12855 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12856 }
12857 return TRUE;
12858}
12859
12860bfd_boolean
12861ppc64_elf_check_init_fini (struct bfd_link_info *info)
12862{
12863 return (check_pasted_section (info, ".init")
12864 & check_pasted_section (info, ".fini"));
12865}
12866
721956f4
AM
12867/* See whether we can group stub sections together. Grouping stub
12868 sections may result in fewer stubs. More importantly, we need to
12869 put all .init* and .fini* stubs at the beginning of the .init or
12870 .fini output sections respectively, because glibc splits the
12871 _init and _fini functions into multiple parts. Putting a stub in
12872 the middle of a function is not a good idea. */
12873
6f20ed8a
AM
12874static bfd_boolean
12875group_sections (struct bfd_link_info *info,
4ce794b7
AM
12876 bfd_size_type stub_group_size,
12877 bfd_boolean stubs_always_before_branch)
721956f4 12878{
6f20ed8a
AM
12879 struct ppc_link_hash_table *htab;
12880 asection *osec;
7c8fe5c4
AM
12881 bfd_boolean suppress_size_errors;
12882
6f20ed8a
AM
12883 htab = ppc_hash_table (info);
12884 if (htab == NULL)
12885 return FALSE;
12886
7c8fe5c4 12887 suppress_size_errors = FALSE;
7c8fe5c4
AM
12888 if (stub_group_size == 1)
12889 {
12890 /* Default values. */
12891 if (stubs_always_before_branch)
09f92717 12892 stub_group_size = 0x1e00000;
7c8fe5c4 12893 else
09f92717 12894 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12895 suppress_size_errors = TRUE;
12896 }
12897
6f20ed8a 12898 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12899 {
6f20ed8a
AM
12900 asection *tail;
12901
12902 if (osec->id >= htab->sec_info_arr_size)
12903 continue;
12904
12905 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12906 while (tail != NULL)
721956f4 12907 {
734b6cf9
AM
12908 asection *curr;
12909 asection *prev;
12910 bfd_size_type total;
12911 bfd_boolean big_sec;
12912 bfd_vma curr_toc;
6f20ed8a 12913 struct map_stub *group;
09f92717 12914 bfd_size_type group_size;
734b6cf9
AM
12915
12916 curr = tail;
eea6121a 12917 total = tail->size;
09f92717
AM
12918 group_size = (ppc64_elf_section_data (tail) != NULL
12919 && ppc64_elf_section_data (tail)->has_14bit_branch
12920 ? stub_group_size >> 10 : stub_group_size);
12921
12922 big_sec = total > group_size;
7c8fe5c4 12923 if (big_sec && !suppress_size_errors)
695344c0 12924 /* xgettext:c-format */
871b3ab2 12925 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12926 tail->owner, tail);
6f20ed8a 12927 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12928
6f20ed8a 12929 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12930 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12931 < (ppc64_elf_section_data (prev) != NULL
12932 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12933 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12934 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12935 curr = prev;
12936
12937 /* OK, the size from the start of CURR to the end is less
09f92717 12938 than group_size and thus can be handled by one stub
734b6cf9 12939 section. (or the tail section is itself larger than
09f92717
AM
12940 group_size, in which case we may be toast.) We should
12941 really be keeping track of the total size of stubs added
12942 here, as stubs contribute to the final output section
12943 size. That's a little tricky, and this way will only
12944 break if stubs added make the total size more than 2^25,
12945 ie. for the default stub_group_size, if stubs total more
12946 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12947 group = bfd_alloc (curr->owner, sizeof (*group));
12948 if (group == NULL)
12949 return FALSE;
12950 group->link_sec = curr;
12951 group->stub_sec = NULL;
a4b6fadd 12952 group->needs_save_res = 0;
df136d64
AM
12953 group->lr_restore = 0;
12954 group->eh_size = 0;
12955 group->eh_base = 0;
a4b6fadd
AM
12956 group->next = htab->group;
12957 htab->group = group;
734b6cf9 12958 do
721956f4 12959 {
6f20ed8a 12960 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12961 /* Set up this stub group. */
6f20ed8a 12962 htab->sec_info[tail->id].u.group = group;
721956f4 12963 }
734b6cf9
AM
12964 while (tail != curr && (tail = prev) != NULL);
12965
09f92717 12966 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12967 bytes before the stub section can be handled by it too.
12968 Don't do this if we have a really large section after the
12969 stubs, as adding more stubs increases the chance that
12970 branches may not reach into the stub section. */
12971 if (!stubs_always_before_branch && !big_sec)
12972 {
12973 total = 0;
12974 while (prev != NULL
12975 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12976 < (ppc64_elf_section_data (prev) != NULL
12977 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12978 ? (group_size = stub_group_size >> 10)
12979 : group_size))
6f20ed8a 12980 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12981 {
12982 tail = prev;
6f20ed8a
AM
12983 prev = htab->sec_info[tail->id].u.list;
12984 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12985 }
12986 }
12987 tail = prev;
721956f4
AM
12988 }
12989 }
6f20ed8a 12990 return TRUE;
721956f4
AM
12991}
12992
58d180e8
AM
12993static const unsigned char glink_eh_frame_cie[] =
12994{
12995 0, 0, 0, 16, /* length. */
12996 0, 0, 0, 0, /* id. */
12997 1, /* CIE version. */
12998 'z', 'R', 0, /* Augmentation string. */
12999 4, /* Code alignment. */
13000 0x78, /* Data alignment. */
13001 65, /* RA reg. */
13002 1, /* Augmentation size. */
13003 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 13004 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
13005};
13006
d969d15f
AM
13007/* Stripping output sections is normally done before dynamic section
13008 symbols have been allocated. This function is called later, and
13009 handles cases like htab->brlt which is mapped to its own output
13010 section. */
13011
13012static void
13013maybe_strip_output (struct bfd_link_info *info, asection *isec)
13014{
13015 if (isec->size == 0
13016 && isec->output_section->size == 0
53d8967a 13017 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13018 && !bfd_section_removed_from_list (info->output_bfd,
13019 isec->output_section)
13020 && elf_section_data (isec->output_section)->dynindx == 0)
13021 {
13022 isec->output_section->flags |= SEC_EXCLUDE;
13023 bfd_section_list_remove (info->output_bfd, isec->output_section);
13024 info->output_bfd->section_count--;
13025 }
13026}
13027
721956f4
AM
13028/* Determine and set the size of the stub section for a final link.
13029
13030 The basic idea here is to examine all the relocations looking for
13031 PC-relative calls to a target that is unreachable with a "bl"
13032 instruction. */
13033
b34976b6 13034bfd_boolean
e7d1c40c 13035ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13036{
13037 bfd_size_type stub_group_size;
b34976b6 13038 bfd_boolean stubs_always_before_branch;
721956f4
AM
13039 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13040
4dfe6ac6
NC
13041 if (htab == NULL)
13042 return FALSE;
13043
0e1862bb 13044 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13045 htab->params->plt_thread_safe = 1;
b9e5796b 13046 if (!htab->opd_abi)
e7d1c40c
AM
13047 htab->params->plt_thread_safe = 0;
13048 else if (htab->params->plt_thread_safe == -1)
794e51c0 13049 {
e2458743 13050 static const char *const thread_starter[] =
794e51c0
AM
13051 {
13052 "pthread_create",
13053 /* libstdc++ */
13054 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13055 /* librt */
13056 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13057 "mq_notify", "create_timer",
13058 /* libanl */
13059 "getaddrinfo_a",
13060 /* libgomp */
2300b5a1 13061 "GOMP_parallel",
794e51c0 13062 "GOMP_parallel_start",
2300b5a1 13063 "GOMP_parallel_loop_static",
794e51c0 13064 "GOMP_parallel_loop_static_start",
2300b5a1 13065 "GOMP_parallel_loop_dynamic",
794e51c0 13066 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13067 "GOMP_parallel_loop_guided",
794e51c0 13068 "GOMP_parallel_loop_guided_start",
2300b5a1 13069 "GOMP_parallel_loop_runtime",
794e51c0 13070 "GOMP_parallel_loop_runtime_start",
2300b5a1 13071 "GOMP_parallel_sections",
68ffbac6 13072 "GOMP_parallel_sections_start",
f9dffbf0
AM
13073 /* libgo */
13074 "__go_go",
794e51c0
AM
13075 };
13076 unsigned i;
13077
a4b6fadd 13078 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13079 {
13080 struct elf_link_hash_entry *h;
13081 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13082 FALSE, FALSE, TRUE);
e7d1c40c
AM
13083 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13084 if (htab->params->plt_thread_safe)
794e51c0
AM
13085 break;
13086 }
13087 }
e7d1c40c
AM
13088 stubs_always_before_branch = htab->params->group_size < 0;
13089 if (htab->params->group_size < 0)
13090 stub_group_size = -htab->params->group_size;
721956f4 13091 else
e7d1c40c 13092 stub_group_size = htab->params->group_size;
721956f4 13093
6f20ed8a
AM
13094 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13095 return FALSE;
721956f4 13096
a804e476
AM
13097 htab->tga_group = NULL;
13098 if (!htab->params->no_tls_get_addr_regsave
13099 && htab->tga_desc_fd != NULL
13100 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13101 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13102 && htab->tls_get_addr_fd != NULL
13103 && is_static_defined (&htab->tls_get_addr_fd->elf))
13104 {
13105 asection *sym_sec, *code_sec, *stub_sec;
13106 bfd_vma sym_value;
13107 struct _opd_sec_data *opd;
13108
13109 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13110 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13111 code_sec = sym_sec;
13112 opd = get_opd_info (sym_sec);
13113 if (opd != NULL)
13114 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13115 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13116 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13117 htab->tga_group->link_sec);
13118 if (stub_sec == NULL)
13119 return FALSE;
13120 htab->tga_group->stub_sec = stub_sec;
13121
13122 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13123 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13124 htab->tga_desc_fd->elf.root.u.def.value = 0;
13125 htab->tga_desc_fd->elf.type = STT_FUNC;
13126 htab->tga_desc_fd->elf.def_regular = 1;
13127 htab->tga_desc_fd->elf.non_elf = 0;
13128 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13129 }
13130
c9301e31
AM
13131#define STUB_SHRINK_ITER 20
13132 /* Loop until no stubs added. After iteration 20 of this loop we may
13133 exit on a stub section shrinking. This is to break out of a
13134 pathological case where adding stubs on one iteration decreases
13135 section gaps (perhaps due to alignment), which then requires
13136 fewer or smaller stubs on the next iteration. */
13137
721956f4
AM
13138 while (1)
13139 {
13140 bfd *input_bfd;
13141 unsigned int bfd_indx;
a4b6fadd 13142 struct map_stub *group;
721956f4
AM
13143
13144 htab->stub_iteration += 1;
721956f4
AM
13145
13146 for (input_bfd = info->input_bfds, bfd_indx = 0;
13147 input_bfd != NULL;
c72f2fb2 13148 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13149 {
13150 Elf_Internal_Shdr *symtab_hdr;
13151 asection *section;
6cdc0ccc 13152 Elf_Internal_Sym *local_syms = NULL;
721956f4 13153
0c8d6e5c 13154 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13155 continue;
13156
721956f4 13157 /* We'll need the symbol table in a second. */
0ffa91dd 13158 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13159 if (symtab_hdr->sh_info == 0)
13160 continue;
13161
721956f4
AM
13162 /* Walk over each section attached to the input bfd. */
13163 for (section = input_bfd->sections;
13164 section != NULL;
13165 section = section->next)
13166 {
721956f4 13167 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13168
13169 /* If there aren't any relocs, then there's nothing more
13170 to do. */
13171 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13172 || (section->flags & SEC_ALLOC) == 0
13173 || (section->flags & SEC_LOAD) == 0
13174 || (section->flags & SEC_CODE) == 0
721956f4
AM
13175 || section->reloc_count == 0)
13176 continue;
13177
13178 /* If this section is a link-once section that will be
13179 discarded, then don't create any stubs. */
13180 if (section->output_section == NULL
927be08e 13181 || section->output_section->owner != info->output_bfd)
721956f4
AM
13182 continue;
13183
1e2f5b6e
AM
13184 /* Get the relocs. */
13185 internal_relocs
4ce794b7 13186 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13187 info->keep_memory);
721956f4 13188 if (internal_relocs == NULL)
1e2f5b6e 13189 goto error_ret_free_local;
721956f4
AM
13190
13191 /* Now examine each relocation. */
13192 irela = internal_relocs;
13193 irelaend = irela + section->reloc_count;
13194 for (; irela < irelaend; irela++)
13195 {
4ce794b7
AM
13196 enum elf_ppc64_reloc_type r_type;
13197 unsigned int r_indx;
721956f4
AM
13198 enum ppc_stub_type stub_type;
13199 struct ppc_stub_hash_entry *stub_entry;
8387904d 13200 asection *sym_sec, *code_sec;
e054468f 13201 bfd_vma sym_value, code_value;
721956f4 13202 bfd_vma destination;
6911b7dc 13203 unsigned long local_off;
8843416a 13204 bfd_boolean ok_dest;
721956f4 13205 struct ppc_link_hash_entry *hash;
8387904d 13206 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13207 struct elf_link_hash_entry *h;
13208 Elf_Internal_Sym *sym;
721956f4
AM
13209 char *stub_name;
13210 const asection *id_sec;
74f0fb50 13211 struct _opd_sec_data *opd;
e054468f 13212 struct plt_entry *plt_ent;
721956f4
AM
13213
13214 r_type = ELF64_R_TYPE (irela->r_info);
13215 r_indx = ELF64_R_SYM (irela->r_info);
13216
4ce794b7 13217 if (r_type >= R_PPC64_max)
721956f4
AM
13218 {
13219 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13220 goto error_ret_free_internal;
721956f4
AM
13221 }
13222
13223 /* Only look for stubs on branch instructions. */
4ce794b7 13224 if (r_type != R_PPC64_REL24
05d0e962 13225 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13226 && r_type != R_PPC64_REL14
13227 && r_type != R_PPC64_REL14_BRTAKEN
13228 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13229 continue;
13230
13231 /* Now determine the call target, its name, value,
13232 section. */
411e1bfb
AM
13233 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13234 r_indx, input_bfd))
13235 goto error_ret_free_internal;
ed7007c1 13236 hash = ppc_elf_hash_entry (h);
411e1bfb 13237
8843416a 13238 ok_dest = FALSE;
8387904d 13239 fdh = NULL;
7fe2b9a6 13240 sym_value = 0;
411e1bfb 13241 if (hash == NULL)
721956f4 13242 {
411e1bfb 13243 sym_value = sym->st_value;
c27b8c2a
AM
13244 if (sym_sec != NULL
13245 && sym_sec->output_section != NULL)
13246 ok_dest = TRUE;
721956f4 13247 }
7fe2b9a6
AM
13248 else if (hash->elf.root.type == bfd_link_hash_defined
13249 || hash->elf.root.type == bfd_link_hash_defweak)
13250 {
13251 sym_value = hash->elf.root.u.def.value;
13252 if (sym_sec->output_section != NULL)
13253 ok_dest = TRUE;
13254 }
13255 else if (hash->elf.root.type == bfd_link_hash_undefweak
13256 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13257 {
99877b66 13258 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13259 use the func descriptor sym instead if it is
13260 defined. */
ceb1f1ef 13261 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13262 && hash->oh != NULL)
8387904d 13263 {
8c5b4e52 13264 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13265 if (fdh->elf.root.type == bfd_link_hash_defined
13266 || fdh->elf.root.type == bfd_link_hash_defweak)
13267 {
13268 sym_sec = fdh->elf.root.u.def.section;
13269 sym_value = fdh->elf.root.u.def.value;
13270 if (sym_sec->output_section != NULL)
13271 ok_dest = TRUE;
13272 }
99877b66
AM
13273 else
13274 fdh = NULL;
8387904d 13275 }
7fe2b9a6
AM
13276 }
13277 else
13278 {
13279 bfd_set_error (bfd_error_bad_value);
13280 goto error_ret_free_internal;
721956f4
AM
13281 }
13282
8843416a 13283 destination = 0;
6911b7dc 13284 local_off = 0;
8843416a
AM
13285 if (ok_dest)
13286 {
13287 sym_value += irela->r_addend;
13288 destination = (sym_value
13289 + sym_sec->output_offset
13290 + sym_sec->output_section->vma);
6911b7dc
AM
13291 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13292 ? hash->elf.other
13293 : sym->st_other);
8843416a
AM
13294 }
13295
8387904d 13296 code_sec = sym_sec;
e054468f 13297 code_value = sym_value;
74f0fb50
AM
13298 opd = get_opd_info (sym_sec);
13299 if (opd != NULL)
8387904d
AM
13300 {
13301 bfd_vma dest;
13302
74f0fb50 13303 if (hash == NULL && opd->adjust != NULL)
8387904d 13304 {
51aecdc5 13305 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13306 if (adjust == -1)
13307 continue;
e054468f 13308 code_value += adjust;
8387904d
AM
13309 sym_value += adjust;
13310 }
13311 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13312 &code_sec, &code_value, FALSE);
8387904d
AM
13313 if (dest != (bfd_vma) -1)
13314 {
13315 destination = dest;
13316 if (fdh != NULL)
13317 {
13318 /* Fixup old ABI sym to point at code
13319 entry. */
99877b66 13320 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13321 hash->elf.root.u.def.section = code_sec;
e054468f 13322 hash->elf.root.u.def.value = code_value;
8387904d
AM
13323 }
13324 }
13325 }
13326
721956f4 13327 /* Determine what (if any) linker stub is needed. */
e054468f 13328 plt_ent = NULL;
721956f4 13329 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13330 &plt_ent, destination,
13331 local_off);
ad8e1ba5 13332
05d0e962
AM
13333 if (r_type == R_PPC64_REL24_NOTOC)
13334 {
13335 if (stub_type == ppc_stub_plt_call)
13336 stub_type = ppc_stub_plt_call_notoc;
13337 else if (stub_type == ppc_stub_long_branch
13338 || (code_sec != NULL
13339 && code_sec->output_section != NULL
13340 && (((hash ? hash->elf.other : sym->st_other)
13341 & STO_PPC64_LOCAL_MASK)
4a4e7361 13342 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13343 stub_type = ppc_stub_long_branch_notoc;
13344 }
13345 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13346 {
13347 /* Check whether we need a TOC adjusting stub.
