PowerPC64 ld --no-power10-stubs
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
bf577467 128#define elf_backend_section_flags ppc64_elf_section_flags
6911b7dc 129#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 130#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 131#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 132
5bd4f169
AM
133/* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 138#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 139#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
140
141/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 142#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 143
a078d95a
AM
144/* Offsets to some stack save slots. */
145#define STK_LR 16
146#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 147/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
5bd4f169 152/* TOC base pointers offset from start of TOC. */
411e1bfb 153#define TOC_BASE_OFF 0x8000
a27e685f
AM
154/* TOC base alignment. */
155#define TOC_BASE_ALIGN 256
411e1bfb
AM
156
157/* Offset of tp and dtp pointers from start of TLS block. */
158#define TP_OFFSET 0x7000
159#define DTP_OFFSET 0x8000
5bd4f169 160
ad8e1ba5
AM
161/* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 163 insert an addi to adjust r11. */
a078d95a 164#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
165#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
170#define BCTR 0x4e800420 /* bctr */
171
07d6d2b8 172#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
173#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
175#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183#define BNECTR 0x4ca20420 /* bnectr+ */
184#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 185
71a39c98 186#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 187#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 188#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 189
07d6d2b8
AM
190#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 193
04bdff6a 194#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 195#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 196#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 197#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
198#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 200#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 201#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 202#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 203#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 204#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 205#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 206#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
207#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
210#define PADDI_R12_PC 0x0610000039800000ULL
211#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 212#define PNOP 0x0700000000000000ULL
a345bc8d 213
9e390558
AM
214/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220#define MFLR_R12 0x7d8802a6 /* mflr %12 */
221#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 224 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 225#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
226#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
ee4bf8d2 231 /* bctr */
b9e5796b
AM
232#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
237
238/* Pad with this. */
239#define NOP 0x60000000
240
721956f4
AM
241/* Some other nops. */
242#define CROR_151515 0x4def7b82
243#define CROR_313131 0x4ffffb82
244
cedb70c5 245/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
246#define LI_R0_0 0x38000000 /* li %r0,0 */
247#define B_DOT 0x48000000 /* b . */
248
249/* After that, we need two instructions to load the index, followed by
250 a branch. */
251#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 252#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 253
deb0e272
AM
254/* Instructions used by the save and restore reg functions. */
255#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
259#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
261#define LI_R12_0 0x39800000 /* li %r12,0 */
262#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
265#define BLR 0x4e800020 /* blr */
266
41bd81ab
AM
267/* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 270 relocate .opd without reloc entries. */
41bd81ab
AM
271#ifndef NO_OPD_RELOCS
272#define NO_OPD_RELOCS 0
273#endif
810d4e75 274
a4b6fadd
AM
275#ifndef ARRAY_SIZE
276#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277#endif
278
810d4e75
AM
279static inline int
280abiversion (bfd *abfd)
281{
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283}
284
285static inline void
286set_abiversion (bfd *abfd, int ver)
287{
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290}
5bd4f169
AM
291\f
292/* Relocation HOWTO's. */
46807bf4
AM