13348 Since the linker pastes together pieces from
13349 different object files when creating the
13350 _init and _fini functions, it may be that a
13351 call to what looks like a local sym is in
13352 fact a call needing a TOC adjustment. */
33cb30a1
AM
13353 if ((code_sec != NULL
13354 && code_sec->output_section != NULL
13355 && (htab->sec_info[code_sec->id].toc_off
13356 != htab->sec_info[section->id].toc_off)
13357 && (code_sec->has_toc_reloc
13358 || code_sec->makes_toc_func_call))
13359 || (((hash ? hash->elf.other : sym->st_other)
13360 & STO_PPC64_LOCAL_MASK)
13361 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13362 stub_type = ppc_stub_long_branch_r2off;
13363 }
13364
721956f4
AM
13365 if (stub_type == ppc_stub_none)
13366 continue;
13367
411e1bfb
AM
13368 /* __tls_get_addr calls might be eliminated. */
13369 if (stub_type != ppc_stub_plt_call
05d0e962 13370 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13371 && hash != NULL
ed7007c1 13372 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13373 && section->has_tls_reloc
13374 && irela != internal_relocs)
13375 {
13376 /* Get tls info. */
f961d9dd 13377 unsigned char *tls_mask;
411e1bfb 13378
3a71aa26 13379 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13380 irela - 1, input_bfd))
13381 goto error_ret_free_internal;
abc489c6
AM
13382 if ((*tls_mask & TLS_TLS) != 0
13383 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13384 continue;
13385 }
13386
f378ab09 13387 if (stub_type == ppc_stub_plt_call)
794e51c0 13388 {
6e1816be
AM
13389 if (!htab->opd_abi
13390 && htab->params->plt_localentry0 != 0
13391 && is_elfv2_localentry0 (&hash->elf))
13392 htab->has_plt_localentry0 = 1;
13393 else if (irela + 1 < irelaend
13394 && irela[1].r_offset == irela->r_offset + 4
13395 && (ELF64_R_TYPE (irela[1].r_info)
13396 == R_PPC64_TOCSAVE))
f378ab09
AM
13397 {
13398 if (!tocsave_find (htab, INSERT,
13399 &local_syms, irela + 1, input_bfd))
13400 goto error_ret_free_internal;
13401 }
f378ab09
AM
13402 else
13403 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13404 }
3b421ab3 13405
721956f4 13406 /* Support for grouping stub sections. */
6f20ed8a 13407 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13408
13409 /* Get the name of this stub. */
13410 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13411 if (!stub_name)
13412 goto error_ret_free_internal;
13413
13414 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13415 stub_name, FALSE, FALSE);
721956f4
AM
13416 if (stub_entry != NULL)
13417 {
05d0e962
AM
13418 enum ppc_stub_type old_type;
13419 /* A stub has already been created, but it may
13420 not be the required type. We shouldn't be
13421 transitioning from plt_call to long_branch
13422 stubs or vice versa, but we might be
13423 upgrading from plt_call to plt_call_r2save or
13424 from long_branch to long_branch_r2off. */
721956f4 13425 free (stub_name);
05d0e962
AM
13426 old_type = stub_entry->stub_type;
13427 switch (old_type)
13428 {
13429 default:
13430 abort ();
13431
13432 case ppc_stub_save_res:
13433 continue;
13434
13435 case ppc_stub_plt_call:
13436 case ppc_stub_plt_call_r2save:
13437 case ppc_stub_plt_call_notoc:
13438 case ppc_stub_plt_call_both:
13439 if (stub_type == ppc_stub_plt_call)
13440 continue;
13441 else if (stub_type == ppc_stub_plt_call_r2save)
13442 {
13443 if (old_type == ppc_stub_plt_call_notoc)
13444 stub_type = ppc_stub_plt_call_both;
13445 }
13446 else if (stub_type == ppc_stub_plt_call_notoc)
13447 {
13448 if (old_type == ppc_stub_plt_call_r2save)
13449 stub_type = ppc_stub_plt_call_both;
13450 }
13451 else
13452 abort ();
13453 break;
13454
13455 case ppc_stub_plt_branch:
13456 case ppc_stub_plt_branch_r2off:
13457 case ppc_stub_plt_branch_notoc:
13458 case ppc_stub_plt_branch_both:
13459 old_type += (ppc_stub_long_branch
13460 - ppc_stub_plt_branch);
13461 /* Fall through. */
13462 case ppc_stub_long_branch:
13463 case ppc_stub_long_branch_r2off:
13464 case ppc_stub_long_branch_notoc:
13465 case ppc_stub_long_branch_both:
13466 if (stub_type == ppc_stub_long_branch)
13467 continue;
13468 else if (stub_type == ppc_stub_long_branch_r2off)
13469 {
13470 if (old_type == ppc_stub_long_branch_notoc)
13471 stub_type = ppc_stub_long_branch_both;
13472 }
13473 else if (stub_type == ppc_stub_long_branch_notoc)
13474 {
13475 if (old_type == ppc_stub_long_branch_r2off)
13476 stub_type = ppc_stub_long_branch_both;
13477 }
13478 else
13479 abort ();
13480 break;
13481 }
13482 if (old_type < stub_type)
794e51c0 13483 stub_entry->stub_type = stub_type;
721956f4
AM
13484 continue;
13485 }
13486
25f53a85 13487 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13488 if (stub_entry == NULL)
13489 {
13490 free (stub_name);
6cdc0ccc
AM
13491 error_ret_free_internal:
13492 if (elf_section_data (section)->relocs == NULL)
13493 free (internal_relocs);
13494 error_ret_free_local:
13495 if (local_syms != NULL
13496 && (symtab_hdr->contents
13497 != (unsigned char *) local_syms))
13498 free (local_syms);
b34976b6 13499 return FALSE;
721956f4
AM
13500 }
13501
ad8e1ba5 13502 stub_entry->stub_type = stub_type;
05d0e962
AM
13503 if (stub_type >= ppc_stub_plt_call
13504 && stub_type <= ppc_stub_plt_call_both)
e054468f 13505 {
05d0e962
AM
13506 stub_entry->target_value = sym_value;
13507 stub_entry->target_section = sym_sec;
e054468f
AM
13508 }
13509 else
13510 {
05d0e962
AM
13511 stub_entry->target_value = code_value;
13512 stub_entry->target_section = code_sec;
e054468f 13513 }
721956f4 13514 stub_entry->h = hash;
e054468f 13515 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13516 stub_entry->symtype
13517 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13518 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13519
3d58e1fc
AM
13520 if (hash != NULL
13521 && (hash->elf.root.type == bfd_link_hash_defined
13522 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13523 htab->stub_globals += 1;
721956f4
AM
13524 }
13525
13526 /* We're done with the internal relocs, free them. */
6cdc0ccc 13527 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13528 free (internal_relocs);
721956f4 13529 }
6cdc0ccc
AM
13530
13531 if (local_syms != NULL
13532 && symtab_hdr->contents != (unsigned char *) local_syms)
13533 {
13534 if (!info->keep_memory)
13535 free (local_syms);
13536 else
13537 symtab_hdr->contents = (unsigned char *) local_syms;
13538 }
721956f4
AM
13539 }
13540
5c3dead3 13541 /* We may have added some stubs. Find out the new size of the
721956f4 13542 stub sections. */
d4aaa2a0 13543 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13544 {
13545 group->lr_restore = 0;
13546 group->eh_size = 0;
13547 if (group->stub_sec != NULL)
13548 {
13549 asection *stub_sec = group->stub_sec;
13550
13551 if (htab->stub_iteration <= STUB_SHRINK_ITER
13552 || stub_sec->rawsize < stub_sec->size)
13553 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13554 stub_sec->rawsize = stub_sec->size;
13555 stub_sec->size = 0;
13556 stub_sec->reloc_count = 0;
13557 stub_sec->flags &= ~SEC_RELOC;
13558 }
13559 }
a804e476
AM
13560 if (htab->tga_group != NULL)
13561 {
13562 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13563 htab->tga_group->eh_size
13564 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13565 htab->tga_group->lr_restore = 23 * 4;
13566 htab->tga_group->stub_sec->size = 24 * 4;
13567 }
eea6121a 13568
ba21f564
AM
13569 if (htab->stub_iteration <= STUB_SHRINK_ITER
13570 || htab->brlt->rawsize < htab->brlt->size)
13571 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13572 htab->brlt->size = 0;
84f5d08e
AM
13573 htab->brlt->reloc_count = 0;
13574 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13575 if (htab->relbrlt != NULL)
eea6121a 13576 htab->relbrlt->size = 0;
721956f4 13577
63bc6f6c 13578 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13579
a4b6fadd
AM
13580 for (group = htab->group; group != NULL; group = group->next)
13581 if (group->needs_save_res)
13582 group->stub_sec->size += htab->sfpr->size;
13583
176a0d42
AM
13584 if (info->emitrelocations
13585 && htab->glink != NULL && htab->glink->size != 0)
13586 {
13587 htab->glink->reloc_count = 1;
13588 htab->glink->flags |= SEC_RELOC;
13589 }
13590
58d180e8
AM
13591 if (htab->glink_eh_frame != NULL
13592 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13593 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13594 {
2e0ce1c8 13595 size_t size = 0, align = 4;
58d180e8 13596
d4aaa2a0 13597 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13598 if (group->eh_size != 0)
13599 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13600 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13601 size += (24 + align - 1) & -align;
58d180e8 13602 if (size != 0)
2e0ce1c8
AM
13603 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13604 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13605 size = (size + align - 1) & -align;
58d180e8
AM
13606 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13607 htab->glink_eh_frame->size = size;
13608 }
13609
e7d1c40c 13610 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13611 for (group = htab->group; group != NULL; group = group->next)
13612 if (group->stub_sec != NULL)
691d2e9a
AM
13613 {
13614 int align = abs (htab->params->plt_stub_align);
13615 group->stub_sec->size
13616 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13617 }
d4aaa2a0
AM
13618
13619 for (group = htab->group; group != NULL; group = group->next)
13620 if (group->stub_sec != NULL
13621 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13622 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13623 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13624 break;
13625
d4aaa2a0 13626 if (group == NULL
ba21f564
AM
13627 && (htab->brlt->rawsize == htab->brlt->size
13628 || (htab->stub_iteration > STUB_SHRINK_ITER
13629 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13630 && (htab->glink_eh_frame == NULL
a804e476
AM
13631 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13632 && (htab->tga_group == NULL
13633 || htab->stub_iteration > 1))
5c3dead3
AM
13634 break;
13635
721956f4 13636 /* Ask the linker to do its stuff. */
e7d1c40c 13637 (*htab->params->layout_sections_again) ();
721956f4
AM
13638 }
13639
da44f4e5
AM
13640 if (htab->glink_eh_frame != NULL
13641 && htab->glink_eh_frame->size != 0)
13642 {
13643 bfd_vma val;
13644 bfd_byte *p, *last_fde;
13645 size_t last_fde_len, size, align, pad;
d4aaa2a0 13646 struct map_stub *group;
da44f4e5 13647
df136d64
AM
13648 /* It is necessary to at least have a rough outline of the
13649 linker generated CIEs and FDEs written before
13650 bfd_elf_discard_info is run, in order for these FDEs to be
13651 indexed in .eh_frame_hdr. */
da44f4e5
AM
13652 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13653 if (p == NULL)
13654 return FALSE;
13655 htab->glink_eh_frame->contents = p;
13656 last_fde = p;
2e0ce1c8 13657 align = 4;
da44f4e5
AM
13658
13659 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13660 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13661 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13662 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13663 p += last_fde_len + 4;
da44f4e5 13664
d4aaa2a0 13665 for (group = htab->group; group != NULL; group = group->next)
df136d64 13666 if (group->eh_size != 0)
da44f4e5 13667 {
df136d64 13668 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13669 last_fde = p;
df136d64 13670 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13671 /* FDE length. */
2e0ce1c8 13672 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13673 p += 4;
13674 /* CIE pointer. */
13675 val = p - htab->glink_eh_frame->contents;
13676 bfd_put_32 (htab->elf.dynobj, val, p);
13677 p += 4;
13678 /* Offset to stub section, written later. */
13679 p += 4;
13680 /* stub section size. */
d4aaa2a0 13681 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13682 p += 4;
13683 /* Augmentation. */
13684 p += 1;
df136d64
AM
13685 /* Make sure we don't have all nops. This is enough for
13686 elf-eh-frame.c to detect the last non-nop opcode. */
13687 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13688 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13689 }
13690 if (htab->glink != NULL && htab->glink->size != 0)
13691 {
13692 last_fde = p;
2e0ce1c8 13693 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13694 /* FDE length. */
2e0ce1c8 13695 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13696 p += 4;
13697 /* CIE pointer. */
13698 val = p - htab->glink_eh_frame->contents;
13699 bfd_put_32 (htab->elf.dynobj, val, p);
13700 p += 4;
13701 /* Offset to .glink, written later. */
13702 p += 4;
13703 /* .glink size. */
13704 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13705 p += 4;
13706 /* Augmentation. */
13707 p += 1;
13708
13709 *p++ = DW_CFA_advance_loc + 1;
13710 *p++ = DW_CFA_register;
13711 *p++ = 65;
9f08fa5c 13712 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13713 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13714 *p++ = DW_CFA_restore_extended;
13715 *p++ = 65;
2e0ce1c8 13716 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13717 }
13718 /* Subsume any padding into the last FDE if user .eh_frame
13719 sections are aligned more than glink_eh_frame. Otherwise any
13720 zero padding will be seen as a terminator. */
2e0ce1c8 13721 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13722 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13723 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13724 htab->glink_eh_frame->size = size + pad;
13725 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13726 }
13727
d969d15f
AM
13728 maybe_strip_output (info, htab->brlt);
13729 if (htab->glink_eh_frame != NULL)
13730 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13731
b34976b6 13732 return TRUE;
721956f4
AM
13733}
13734
13735/* Called after we have determined section placement. If sections
805fc799 13736 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13737
805fc799 13738bfd_vma
1c865ab2 13739ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13740{
805fc799 13741 asection *s;
a27e685f 13742 bfd_vma TOCstart, adjust;
721956f4 13743
43417696
AM
13744 if (info != NULL)
13745 {
13746 struct elf_link_hash_entry *h;
13747 struct elf_link_hash_table *htab = elf_hash_table (info);
13748
13749 if (is_elf_hash_table (htab)
13750 && htab->hgot != NULL)
13751 h = htab->hgot;
13752 else
13753 {
13754 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13755 if (is_elf_hash_table (htab))
13756 htab->hgot = h;
13757 }
13758 if (h != NULL
13759 && h->root.type == bfd_link_hash_defined
13760 && !h->root.linker_def
13761 && (!is_elf_hash_table (htab)
13762 || h->def_regular))
13763 {
ed7007c1 13764 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13765 _bfd_set_gp_value (obfd, TOCstart);
13766 return TOCstart;
13767 }
13768 }
13769
805fc799
AM
13770 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13771 order. The TOC starts where the first of these sections starts. */
13772 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13773 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13774 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13775 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13776 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13777 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13778 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13779 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13780 {
13781 /* This may happen for
13782 o references to TOC base (SYM@toc / TOC[tc0]) without a
13783 .toc directive
13784 o bad linker script
13785 o --gc-sections and empty TOC sections
13786
13787 FIXME: Warn user? */
13788
13789 /* Look for a likely section. We probably won't even be
13790 using TOCstart. */
13791 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13792 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13793 | SEC_EXCLUDE))
805fc799
AM
13794 == (SEC_ALLOC | SEC_SMALL_DATA))
13795 break;
721956f4 13796 if (s == NULL)
805fc799 13797 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13798 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13799 == (SEC_ALLOC | SEC_SMALL_DATA))
13800 break;
721956f4 13801 if (s == NULL)
805fc799 13802 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13803 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13804 == SEC_ALLOC)
805fc799 13805 break;
721956f4 13806 if (s == NULL)
805fc799 13807 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13808 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13809 break;
13810 }
721956f4 13811
805fc799
AM
13812 TOCstart = 0;
13813 if (s != NULL)
13814 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13815
a27e685f
AM
13816 /* Force alignment. */
13817 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13818 TOCstart -= adjust;
1c865ab2
AM
13819 _bfd_set_gp_value (obfd, TOCstart);
13820
810d4e75 13821 if (info != NULL && s != NULL)
1c865ab2
AM
13822 {
13823 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13824
810d4e75
AM
13825 if (htab != NULL)
13826 {
13827 if (htab->elf.hgot != NULL)
13828 {
a27e685f 13829 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13830 htab->elf.hgot->root.u.def.section = s;
13831 }
13832 }
13833 else
1c865ab2 13834 {
810d4e75
AM
13835 struct bfd_link_hash_entry *bh = NULL;
13836 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13837 s, TOC_BASE_OFF - adjust,
13838 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13839 }
13840 }
805fc799 13841 return TOCstart;
721956f4
AM
13842}
13843
a345bc8d 13844/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13845 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13846
13847static bfd_boolean
49c09209 13848build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13849{
13850 struct bfd_link_info *info;
13851 struct ppc_link_hash_table *htab;
49c09209 13852 struct plt_entry *ent;
a345bc8d
AM
13853 asection *s;
13854
13855 if (h->root.type == bfd_link_hash_indirect)
13856 return TRUE;
13857
49c09209
AM
13858 info = inf;
13859 htab = ppc_hash_table (info);
13860 if (htab == NULL)
13861 return FALSE;
13862
13863 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13864 if (ent->plt.offset != (bfd_vma) -1)
13865 {
13866 /* This symbol has an entry in the procedure linkage
13867 table. Set it up. */
13868 Elf_Internal_Rela rela;
2d7ad24e 13869 asection *plt, *relplt;
49c09209
AM
13870 bfd_byte *loc;
13871
13872 if (!htab->elf.dynamic_sections_created
13873 || h->dynindx == -1)
13874 {
13875 if (!(h->def_regular
13876 && (h->root.type == bfd_link_hash_defined
13877 || h->root.type == bfd_link_hash_defweak)))
13878 continue;
2d7ad24e
AM
13879 if (h->type == STT_GNU_IFUNC)
13880 {
13881 plt = htab->elf.iplt;
13882 relplt = htab->elf.irelplt;
13883 htab->local_ifunc_resolver = 1;
13884 if (htab->opd_abi)
13885 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13886 else
13887 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13888 }
49c09209 13889 else
2d7ad24e
AM
13890 {
13891 plt = htab->pltlocal;
13892 if (bfd_link_pic (info))
13893 {
13894 relplt = htab->relpltlocal;
13895 if (htab->opd_abi)
13896 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13897 else
13898 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13899 }
13900 else
13901 relplt = NULL;
13902 }
ed7007c1 13903 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
13904
13905 if (relplt == NULL)
13906 {
13907 loc = plt->contents + ent->plt.offset;
13908 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13909 if (htab->opd_abi)
13910 {
13911 bfd_vma toc = elf_gp (info->output_bfd);
13912 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13913 bfd_put_64 (info->output_bfd, toc, loc + 8);
13914 }
13915 }
13916 else
13917 {
13918 rela.r_offset = (plt->output_section->vma
13919 + plt->output_offset
13920 + ent->plt.offset);
13921 loc = relplt->contents + (relplt->reloc_count++
13922 * sizeof (Elf64_External_Rela));
13923 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13924 }
49c09209
AM
13925 }
13926 else
13927 {
13928 rela.r_offset = (htab->elf.splt->output_section->vma
13929 + htab->elf.splt->output_offset
13930 + ent->plt.offset);
13931 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13932 rela.r_addend = ent->addend;
13933 loc = (htab->elf.srelplt->contents
13934 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13935 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13936 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13937 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13938 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13939 }
49c09209
AM
13940 }
13941
a345bc8d
AM
13942 if (!h->pointer_equality_needed)
13943 return TRUE;
13944
13945 if (h->def_regular)
13946 return TRUE;
13947
9e390558 13948 s = htab->global_entry;
49c09209
AM
13949 if (s == NULL || s->size == 0)
13950 return TRUE;
13951
13952 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13953 if (ent->plt.offset != (bfd_vma) -1
13954 && ent->addend == 0)
a345bc8d
AM
13955 {
13956 bfd_byte *p;
13957 asection *plt;
13958 bfd_vma off;
13959
a345bc8d 13960 p = s->contents + h->root.u.def.value;
33e44f2e 13961 plt = htab->elf.splt;
a345bc8d
AM
13962 if (!htab->elf.dynamic_sections_created
13963 || h->dynindx == -1)
2d7ad24e
AM
13964 {
13965 if (h->type == STT_GNU_IFUNC)
13966 plt = htab->elf.iplt;
13967 else
13968 plt = htab->pltlocal;
13969 }
49c09209 13970 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13971 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13972
13973 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13974 {
13975 info->callbacks->einfo
c1c8c1ef 13976 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13977 h->root.root.string);
13978 bfd_set_error (bfd_error_bad_value);
13979 htab->stub_error = TRUE;
13980 }
13981
7341d5e2
AM
13982 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13983 if (htab->params->emit_stub_syms)
13984 {
13985 size_t len = strlen (h->root.root.string);
13986 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13987
13988 if (name == NULL)
13989 return FALSE;
13990
13991 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13992 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13993 if (h == NULL)
13994 return FALSE;
13995 if (h->root.type == bfd_link_hash_new)
13996 {
13997 h->root.type = bfd_link_hash_defined;
13998 h->root.u.def.section = s;
13999 h->root.u.def.value = p - s->contents;
14000 h->ref_regular = 1;
14001 h->def_regular = 1;
14002 h->ref_regular_nonweak = 1;
14003 h->forced_local = 1;
14004 h->non_elf = 0;
2ec55de3 14005 h->root.linker_def = 1;
7341d5e2
AM
14006 }
14007 }
14008
a345bc8d
AM
14009 if (PPC_HA (off) != 0)
14010 {
14011 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14012 p += 4;
14013 }
14014 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14015 p += 4;
14016 bfd_put_32 (s->owner, MTCTR_R12, p);
14017 p += 4;
407aa07c 14018 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14019 break;
14020 }
14021 return TRUE;
14022}
14023
49c09209
AM
14024/* Write PLT relocs for locals. */
14025
14026static bfd_boolean
14027write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14028{
14029 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14030 bfd *ibfd;
14031
14032 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14033 {
14034 struct got_entry **lgot_ents, **end_lgot_ents;
14035 struct plt_entry **local_plt, **lplt, **end_local_plt;
14036 Elf_Internal_Shdr *symtab_hdr;
14037 bfd_size_type locsymcount;
14038 Elf_Internal_Sym *local_syms = NULL;
14039 struct plt_entry *ent;
14040
14041 if (!is_ppc64_elf (ibfd))
14042 continue;
14043
14044 lgot_ents = elf_local_got_ents (ibfd);
14045 if (!lgot_ents)
14046 continue;
14047
14048 symtab_hdr = &elf_symtab_hdr (ibfd);
14049 locsymcount = symtab_hdr->sh_info;
14050 end_lgot_ents = lgot_ents + locsymcount;
14051 local_plt = (struct plt_entry **) end_lgot_ents;
14052 end_local_plt = local_plt + locsymcount;
14053 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14054 for (ent = *lplt; ent != NULL; ent = ent->next)
14055 if (ent->plt.offset != (bfd_vma) -1)
14056 {
14057 Elf_Internal_Sym *sym;
14058 asection *sym_sec;
14059 asection *plt, *relplt;
14060 bfd_byte *loc;
14061 bfd_vma val;
49c09209
AM
14062
14063 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14064 lplt - local_plt, ibfd))
14065 {
14066 if (local_syms != NULL
14067 && symtab_hdr->contents != (unsigned char *) local_syms)
14068 free (local_syms);
14069 return FALSE;
14070 }
14071
14072 val = sym->st_value + ent->addend;
ba85c15d
AM
14073 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14074 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14075 if (sym_sec != NULL && sym_sec->output_section != NULL)
14076 val += sym_sec->output_offset + sym_sec->output_section->vma;
14077
2d7ad24e
AM
14078 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14079 {
14080 htab->local_ifunc_resolver = 1;
14081 plt = htab->elf.iplt;
14082 relplt = htab->elf.irelplt;
14083 }
14084 else
14085 {
14086 plt = htab->pltlocal;
14087 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14088 }
49c09209 14089
2d7ad24e
AM
14090 if (relplt == NULL)
14091 {
14092 loc = plt->contents + ent->plt.offset;
14093 bfd_put_64 (info->output_bfd, val, loc);
14094 if (htab->opd_abi)
14095 {
14096 bfd_vma toc = elf_gp (ibfd);
14097 bfd_put_64 (info->output_bfd, toc, loc + 8);
14098 }
14099 }
49c09209 14100 else
2d7ad24e
AM
14101 {
14102 Elf_Internal_Rela rela;
14103 rela.r_offset = (ent->plt.offset
14104 + plt->output_offset
14105 + plt->output_section->vma);
14106 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14107 {
14108 if (htab->opd_abi)
14109 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14110 else
14111 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14112 }
14113 else
14114 {
14115 if (htab->opd_abi)
14116 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14117 else
14118 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14119 }
14120 rela.r_addend = val;
14121 loc = relplt->contents + (relplt->reloc_count++
14122 * sizeof (Elf64_External_Rela));
14123 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14124 }
49c09209
AM
14125 }
14126
14127 if (local_syms != NULL
14128 && symtab_hdr->contents != (unsigned char *) local_syms)
14129 {
14130 if (!info->keep_memory)
14131 free (local_syms);
14132 else
14133 symtab_hdr->contents = (unsigned char *) local_syms;
14134 }
14135 }
14136 return TRUE;
14137}
14138
a804e476
AM
14139/* Emit the static wrapper function preserving registers around a
14140 __tls_get_addr_opt call. */
14141
14142static bfd_boolean
14143emit_tga_desc (struct ppc_link_hash_table *htab)
14144{
14145 asection *stub_sec = htab->tga_group->stub_sec;
14146 unsigned int cfa_updt = 11 * 4;
14147 bfd_byte *p;
14148 bfd_vma to, from, delta;
14149
14150 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14151 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14152 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14153 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14154 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14155 delta = to - from;
14156 if (delta + (1 << 25) >= 1 << 26)
14157 {
14158 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14159 htab->stub_error = TRUE;
14160 return FALSE;
14161 }
14162
14163 p = stub_sec->contents;
14164 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14165 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14166 p += 4;
14167 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14168 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14169}
14170
14171/* Emit eh_frame describing the static wrapper function. */
14172
14173static bfd_byte *
14174emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14175{
14176 unsigned int cfa_updt = 11 * 4;
14177 unsigned int i;
14178
14179 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14180 *p++ = DW_CFA_def_cfa_offset;
14181 if (htab->opd_abi)
14182 {
14183 *p++ = 128;
14184 *p++ = 1;
14185 }
14186 else
14187 *p++ = 96;
14188 *p++ = DW_CFA_offset_extended_sf;
14189 *p++ = 65;
14190 *p++ = (-16 / 8) & 0x7f;
14191 for (i = 4; i < 12; i++)
14192 {
14193 *p++ = DW_CFA_offset + i;
14194 *p++ = (htab->opd_abi ? 13 : 12) - i;
14195 }
14196 *p++ = DW_CFA_advance_loc + 10;
14197 *p++ = DW_CFA_def_cfa_offset;
14198 *p++ = 0;
14199 for (i = 4; i < 12; i++)
14200 *p++ = DW_CFA_restore + i;
14201 *p++ = DW_CFA_advance_loc + 2;
14202 *p++ = DW_CFA_restore_extended;
14203 *p++ = 65;
14204 return p;
14205}
14206
721956f4
AM
14207/* Build all the stubs associated with the current output file.