293/* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
04c9666a 306static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 307
f3185997
NC
308static reloc_howto_type ppc64_elf_howto_raw[] =
309{
5bd4f169 310 /* This reloc does nothing. */
46807bf4
AM
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A standard 32 bit relocation. */
46807bf4
AM
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
46807bf4
AM
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* A 16 bit relocation without overflow. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address. */
46807bf4
AM
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
5bd4f169
AM
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
46807bf4
AM
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
5bd4f169
AM
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
46807bf4
AM
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
5bd4f169
AM
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
46807bf4
AM
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
5bd4f169
AM
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
5bd4f169
AM
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
5bd4f169 360
05d0e962 361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
05d0e962 364
5bd4f169 365 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
5bd4f169
AM
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
46807bf4
AM
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
5bd4f169
AM
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
46807bf4
AM
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
5bd4f169
AM
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
46807bf4
AM
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
5bd4f169
AM
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
46807bf4
AM
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
46807bf4
AM
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
46807bf4
AM
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
46807bf4
AM
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
5bd4f169
AM
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
46807bf4
AM
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
5bd4f169
AM
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
46807bf4
AM
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
5bd4f169
AM
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
46807bf4
AM
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
5bd4f169
AM
432
433 /* 32-bit PC relative. */
46807bf4
AM
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
5bd4f169 436
10ed1bba 437 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
5bd4f169
AM
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
5bd4f169
AM
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
46807bf4
AM
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
5bd4f169
AM
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
46807bf4
AM
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
5bd4f169
AM
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
46807bf4
AM
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
5bd4f169 460
c061c2d8 461 /* 16-bit section relative relocation. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
5bd4f169 464
c061c2d8 465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
5bd4f169
AM
472
473 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
5bd4f169 476
04c9666a 477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
5bd4f169
AM
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
46807bf4
AM
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address. */
46807bf4
AM
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
5bd4f169
AM
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address. */
46807bf4
AM
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
5bd4f169
AM
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
46807bf4
AM
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
5bd4f169
AM
504
505 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
5bd4f169
AM
508
509 /* 64-bit relative relocation. */
46807bf4
AM
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
5bd4f169 512
cedb70c5 513 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
5bd4f169
AM
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
5bd4f169
AM
522
523 /* 16 bit TOC-relative relocation. */
5bd4f169 524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
5bd4f169
AM
527
528 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
5bd4f169
AM
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
5bd4f169
AM
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
5bd4f169 541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
5bd4f169
AM
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
411e1bfb
AM
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
411e1bfb
AM
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
411e1bfb
AM
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
411e1bfb
AM
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
411e1bfb
AM
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
411e1bfb 624
727fc41e 625 /* Marker relocs for TLS. */
46807bf4
AM
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
727fc41e 634
23cedd1d
AM
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
46807bf4
AM
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
3b421ab3 639
23cedd1d 640 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
23cedd1d 646
411e1bfb
AM
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
46807bf4
AM
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
411e1bfb
AM
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* A 16 bit dtprel reloc. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16, but no overflow. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* A 16 bit tprel reloc. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16, but no overflow. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
411e1bfb
AM
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb 757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
5bd4f169 760
411e1bfb
AM
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb
AM
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
411e1bfb
AM
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
5bd4f169 808
411e1bfb 809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
e054468f 818
25f23106 819 /* A 16 bit relative relocation. */
46807bf4
AM
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address. */
46807bf4
AM
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
25f23106
AM
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
25f23106 835
4a969973
AM
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
a680de9a 854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
a680de9a 857
7ba71655 858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
7ba71655 861
f9c6b907 862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907
AM
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
f9c6b907 885
006589cf 886 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
006589cf 889
45965137 890 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
45965137 893
5663e321
AM
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
c213164a
AM
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
87c69f97 933 HOW (R_PPC64_GOT_TLSGD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
934 ppc64_elf_unhandled_reloc),
935
87c69f97 936 HOW (R_PPC64_GOT_TLSLD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
937 ppc64_elf_unhandled_reloc),
938
87c69f97 939 HOW (R_PPC64_GOT_TPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
940 ppc64_elf_unhandled_reloc),
941
87c69f97 942 HOW (R_PPC64_GOT_DTPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
943 ppc64_elf_unhandled_reloc),
944
5663e321
AM
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
5bd4f169 975 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978
979 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
5bd4f169
AM
982};
983
984\f
985/* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988static void
4ce794b7 989ppc_howto_init (void)
5bd4f169
AM
990{
991 unsigned int i, type;
992
a4b6fadd 993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
994 {
995 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999}
1000
1001static reloc_howto_type *
87c69f97 1002ppc64_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
87c69f97 1282 case BFD_RELOC_PPC64_GOT_TLSGD_PCREL34: r = R_PPC64_GOT_TLSGD_PCREL34;
c213164a 1283 break;
87c69f97 1284 case BFD_RELOC_PPC64_GOT_TLSLD_PCREL34: r = R_PPC64_GOT_TLSLD_PCREL34;
c213164a 1285 break;
87c69f97 1286 case BFD_RELOC_PPC64_GOT_TPREL_PCREL34: r = R_PPC64_GOT_TPREL_PCREL34;
c213164a 1287 break;
87c69f97 1288 case BFD_RELOC_PPC64_GOT_DTPREL_PCREL34: r = R_PPC64_GOT_DTPREL_PCREL34;
c213164a 1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7 1319static reloc_howto_type *
87c69f97 1320ppc64_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
157090f7
AM
1321{
1322 unsigned int i;
87c69f97
AM
1323 static char *compat_map[][2] = {
1324 { "R_PPC64_GOT_TLSGD34", "R_PPC64_GOT_TLSGD_PCREL34" },
1325 { "R_PPC64_GOT_TLSLD34", "R_PPC64_GOT_TLSLD_PCREL34" },
1326 { "R_PPC64_GOT_TPREL34", "R_PPC64_GOT_TPREL_PCREL34" },
1327 { "R_PPC64_GOT_DTPREL34", "R_PPC64_GOT_DTPREL_PCREL34" }
1328 };
157090f7 1329
a4b6fadd 1330 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1331 if (ppc64_elf_howto_raw[i].name != NULL
1332 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1333 return &ppc64_elf_howto_raw[i];
1334
87c69f97
AM
1335 /* Handle old names of relocations in case they were used by
1336 .reloc directives.
1337 FIXME: Remove this soon. Mapping the reloc names is very likely