14208 The stubs are kept in a hash table attached to the main linker
14209 hash table. This function is called via gldelf64ppc_finish. */
14210
b34976b6 14211bfd_boolean
e7d1c40c 14212ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14213 char **stats)
5d1634d7
AM
14214{
14215 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14216 struct map_stub *group;
721956f4 14217 asection *stub_sec;
5d1634d7 14218 bfd_byte *p;
e717da7e 14219 int stub_sec_count = 0;
5d1634d7 14220
4dfe6ac6
NC
14221 if (htab == NULL)
14222 return FALSE;
14223
eea6121a 14224 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14225 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14226 {
14227 group->eh_size = 0;
14228 group->lr_restore = 0;
14229 if ((stub_sec = group->stub_sec) != NULL
14230 && stub_sec->size != 0)
14231 {
14232 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14233 stub_sec->size);
14234 if (stub_sec->contents == NULL)
14235 return FALSE;
14236 stub_sec->size = 0;
14237 }
14238 }
5d1634d7 14239
23eb7e01 14240 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14241 {
9f951329 14242 unsigned int indx;
ad8e1ba5 14243 bfd_vma plt0;
9f951329 14244
721956f4 14245 /* Build the .glink plt call stub. */
e7d1c40c 14246 if (htab->params->emit_stub_syms)
97b639ba
AM
14247 {
14248 struct elf_link_hash_entry *h;
468392fb
AM
14249 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14250 TRUE, FALSE, FALSE);
97b639ba
AM
14251 if (h == NULL)
14252 return FALSE;
14253 if (h->root.type == bfd_link_hash_new)
14254 {
14255 h->root.type = bfd_link_hash_defined;
14256 h->root.u.def.section = htab->glink;
ee4bf8d2 14257 h->root.u.def.value = 8;
f5385ebf
AM
14258 h->ref_regular = 1;
14259 h->def_regular = 1;
14260 h->ref_regular_nonweak = 1;
14261 h->forced_local = 1;
14262 h->non_elf = 0;
2ec55de3 14263 h->root.linker_def = 1;
97b639ba
AM
14264 }
14265 }
33e44f2e
AM
14266 plt0 = (htab->elf.splt->output_section->vma
14267 + htab->elf.splt->output_offset
14268 - 16);
176a0d42
AM
14269 if (info->emitrelocations)
14270 {
14271 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14272 if (r == NULL)
14273 return FALSE;
14274 r->r_offset = (htab->glink->output_offset
14275 + htab->glink->output_section->vma);
14276 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14277 r->r_addend = plt0;
14278 }
4ce794b7 14279 p = htab->glink->contents;
176a0d42 14280 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14281 bfd_put_64 (htab->glink->owner, plt0, p);
14282 p += 8;
b9e5796b
AM
14283 if (htab->opd_abi)
14284 {
14285 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14286 p += 4;
14287 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14288 p += 4;
14289 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14290 p += 4;
14291 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14292 p += 4;
14293 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14294 p += 4;
14295 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14296 p += 4;
14297 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14298 p += 4;
14299 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14300 p += 4;
14301 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14302 p += 4;
14303 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14304 p += 4;
14305 }
14306 else
14307 {
14308 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14309 p += 4;
14310 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14311 p += 4;
14312 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14313 p += 4;
f378ab09
AM
14314 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14315 p += 4;
b9e5796b
AM
14316 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14317 p += 4;
14318 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14319 p += 4;
14320 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14321 p += 4;
14322 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14323 p += 4;
14324 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14325 p += 4;
14326 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14327 p += 4;
14328 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14329 p += 4;
14330 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14331 p += 4;
14332 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14333 p += 4;
14334 }
407aa07c
AM
14335 bfd_put_32 (htab->glink->owner, BCTR, p);
14336 p += 4;
c75bc4f7 14337 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14338
9f951329
AM
14339 /* Build the .glink lazy link call stubs. */
14340 indx = 0;
9e390558 14341 while (p < htab->glink->contents + htab->glink->size)
9f951329 14342 {
b9e5796b 14343 if (htab->opd_abi)
9f951329 14344 {
b9e5796b
AM
14345 if (indx < 0x8000)
14346 {
14347 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14348 p += 4;
14349 }
14350 else
14351 {
14352 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14353 p += 4;
14354 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14355 p);
14356 p += 4;
14357 }
9f951329 14358 }
4ce794b7 14359 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14360 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14361 indx++;
9f951329
AM
14362 p += 4;
14363 }
5d1634d7 14364 }
5d1634d7 14365
a804e476
AM
14366 if (htab->tga_group != NULL)
14367 {
14368 htab->tga_group->lr_restore = 23 * 4;
14369 htab->tga_group->stub_sec->size = 24 * 4;
14370 if (!emit_tga_desc (htab))
14371 return FALSE;
14372 if (htab->glink_eh_frame != NULL
14373 && htab->glink_eh_frame->size != 0)
14374 {
14375 size_t align = 4;
14376
14377 p = htab->glink_eh_frame->contents;
14378 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14379 p += 17;
14380 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14381 }
14382 }
14383
49c09209
AM
14384 /* Build .glink global entry stubs, and PLT relocs for globals. */
14385 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14386
14387 if (!write_plt_relocs_for_local_syms (info))
14388 return FALSE;
9e390558 14389
7341d5e2 14390 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14391 {
4ce794b7 14392 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14393 htab->brlt->size);
4ce794b7 14394 if (htab->brlt->contents == NULL)
b34976b6 14395 return FALSE;
721956f4 14396 }
ee75fd95 14397 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14398 {
14399 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14400 htab->relbrlt->size);
63bc6f6c
AM
14401 if (htab->relbrlt->contents == NULL)
14402 return FALSE;
14403 }
5d1634d7 14404
721956f4
AM
14405 /* Build the stubs as directed by the stub hash table. */
14406 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14407
a4b6fadd
AM
14408 for (group = htab->group; group != NULL; group = group->next)
14409 if (group->needs_save_res)
7dda8d3c 14410 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14411
aa8a7074
AM
14412 if (htab->relbrlt != NULL)
14413 htab->relbrlt->reloc_count = 0;
14414
e7d1c40c 14415 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14416 for (group = htab->group; group != NULL; group = group->next)
14417 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14418 {
14419 int align = abs (htab->params->plt_stub_align);
14420 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14421 }
794e51c0 14422
7dda8d3c
AM
14423 for (group = htab->group; group != NULL; group = group->next)
14424 if (group->needs_save_res)
14425 {
14426 stub_sec = group->stub_sec;
14427 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14428 htab->sfpr->contents, htab->sfpr->size);
14429 if (htab->params->emit_stub_syms)
14430 {
14431 unsigned int i;
14432
14433 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14434 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14435 return FALSE;
14436 }
14437 }
14438
df136d64
AM
14439 if (htab->glink_eh_frame != NULL
14440 && htab->glink_eh_frame->size != 0)
14441 {
14442 bfd_vma val;
14443 size_t align = 4;
14444
14445 p = htab->glink_eh_frame->contents;
14446 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14447
14448 for (group = htab->group; group != NULL; group = group->next)
14449 if (group->eh_size != 0)
14450 {
14451 /* Offset to stub section. */
14452 val = (group->stub_sec->output_section->vma
14453 + group->stub_sec->output_offset);
14454 val -= (htab->glink_eh_frame->output_section->vma
14455 + htab->glink_eh_frame->output_offset
14456 + (p + 8 - htab->glink_eh_frame->contents));
14457 if (val + 0x80000000 > 0xffffffff)
14458 {
14459 _bfd_error_handler
14460 (_("%s offset too large for .eh_frame sdata4 encoding"),
14461 group->stub_sec->name);
14462 return FALSE;
14463 }
14464 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14465 p += (group->eh_size + 17 + 3) & -4;
14466 }
14467 if (htab->glink != NULL && htab->glink->size != 0)
14468 {
14469 /* Offset to .glink. */
14470 val = (htab->glink->output_section->vma
14471 + htab->glink->output_offset
14472 + 8);
14473 val -= (htab->glink_eh_frame->output_section->vma
14474 + htab->glink_eh_frame->output_offset
14475 + (p + 8 - htab->glink_eh_frame->contents));
14476 if (val + 0x80000000 > 0xffffffff)
14477 {
14478 _bfd_error_handler
14479 (_("%s offset too large for .eh_frame sdata4 encoding"),
14480 htab->glink->name);
14481 return FALSE;
14482 }
14483 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14484 p += (24 + align - 1) & -align;
14485 }
14486 }
14487
d4aaa2a0
AM
14488 for (group = htab->group; group != NULL; group = group->next)
14489 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14490 {
14491 stub_sec_count += 1;
c9301e31
AM
14492 if (stub_sec->rawsize != stub_sec->size
14493 && (htab->stub_iteration <= STUB_SHRINK_ITER
14494 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14495 break;
14496 }
5d1634d7 14497
25516cc5 14498 if (group != NULL)
5d1634d7 14499 {
b34976b6 14500 htab->stub_error = TRUE;
cf97bcb0 14501 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14502 }
721956f4 14503
d2a300cf
AM
14504 if (htab->stub_error)
14505 return FALSE;
14506
14507 if (stats != NULL)
14508 {
db84fff3 14509 size_t len;
d2a300cf
AM
14510 *stats = bfd_malloc (500);
14511 if (*stats == NULL)
14512 return FALSE;
14513
db84fff3
AM
14514 len = sprintf (*stats,
14515 ngettext ("linker stubs in %u group\n",
14516 "linker stubs in %u groups\n",
14517 stub_sec_count),
14518 stub_sec_count);
05d0e962
AM
14519 sprintf (*stats + len, _(" branch %lu\n"
14520 " branch toc adj %lu\n"
14521 " branch notoc %lu\n"
14522 " branch both %lu\n"
14523 " long branch %lu\n"
14524 " long toc adj %lu\n"
14525 " long notoc %lu\n"
14526 " long both %lu\n"
14527 " plt call %lu\n"
14528 " plt call save %lu\n"
14529 " plt call notoc %lu\n"
14530 " plt call both %lu\n"
14531 " global entry %lu"),
4ce794b7
AM
14532 htab->stub_count[ppc_stub_long_branch - 1],
14533 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14534 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14535 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14536 htab->stub_count[ppc_stub_plt_branch - 1],
14537 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14538 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14539 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14540 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14541 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14542 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14543 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14544 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14545 }
14546 return TRUE;
5bd4f169
AM
14547}
14548
60124e18
AM
14549/* What to do when ld finds relocations against symbols defined in
14550 discarded sections. */
14551
14552static unsigned int
14553ppc64_elf_action_discarded (asection *sec)
14554{
14555 if (strcmp (".opd", sec->name) == 0)
14556 return 0;
14557
14558 if (strcmp (".toc", sec->name) == 0)
14559 return 0;
14560
bce50a28
JJ
14561 if (strcmp (".toc1", sec->name) == 0)
14562 return 0;
14563
60124e18
AM
14564 return _bfd_elf_default_action_discarded (sec);
14565}
14566
e59a1001
AM
14567/* These are the dynamic relocations supported by glibc. */
14568
14569static bfd_boolean
14570ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14571{
14572 switch (r_type)
14573 {
14574 case R_PPC64_RELATIVE:
14575 case R_PPC64_NONE:
14576 case R_PPC64_ADDR64:
14577 case R_PPC64_GLOB_DAT:
14578 case R_PPC64_IRELATIVE:
14579 case R_PPC64_JMP_IREL:
14580 case R_PPC64_JMP_SLOT:
14581 case R_PPC64_DTPMOD64:
14582 case R_PPC64_DTPREL64:
14583 case R_PPC64_TPREL64:
14584 case R_PPC64_TPREL16_LO_DS:
14585 case R_PPC64_TPREL16_DS:
14586 case R_PPC64_TPREL16:
14587 case R_PPC64_TPREL16_LO:
14588 case R_PPC64_TPREL16_HI:
14589 case R_PPC64_TPREL16_HIGH:
14590 case R_PPC64_TPREL16_HA:
14591 case R_PPC64_TPREL16_HIGHA:
14592 case R_PPC64_TPREL16_HIGHER:
14593 case R_PPC64_TPREL16_HIGHEST:
14594 case R_PPC64_TPREL16_HIGHERA:
14595 case R_PPC64_TPREL16_HIGHESTA:
14596 case R_PPC64_ADDR16_LO_DS:
14597 case R_PPC64_ADDR16_LO:
14598 case R_PPC64_ADDR16_HI:
14599 case R_PPC64_ADDR16_HIGH:
14600 case R_PPC64_ADDR16_HA:
14601 case R_PPC64_ADDR16_HIGHA:
14602 case R_PPC64_REL30:
14603 case R_PPC64_COPY:
14604 case R_PPC64_UADDR64:
14605 case R_PPC64_UADDR32:
14606 case R_PPC64_ADDR32:
14607 case R_PPC64_ADDR24:
14608 case R_PPC64_ADDR16:
14609 case R_PPC64_UADDR16:
14610 case R_PPC64_ADDR16_DS:
14611 case R_PPC64_ADDR16_HIGHER:
14612 case R_PPC64_ADDR16_HIGHEST:
14613 case R_PPC64_ADDR16_HIGHERA:
14614 case R_PPC64_ADDR16_HIGHESTA:
14615 case R_PPC64_ADDR14:
14616 case R_PPC64_ADDR14_BRTAKEN:
14617 case R_PPC64_ADDR14_BRNTAKEN:
14618 case R_PPC64_REL32:
14619 case R_PPC64_REL64:
14620 return TRUE;
14621
14622 default:
14623 return FALSE;
14624 }
14625}
14626
5bd4f169
AM
14627/* The RELOCATE_SECTION function is called by the ELF backend linker
14628 to handle the relocations for a section.
14629
14630 The relocs are always passed as Rela structures; if the section
14631 actually uses Rel structures, the r_addend field will always be
14632 zero.
14633
14634 This function is responsible for adjust the section contents as
14635 necessary, and (if using Rela relocs and generating a
1049f94e 14636 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14637 necessary.
14638
14639 This function does not have to worry about setting the reloc
14640 address or the reloc symbol index.
14641
14642 LOCAL_SYMS is a pointer to the swapped in local symbols.
14643
14644 LOCAL_SECTIONS is an array giving the section in the input file
14645 corresponding to the st_shndx field of each local symbol.
14646
14647 The global hash table entry for the global symbols can be found
14648 via elf_sym_hashes (input_bfd).