1338 completely unnecessary. */
1339 for (i = 0; i < ARRAY_SIZE (compat_map); i++)
1340 if (strcasecmp (compat_map[i][0], r_name) == 0)
1341 {
1342 _bfd_error_handler (_("warning: %s should be used rather than %s"),
1343 compat_map[i][1], compat_map[i][0]);
1344 return ppc64_elf_reloc_name_lookup (abfd, compat_map[i][1]);
1345 }
1346
157090f7
AM
1347 return NULL;
1348}
1349
5bd4f169
AM
1350/* Set the howto pointer for a PowerPC ELF reloc. */
1351
f3185997 1352static bfd_boolean
4aef7643 1353ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1354 Elf_Internal_Rela *dst)
5bd4f169 1355{
65f38f15
AM
1356 unsigned int type;
1357
ef60b7ff 1358 /* Initialize howto table if needed. */
5bd4f169 1359 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1360 ppc_howto_init ();
1361
65f38f15 1362 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1363 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1364 {
695344c0 1365 /* xgettext:c-format */
0aa13fee 1366 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1367 abfd, type);
f3185997
NC
1368 bfd_set_error (bfd_error_bad_value);
1369 return FALSE;
d0fb9a8d 1370 }
65f38f15 1371 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1372 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1373 {
1374 /* xgettext:c-format */
1375 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1376 abfd, type);
1377 bfd_set_error (bfd_error_bad_value);
1378 return FALSE;
1379 }
2cdcc330 1380
f3185997 1381 return TRUE;
5bd4f169
AM
1382}
1383
04c9666a 1384/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1385
1386static bfd_reloc_status_type
4ce794b7
AM
1387ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1388 void *data, asection *input_section,
1389 bfd *output_bfd, char **error_message)
5bd4f169 1390{
a680de9a
PB
1391 enum elf_ppc64_reloc_type r_type;
1392 long insn;
1393 bfd_size_type octets;
3de43e7b 1394 bfd_vma value;
a680de9a 1395
805fc799
AM
1396 /* If this is a relocatable link (output_bfd test tells us), just
1397 call the generic function. Any adjustment will be done at final
1398 link time. */
1399 if (output_bfd != NULL)
cedb70c5 1400 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1401 input_section, output_bfd, error_message);
1402
5663e321
AM
1403 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1404 We won't actually be using the low bits, so trashing them
805fc799 1405 doesn't matter. */
a680de9a 1406 r_type = reloc_entry->howto->type;
5663e321
AM
1407 if (r_type == R_PPC64_ADDR16_HIGHERA34
1408 || r_type == R_PPC64_ADDR16_HIGHESTA34
1409 || r_type == R_PPC64_REL16_HIGHERA34
1410 || r_type == R_PPC64_REL16_HIGHESTA34)
1411 reloc_entry->addend += 1ULL << 33;
1412 else
1413 reloc_entry->addend += 1U << 15;
a680de9a
PB
1414 if (r_type != R_PPC64_REL16DX_HA)
1415 return bfd_reloc_continue;
1416
1417 value = 0;
1418 if (!bfd_is_com_section (symbol->section))
1419 value = symbol->value;
1420 value += (reloc_entry->addend
1421 + symbol->section->output_offset
1422 + symbol->section->output_section->vma);
1423 value -= (reloc_entry->address
1424 + input_section->output_offset
1425 + input_section->output_section->vma);
3de43e7b 1426 value = (bfd_signed_vma) value >> 16;
a680de9a 1427
bb294208 1428 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1429 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1430 insn &= ~0x1fffc1;
3de43e7b 1431 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1432 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1433 if (value + 0x8000 > 0xffff)
a680de9a
PB
1434 return bfd_reloc_overflow;
1435 return bfd_reloc_ok;
805fc799 1436}
5bd4f169 1437
2441e016
AM
1438static bfd_reloc_status_type
1439ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1440 void *data, asection *input_section,
1441 bfd *output_bfd, char **error_message)
1442{
1443 if (output_bfd != NULL)
1444 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1445 input_section, output_bfd, error_message);
1446
699733f6
AM
1447 if (strcmp (symbol->section->name, ".opd") == 0
1448 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1449 {
1450 bfd_vma dest = opd_entry_value (symbol->section,
1451 symbol->value + reloc_entry->addend,
aef36ac1 1452 NULL, NULL, FALSE);
2441e016
AM
1453 if (dest != (bfd_vma) -1)
1454 reloc_entry->addend = dest - (symbol->value
1455 + symbol->section->output_section->vma
1456 + symbol->section->output_offset);
1457 }
810d4e75
AM
1458 else
1459 {
1460 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1461
1462 if (symbol->section->owner != abfd
9f284bf9 1463 && symbol->section->owner != NULL
810d4e75
AM
1464 && abiversion (symbol->section->owner) >= 2)
1465 {
1466 unsigned int i;
1467
1468 for (i = 0; i < symbol->section->owner->symcount; ++i)
1469 {
1470 asymbol *symdef = symbol->section->owner->outsymbols[i];
1471
1472 if (strcmp (symdef->name, symbol->name) == 0)