14649
1049f94e 14650 When generating relocatable output, this function must handle
5bd4f169
AM
14651 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14652 going to be the section symbol corresponding to the output
14653 section, which means that the addend must be adjusted
14654 accordingly. */
14655
b34976b6 14656static bfd_boolean
4ce794b7
AM
14657ppc64_elf_relocate_section (bfd *output_bfd,
14658 struct bfd_link_info *info,
14659 bfd *input_bfd,
14660 asection *input_section,
14661 bfd_byte *contents,
14662 Elf_Internal_Rela *relocs,
14663 Elf_Internal_Sym *local_syms,
14664 asection **local_sections)
5bd4f169 14665{
65f38f15 14666 struct ppc_link_hash_table *htab;
5bd4f169
AM
14667 Elf_Internal_Shdr *symtab_hdr;
14668 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14669 Elf_Internal_Rela *rel;
c316a17c 14670 Elf_Internal_Rela *wrel;
5bd4f169 14671 Elf_Internal_Rela *relend;
411e1bfb
AM
14672 Elf_Internal_Rela outrel;
14673 bfd_byte *loc;
411e1bfb 14674 struct got_entry **local_got_ents;
5bd4f169 14675 bfd_vma TOCstart;
b34976b6
AM
14676 bfd_boolean ret = TRUE;
14677 bfd_boolean is_opd;
794e51c0
AM
14678 /* Assume 'at' branch hints. */
14679 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14680 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14681 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14682
65f38f15 14683 /* Initialize howto table if needed. */
5bd4f169 14684 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14685 ppc_howto_init ();
14686
65f38f15 14687 htab = ppc_hash_table (info);
4dfe6ac6
NC
14688 if (htab == NULL)
14689 return FALSE;
ee75fd95
AM
14690
14691 /* Don't relocate stub sections. */
e7d1c40c 14692 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14693 return TRUE;
14694
7af5d5c4
AM
14695 if (!is_ppc64_elf (input_bfd))
14696 {
14697 bfd_set_error (bfd_error_wrong_format);
14698 return FALSE;
14699 }
0ffa91dd 14700
411e1bfb 14701 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14702 TOCstart = elf_gp (output_bfd);
0ffa91dd 14703 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14704 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14705 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14706
c316a17c 14707 rel = wrel = relocs;
5bd4f169 14708 relend = relocs + input_section->reloc_count;
c316a17c 14709 for (; rel < relend; wrel++, rel++)
5bd4f169 14710 {
04c9666a 14711 enum elf_ppc64_reloc_type r_type;
31c76678 14712 bfd_vma addend;
5bd4f169
AM
14713 bfd_reloc_status_type r;
14714 Elf_Internal_Sym *sym;
14715 asection *sec;
039b3fef
AM
14716 struct elf_link_hash_entry *h_elf;
14717 struct ppc_link_hash_entry *h;
14718 struct ppc_link_hash_entry *fdh;
5bd4f169 14719 const char *sym_name;
0d4792f7 14720 unsigned long r_symndx, toc_symndx;
3a71aa26 14721 bfd_vma toc_addend;
f961d9dd
AM
14722 unsigned char tls_mask, tls_gd, tls_type;
14723 unsigned char sym_type;
5bd4f169 14724 bfd_vma relocation;
23cedd1d 14725 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14726 bfd_boolean warned;
bc30df16 14727 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14728 unsigned int insn;
e11840f9 14729 unsigned int mask;
721956f4
AM
14730 struct ppc_stub_hash_entry *stub_entry;
14731 bfd_vma max_br_offset;
14732 bfd_vma from;
c316a17c 14733 Elf_Internal_Rela orig_rel;
b80eed39
AM
14734 reloc_howto_type *howto;
14735 struct reloc_howto_struct alt_howto;
4a421c53
AM
14736 uint64_t pinsn;
14737 bfd_vma offset;
5bd4f169 14738
c316a17c
AM
14739 again:
14740 orig_rel = *rel;
14741
4ce794b7 14742 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14743 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14744
14745 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14746 symbol of the previous ADDR64 reloc. The symbol gives us the
14747 proper TOC base to use. */
14748 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14749 && wrel != relocs
14750 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14751 && is_opd)
c316a17c 14752 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14753
4ce794b7
AM
14754 sym = NULL;
14755 sec = NULL;
039b3fef 14756 h_elf = NULL;
4ce794b7 14757 sym_name = NULL;
b34976b6
AM
14758 unresolved_reloc = FALSE;
14759 warned = FALSE;
65f38f15 14760
0b13192e 14761 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14762 {
14763 /* It's a local symbol. */
74f0fb50 14764 struct _opd_sec_data *opd;
4025353c 14765
5bd4f169
AM
14766 sym = local_syms + r_symndx;
14767 sec = local_sections[r_symndx];
26c61ae5 14768 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14769 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14770 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14771 opd = get_opd_info (sec);
14772 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14773 {
51aecdc5
AM
14774 long adjust = opd->adjust[OPD_NDX (sym->st_value
14775 + rel->r_addend)];
4025353c
AM
14776 if (adjust == -1)
14777 relocation = 0;
14778 else
4cc603a5
AM
14779 {
14780 /* If this is a relocation against the opd section sym
14781 and we have edited .opd, adjust the reloc addend so
14782 that ld -r and ld --emit-relocs output is correct.
14783 If it is a reloc against some other .opd symbol,
14784 then the symbol value will be adjusted later. */
14785 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14786 rel->r_addend += adjust;
14787 else
14788 relocation += adjust;
14789 }
1e2f5b6e 14790 }
5bd4f169
AM
14791 }
14792 else
14793 {
62d887d4
L
14794 bfd_boolean ignored;
14795
b2a8e766
AM
14796 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14797 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14798 h_elf, sec, relocation,
62d887d4 14799 unresolved_reloc, warned, ignored);
039b3fef
AM
14800 sym_name = h_elf->root.root.string;
14801 sym_type = h_elf->type;
b69fdb4e
AM
14802 if (sec != NULL
14803 && sec->owner == output_bfd
14804 && strcmp (sec->name, ".opd") == 0)
14805 {
14806 /* This is a symbol defined in a linker script. All
14807 such are defined in output sections, even those
14808 defined by simple assignment from a symbol defined in
14809 an input section. Transfer the symbol to an
14810 appropriate input .opd section, so that a branch to
14811 this symbol will be mapped to the location specified
14812 by the opd entry. */
14813 struct bfd_link_order *lo;
14814 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14815 if (lo->type == bfd_indirect_link_order)
14816 {
14817 asection *isec = lo->u.indirect.section;
14818 if (h_elf->root.u.def.value >= isec->output_offset
14819 && h_elf->root.u.def.value < (isec->output_offset
14820 + isec->size))
14821 {
14822 h_elf->root.u.def.value -= isec->output_offset;
14823 h_elf->root.u.def.section = isec;
14824 sec = isec;
14825 break;
14826 }
14827 }
14828 }
5bd4f169 14829 }
ed7007c1 14830 h = ppc_elf_hash_entry (h_elf);
5bd4f169 14831
dbaa2011 14832 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14833 {
14834 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14835 input_bfd, input_section,
0930cb30 14836 contents, rel->r_offset);
c316a17c
AM
14837 wrel->r_offset = rel->r_offset;
14838 wrel->r_info = 0;
14839 wrel->r_addend = 0;
14840
14841 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14842 symbols defined in discarded sections. Not done for
c316a17c
AM
14843 non-debug to preserve relocs in .eh_frame which the
14844 eh_frame editing code expects to be present. */
14845 if (bfd_link_relocatable (info)
14846 && (input_section->flags & SEC_DEBUGGING))
14847 wrel--;
14848
14849 continue;
14850 }
ab96bf03 14851
0e1862bb 14852 if (bfd_link_relocatable (info))
c316a17c 14853 goto copy_reloc;
ab96bf03 14854
f40da81b
AM
14855 if (h != NULL && &h->elf == htab->elf.hgot)
14856 {
6f20ed8a 14857 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14858 sec = bfd_abs_section_ptr;
14859 unresolved_reloc = FALSE;
14860 }
14861
951fd09b
AM
14862 /* TLS optimizations. Replace instruction sequences and relocs
14863 based on information we collected in tls_optimize. We edit
14864 RELOCS so that --emit-relocs will output something sensible
14865 for the final instruction stream. */
14866 tls_mask = 0;
14867 tls_gd = 0;
0d4792f7 14868 toc_symndx = 0;
727fc41e
AM
14869 if (h != NULL)
14870 tls_mask = h->tls_mask;
14871 else if (local_got_ents != NULL)
411e1bfb 14872 {
e054468f
AM
14873 struct plt_entry **local_plt = (struct plt_entry **)
14874 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14875 unsigned char *lgot_masks = (unsigned char *)
e054468f 14876 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14877 tls_mask = lgot_masks[r_symndx];
14878 }
37da22e5 14879 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14880 && (r_type == R_PPC64_TLS
14881 || r_type == R_PPC64_TLSGD
14882 || r_type == R_PPC64_TLSLD))
14883 {
14884 /* Check for toc tls entries. */
f961d9dd 14885 unsigned char *toc_tls;
0d4792f7 14886
727fc41e
AM
14887 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14888 &local_syms, rel, input_bfd))
14889 return FALSE;
0d4792f7 14890
727fc41e
AM
14891 if (toc_tls)
14892 tls_mask = *toc_tls;
0d4792f7
AM
14893 }
14894
14895 /* Check that tls relocs are used with tls syms, and non-tls
14896 relocs are used with non-tls syms. */
cf35638d 14897 if (r_symndx != STN_UNDEF
0d4792f7
AM
14898 && r_type != R_PPC64_NONE
14899 && (h == NULL
039b3fef
AM
14900 || h->elf.root.type == bfd_link_hash_defined
14901 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14902 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14903 {
37da22e5 14904 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14905 && (r_type == R_PPC64_TLS
14906 || r_type == R_PPC64_TLSGD
14907 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14908 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14909 ;
14910 else
25f53a85 14911 info->callbacks->einfo
1d483afe 14912 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14913 /* xgettext:c-format */
c1c8c1ef 14914 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14915 /* xgettext:c-format */
c1c8c1ef 14916 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14917 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14918 ppc64_elf_howto_table[r_type]->name,
14919 sym_name);
411e1bfb
AM
14920 }
14921
14922 /* Ensure reloc mapping code below stays sane. */
14923 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14924 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14925 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14926 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14927 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14928 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14929 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14930 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14931 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14932 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14933 abort ();
0d4792f7 14934
411e1bfb
AM
14935 switch (r_type)
14936 {
14937 default:
411e1bfb
AM
14938 break;
14939
ba761f19 14940 case R_PPC64_LO_DS_OPT:
95f0d0d2 14941 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 14942 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
14943 abort ();
14944 insn += (14u << 26) - (58u << 26);
95f0d0d2 14945 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14946 r_type = R_PPC64_TOC16_LO;
14947 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14948 break;
14949
411e1bfb
AM
14950 case R_PPC64_TOC16:
14951 case R_PPC64_TOC16_LO:
14952 case R_PPC64_TOC16_DS:
14953 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14954 {
14955 /* Check for toc tls entries. */
f961d9dd 14956 unsigned char *toc_tls;
951fd09b 14957 int retval;
411e1bfb 14958
3a71aa26
AM
14959 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14960 &local_syms, rel, input_bfd);
951fd09b 14961 if (retval == 0)
411e1bfb
AM
14962 return FALSE;
14963
14964 if (toc_tls)
14965 {
951fd09b 14966 tls_mask = *toc_tls;
411e1bfb
AM
14967 if (r_type == R_PPC64_TOC16_DS
14968 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14969 {
37da22e5 14970 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14971 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14972 goto toctprel;
14973 }
411e1bfb 14974 else
951fd09b
AM
14975 {
14976 /* If we found a GD reloc pair, then we might be
14977 doing a GD->IE transition. */
14978 if (retval == 2)
14979 {
b00a0a86 14980 tls_gd = TLS_GDIE;
37da22e5
AM
14981 if ((tls_mask & TLS_TLS) != 0
14982 && (tls_mask & TLS_GD) == 0)
102890f0 14983 goto tls_ldgd_opt;
951fd09b
AM
14984 }
14985 else if (retval == 3)
14986 {
37da22e5
AM
14987 if ((tls_mask & TLS_TLS) != 0
14988 && (tls_mask & TLS_LD) == 0)
102890f0 14989 goto tls_ldgd_opt;
951fd09b
AM
14990 }
14991 }
411e1bfb
AM
14992 }
14993 }
14994 break;
14995
9d6ded02
AM
14996 case R_PPC64_GOT_TPREL16_HI:
14997 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14998 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14999 && (tls_mask & TLS_TPREL) == 0)
15000 {
15001 rel->r_offset -= d_offset;
95f0d0d2 15002 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15003 r_type = R_PPC64_NONE;
15004 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15005 }
15006 break;
15007
411e1bfb
AM
15008 case R_PPC64_GOT_TPREL16_DS:
15009 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15010 if ((tls_mask & TLS_TLS) != 0
951fd09b 15011 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15012 {
81407a69 15013 toctprel:
95f0d0d2 15014 insn = bfd_get_32 (input_bfd,
c316a17c 15015 contents + rel->r_offset - d_offset);
411e1bfb
AM
15016 insn &= 31 << 21;
15017 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15018 bfd_put_32 (input_bfd, insn,
c316a17c 15019 contents + rel->r_offset - d_offset);
411e1bfb 15020 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15021 if (toc_symndx != 0)
15022 {
15023 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15024 rel->r_addend = toc_addend;
0d4792f7
AM
15025 /* We changed the symbol. Start over in order to
15026 get h, sym, sec etc. right. */
c316a17c 15027 goto again;
0d4792f7
AM
15028 }
15029 else
15030 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15031 }
15032 break;
15033
c213164a
AM
15034 case R_PPC64_GOT_TPREL34:
15035 if ((tls_mask & TLS_TLS) != 0
15036 && (tls_mask & TLS_TPREL) == 0)
15037 {
15038 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15039 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15040 pinsn <<= 32;
15041 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15042 pinsn += ((2ULL << 56) + (-1ULL << 52)
15043 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15044 bfd_put_32 (input_bfd, pinsn >> 32,
15045 contents + rel->r_offset);
15046 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15047 contents + rel->r_offset + 4);
15048 r_type = R_PPC64_TPREL34;
15049 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15050 }
15051 break;
15052
411e1bfb 15053 case R_PPC64_TLS:
37da22e5 15054 if ((tls_mask & TLS_TLS) != 0
951fd09b 15055 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15056 {
c213164a 15057 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15058 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15059 if (insn == 0)
c213164a
AM
15060 break;
15061 if ((rel->r_offset & 3) == 0)
0d4792f7 15062 {
c213164a
AM
15063 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15064 /* Was PPC64_TLS which sits on insn boundary, now
15065 PPC64_TPREL16_LO which is at low-order half-word. */
15066 rel->r_offset += d_offset;
15067 r_type = R_PPC64_TPREL16_LO;
15068 if (toc_symndx != 0)
15069 {
15070 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15071 rel->r_addend = toc_addend;
15072 /* We changed the symbol. Start over in order to
15073 get h, sym, sec etc. right. */
15074 goto again;
15075 }
15076 else
15077 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15078 }
15079 else if ((rel->r_offset & 3) == 1)
15080 {
15081 /* For pcrel IE to LE we already have the full
15082 offset and thus don't need an addi here. A nop
15083 or mr will do. */
2365f8d7 15084 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15085 {
15086 /* Extract regs from addi rt,ra,si. */
15087 unsigned int rt = (insn >> 21) & 0x1f;
15088 unsigned int ra = (insn >> 16) & 0x1f;
15089 if (rt == ra)
15090 insn = NOP;
15091 else
15092 {
15093 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15094 insn = (rt << 16) | (ra << 21) | (ra << 11);
15095 insn |= (31u << 26) | (444u << 1);
15096 }
15097 }
15098 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15099 }
411e1bfb
AM
15100 }
15101 break;
15102
411e1bfb
AM
15103 case R_PPC64_GOT_TLSGD16_HI:
15104 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15105 tls_gd = TLS_GDIE;
37da22e5 15106 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15107 goto tls_gdld_hi;
15108 break;
15109
411e1bfb
AM
15110 case R_PPC64_GOT_TLSLD16_HI:
15111 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15112 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15113 {
951fd09b
AM
15114 tls_gdld_hi:
15115 if ((tls_mask & tls_gd) != 0)
15116 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15117 + R_PPC64_GOT_TPREL16_DS);
15118 else
411e1bfb 15119 {
4fe5ca5b 15120 rel->r_offset -= d_offset;
95f0d0d2 15121 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15122 r_type = R_PPC64_NONE;
411e1bfb 15123 }
951fd09b 15124 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15125 }
15126 break;
15127
951fd09b
AM
15128 case R_PPC64_GOT_TLSGD16:
15129 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15130 tls_gd = TLS_GDIE;
37da22e5 15131 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15132 goto tls_ldgd_opt;
951fd09b 15133 break;
411e1bfb 15134
951fd09b
AM
15135 case R_PPC64_GOT_TLSLD16:
15136 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15137 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15138 {
b9f04fe0 15139 unsigned int insn1, insn2;
102890f0
AM
15140
15141 tls_ldgd_opt:
727fc41e
AM
15142 offset = (bfd_vma) -1;
15143 /* If not using the newer R_PPC64_TLSGD/LD to mark
15144 __tls_get_addr calls, we must trust that the call
15145 stays with its arg setup insns, ie. that the next
15146 reloc is the __tls_get_addr call associated with
15147 the current reloc. Edit both insns. */
9737e8af 15148 if (input_section->nomark_tls_get_addr
727fc41e
AM
15149 && rel + 1 < relend
15150 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15151 htab->tls_get_addr_fd,
15152 htab->tga_desc_fd,
727fc41e 15153 htab->tls_get_addr,
9e7028aa 15154 htab->tga_desc))
727fc41e 15155 offset = rel[1].r_offset;
b86ac8e3
AM
15156 /* We read the low GOT_TLS (or TOC16) insn because we
15157 need to keep the destination reg. It may be
15158 something other than the usual r3, and moved to r3
15159 before the call by intervening code. */
95f0d0d2 15160 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15161 contents + rel->r_offset - d_offset);
102890f0 15162 if ((tls_mask & tls_gd) != 0)
411e1bfb 15163 {
102890f0 15164 /* IE */
b86ac8e3 15165 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15166 insn1 |= 58u << 26; /* ld */
102890f0 15167 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15168 if (offset != (bfd_vma) -1)
f58d5a2d 15169 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15170 if (r_type == R_PPC64_TOC16
15171 || r_type == R_PPC64_TOC16_LO)
102890f0 15172 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15173 else
15174 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15175 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15176 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15177 }
15178 else
15179 {
15180 /* LE */
b86ac8e3
AM
15181 insn1 &= 0x1f << 21;
15182 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15183 insn2 = 0x38630000; /* addi 3,3,0 */
15184 if (tls_gd == 0)
951fd09b 15185 {
102890f0 15186 /* Was an LD reloc. */
71c4e95a 15187 r_symndx = STN_UNDEF;
102890f0 15188 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15189 }
102890f0 15190 else if (toc_symndx != 0)
3a71aa26
AM
15191 {
15192 r_symndx = toc_symndx;
15193 rel->r_addend = toc_addend;
15194 }
102890f0
AM
15195 r_type = R_PPC64_TPREL16_HA;
15196 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15197 if (offset != (bfd_vma) -1)
15198 {
15199 rel[1].r_info = ELF64_R_INFO (r_symndx,
15200 R_PPC64_TPREL16_LO);
15201 rel[1].r_offset = offset + d_offset;
15202 rel[1].r_addend = rel->r_addend;
15203 }
102890f0 15204 }
95f0d0d2 15205 bfd_put_32 (input_bfd, insn1,
3a71aa26 15206 contents + rel->r_offset - d_offset);
727fc41e 15207 if (offset != (bfd_vma) -1)
c96e0573
AM
15208 {
15209 bfd_put_32 (input_bfd, insn2, contents + offset);
15210 if (offset + 8 <= input_section->size)
15211 {
15212 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15213 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15214 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15215 }
15216 }
727fc41e
AM
15217 if ((tls_mask & tls_gd) == 0
15218 && (tls_gd == 0 || toc_symndx != 0))
15219 {