1473 {
1474 elfsym = (elf_symbol_type *) symdef;
1475 break;
1476 }
1477 }
1478 }
1479 reloc_entry->addend
1480 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1481 }
2441e016
AM
1482 return bfd_reloc_continue;
1483}
1484
805fc799 1485static bfd_reloc_status_type
4ce794b7
AM
1486ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1487 void *data, asection *input_section,
1488 bfd *output_bfd, char **error_message)
805fc799
AM
1489{
1490 long insn;
04c9666a 1491 enum elf_ppc64_reloc_type r_type;
805fc799 1492 bfd_size_type octets;
794e51c0
AM
1493 /* Assume 'at' branch hints. */
1494 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1495
1496 /* If this is a relocatable link (output_bfd test tells us), just
1497 call the generic function. Any adjustment will be done at final
1498 link time. */
5bd4f169 1499 if (output_bfd != NULL)
cedb70c5 1500 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1501 input_section, output_bfd, error_message);
1502
bb294208 1503 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1504 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1505 insn &= ~(0x01 << 21);
4ce794b7 1506 r_type = reloc_entry->howto->type;
805fc799
AM
1507 if (r_type == R_PPC64_ADDR14_BRTAKEN
1508 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1509 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1510
794e51c0 1511 if (is_isa_v2)
5bd4f169 1512 {
805fc799
AM
1513 /* Set 'a' bit. This is 0b00010 in BO field for branch
1514 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1515 for branch on CTR insns (BO == 1a00t or 1a01t). */
1516 if ((insn & (0x14 << 21)) == (0x04 << 21))
1517 insn |= 0x02 << 21;
1518 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1519 insn |= 0x08 << 21;
1520 else
2441e016 1521 goto out;
5bd4f169 1522 }
805fc799
AM
1523 else
1524 {
1525 bfd_vma target = 0;
1526 bfd_vma from;
5bd4f169 1527
805fc799
AM
1528 if (!bfd_is_com_section (symbol->section))
1529 target = symbol->value;
1530 target += symbol->section->output_section->vma;
1531 target += symbol->section->output_offset;
1532 target += reloc_entry->addend;
5bd4f169 1533
805fc799
AM
1534 from = (reloc_entry->address
1535 + input_section->output_offset
1536 + input_section->output_section->vma);
5bd4f169 1537
805fc799
AM
1538 /* Invert 'y' bit if not the default. */
1539 if ((bfd_signed_vma) (target - from) < 0)
1540 insn ^= 0x01 << 21;
1541 }
4ce794b7 1542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1543 out:
1544 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1545 input_section, output_bfd, error_message);
805fc799 1546}
5bd4f169 1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1558 input_section, output_bfd, error_message);
5bd4f169 1559
805fc799
AM
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1562 return bfd_reloc_continue;
1563}
1564
805fc799 1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 /* If this is a relocatable link (output_bfd test tells us), just
1571 call the generic function. Any adjustment will be done at final
1572 link time. */
1573 if (output_bfd != NULL)
cedb70c5 1574 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1575 input_section, output_bfd, error_message);
1576
1577 /* Subtract the symbol section base address. */
1578 reloc_entry->addend -= symbol->section->output_section->vma;
1579
1580 /* Adjust the addend for sign extension of the low 16 bits. */
1581 reloc_entry->addend += 0x8000;
1582 return bfd_reloc_continue;
1583}
1584
1585static bfd_reloc_status_type
4ce794b7
AM
1586ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1587 void *data, asection *input_section,
1588 bfd *output_bfd, char **error_message)
805fc799
AM
1589{
1590 bfd_vma TOCstart;
1591
1592 /* If this is a relocatable link (output_bfd test tells us), just
1593 call the generic function. Any adjustment will be done at final
1594 link time. */
1595 if (output_bfd != NULL)
cedb70c5 1596 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1597 input_section, output_bfd, error_message);
1598
1599 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1600 if (TOCstart == 0)
1c865ab2 1601 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1602
1603 /* Subtract the TOC base address. */
1604 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1605 return bfd_reloc_continue;
1606}
1607
1608static bfd_reloc_status_type
4ce794b7
AM
1609ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1610 void *data, asection *input_section,
1611 bfd *output_bfd, char **error_message)
805fc799
AM
1612{
1613 bfd_vma TOCstart;
1614
1615 /* If this is a relocatable link (output_bfd test tells us), just
1616 call the generic function. Any adjustment will be done at final
1617 link time. */
1618 if (output_bfd != NULL)
cedb70c5 1619 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1620 input_section, output_bfd, error_message);
1621