15220 /* We changed the symbol. Start over in order
15221 to get h, sym, sec etc. right. */
c316a17c 15222 goto again;
727fc41e
AM
15223 }
15224 }
15225 break;
15226
c213164a
AM
15227 case R_PPC64_GOT_TLSGD34:
15228 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15229 {
15230 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15231 pinsn <<= 32;
15232 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15233 if ((tls_mask & TLS_GDIE) != 0)
15234 {
15235 /* IE, pla -> pld */
15236 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
15237 r_type = R_PPC64_GOT_TPREL34;
15238 }
15239 else
15240 {
15241 /* LE, pla pcrel -> paddi r13 */
15242 pinsn += (-1ULL << 52) + (13ULL << 16);
15243 r_type = R_PPC64_TPREL34;
15244 }
15245 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15246 bfd_put_32 (input_bfd, pinsn >> 32,
15247 contents + rel->r_offset);
15248 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15249 contents + rel->r_offset + 4);
15250 }
15251 break;
15252
15253 case R_PPC64_GOT_TLSLD34:
15254 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15255 {
15256 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15257 pinsn <<= 32;
15258 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15259 pinsn += (-1ULL << 52) + (13ULL << 16);
15260 bfd_put_32 (input_bfd, pinsn >> 32,
15261 contents + rel->r_offset);
15262 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15263 contents + rel->r_offset + 4);
15264 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15265 r_symndx = STN_UNDEF;
15266 r_type = R_PPC64_TPREL34;
15267 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15268 goto again;
15269 }
15270 break;
15271
727fc41e 15272 case R_PPC64_TLSGD:
37da22e5 15273 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15274 && rel + 1 < relend)
727fc41e 15275 {
b9f04fe0 15276 unsigned int insn2;
5663e321 15277 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15278
4a421c53 15279 offset = rel->r_offset;
5663e321 15280 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15281 {
15282 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15283 if (r_type1 == R_PPC64_PLT_PCREL34
15284 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15285 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15286 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15287 break;
15288 }
15289
15290 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15291 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15292
b00a0a86 15293 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15294 {
15295 /* IE */
15296 r_type = R_PPC64_NONE;
15297 insn2 = 0x7c636a14; /* add 3,3,13 */
15298 }
15299 else
15300 {
15301 /* LE */
15302 if (toc_symndx != 0)
15303 {
15304 r_symndx = toc_symndx;
15305 rel->r_addend = toc_addend;
15306 }
c213164a
AM
15307 if (r_type1 == R_PPC64_REL24_NOTOC
15308 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15309 {
15310 r_type = R_PPC64_NONE;
15311 insn2 = NOP;
15312 }
15313 else
15314 {
15315 rel->r_offset = offset + d_offset;
15316 r_type = R_PPC64_TPREL16_LO;
15317 insn2 = 0x38630000; /* addi 3,3,0 */
15318 }
727fc41e
AM
15319 }
15320 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15321 /* Zap the reloc on the _tls_get_addr call too. */
15322 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15323 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15324 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15325 if ((tls_mask & TLS_GDIE) == 0
15326 && toc_symndx != 0
15327 && r_type != R_PPC64_NONE)
c316a17c 15328 goto again;
411e1bfb 15329 }
411e1bfb
AM
15330 break;
15331
727fc41e 15332 case R_PPC64_TLSLD:
37da22e5 15333 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15334 && rel + 1 < relend)
727fc41e 15335 {
b9f04fe0 15336 unsigned int insn2;
5663e321 15337 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15338
4a421c53 15339 offset = rel->r_offset;
5663e321 15340 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15341 {
15342 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15343 if (r_type1 == R_PPC64_PLT_PCREL34
15344 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15345 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15346 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15347 break;
15348 }
15349
15350 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15351 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15352
c213164a
AM
15353 if (r_type1 == R_PPC64_REL24_NOTOC
15354 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15355 {
15356 r_type = R_PPC64_NONE;
15357 insn2 = NOP;
15358 }
15359 else
15360 {
15361 rel->r_offset = offset + d_offset;
15362 r_symndx = STN_UNDEF;
15363 r_type = R_PPC64_TPREL16_LO;
15364 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15365 insn2 = 0x38630000; /* addi 3,3,0 */
15366 }
727fc41e 15367 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15368 /* Zap the reloc on the _tls_get_addr call too. */
15369 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15370 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15371 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15372 if (r_type != R_PPC64_NONE)
15373 goto again;
727fc41e
AM
15374 }
15375 break;
15376
411e1bfb 15377 case R_PPC64_DTPMOD64:
951fd09b
AM
15378 if (rel + 1 < relend
15379 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15380 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15381 {
951fd09b
AM
15382 if ((tls_mask & TLS_GD) == 0)
15383 {
15384 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15385 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15386 r_type = R_PPC64_TPREL64;
15387 else
15388 {
4ce794b7 15389 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15390 r_type = R_PPC64_NONE;
15391 }
15392 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15393 }
15394 }
15395 else
15396 {
15397 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15398 {
4ce794b7 15399 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15400 r_type = R_PPC64_NONE;
951fd09b 15401 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15402 }
411e1bfb
AM
15403 }
15404 break;
15405
15406 case R_PPC64_TPREL64:
951fd09b 15407 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15408 {
15409 r_type = R_PPC64_NONE;
15410 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15411 }
15412 break;
52a82034 15413
006589cf
AM
15414 case R_PPC64_ENTRY:
15415 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15416 if (!bfd_link_pic (info)
15417 && !info->traditional_format
15418 && relocation + 0x80008000 <= 0xffffffff)
15419 {
15420 unsigned int insn1, insn2;
15421
15422 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15423 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15424 if ((insn1 & ~0xfffc) == LD_R2_0R12
15425 && insn2 == ADD_R2_R2_R12)
15426 {
95f0d0d2 15427 bfd_put_32 (input_bfd,
006589cf
AM
15428 LIS_R2 + PPC_HA (relocation),
15429 contents + rel->r_offset);
95f0d0d2 15430 bfd_put_32 (input_bfd,
006589cf
AM
15431 ADDI_R2_R2 + PPC_LO (relocation),
15432 contents + rel->r_offset + 4);
15433 }
15434 }
15435 else
15436 {
15437 relocation -= (rel->r_offset
15438 + input_section->output_offset
15439 + input_section->output_section->vma);
15440 if (relocation + 0x80008000 <= 0xffffffff)
15441 {
15442 unsigned int insn1, insn2;
15443
15444 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15445 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15446 if ((insn1 & ~0xfffc) == LD_R2_0R12
15447 && insn2 == ADD_R2_R2_R12)
15448 {
95f0d0d2 15449 bfd_put_32 (input_bfd,
006589cf
AM
15450 ADDIS_R2_R12 + PPC_HA (relocation),
15451 contents + rel->r_offset);
95f0d0d2 15452 bfd_put_32 (input_bfd,
006589cf
AM
15453 ADDI_R2_R2 + PPC_LO (relocation),
15454 contents + rel->r_offset + 4);
15455 }
15456 }
15457 }
15458 break;
15459
52a82034
AM
15460 case R_PPC64_REL16_HA:
15461 /* If we are generating a non-PIC executable, edit
15462 . 0: addis 2,12,.TOC.-0b@ha
15463 . addi 2,2,.TOC.-0b@l
15464 used by ELFv2 global entry points to set up r2, to
15465 . lis 2,.TOC.@ha
15466 . addi 2,2,.TOC.@l
15467 if .TOC. is in range. */
0e1862bb 15468 if (!bfd_link_pic (info)
810d4e75 15469 && !info->traditional_format
006589cf 15470 && !htab->opd_abi
4f038ee5 15471 && rel->r_addend == d_offset
52a82034
AM
15472 && h != NULL && &h->elf == htab->elf.hgot
15473 && rel + 1 < relend
15474 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15475 && rel[1].r_offset == rel->r_offset + 4
15476 && rel[1].r_addend == rel->r_addend + 4
15477 && relocation + 0x80008000 <= 0xffffffff)
15478 {
15479 unsigned int insn1, insn2;
4a421c53 15480 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15481 insn1 = bfd_get_32 (input_bfd, contents + offset);
15482 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15483 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15484 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15485 {
15486 r_type = R_PPC64_ADDR16_HA;
15487 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15488 rel->r_addend -= d_offset;
15489 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15490 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15491 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15492 }
15493 }
15494 break;
411e1bfb
AM
15495 }
15496
15497 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15498 insn = 0;
b25116a9
AM
15499 max_br_offset = 1 << 25;
15500 addend = rel->r_addend;
bc30df16 15501 reloc_dest = DEST_NORMAL;
65f38f15 15502 switch (r_type)
5bd4f169
AM
15503 {
15504 default:
65f38f15 15505 break;
5bd4f169 15506
3b421ab3
AM
15507 case R_PPC64_TOCSAVE:
15508 if (relocation + addend == (rel->r_offset
15509 + input_section->output_offset
15510 + input_section->output_section->vma)
15511 && tocsave_find (htab, NO_INSERT,
15512 &local_syms, rel, input_bfd))
15513 {
15514 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15515 if (insn == NOP
15516 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15517 bfd_put_32 (input_bfd,
15518 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15519 contents + rel->r_offset);
15520 }
15521 break;
15522
65f38f15
AM
15523 /* Branch taken prediction relocations. */
15524 case R_PPC64_ADDR14_BRTAKEN:
15525 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15526 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15527 /* Fall through. */
65f38f15 15528
86c76c7b 15529 /* Branch not taken prediction relocations. */
65f38f15
AM
15530 case R_PPC64_ADDR14_BRNTAKEN:
15531 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15532 insn |= bfd_get_32 (input_bfd,
411e1bfb 15533 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15534 /* Fall through. */
86c76c7b 15535
b25116a9
AM
15536 case R_PPC64_REL14:
15537 max_br_offset = 1 << 15;
1a0670f3 15538 /* Fall through. */
5bd4f169 15539
65f38f15 15540 case R_PPC64_REL24:
05d0e962 15541 case R_PPC64_REL24_NOTOC:
23cedd1d 15542 case R_PPC64_PLTCALL:
5663e321 15543 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15544 /* Calls to functions with a different TOC, such as calls to
15545 shared objects, need to alter the TOC pointer. This is
15546 done using a linkage stub. A REL24 branching to these
15547 linkage stubs needs to be followed by a nop, as the nop
15548 will be replaced with an instruction to restore the TOC
15549 base pointer. */
8387904d 15550 fdh = h;
b31867b6
AM
15551 if (h != NULL
15552 && h->oh != NULL
15553 && h->oh->is_func_descriptor)
15554 fdh = ppc_follow_link (h->oh);
31c76678
DK
15555 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15556 htab);
5663e321
AM
15557 if ((r_type == R_PPC64_PLTCALL
15558 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15559 && stub_entry != NULL
05d0e962
AM
15560 && stub_entry->stub_type >= ppc_stub_plt_call
15561 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15562 stub_entry = NULL;
15563
6abec6bc 15564 if (stub_entry != NULL
d0abeec8
AM
15565 && ((stub_entry->stub_type >= ppc_stub_plt_call
15566 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15567 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15568 || stub_entry->stub_type == ppc_stub_plt_branch_both
15569 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15570 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15571 {
b25116a9 15572 bfd_boolean can_plt_call = FALSE;
721956f4 15573
6e1816be
AM
15574 if (stub_entry->stub_type == ppc_stub_plt_call
15575 && !htab->opd_abi
15576 && htab->params->plt_localentry0 != 0
15577 && is_elfv2_localentry0 (&h->elf))
15578 {
15579 /* The function doesn't use or change r2. */
15580 can_plt_call = TRUE;
15581 }
05d0e962
AM
15582 else if (r_type == R_PPC64_REL24_NOTOC)
15583 {
15584 /* NOTOC calls don't need to restore r2. */
15585 can_plt_call = TRUE;
15586 }
6e1816be 15587
f378ab09 15588 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15589 branch and link followed by a nop. The nop is
15590 replaced by an insn to restore r2. */
6e1816be 15591 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15592 {
ba8ca3e7
AM
15593 unsigned long br;
15594
15595 br = bfd_get_32 (input_bfd,
15596 contents + rel->r_offset);
15597 if ((br & 1) != 0)
41bd81ab 15598 {
ba8ca3e7
AM
15599 unsigned long nop;
15600
15601 nop = bfd_get_32 (input_bfd,
15602 contents + rel->r_offset + 4);
23cedd1d
AM
15603 if (nop == LD_R2_0R1 + STK_TOC (htab))
15604 can_plt_call = TRUE;
15605 else if (nop == NOP
15606 || nop == CROR_151515
15607 || nop == CROR_313131)
a7f2871e 15608 {
ba8ca3e7 15609 if (h != NULL
ed7007c1 15610 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15611 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15612 {
15613 /* Special stub used, leave nop alone. */
15614 }
15615 else
a078d95a
AM
15616 bfd_put_32 (input_bfd,
15617 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15618 contents + rel->r_offset + 4);
15619 can_plt_call = TRUE;
a7f2871e 15620 }
41bd81ab 15621 }
5bd4f169 15622 }
721956f4 15623
ba8ca3e7 15624 if (!can_plt_call && h != NULL)
721956f4 15625 {
ba8ca3e7
AM
15626 const char *name = h->elf.root.root.string;
15627
15628 if (*name == '.')
15629 ++name;
15630
15631 if (strncmp (name, "__libc_start_main", 17) == 0
15632 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15633 {
ba8ca3e7
AM
15634 /* Allow crt1 branch to go via a toc adjusting
15635 stub. Other calls that never return could do
15636 the same, if we could detect such. */
b25116a9 15637 can_plt_call = TRUE;
6ab189d5 15638 }
ba8ca3e7
AM
15639 }
15640
15641 if (!can_plt_call)
15642 {
15643 /* g++ as of 20130507 emits self-calls without a
15644 following nop. This is arguably wrong since we
15645 have conflicting information. On the one hand a
15646 global symbol and on the other a local call
15647 sequence, but don't error for this special case.
15648 It isn't possible to cheaply verify we have
15649 exactly such a call. Allow all calls to the same
15650 section. */
15651 asection *code_sec = sec;
15652
15653 if (get_opd_info (sec) != NULL)
ad8e1ba5 15654 {
ba8ca3e7
AM
15655 bfd_vma off = (relocation + addend
15656 - sec->output_section->vma
15657 - sec->output_offset);
bc30df16 15658
ba8ca3e7 15659 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15660 }
ba8ca3e7
AM
15661 if (code_sec == input_section)
15662 can_plt_call = TRUE;
15663 }
15664
15665 if (!can_plt_call)
15666 {
05d0e962
AM
15667 if (stub_entry->stub_type >= ppc_stub_plt_call
15668 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15669 info->callbacks->einfo
695344c0 15670 /* xgettext:c-format */
c1c8c1ef 15671 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15672 "(plt call stub)\n"),
4805fc55
AM
15673 input_bfd, input_section, rel->r_offset, sym_name);
15674 else
15675 info->callbacks->einfo
695344c0 15676 /* xgettext:c-format */
c1c8c1ef 15677 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15678 "(toc save/adjust stub)\n"),
4805fc55 15679 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15680
15681 bfd_set_error (bfd_error_bad_value);
15682 ret = FALSE;
721956f4
AM
15683 }
15684
b25116a9 15685 if (can_plt_call
05d0e962
AM
15686 && stub_entry->stub_type >= ppc_stub_plt_call
15687 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15688 unresolved_reloc = FALSE;
15689 }
15690
6abec6bc
AM
15691 if ((stub_entry == NULL
15692 || stub_entry->stub_type == ppc_stub_long_branch
15693 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15694 && get_opd_info (sec) != NULL)
15695 {
15696 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15697 bfd_vma off = (relocation + addend
15698 - sec->output_section->vma
15699 - sec->output_offset);
aef36ac1 15700 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15701 if (dest != (bfd_vma) -1)
15702 {
15703 relocation = dest;
15704 addend = 0;
bc30df16 15705 reloc_dest = DEST_OPD;
8387904d
AM
15706 }
15707 }
15708
b25116a9
AM
15709 /* If the branch is out of reach we ought to have a long
15710 branch stub. */
15711 from = (rel->r_offset
15712 + input_section->output_offset
15713 + input_section->output_section->vma);
15714
6911b7dc
AM
15715 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15716 ? fdh->elf.other
15717 : sym->st_other);
15718
6abec6bc
AM
15719 if (stub_entry != NULL
15720 && (stub_entry->stub_type == ppc_stub_long_branch
15721 || stub_entry->stub_type == ppc_stub_plt_branch)
15722 && (r_type == R_PPC64_ADDR14_BRTAKEN
15723 || r_type == R_PPC64_ADDR14_BRNTAKEN
15724 || (relocation + addend - from + max_br_offset
15725 < 2 * max_br_offset)))
15726 /* Don't use the stub if this branch is in range. */
15727 stub_entry = NULL;
b25116a9 15728
05d0e962
AM
15729 if (stub_entry != NULL
15730 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15731 || stub_entry->stub_type == ppc_stub_long_branch_both
15732 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15733 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15734 && (r_type != R_PPC64_REL24_NOTOC
15735 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15736 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15737 && (relocation + addend - from + max_br_offset
15738 < 2 * max_br_offset))
15739 stub_entry = NULL;
15740
15741 if (stub_entry != NULL
15742 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15743 || stub_entry->stub_type == ppc_stub_long_branch_both
15744 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15745 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15746 && r_type == R_PPC64_REL24_NOTOC
15747 && (relocation + addend - from + max_br_offset
15748 < 2 * max_br_offset))
15749 stub_entry = NULL;
15750
b25116a9
AM
15751 if (stub_entry != NULL)
15752 {
15753 /* Munge up the value and addend so that we call the stub
15754 rather than the procedure directly. */
a4b6fadd
AM
15755 asection *stub_sec = stub_entry->group->stub_sec;
15756
15757 if (stub_entry->stub_type == ppc_stub_save_res)
15758 relocation += (stub_sec->output_offset
15759 + stub_sec->output_section->vma
15760 + stub_sec->size - htab->sfpr->size
15761 - htab->sfpr->output_offset
15762 - htab->sfpr->output_section->vma);
15763 else
15764 relocation = (stub_entry->stub_offset
15765 + stub_sec->output_offset
15766 + stub_sec->output_section->vma);
b25116a9 15767 addend = 0;
bc30df16 15768 reloc_dest = DEST_STUB;
3b421ab3 15769
05d0e962
AM
15770 if (((stub_entry->stub_type == ppc_stub_plt_call
15771 && ALWAYS_EMIT_R2SAVE)
15772 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15773 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93 15774 && !(h != NULL
ed7007c1 15775 && is_tls_get_addr (&h->elf, htab)
e81b4c93 15776 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15777 && rel + 1 < relend
15778 && rel[1].r_offset == rel->r_offset + 4
15779 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15780 relocation += 4;
05d0e962
AM
15781 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15782 || stub_entry->stub_type == ppc_stub_plt_branch_both
15783 || stub_entry->stub_type == ppc_stub_plt_call_both)
15784 && r_type == R_PPC64_REL24_NOTOC)
15785 relocation += 4;
5663e321
AM
15786
15787 if (r_type == R_PPC64_REL24_NOTOC
15788 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15789 || stub_entry->stub_type == ppc_stub_plt_call_both))
15790 htab->notoc_plt = 1;
b25116a9
AM
15791 }
15792
15793 if (insn != 0)
15794 {
794e51c0 15795 if (is_isa_v2)
721956f4 15796 {
b25116a9
AM
15797 /* Set 'a' bit. This is 0b00010 in BO field for branch
15798 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15799 for branch on CTR insns (BO == 1a00t or 1a01t). */
15800 if ((insn & (0x14 << 21)) == (0x04 << 21))
15801 insn |= 0x02 << 21;
15802 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15803 insn |= 0x08 << 21;
15804 else
15805 break;
15806 }
15807 else
15808 {
15809 /* Invert 'y' bit if not the default. */
4cc603a5 15810 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15811 insn ^= 0x01 << 21;
721956f4 15812 }
b25116a9 15813
95f0d0d2 15814 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15815 }
e86ce104 15816
06da1e8e
AM
15817 /* NOP out calls to undefined weak functions.
15818 We can thus call a weak function without first
15819 checking whether the function is defined. */
b25116a9 15820 else if (h != NULL
039b3fef 15821 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15822 && h->elf.dynindx == -1
05d0e962
AM
15823 && (r_type == R_PPC64_REL24
15824 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15825 && relocation == 0
4cc603a5 15826 && addend == 0)
e86ce104 15827 {
95f0d0d2 15828 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15829 goto copy_reloc;
e86ce104 15830 }
65f38f15 15831 break;
066f4018
AM
15832
15833 case R_PPC64_GOT16_DS:
15834 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15835 if (relocation + addend - from + 0x8000 < 0x10000
15836 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15837 {
15838 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15839 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15840 {
15841 insn += (14u << 26) - (58u << 26);
15842 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15843 r_type = R_PPC64_TOC16;
15844 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15845 }
15846 }
15847 break;
15848
15849 case R_PPC64_GOT16_LO_DS:
15850 case R_PPC64_GOT16_HA:
15851 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15852 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15853 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15854 {
15855 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15856 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15857 {
15858 insn += (14u << 26) - (58u << 26);
15859 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15860 r_type = R_PPC64_TOC16_LO;
15861 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15862 }
2365f8d7 15863 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15864 {
15865 r_type = R_PPC64_TOC16_HA;
15866 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15867 }
15868 }
15869 break;
4a421c53
AM
15870
15871 case R_PPC64_GOT_PCREL34:
15872 from = (rel->r_offset
15873 + input_section->output_section->vma
15874 + input_section->output_offset);
15875 if (relocation - from + (1ULL << 33) < 1ULL << 34
15876 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15877 {
15878 offset = rel->r_offset;
15879 pinsn = bfd_get_32 (input_bfd, contents + offset);
15880 pinsn <<= 32;
15881 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15882 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15883 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15884 {
15885 /* Replace with paddi. */
15886 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15887 r_type = R_PPC64_PCREL34;
15888 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15889 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15890 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15891 goto pcrelopt;
15892 }
15893 }
15894 break;
15895
15896 case R_PPC64_PCREL34:
15897 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15898 {
15899 offset = rel->r_offset;
15900 pinsn = bfd_get_32 (input_bfd, contents + offset);
15901 pinsn <<= 32;
15902 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15903 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15904 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15905 | (14ULL << 26) /* paddi */))
15906 {
15907 pcrelopt:
15908 if (rel + 1 < relend
15909 && rel[1].r_offset == offset
15910 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15911 {
15912 bfd_vma off2 = rel[1].r_addend;
15913 if (off2 == 0)
15914 /* zero means next insn. */
15915 off2 = 8;
15916 off2 += offset;
15917 if (off2 + 4 <= input_section->size)
15918 {
15919 uint64_t pinsn2;
dd9b12c2 15920 bfd_signed_vma addend_off;
4a421c53
AM
15921 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15922 pinsn2 <<= 32;
15923 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15924 {
15925 if (off2 + 8 > input_section->size)
15926 break;
15927 pinsn2 |= bfd_get_32 (input_bfd,
15928 contents + off2 + 4);
15929 }
dd9b12c2 15930 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15931 {
dd9b12c2
AM
15932 addend += addend_off;
15933 rel->r_addend = addend;
4a421c53
AM
15934 bfd_put_32 (input_bfd, pinsn >> 32,
15935 contents + offset);
15936 bfd_put_32 (input_bfd, pinsn,
15937 contents + offset + 4);
15938 bfd_put_32 (input_bfd, pinsn2 >> 32,
15939 contents + off2);
77486630
AM
15940 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15941 bfd_put_32 (input_bfd, pinsn2,
15942 contents + off2 + 4);
4a421c53
AM
15943 }
15944 }
15945 }
15946 }
15947 }
15948 break;
65f38f15 15949 }
5bd4f169 15950
411e1bfb 15951 tls_type = 0;
23cedd1d 15952 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15953 switch (r_type)
15954 {
15955 default:
cf97bcb0
AM
15956 /* xgettext:c-format */
15957 _bfd_error_handler (_("%pB: %s unsupported"),
15958 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15959
65f38f15 15960 bfd_set_error (bfd_error_bad_value);
b34976b6 15961 ret = FALSE;
c316a17c 15962 goto copy_reloc;
5bd4f169 15963
65f38f15 15964 case R_PPC64_NONE:
411e1bfb 15965 case R_PPC64_TLS:
727fc41e
AM
15966 case R_PPC64_TLSGD:
15967 case R_PPC64_TLSLD:
3b421ab3 15968 case R_PPC64_TOCSAVE:
04c9666a
AM
15969 case R_PPC64_GNU_VTINHERIT:
15970 case R_PPC64_GNU_VTENTRY:
006589cf 15971 case R_PPC64_ENTRY:
4a421c53 15972 case R_PPC64_PCREL_OPT:
c316a17c 15973 goto copy_reloc;
5bd4f169
AM
15974
15975 /* GOT16 relocations. Like an ADDR16 using the symbol's
15976 address in the GOT as relocation value instead of the
411e1bfb 15977 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15978 symbol and put the symbol value there. */
411e1bfb
AM
15979 case R_PPC64_GOT_TLSGD16:
15980 case R_PPC64_GOT_TLSGD16_LO:
15981 case R_PPC64_GOT_TLSGD16_HI:
15982 case R_PPC64_GOT_TLSGD16_HA:
c213164a 15983 case R_PPC64_GOT_TLSGD34:
951fd09b 15984 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15985 goto dogot;
15986
15987 case R_PPC64_GOT_TLSLD16:
15988 case R_PPC64_GOT_TLSLD16_LO:
15989 case R_PPC64_GOT_TLSLD16_HI:
15990 case R_PPC64_GOT_TLSLD16_HA:
c213164a 15991 case R_PPC64_GOT_TLSLD34:
951fd09b 15992 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15993 goto dogot;
15994
15995 case R_PPC64_GOT_TPREL16_DS:
15996 case R_PPC64_GOT_TPREL16_LO_DS:
15997 case R_PPC64_GOT_TPREL16_HI:
15998 case R_PPC64_GOT_TPREL16_HA:
c213164a 15999 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
16000 tls_type = TLS_TLS | TLS_TPREL;
16001 goto dogot;
16002
16003 case R_PPC64_GOT_DTPREL16_DS:
16004 case R_PPC64_GOT_DTPREL16_LO_DS:
16005 case R_PPC64_GOT_DTPREL16_HI:
16006 case R_PPC64_GOT_DTPREL16_HA:
c213164a 16007 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
16008 tls_type = TLS_TLS | TLS_DTPREL;
16009 goto dogot;
16010
65f38f15
AM
16011 case R_PPC64_GOT16:
16012 case R_PPC64_GOT16_LO:
16013 case R_PPC64_GOT16_HI:
16014 case R_PPC64_GOT16_HA:
16015 case R_PPC64_GOT16_DS:
16016 case R_PPC64_GOT16_LO_DS:
5663e321 16017 case R_PPC64_GOT_PCREL34:
411e1bfb 16018 dogot:
5bd4f169
AM
16019 {
16020 /* Relocation is to the entry for this symbol in the global
16021 offset table. */
e717da7e 16022 asection *got;
d881513a 16023 bfd_vma *offp;
5bd4f169 16024 bfd_vma off;
d881513a 16025 unsigned long indx = 0;
927be08e 16026 struct got_entry *ent;
65f38f15 16027
d881513a 16028 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 16029 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 16030 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16031 else
5bd4f169 16032 {
d881513a
AM
16033 if (h != NULL)
16034 {
f0158f44
AM
16035 if (!htab->elf.dynamic_sections_created
16036 || h->elf.dynindx == -1
16037 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16038 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16039 /* This is actually a static link, or it is a
16040 -Bsymbolic link and the symbol is defined
16041 locally, or the symbol was forced to be local
16042 because of a version file. */
16043 ;
16044 else
16045 {
039b3fef 16046 indx = h->elf.dynindx;
d881513a
AM
16047 unresolved_reloc = FALSE;
16048 }
039b3fef 16049 ent = h->elf.got.glist;
d881513a 16050 }
411e1bfb 16051 else
5bd4f169 16052 {
d881513a
AM
16053 if (local_got_ents == NULL)
16054 abort ();
16055 ent = local_got_ents[r_symndx];
5bd4f169 16056 }
d881513a
AM
16057
16058 for (; ent != NULL; ent = ent->next)
133a1f60 16059 if (ent->addend == orig_rel.r_addend
e717da7e 16060 && ent->owner == input_bfd
d881513a
AM
16061 && ent->tls_type == tls_type)
16062 break;
5bd4f169 16063 }
411e1bfb 16064
927be08e
AM
16065 if (ent == NULL)
16066 abort ();
16067 if (ent->is_indirect)
16068 ent = ent->got.ent;
16069 offp = &ent->got.offset;
16070 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16071 if (got == NULL)
16072 abort ();
16073
411e1bfb
AM
16074 /* The offset must always be a multiple of 8. We use the
16075 least significant bit to record whether we have already
16076 processed this entry. */
d881513a 16077 off = *offp;
411e1bfb
AM
16078 if ((off & 1) != 0)
16079 off &= ~1;
5bd4f169
AM
16080 else
16081 {
411e1bfb
AM
16082 /* Generate relocs for the dynamic linker, except in
16083 the case of TLSLD where we'll use one entry per
16084 module. */
25f23106
AM
16085 asection *relgot;
16086 bfd_boolean ifunc;
e717da7e 16087
d881513a 16088 *offp = off | 1;
25f23106
AM
16089 relgot = NULL;
16090 ifunc = (h != NULL
16091 ? h->elf.type == STT_GNU_IFUNC
16092 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16093 if (ifunc)
82e66161
AM
16094 {
16095 relgot = htab->elf.irelplt;
16096 if (indx == 0)
16097 htab->local_ifunc_resolver = 1;
16098 else if (is_static_defined (&h->elf))
16099 htab->maybe_local_ifunc_resolver = 1;
16100 }
f0158f44
AM
16101 else if (indx != 0
16102 || (bfd_link_pic (info)
16103 && (h == NULL
f749f26e
AM
16104 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16105 && !(tls_type != 0
f15d0b54
AM
16106 && bfd_link_executable (info)
16107 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 16108 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16109 if (relgot != NULL)
5bd4f169 16110 {
e717da7e
AM
16111 outrel.r_offset = (got->output_section->vma
16112 + got->output_offset
411e1bfb 16113 + off);
133a1f60 16114 outrel.r_addend = orig_rel.r_addend;
d881513a 16115 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16116 {
411e1bfb 16117 outrel.r_addend = 0;
e515b051 16118 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16119 if (tls_type == (TLS_TLS | TLS_GD))
16120 {
e717da7e
AM
16121 loc = relgot->contents;
16122 loc += (relgot->reloc_count++
d881513a
AM
16123 * sizeof (Elf64_External_Rela));
16124 bfd_elf64_swap_reloca_out (output_bfd,
16125 &outrel, loc);
e515b051 16126 outrel.r_offset += 8;
133a1f60 16127 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16128 outrel.r_info
16129 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16130 }
411e1bfb 16131 }
951fd09b 16132 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16133 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16134 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16135 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16136 else if (indx != 0)
16137 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16138 else
81407a69 16139 {
25f23106
AM
16140 if (ifunc)
16141 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16142 else
16143 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16144
16145 /* Write the .got section contents for the sake
16146 of prelink. */
e717da7e 16147 loc = got->contents + off;
23fbd6fa
JJ
16148 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16149 loc);
81407a69 16150 }
81407a69
AM
16151
16152 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16153 {
16154 outrel.r_addend += relocation;
16155 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16156 {
16157 if (htab->elf.tls_sec == NULL)
16158 outrel.r_addend = 0;
16159 else
16160 outrel.r_addend -= htab->elf.tls_sec->vma;
16161 }
e515b051 16162 }
e717da7e
AM
16163 loc = relgot->contents;
16164 loc += (relgot->reloc_count++
411e1bfb
AM
16165 * sizeof (Elf64_External_Rela));
16166 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16167 }
16168
ad8e1ba5 16169 /* Init the .got section contents here if we're not
81407a69 16170 emitting a reloc. */
d881513a 16171 else
411e1bfb 16172 {
133a1f60 16173 relocation += orig_rel.r_addend;
f0158f44 16174 if (tls_type != 0)
411e1bfb 16175 {
989f9879
AM
16176 if (htab->elf.tls_sec == NULL)
16177 relocation = 0;
16178 else
16179 {
f0158f44
AM
16180 if (tls_type & TLS_LD)
16181 relocation = 0;
16182 else
16183 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16184 if (tls_type & TLS_TPREL)
989f9879
AM
16185 relocation += DTP_OFFSET - TP_OFFSET;
16186 }
5bd4f169 16187
f0158f44 16188 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16189 {
16190 bfd_put_64 (output_bfd, relocation,
e717da7e 16191 got->contents + off + 8);
676ee2b5 16192 relocation = 1;
7b609f53 16193 }
411e1bfb
AM
16194 }
16195 bfd_put_64 (output_bfd, relocation,
e717da7e 16196 got->contents + off);
5bd4f169
AM
16197 }
16198 }
16199
65f38f15
AM
16200 if (off >= (bfd_vma) -2)
16201 abort ();
16202
bf102f86 16203 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16204 addend = 0;
c213164a
AM
16205 if (!(r_type == R_PPC64_GOT_PCREL34
16206 || r_type == R_PPC64_GOT_TLSGD34
16207 || r_type == R_PPC64_GOT_TLSLD34
16208 || r_type == R_PPC64_GOT_TPREL34
16209 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 16210 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16211 }
65f38f15
AM
16212 break;
16213
16214 case R_PPC64_PLT16_HA:
16215 case R_PPC64_PLT16_HI:
16216 case R_PPC64_PLT16_LO:
08be3224 16217 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16218 case R_PPC64_PLT_PCREL34:
16219 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16220 case R_PPC64_PLT32:
16221 case R_PPC64_PLT64:
23cedd1d 16222 case R_PPC64_PLTSEQ:
5663e321 16223 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16224 case R_PPC64_PLTCALL:
5663e321 16225 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16226 /* Relocation is to the entry for this symbol in the
16227 procedure linkage table. */
23cedd1d 16228 unresolved_reloc = TRUE;
cbf95972
AM
16229 {
16230 struct plt_entry **plt_list = NULL;
16231 if (h != NULL)
16232 plt_list = &h->elf.plt.plist;
16233 else if (local_got_ents != NULL)
16234 {
16235 struct plt_entry **local_plt = (struct plt_entry **)
16236 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16237 plt_list = local_plt + r_symndx;
cbf95972
AM
16238 }
16239 if (plt_list)
16240 {
16241 struct plt_entry *ent;
65f38f15 16242
cbf95972
AM
16243 for (ent = *plt_list; ent != NULL; ent = ent->next)
16244 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16245 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16246 {
16247 asection *plt;
08be3224 16248 bfd_vma got;
cbf95972
AM
16249
16250 plt = htab->elf.splt;
16251 if (!htab->elf.dynamic_sections_created
16252 || h == NULL
16253 || h->elf.dynindx == -1)
2d7ad24e
AM
16254 {
16255 if (h != NULL
16256 ? h->elf.type == STT_GNU_IFUNC
16257 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16258 plt = htab->elf.iplt;
16259 else
16260 plt = htab->pltlocal;
16261 }
16262 relocation = (plt->output_section->vma
16263 + plt->output_offset
16264 + ent->plt.offset);
08be3224 16265 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16266 || r_type == R_PPC64_PLT16_HI
16267 || r_type == R_PPC64_PLT16_LO
16268 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16269 {
16270 got = (elf_gp (output_bfd)
16271 + htab->sec_info[input_section->id].toc_off);
16272 relocation -= got;
16273 }
133a1f60 16274 addend = 0;
cbf95972
AM
16275 unresolved_reloc = FALSE;
16276 break;
16277 }
16278 }
16279 }
65f38f15 16280 break;
5bd4f169 16281
0b13192e
AM
16282 case R_PPC64_TOC:
16283 /* Relocation value is TOC base. */
16284 relocation = TOCstart;
cf35638d 16285 if (r_symndx == STN_UNDEF)
6f20ed8a 16286 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16287 else if (unresolved_reloc)
16288 ;
6f20ed8a
AM
16289 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16290 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16291 else
16292 unresolved_reloc = TRUE;
ab96bf03 16293 goto dodyn;
0b13192e 16294
5bd4f169
AM
16295 /* TOC16 relocs. We want the offset relative to the TOC base,
16296 which is the address of the start of the TOC plus 0x8000.