1622 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1623 if (TOCstart == 0)
1c865ab2 1624 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1625
1626 /* Subtract the TOC base address. */
1627 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1628
1629 /* Adjust the addend for sign extension of the low 16 bits. */
1630 reloc_entry->addend += 0x8000;
1631 return bfd_reloc_continue;
1632}
1633
1634static bfd_reloc_status_type
4ce794b7
AM
1635ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1636 void *data, asection *input_section,
1637 bfd *output_bfd, char **error_message)
805fc799
AM
1638{
1639 bfd_vma TOCstart;
1640 bfd_size_type octets;
1641
1642 /* If this is a relocatable link (output_bfd test tells us), just
1643 call the generic function. Any adjustment will be done at final
1644 link time. */
1645 if (output_bfd != NULL)
cedb70c5 1646 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1647 input_section, output_bfd, error_message);
1648
1649 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1650 if (TOCstart == 0)
1c865ab2 1651 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1652
bb294208 1653 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1654 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1655 return bfd_reloc_ok;
1656}
1657
5663e321
AM
1658static bfd_reloc_status_type
1659ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1660 void *data, asection *input_section,
1661 bfd *output_bfd, char **error_message)
1662{
1663 uint64_t insn;
1664 bfd_vma targ;
1665
1666 if (output_bfd != NULL)
1667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1668 input_section, output_bfd, error_message);
1669
1670 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1671 insn <<= 32;
1672 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1673
1674 targ = (symbol->section->output_section->vma
1675 + symbol->section->output_offset
1676 + reloc_entry->addend);
1677 if (!bfd_is_com_section (symbol->section))
1678 targ += symbol->value;
1679 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1680 targ += 1ULL << 33;
1681 if (reloc_entry->howto->pc_relative)
1682 {
1683 bfd_vma from = (reloc_entry->address
1684 + input_section->output_offset
1685 + input_section->output_section->vma);
1686 targ -=from;
1687 }
1688 targ >>= reloc_entry->howto->rightshift;
1689 insn &= ~reloc_entry->howto->dst_mask;
1690 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1691 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1692 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1693 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1694 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1695 >= 1ULL << reloc_entry->howto->bitsize))
1696 return bfd_reloc_overflow;
1697 return bfd_reloc_ok;
1698}
1699
805fc799 1700static bfd_reloc_status_type
4ce794b7
AM
1701ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1702 void *data, asection *input_section,
1703 bfd *output_bfd, char **error_message)
805fc799
AM
1704{
1705 /* If this is a relocatable link (output_bfd test tells us), just
1706 call the generic function. Any adjustment will be done at final
1707 link time. */
1708 if (output_bfd != NULL)
cedb70c5 1709 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1710 input_section, output_bfd, error_message);
1711
1712 if (error_message != NULL)
1713 {
1714 static char buf[60];
1715 sprintf (buf, "generic linker can't handle %s",
1716 reloc_entry->howto->name);
1717 *error_message = buf;
1718 }
1719 return bfd_reloc_dangerous;
1720}
1721
927be08e
AM
1722/* Track GOT entries needed for a given symbol. We might need more
1723 than one got entry per symbol. */
1724struct got_entry
1725{
1726 struct got_entry *next;
1727
1728 /* The symbol addend that we'll be placing in the GOT. */
1729 bfd_vma addend;
1730
1731 /* Unlike other ELF targets, we use separate GOT entries for the same
1732 symbol referenced from different input files. This is to support
1733 automatic multiple TOC/GOT sections, where the TOC base can vary
1734 from one input file to another. After partitioning into TOC groups
1735 we merge entries within the group.
1736
1737 Point to the BFD owning this GOT entry. */
1738 bfd *owner;
1739
1740 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1741 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1742 unsigned char tls_type;
927be08e
AM
1743
1744 /* Non-zero if got.ent points to real entry. */
f961d9dd 1745 unsigned char is_indirect;
927be08e
AM
1746
1747 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1748 union
2cdcc330
AM
1749 {
1750 bfd_signed_vma refcount;
1751 bfd_vma offset;
1752 struct got_entry *ent;
1753 } got;
927be08e
AM
1754};
1755
1756/* The same for PLT. */
1757struct plt_entry
1758{
1759 struct plt_entry *next;
1760
1761 bfd_vma addend;
1762
1763 union
2cdcc330
AM
1764 {
1765 bfd_signed_vma refcount;