16297 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16298 in this order. */
65f38f15
AM
16299 case R_PPC64_TOC16:
16300 case R_PPC64_TOC16_LO:
16301 case R_PPC64_TOC16_HI:
16302 case R_PPC64_TOC16_DS:
16303 case R_PPC64_TOC16_LO_DS:
16304 case R_PPC64_TOC16_HA:
6f20ed8a 16305 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16306 if (h != NULL)
16307 goto dodyn;
5bd4f169
AM
16308 break;
16309
16310 /* Relocate against the beginning of the section. */
65f38f15
AM
16311 case R_PPC64_SECTOFF:
16312 case R_PPC64_SECTOFF_LO:
16313 case R_PPC64_SECTOFF_HI:
16314 case R_PPC64_SECTOFF_DS:
16315 case R_PPC64_SECTOFF_LO_DS:
16316 case R_PPC64_SECTOFF_HA:
4ce794b7 16317 if (sec != NULL)
65f38f15 16318 addend -= sec->output_section->vma;
5bd4f169
AM
16319 break;
16320
25f23106
AM
16321 case R_PPC64_REL16:
16322 case R_PPC64_REL16_LO:
16323 case R_PPC64_REL16_HI:
16324 case R_PPC64_REL16_HA:
4a969973
AM
16325 case R_PPC64_REL16_HIGH:
16326 case R_PPC64_REL16_HIGHA:
16327 case R_PPC64_REL16_HIGHER:
16328 case R_PPC64_REL16_HIGHERA:
16329 case R_PPC64_REL16_HIGHEST:
16330 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16331 case R_PPC64_REL16_HIGHER34:
16332 case R_PPC64_REL16_HIGHERA34:
16333 case R_PPC64_REL16_HIGHEST34:
16334 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16335 case R_PPC64_REL16DX_HA:
721956f4
AM
16336 case R_PPC64_REL14:
16337 case R_PPC64_REL14_BRNTAKEN:
16338 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16339 case R_PPC64_REL24:
05d0e962 16340 case R_PPC64_REL24_NOTOC:
5663e321
AM
16341 case R_PPC64_PCREL34:
16342 case R_PPC64_PCREL28:
5d1634d7
AM
16343 break;
16344
411e1bfb
AM
16345 case R_PPC64_TPREL16:
16346 case R_PPC64_TPREL16_LO:
16347 case R_PPC64_TPREL16_HI:
16348 case R_PPC64_TPREL16_HA:
16349 case R_PPC64_TPREL16_DS:
16350 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16351 case R_PPC64_TPREL16_HIGH:
16352 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16353 case R_PPC64_TPREL16_HIGHER:
16354 case R_PPC64_TPREL16_HIGHERA:
16355 case R_PPC64_TPREL16_HIGHEST:
16356 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16357 case R_PPC64_TPREL34:
766bc656
AM
16358 if (h != NULL
16359 && h->elf.root.type == bfd_link_hash_undefweak
16360 && h->elf.dynindx == -1)
16361 {
16362 /* Make this relocation against an undefined weak symbol
16363 resolve to zero. This is really just a tweak, since
16364 code using weak externs ought to check that they are
16365 defined before using them. */
16366 bfd_byte *p = contents + rel->r_offset - d_offset;
16367
95f0d0d2 16368 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16369 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16370 if (insn != 0)
95f0d0d2 16371 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16372 break;
16373 }
989f9879
AM
16374 if (htab->elf.tls_sec != NULL)
16375 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16376 /* The TPREL16 relocs shouldn't really be used in shared
16377 libs or with non-local symbols as that will result in
16378 DT_TEXTREL being set, but support them anyway. */
16379 goto dodyn;
411e1bfb
AM
16380
16381 case R_PPC64_DTPREL16:
16382 case R_PPC64_DTPREL16_LO:
16383 case R_PPC64_DTPREL16_HI:
16384 case R_PPC64_DTPREL16_HA:
16385 case R_PPC64_DTPREL16_DS:
16386 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16387 case R_PPC64_DTPREL16_HIGH:
16388 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16389 case R_PPC64_DTPREL16_HIGHER:
16390 case R_PPC64_DTPREL16_HIGHERA:
16391 case R_PPC64_DTPREL16_HIGHEST:
16392 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16393 case R_PPC64_DTPREL34:
989f9879
AM
16394 if (htab->elf.tls_sec != NULL)
16395 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16396 break;
16397
45965137
AM
16398 case R_PPC64_ADDR64_LOCAL:
16399 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16400 ? h->elf.other
16401 : sym->st_other);
16402 break;
16403
e515b051
AM
16404 case R_PPC64_DTPMOD64:
16405 relocation = 1;
16406 addend = 0;
16407 goto dodyn;
16408
411e1bfb 16409 case R_PPC64_TPREL64:
989f9879
AM
16410 if (htab->elf.tls_sec != NULL)
16411 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16412 goto dodyn;
16413
16414 case R_PPC64_DTPREL64:
989f9879
AM
16415 if (htab->elf.tls_sec != NULL)
16416 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16417 /* Fall through. */
411e1bfb 16418
65f38f15
AM
16419 /* Relocations that may need to be propagated if this is a
16420 dynamic object. */
04c9666a 16421 case R_PPC64_REL30:
65f38f15
AM
16422 case R_PPC64_REL32:
16423 case R_PPC64_REL64:
16424 case R_PPC64_ADDR14:
16425 case R_PPC64_ADDR14_BRNTAKEN:
16426 case R_PPC64_ADDR14_BRTAKEN:
16427 case R_PPC64_ADDR16:
16428 case R_PPC64_ADDR16_DS:
16429 case R_PPC64_ADDR16_HA:
16430 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16431 case R_PPC64_ADDR16_HIGH:
16432 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16433 case R_PPC64_ADDR16_HIGHER:
16434 case R_PPC64_ADDR16_HIGHERA:
16435 case R_PPC64_ADDR16_HIGHEST:
16436 case R_PPC64_ADDR16_HIGHESTA:
16437 case R_PPC64_ADDR16_LO:
16438 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16439 case R_PPC64_ADDR16_HIGHER34:
16440 case R_PPC64_ADDR16_HIGHERA34:
16441 case R_PPC64_ADDR16_HIGHEST34:
16442 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16443 case R_PPC64_ADDR24:
65f38f15
AM
16444 case R_PPC64_ADDR32:
16445 case R_PPC64_ADDR64:
16446 case R_PPC64_UADDR16:
16447 case R_PPC64_UADDR32:
16448 case R_PPC64_UADDR64:
5663e321
AM
16449 case R_PPC64_D34:
16450 case R_PPC64_D34_LO:
16451 case R_PPC64_D34_HI30:
16452 case R_PPC64_D34_HA30:
16453 case R_PPC64_D28:
411e1bfb 16454 dodyn:
5d1634d7 16455 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16456 break;
16457
41bd81ab
AM
16458 if (NO_OPD_RELOCS && is_opd)
16459 break;
16460
8a9e8e72 16461 if (bfd_link_pic (info)
b1b07054
AM
16462 ? ((h == NULL
16463 || h->dyn_relocs != NULL)
16464 && ((h != NULL && pc_dynrelocs (h))
16465 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16466 : (h != NULL
16467 ? h->dyn_relocs != NULL
d311bc8b 16468 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16469 {
b34976b6 16470 bfd_boolean skip, relocate;
65f38f15 16471 asection *sreloc;
1cf1f670 16472 bfd_vma out_off;
82e66161 16473 long indx = 0;
65f38f15
AM
16474
16475 /* When generating a dynamic object, these relocations
16476 are copied into the output file to be resolved at run
16477 time. */
16478
b34976b6
AM
16479 skip = FALSE;
16480 relocate = FALSE;
65f38f15 16481
1cf1f670
AM
16482 out_off = _bfd_elf_section_offset (output_bfd, info,
16483 input_section, rel->r_offset);
16484 if (out_off == (bfd_vma) -1)
b34976b6 16485 skip = TRUE;
1cf1f670 16486 else if (out_off == (bfd_vma) -2)
b34976b6 16487 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16488 out_off += (input_section->output_section->vma
16489 + input_section->output_offset);
16490 outrel.r_offset = out_off;
411e1bfb 16491 outrel.r_addend = rel->r_addend;
65f38f15 16492
1cf1f670
AM
16493 /* Optimize unaligned reloc use. */
16494 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16495 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16496 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16497 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16498 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16499 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16500 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16501 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16502 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16503
65f38f15 16504 if (skip)
0bb2d96a 16505 memset (&outrel, 0, sizeof outrel);
afe397ea 16506 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16507 && !is_opd
16508 && r_type != R_PPC64_TOC)
14acf4dc 16509 {
82e66161
AM
16510 indx = h->elf.dynindx;
16511 BFD_ASSERT (indx != -1);
16512 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16513 }
65f38f15
AM
16514 else
16515 {
41bd81ab
AM
16516 /* This symbol is local, or marked to become local,
16517 or this is an opd section reloc which must point
16518 at a local function. */
65f38f15 16519 outrel.r_addend += relocation;
e86ce104 16520 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16521 {
3fad3c7c 16522 if (is_opd && h != NULL)
afbe61cf
AM
16523 {
16524 /* Lie about opd entries. This case occurs
16525 when building shared libraries and we
16526 reference a function in another shared
3fad3c7c
AM
16527 lib. The same thing happens for a weak
16528 definition in an application that's
16529 overridden by a strong definition in a
16530 shared lib. (I believe this is a generic
16531 bug in binutils handling of weak syms.)
16532 In these cases we won't use the opd
1e2f5b6e 16533 entry in this lib. */
b34976b6 16534 unresolved_reloc = FALSE;
afbe61cf 16535 }
25f23106
AM
16536 if (!is_opd
16537 && r_type == R_PPC64_ADDR64
16538 && (h != NULL
16539 ? h->elf.type == STT_GNU_IFUNC
16540 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16541 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16542 else
16543 {
16544 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16545
25f23106
AM
16546 /* We need to relocate .opd contents for ld.so.
16547 Prelink also wants simple and consistent rules
16548 for relocs. This make all RELATIVE relocs have
16549 *r_offset equal to r_addend. */
16550 relocate = TRUE;
16551 }
65f38f15
AM
16552 }
16553 else
16554 {
25f23106
AM
16555 if (h != NULL
16556 ? h->elf.type == STT_GNU_IFUNC
16557 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16558 {
25f53a85 16559 info->callbacks->einfo
695344c0 16560 /* xgettext:c-format */
174d0a74 16561 (_("%H: %s for indirect "
c1c8c1ef 16562 "function `%pT' unsupported\n"),
25f53a85 16563 input_bfd, input_section, rel->r_offset,
25f23106
AM
16564 ppc64_elf_howto_table[r_type]->name,
16565 sym_name);
16566 ret = FALSE;
16567 }
cf35638d 16568 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16569 ;
16570 else if (sec == NULL || sec->owner == NULL)
16571 {
16572 bfd_set_error (bfd_error_bad_value);
b34976b6 16573 return FALSE;
65f38f15
AM
16574 }
16575 else
16576 {
f26a3287 16577 asection *osec = sec->output_section;
65f38f15 16578
f26a3287
AM
16579 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16580 {
16581 /* TLS symbol values are relative to the
16582 TLS segment. Dynamic relocations for
16583 local TLS symbols therefore can't be
16584 reduced to a relocation against their
16585 section symbol because it holds the
16586 address of the section, not a value
16587 relative to the TLS segment. We could
16588 change the .tdata dynamic section symbol
16589 to be zero value but STN_UNDEF works
16590 and is used elsewhere, eg. for TPREL64
16591 GOT relocs against local TLS symbols. */
16592 osec = htab->elf.tls_sec;
16593 indx = 0;
16594 }
16595 else
74541ad4 16596 {
74541ad4 16597 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16598 if (indx == 0)
16599 {
16600 if ((osec->flags & SEC_READONLY) == 0
16601 && htab->elf.data_index_section != NULL)
16602 osec = htab->elf.data_index_section;
16603 else
16604 osec = htab->elf.text_index_section;
16605 indx = elf_section_data (osec)->dynindx;
16606 }
16607 BFD_ASSERT (indx != 0);
74541ad4 16608 }
74541ad4 16609
65f38f15
AM
16610 /* We are turning this relocation into one
16611 against a section symbol, so subtract out
16612 the output section's address but not the
16613 offset of the input section in the output
16614 section. */
16615 outrel.r_addend -= osec->vma;
16616 }
16617
16618 outrel.r_info = ELF64_R_INFO (indx, r_type);
16619 }
16620 }
16621
16622 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16623 if (h != NULL
16624 ? h->elf.type == STT_GNU_IFUNC
16625 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16626 {
16627 sreloc = htab->elf.irelplt;
16628 if (indx == 0)
16629 htab->local_ifunc_resolver = 1;
16630 else if (is_static_defined (&h->elf))
16631 htab->maybe_local_ifunc_resolver = 1;
16632 }
65f38f15
AM
16633 if (sreloc == NULL)
16634 abort ();
16635
dfbb6ac9
AM
16636 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16637 >= sreloc->size)
16638 abort ();
947216bf
AM
16639 loc = sreloc->contents;
16640 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16641 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16642
e59a1001
AM
16643 if (!warned_dynamic
16644 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16645 {
16646 info->callbacks->einfo
16647 /* xgettext:c-format */
16648 (_("%X%P: %pB: %s against %pT "
16649 "is not supported by glibc as a dynamic relocation\n"),
16650 input_bfd,
16651 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16652 sym_name);
16653 warned_dynamic = TRUE;
16654 }
16655
65f38f15
AM
16656 /* If this reloc is against an external symbol, it will
16657 be computed at runtime, so there's no need to do
81407a69
AM
16658 anything now. However, for the sake of prelink ensure
16659 that the section contents are a known value. */
2cdcc330 16660 if (!relocate)
81407a69
AM
16661 {
16662 unresolved_reloc = FALSE;
16663 /* The value chosen here is quite arbitrary as ld.so
16664 ignores section contents except for the special
16665 case of .opd where the contents might be accessed
16666 before relocation. Choose zero, as that won't
16667 cause reloc overflow. */
16668 relocation = 0;
16669 addend = 0;
16670 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16671 to improve backward compatibility with older
16672 versions of ld. */
16673 if (r_type == R_PPC64_ADDR64)
16674 addend = outrel.r_addend;
16675 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16676 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16677 addend = outrel.r_offset;
81407a69 16678 }
65f38f15 16679 }
5bd4f169
AM
16680 break;
16681
65f38f15
AM
16682 case R_PPC64_COPY:
16683 case R_PPC64_GLOB_DAT:
16684 case R_PPC64_JMP_SLOT:
25f23106 16685 case R_PPC64_JMP_IREL:
65f38f15
AM
16686 case R_PPC64_RELATIVE:
16687 /* We shouldn't ever see these dynamic relocs in relocatable
16688 files. */
ae9a127f 16689 /* Fall through. */
65f38f15
AM
16690
16691 case R_PPC64_PLTGOT16:
16692 case R_PPC64_PLTGOT16_DS:
16693 case R_PPC64_PLTGOT16_HA:
16694 case R_PPC64_PLTGOT16_HI:
16695 case R_PPC64_PLTGOT16_LO:
16696 case R_PPC64_PLTGOT16_LO_DS:
16697 case R_PPC64_PLTREL32:
16698 case R_PPC64_PLTREL64:
16699 /* These ones haven't been implemented yet. */
16700
25f53a85 16701 info->callbacks->einfo
695344c0 16702 /* xgettext:c-format */
c1c8c1ef 16703 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16704 input_bfd,
4ce794b7 16705 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16706
16707 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16708 ret = FALSE;
c316a17c 16709 goto copy_reloc;
65f38f15 16710 }
5bd4f169 16711
67f0cbdb
AM
16712 /* Multi-instruction sequences that access the TOC can be
16713 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16714 to nop; addi rb,r2,x; */
67f0cbdb
AM
16715 switch (r_type)
16716 {
16717 default:
16718 break;
16719
16720 case R_PPC64_GOT_TLSLD16_HI:
16721 case R_PPC64_GOT_TLSGD16_HI:
16722 case R_PPC64_GOT_TPREL16_HI:
16723 case R_PPC64_GOT_DTPREL16_HI:
16724 case R_PPC64_GOT16_HI:
16725 case R_PPC64_TOC16_HI:
16726 /* These relocs would only be useful if building up an
16727 offset to later add to r2, perhaps in an indexed
16728 addressing mode instruction. Don't try to optimize.
16729 Unfortunately, the possibility of someone building up an
16730 offset like this or even with the HA relocs, means that
16731 we need to check the high insn when optimizing the low
16732 insn. */
16733 break;
16734
5663e321
AM
16735 case R_PPC64_PLTCALL_NOTOC:
16736 if (!unresolved_reloc)
16737 htab->notoc_plt = 1;
16738 /* Fall through. */
23cedd1d
AM
16739 case R_PPC64_PLTCALL:
16740 if (unresolved_reloc)
16741 {
16742 /* No plt entry. Make this into a direct call. */
16743 bfd_byte *p = contents + rel->r_offset;
16744 insn = bfd_get_32 (input_bfd, p);
16745 insn &= 1;
16746 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16747 if (r_type == R_PPC64_PLTCALL)
16748 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16749 unresolved_reloc = save_unresolved_reloc;
16750 r_type = R_PPC64_REL24;
16751 }
16752 break;
16753
5663e321 16754 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16755 case R_PPC64_PLTSEQ:
16756 if (unresolved_reloc)
16757 {
16758 unresolved_reloc = FALSE;
16759 goto nop_it;
16760 }
16761 break;
16762
5663e321
AM
16763 case R_PPC64_PLT_PCREL34_NOTOC:
16764 if (!unresolved_reloc)
16765 htab->notoc_plt = 1;
16766 /* Fall through. */
16767 case R_PPC64_PLT_PCREL34:
16768 if (unresolved_reloc)
16769 {
16770 bfd_byte *p = contents + rel->r_offset;
16771 bfd_put_32 (input_bfd, PNOP >> 32, p);
16772 bfd_put_32 (input_bfd, PNOP, p + 4);
16773 unresolved_reloc = FALSE;
16774 goto copy_reloc;
16775 }
16776 break;
16777
23cedd1d
AM
16778 case R_PPC64_PLT16_HA:
16779 if (unresolved_reloc)
16780 {
16781 unresolved_reloc = FALSE;
16782 goto nop_it;
16783 }
16784 /* Fall through. */
67f0cbdb
AM
16785 case R_PPC64_GOT_TLSLD16_HA:
16786 case R_PPC64_GOT_TLSGD16_HA:
16787 case R_PPC64_GOT_TPREL16_HA:
16788 case R_PPC64_GOT_DTPREL16_HA:
16789 case R_PPC64_GOT16_HA:
16790 case R_PPC64_TOC16_HA:
98528052 16791 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16792 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16793 {
23cedd1d
AM
16794 bfd_byte *p;
16795 nop_it:
16796 p = contents + (rel->r_offset & ~3);
98528052 16797 bfd_put_32 (input_bfd, NOP, p);
d830549d 16798 goto copy_reloc;
98528052 16799 }
67f0cbdb
AM
16800 break;
16801
23cedd1d
AM
16802 case R_PPC64_PLT16_LO:
16803 case R_PPC64_PLT16_LO_DS:
16804 if (unresolved_reloc)
16805 {
16806 unresolved_reloc = FALSE;
16807 goto nop_it;
16808 }
16809 /* Fall through. */
67f0cbdb
AM
16810 case R_PPC64_GOT_TLSLD16_LO:
16811 case R_PPC64_GOT_TLSGD16_LO:
16812 case R_PPC64_GOT_TPREL16_LO_DS:
16813 case R_PPC64_GOT_DTPREL16_LO_DS:
16814 case R_PPC64_GOT16_LO:
16815 case R_PPC64_GOT16_LO_DS:
16816 case R_PPC64_TOC16_LO:
16817 case R_PPC64_TOC16_LO_DS:
98528052 16818 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16819 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16820 {
16821 bfd_byte *p = contents + (rel->r_offset & ~3);
16822 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16823 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16824 {
16825 /* Transform addic to addi when we change reg. */
2365f8d7 16826 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16827 insn |= (14u << 26) | (2 << 16);
16828 }
16829 else
67f0cbdb 16830 {
98528052
AM
16831 insn &= ~(0x1f << 16);
16832 insn |= 2 << 16;
67f0cbdb 16833 }
560c8763 16834 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16835 }
16836 break;
9a23f96e
AM
16837
16838 case R_PPC64_TPREL16_HA:
16839 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16840 {
16841 bfd_byte *p = contents + (rel->r_offset & ~3);
16842 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16843 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16844 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16845 /* xgettext:c-format */
16846 info->callbacks->minfo
16847 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16848 input_bfd, input_section, rel->r_offset,
16849 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16850 else
d830549d
AM
16851 {
16852 bfd_put_32 (input_bfd, NOP, p);
16853 goto copy_reloc;
16854 }
9a23f96e
AM
16855 }
16856 break;
16857
16858 case R_PPC64_TPREL16_LO:
16859 case R_PPC64_TPREL16_LO_DS:
16860 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16861 {
16862 bfd_byte *p = contents + (rel->r_offset & ~3);
16863 insn = bfd_get_32 (input_bfd, p);
16864 insn &= ~(0x1f << 16);
16865 insn |= 13 << 16;
16866 bfd_put_32 (input_bfd, insn, p);
16867 }
16868 break;
67f0cbdb
AM
16869 }
16870
65f38f15
AM
16871 /* Do any further special processing. */
16872 switch (r_type)
16873 {
16874 default:
16875 break;
16876
25f23106 16877 case R_PPC64_REL16_HA:
4a969973
AM
16878 case R_PPC64_REL16_HIGHA:
16879 case R_PPC64_REL16_HIGHERA:
16880 case R_PPC64_REL16_HIGHESTA:
a680de9a 16881 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16882 case R_PPC64_ADDR16_HA:
16883 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16884 case R_PPC64_ADDR16_HIGHERA:
16885 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16886 case R_PPC64_TOC16_HA:
16887 case R_PPC64_SECTOFF_HA:
411e1bfb 16888 case R_PPC64_TPREL16_HA:
f9c6b907 16889 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16890 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16891 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16892 case R_PPC64_DTPREL16_HA:
16893 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16894 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16895 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16896 /* It's just possible that this symbol is a weak symbol
16897 that's not actually defined anywhere. In that case,
16898 'sec' would be NULL, and we should leave the symbol
16899 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16900 if (sec == NULL)
16901 break;
1a0670f3 16902 /* Fall through. */
5c5f6e17
AM
16903
16904 case R_PPC64_GOT16_HA:
16905 case R_PPC64_PLTGOT16_HA:
16906 case R_PPC64_PLT16_HA:
16907 case R_PPC64_GOT_TLSGD16_HA:
16908 case R_PPC64_GOT_TLSLD16_HA:
16909 case R_PPC64_GOT_TPREL16_HA:
16910 case R_PPC64_GOT_DTPREL16_HA:
16911 /* Add 0x10000 if sign bit in 0:15 is set.
16912 Bits 0:15 are not used. */
16913 addend += 0x8000;
65f38f15
AM
16914 break;
16915
5663e321
AM
16916 case R_PPC64_D34_HA30:
16917 case R_PPC64_ADDR16_HIGHERA34:
16918 case R_PPC64_ADDR16_HIGHESTA34:
16919 case R_PPC64_REL16_HIGHERA34:
16920 case R_PPC64_REL16_HIGHESTA34:
16921 if (sec != NULL)
16922 addend += 1ULL << 33;
16923 break;
16924
65f38f15
AM
16925 case R_PPC64_ADDR16_DS:
16926 case R_PPC64_ADDR16_LO_DS:
16927 case R_PPC64_GOT16_DS:
16928 case R_PPC64_GOT16_LO_DS:
16929 case R_PPC64_PLT16_LO_DS:
16930 case R_PPC64_SECTOFF_DS:
16931 case R_PPC64_SECTOFF_LO_DS:
16932 case R_PPC64_TOC16_DS:
16933 case R_PPC64_TOC16_LO_DS:
16934 case R_PPC64_PLTGOT16_DS:
16935 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16936 case R_PPC64_GOT_TPREL16_DS:
16937 case R_PPC64_GOT_TPREL16_LO_DS:
16938 case R_PPC64_GOT_DTPREL16_DS:
16939 case R_PPC64_GOT_DTPREL16_LO_DS:
16940 case R_PPC64_TPREL16_DS:
16941 case R_PPC64_TPREL16_LO_DS:
16942 case R_PPC64_DTPREL16_DS:
16943 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16944 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16945 mask = 3;
a680de9a
PB
16946 /* If this reloc is against an lq, lxv, or stxv insn, then
16947 the value must be a multiple of 16. This is somewhat of
16948 a hack, but the "correct" way to do this by defining _DQ
16949 forms of all the _DS relocs bloats all reloc switches in
16950 this file. It doesn't make much sense to use these
16951 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
16952 if ((insn & (0x3fu << 26)) == (56u << 26)
16953 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16954 mask = 15;
a680de9a
PB
16955 relocation += addend;
16956 addend = insn & (mask ^ 3);
16957 if ((relocation & mask) != 0)
65f38f15 16958 {
a680de9a 16959 relocation ^= relocation & mask;
25f53a85 16960 info->callbacks->einfo
695344c0 16961 /* xgettext:c-format */
174d0a74 16962 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16963 input_bfd, input_section, rel->r_offset,
d830549d 16964 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16965 mask + 1);
65f38f15 16966 bfd_set_error (bfd_error_bad_value);
b34976b6 16967 ret = FALSE;
c316a17c 16968 goto copy_reloc;
65f38f15
AM
16969 }
16970 break;
5bd4f169
AM
16971 }
16972
239e1f3a
AM
16973 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16974 because such sections are not SEC_ALLOC and thus ld.so will
16975 not process them. */
d830549d 16976 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16977 if (unresolved_reloc
239e1f3a 16978 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16979 && h->elf.def_dynamic)
16980 && _bfd_elf_section_offset (output_bfd, info, input_section,
16981 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16982 {
25f53a85 16983 info->callbacks->einfo
695344c0 16984 /* xgettext:c-format */
c1c8c1ef 16985 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16986 input_bfd, input_section, rel->r_offset,
b80eed39 16987 howto->name,
039b3fef 16988 h->elf.root.root.string);
b34976b6 16989 ret = FALSE;
9c07fe7c 16990 }
5bd4f169 16991
b80eed39
AM
16992 /* 16-bit fields in insns mostly have signed values, but a
16993 few insns have 16-bit unsigned values. Really, we should
16994 have different reloc types. */
16995 if (howto->complain_on_overflow != complain_overflow_dont
16996 && howto->dst_mask == 0xffff
16997 && (input_section->flags & SEC_CODE) != 0)
16998 {
16999 enum complain_overflow complain = complain_overflow_signed;
17000
17001 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17002 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17003 complain = complain_overflow_bitfield;
17004 else if (howto->rightshift == 0
2365f8d7
AM
17005 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17006 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17007 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17008 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17009 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17010 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17011 complain = complain_overflow_unsigned;
17012 if (howto->complain_on_overflow != complain)
17013 {
17014 alt_howto = *howto;
17015 alt_howto.complain_on_overflow = complain;
17016 howto = &alt_howto;
17017 }
17018 }
17019
5663e321 17020 switch (r_type)
a680de9a 17021 {
5663e321
AM
17022 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17023 case R_PPC64_D34:
17024 case R_PPC64_D34_LO:
17025 case R_PPC64_D34_HI30:
17026 case R_PPC64_D34_HA30:
17027 case R_PPC64_PCREL34:
17028 case R_PPC64_GOT_PCREL34:
c213164a
AM
17029 case R_PPC64_TPREL34:
17030 case R_PPC64_DTPREL34:
17031 case R_PPC64_GOT_TLSGD34:
17032 case R_PPC64_GOT_TLSLD34:
17033 case R_PPC64_GOT_TPREL34:
17034 case R_PPC64_GOT_DTPREL34:
5663e321
AM
17035 case R_PPC64_PLT_PCREL34:
17036 case R_PPC64_PLT_PCREL34_NOTOC:
17037 case R_PPC64_D28:
17038 case R_PPC64_PCREL28:
17039 if (rel->r_offset + 8 > input_section->size)
17040 r = bfd_reloc_outofrange;
17041 else
17042 {
5663e321
AM
17043 relocation += addend;
17044 if (howto->pc_relative)
17045 relocation -= (rel->r_offset
17046 + input_section->output_offset
17047 + input_section->output_section->vma);
17048 relocation >>= howto->rightshift;
17049
17050 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17051 pinsn <<= 32;
17052 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17053
17054 pinsn &= ~howto->dst_mask;
17055 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17056 & howto->dst_mask);
17057 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17058 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17059 r = bfd_reloc_ok;
17060 if (howto->complain_on_overflow == complain_overflow_signed
17061 && (relocation + (1ULL << (howto->bitsize - 1))
17062 >= 1ULL << howto->bitsize))
17063 r = bfd_reloc_overflow;
17064 }
17065 break;
17066
17067 case R_PPC64_REL16DX_HA:
a680de9a
PB
17068 if (rel->r_offset + 4 > input_section->size)
17069 r = bfd_reloc_outofrange;
17070 else
17071 {
17072 relocation += addend;
17073 relocation -= (rel->r_offset
17074 + input_section->output_offset
17075 + input_section->output_section->vma);
3de43e7b 17076 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17077 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17078 insn &= ~0x1fffc1;
3de43e7b 17079 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17080 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17081 r = bfd_reloc_ok;
3de43e7b 17082 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17083 r = bfd_reloc_overflow;
17084 }
5663e321
AM
17085 break;
17086
17087 default:
17088 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17089 contents, rel->r_offset,
17090 relocation, addend);
a680de9a 17091 }
5bd4f169 17092
ef60b7ff 17093 if (r != bfd_reloc_ok)
5bd4f169 17094 {
bc30df16 17095 char *more_info = NULL;
b80eed39 17096 const char *reloc_name = howto->name;
bc30df16
AM
17097
17098 if (reloc_dest != DEST_NORMAL)
17099 {
17100 more_info = bfd_malloc (strlen (reloc_name) + 8);
17101 if (more_info != NULL)
17102 {
17103 strcpy (more_info, reloc_name);
17104 strcat (more_info, (reloc_dest == DEST_OPD
17105 ? " (OPD)" : " (stub)"));
17106 reloc_name = more_info;
17107 }
17108 }
17109
cd27b276 17110 if (r == bfd_reloc_overflow)
5bd4f169 17111 {
8131c122
AM
17112 /* On code like "if (foo) foo();" don't report overflow
17113 on a branch to zero when foo is undefined. */
17114 if (!warned
17115 && (reloc_dest == DEST_STUB
17116 || !(h != NULL
17117 && (h->elf.root.type == bfd_link_hash_undefweak
17118 || h->elf.root.type == bfd_link_hash_undefined)
17119 && is_branch_reloc (r_type))))
1a72702b
AM
17120 info->callbacks->reloc_overflow (info, &h->elf.root,
17121 sym_name, reloc_name,
17122 orig_rel.r_addend,
17123 input_bfd, input_section,
17124 rel->r_offset);
ef60b7ff
AM
17125 }
17126 else
17127 {
25f53a85 17128 info->callbacks->einfo
695344c0 17129 /* xgettext:c-format */
c1c8c1ef 17130 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17131 input_bfd, input_section, rel->r_offset,
bc30df16 17132 reloc_name, sym_name, (int) r);
b34976b6 17133 ret = FALSE;
ef60b7ff 17134 }
bc30df16
AM
17135 if (more_info != NULL)
17136 free (more_info);
5bd4f169 17137 }
c316a17c
AM
17138 copy_reloc:
17139 if (wrel != rel)
17140 *wrel = *rel;
17141 }
17142
17143 if (wrel != rel)
17144 {
17145 Elf_Internal_Shdr *rel_hdr;
17146 size_t deleted = rel - wrel;
17147
17148 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17149 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17150 if (rel_hdr->sh_size == 0)
17151 {
17152 /* It is too late to remove an empty reloc section. Leave
17153 one NONE reloc.
17154 ??? What is wrong with an empty section??? */
17155 rel_hdr->sh_size = rel_hdr->sh_entsize;
17156 deleted -= 1;
17157 }
17158 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17159 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17160 input_section->reloc_count -= deleted;
5bd4f169
AM
17161 }
17162
645ea6a9
AM
17163 /* If we're emitting relocations, then shortly after this function
17164 returns, reloc offsets and addends for this section will be
17165 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17166 file rather than the input. Save a copy of the relocs for
17167 opd_entry_value. */
0e1862bb 17168 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17169 {
17170 bfd_size_type amt;
17171 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17172 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17173 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17174 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17175 if (rel == NULL)
17176 return FALSE;
17177 memcpy (rel, relocs, amt);
17178 }
5bd4f169
AM
17179 return ret;
17180}
17181
754021d0
AM
17182/* Adjust the value of any local symbols in opd sections. */
17183
6e0b88f1 17184static int
754021d0
AM
17185ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17186 const char *name ATTRIBUTE_UNUSED,
17187 Elf_Internal_Sym *elfsym,
17188 asection *input_sec,
17189 struct elf_link_hash_entry *h)
17190{
74f0fb50
AM
17191 struct _opd_sec_data *opd;
17192 long adjust;
754021d0
AM
17193 bfd_vma value;
17194
4025353c 17195 if (h != NULL)
6e0b88f1 17196 return 1;
4025353c 17197
74f0fb50
AM
17198 opd = get_opd_info (input_sec);
17199 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17200 return 1;
754021d0
AM
17201
17202 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17203 if (!bfd_link_relocatable (info))
754021d0
AM
17204 value -= input_sec->output_section->vma;
17205
51aecdc5 17206 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17207 if (adjust == -1)
6e0b88f1
AM
17208 return 2;
17209
17210 elfsym->st_value += adjust;
17211 return 1;
754021d0
AM
17212}
17213
5bd4f169
AM
17214/* Finish up dynamic symbol handling. We set the contents of various
17215 dynamic sections here. */
17216
b34976b6 17217static bfd_boolean
4ce794b7
AM
17218ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17219 struct bfd_link_info *info,
17220 struct elf_link_hash_entry *h,
4aef7643 17221 Elf_Internal_Sym *sym)
5bd4f169 17222{
65f38f15 17223 struct ppc_link_hash_table *htab;
8387904d 17224 struct plt_entry *ent;
5bd4f169 17225
65f38f15 17226 htab = ppc_hash_table (info);
4dfe6ac6
NC
17227 if (htab == NULL)
17228 return FALSE;
5bd4f169 17229
49c09209
AM
17230 if (!htab->opd_abi && !h->def_regular)
17231 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17232 if (ent->plt.offset != (bfd_vma) -1)
17233 {
17234 /* Mark the symbol as undefined, rather than as
17235 defined in glink. Leave the value if there were
17236 any relocations where pointer equality matters
17237 (this is a clue for the dynamic linker, to make
17238 function pointer comparisons work between an
17239 application and shared library), otherwise set it
17240 to zero. */
17241 sym->st_shndx = SHN_UNDEF;
17242 if (!h->pointer_equality_needed)
17243 sym->st_value = 0;
17244 else if (!h->ref_regular_nonweak)
17245 {
17246 /* This breaks function pointer comparisons, but
17247 that is better than breaking tests for a NULL
17248 function pointer. */
17249 sym->st_value = 0;
17250 }
17251 break;
17252 }
5bd4f169 17253
1bdd8fac
AM
17254 if (h->needs_copy
17255 && (h->root.type == bfd_link_hash_defined
17256 || h->root.type == bfd_link_hash_defweak)
17257 && (h->root.u.def.section == htab->elf.sdynbss
17258 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17259 {
65f38f15 17260 /* This symbol needs a copy reloc. Set it up. */
49c09209 17261 Elf_Internal_Rela rela;
5474d94f 17262 asection *srel;
49c09209 17263 bfd_byte *loc;
5bd4f169 17264
1bdd8fac 17265 if (h->dynindx == -1)
65f38f15 17266 abort ();
5bd4f169 17267
ed7007c1 17268 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17269 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17270 rela.r_addend = 0;
afbf7e8e 17271 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17272 srel = htab->elf.sreldynrelro;
17273 else
17274 srel = htab->elf.srelbss;
17275 loc = srel->contents;
17276 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17277 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17278 }
17279
b34976b6 17280 return TRUE;
5bd4f169
AM
17281}
17282
65f38f15
AM
17283/* Used to decide how to sort relocs in an optimal manner for the
17284 dynamic linker, before writing them out. */
17285
17286static enum elf_reloc_type_class
7e612e98
AM
17287ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17288 const asection *rel_sec,
17289 const Elf_Internal_Rela *rela)
65f38f15 17290{
04c9666a 17291 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17292 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17293
33e44f2e 17294 if (rel_sec == htab->elf.irelplt)
7e612e98 17295 return reloc_class_ifunc;
a33d1f77 17296
4ce794b7 17297 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17298 switch (r_type)
65f38f15
AM
17299 {
17300 case R_PPC64_RELATIVE:
17301 return reloc_class_relative;
17302 case R_PPC64_JMP_SLOT:
17303 return reloc_class_plt;
17304 case R_PPC64_COPY:
17305 return reloc_class_copy;
17306 default:
17307 return reloc_class_normal;
17308 }
17309}
17310
5bd4f169
AM
17311/* Finish up the dynamic sections. */
17312
b34976b6 17313static bfd_boolean
4ce794b7
AM
17314ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17315 struct bfd_link_info *info)
5bd4f169 17316{
65f38f15
AM
17317 struct ppc_link_hash_table *htab;
17318 bfd *dynobj;
5bd4f169 17319 asection *sdyn;
5bd4f169 17320
65f38f15 17321 htab = ppc_hash_table (info);
4dfe6ac6
NC
17322 if (htab == NULL)
17323 return FALSE;
17324
65f38f15 17325 dynobj = htab->elf.dynobj;
3d4d4302 17326 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17327
65f38f15 17328 if (htab->elf.dynamic_sections_created)
5bd4f169 17329 {
5bd4f169
AM
17330 Elf64_External_Dyn *dyncon, *dynconend;
17331
33e44f2e 17332 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17333 abort ();
5bd4f169
AM
17334
17335 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17336 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17337 for (; dyncon < dynconend; dyncon++)
17338 {
17339 Elf_Internal_Dyn dyn;
19397422 17340 asection *s;
5bd4f169
AM
17341
17342 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17343
17344 switch (dyn.d_tag)
17345 {
65f38f15
AM
17346 default:
17347 continue;
5bd4f169 17348
5d1634d7 17349 case DT_PPC64_GLINK:
4ce794b7 17350 s = htab->glink;
6348e046 17351 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17352 /* We stupidly defined DT_PPC64_GLINK to be the start
17353 of glink rather than the first entry point, which is
17354 what ld.so needs, and now have a bigger stub to
17355 support automatic multiple TOCs. */
9e390558 17356 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17357 break;
17358
19397422
AM
17359 case DT_PPC64_OPD:
17360 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17361 if (s == NULL)
17362 continue;
17363 dyn.d_un.d_ptr = s->vma;
19397422
AM
17364 break;
17365
e8910a83 17366 case DT_PPC64_OPT:
5663e321
AM
17367 if ((htab->do_multi_toc && htab->multi_toc_needed)
17368 || htab->notoc_plt)
e8910a83 17369 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17370 if (htab->has_plt_localentry0)
17371 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17372 break;
17373
19397422
AM
17374 case DT_PPC64_OPDSZ:
17375 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17376 if (s == NULL)
17377 continue;
eea6121a 17378 dyn.d_un.d_val = s->size;
19397422
AM
17379 break;
17380
65f38f15 17381 case DT_PLTGOT:
33e44f2e 17382 s = htab->elf.splt;
6348e046 17383 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17384 break;
17385
17386 case DT_JMPREL:
33e44f2e 17387 s = htab->elf.srelplt;
6348e046 17388 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17389 break;
5bd4f169 17390
65f38f15 17391 case DT_PLTRELSZ:
33e44f2e 17392 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17393 break;
82e66161
AM
17394
17395 case DT_TEXTREL:
17396 if (htab->local_ifunc_resolver)
17397 info->callbacks->einfo
17398 (_("%X%P: text relocations and GNU indirect "
17399 "functions will result in a segfault at runtime\n"));
17400 else if (htab->maybe_local_ifunc_resolver)
17401 info->callbacks->einfo
17402 (_("%P: warning: text relocations and GNU indirect "
17403 "functions may result in a segfault at runtime\n"));
17404 continue;
5bd4f169 17405 }
5bd4f169 17406
65f38f15 17407 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17408 }
5bd4f169
AM
17409 }
17410
6528b6eb
AM
17411 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17412 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17413 {
17414 /* Fill in the first entry in the global offset table.
17415 We use it to hold the link-time TOCbase. */
17416 bfd_put_64 (output_bfd,
60ee0d4a 17417 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17418 htab->elf.sgot->contents);
5d1634d7
AM
17419
17420 /* Set .got entry size. */
2cdcc330
AM
17421 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17422 = 8;
5d1634d7
AM
17423 }
17424
6528b6eb
AM
17425 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17426 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17427 {
17428 /* Set .plt entry size. */
33e44f2e 17429 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17430 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17431 }
17432
84f5d08e
AM
17433 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17434 brlt ourselves if emitrelocations. */
17435 if (htab->brlt != NULL
17436 && htab->brlt->reloc_count != 0
17437 && !_bfd_elf_link_output_relocs (output_bfd,
17438 htab->brlt,
d4730f92 17439 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17440 elf_section_data (htab->brlt)->relocs,
17441 NULL))
17442 return FALSE;
17443
176a0d42
AM
17444 if (htab->glink != NULL
17445 && htab->glink->reloc_count != 0
17446 && !_bfd_elf_link_output_relocs (output_bfd,
17447 htab->glink,
d4730f92 17448 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17449 elf_section_data (htab->glink)->relocs,
17450 NULL))
17451 return FALSE;
17452
da44f4e5 17453
df136d64
AM
17454 if (htab->glink_eh_frame != NULL
17455 && htab->glink_eh_frame->size != 0
17456 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17457 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17458 htab->glink_eh_frame,
17459 htab->glink_eh_frame->contents))
17460 return FALSE;
58d180e8 17461
e717da7e 17462 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17463 since we didn't add them to DYNOBJ. We know dynobj is the first
17464 bfd. */
c72f2fb2 17465 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17466 {
17467 asection *s;
7b53ace3 17468
0c8d6e5c 17469 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17470 continue;
17471
e717da7e
AM
17472 s = ppc64_elf_tdata (dynobj)->got;
17473 if (s != NULL
eea6121a 17474 && s->size != 0
e717da7e
AM
17475 && s->output_section != bfd_abs_section_ptr
17476 && !bfd_set_section_contents (output_bfd, s->output_section,
17477 s->contents, s->output_offset,
eea6121a 17478 s->size))
e717da7e
AM
17479 return FALSE;
17480 s = ppc64_elf_tdata (dynobj)->relgot;
17481 if (s != NULL
eea6121a 17482 && s->size != 0
e717da7e
AM
17483 && s->output_section != bfd_abs_section_ptr
17484 && !bfd_set_section_contents (output_bfd, s->output_section,
17485 s->contents, s->output_offset,
eea6121a 17486 s->size))
e717da7e
AM
17487 return FALSE;
17488 }
f6c52c13 17489
b34976b6 17490 return TRUE;
5bd4f169
AM
17491}
17492
5bd4f169 17493#include "elf64-target.h"
7b8e7dad
AM
17494
17495/* FreeBSD support */
17496
17497#undef TARGET_LITTLE_SYM
17498#undef TARGET_LITTLE_NAME
17499
17500#undef TARGET_BIG_SYM
6d00b590 17501#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17502#undef TARGET_BIG_NAME
17503#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17504
17505#undef ELF_OSABI
17506#define ELF_OSABI ELFOSABI_FREEBSD
17507
17508#undef elf64_bed
17509#define elf64_bed elf64_powerpc_fbsd_bed
17510
17511#include "elf64-target.h"
This page took 2.811055 seconds and 4 git commands to generate.