1766 bfd_vma offset;
1767 } plt;
927be08e
AM
1768};
1769
e717da7e
AM
1770struct ppc64_elf_obj_tdata
1771{
1772 struct elf_obj_tdata elf;
1773
1774 /* Shortcuts to dynamic linker sections. */
1775 asection *got;
1776 asection *relgot;
1777
b3fac117
AM
1778 /* Used during garbage collection. We attach global symbols defined
1779 on removed .opd entries to this section so that the sym is removed. */
1780 asection *deleted_section;
81688140 1781
927be08e 1782 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1783 sections means we potentially need one of these for each input bfd. */
927be08e 1784 struct got_entry tlsld_got;
8860955f 1785
2cdcc330
AM
1786 union
1787 {
729eabd5
AM
1788 /* A copy of relocs before they are modified for --emit-relocs. */
1789 Elf_Internal_Rela *relocs;
1790
1791 /* Section contents. */
1792 bfd_byte *contents;
1793 } opd;
d77c8a4b
AM
1794
1795 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1796 the reloc to be in the range -32768 to 32767. */
98528052
AM
1797 unsigned int has_small_toc_reloc : 1;
1798
560c8763
AM
1799 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1800 instruction not one we handle. */
1801 unsigned int unexpected_toc_insn : 1;
066f4018 1802
903b777d
AM
1803 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1804 this file. */
1805 unsigned int has_optrel : 1;
e717da7e
AM
1806};
1807
1808#define ppc64_elf_tdata(bfd) \
1809 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1810
1811#define ppc64_tlsld_got(bfd) \
1812 (&ppc64_elf_tdata (bfd)->tlsld_got)
1813
0c8d6e5c
AM
1814#define is_ppc64_elf(bfd) \
1815 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1816 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1817
e717da7e
AM
1818/* Override the generic function because we store some extras. */
1819
1820static bfd_boolean
1821ppc64_elf_mkobject (bfd *abfd)
1822{
0ffa91dd 1823 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1824 PPC64_ELF_DATA);
e717da7e
AM
1825}
1826
feee612b 1827/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1828 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1829
b34976b6 1830static bfd_boolean
4ce794b7 1831ppc64_elf_object_p (bfd *abfd)
feee612b 1832{
14b57c7c
AM
1833 if (!abfd->arch_info->the_default)
1834 return TRUE;
1835
1836 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1837 {
1838 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1839
1840 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1841 {
1842 /* Relies on arch after 32 bit default being 64 bit default. */
1843 abfd->arch_info = abfd->arch_info->next;
1844 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1845 }
1846 }
14b57c7c 1847 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1848}
1849
d37c89e5
AM
1850/* Support for core dump NOTE sections. */
1851
1852static bfd_boolean
1853ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1854{
eea6121a 1855 size_t offset, size;
d37c89e5
AM
1856
1857 if (note->descsz != 504)
1858 return FALSE;
1859
1860 /* pr_cursig */
228e534f 1861 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1862
1863 /* pr_pid */
228e534f 1864 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1865
1866 /* pr_reg */
1867 offset = 112;
eea6121a 1868 size = 384;
d37c89e5
AM
1869
1870 /* Make a ".reg/999" section. */
1871 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1872 size, note->descpos + offset);
d37c89e5
AM
1873}
1874
1875static bfd_boolean
1876ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1877{
1878 if (note->descsz != 136)
1879 return FALSE;
1880
228e534f 1881 elf_tdata (abfd)->core->pid
bc989cdc 1882 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1883 elf_tdata (abfd)->core->program
d37c89e5 1884 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1885 elf_tdata (abfd)->core->command
d37c89e5
AM
1886 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1887
1888 return TRUE;
1889}
1890
183e98be
AM
1891static char *
1892ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1893 ...)
1894{
1895 switch (note_type)
1896 {
1897 default:
1898 return NULL;
1899
1900 case NT_PRPSINFO:
1901 {
9ef6d1e3 1902 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1903 va_list ap;
1904
1905 va_start (ap, note_type);
75cd47ed 1906 memset (data, 0, sizeof (data));
183e98be 1907 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1908#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1909 DIAGNOSTIC_PUSH;
be3e27bb 1910 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1911 -Wstringop-truncation:
1912 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1913 */
95da9854
L
1914 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1915#endif
183e98be 1916 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1917#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1918 DIAGNOSTIC_POP;
fe75810f 1919#endif
183e98be
AM
1920 va_end (ap);
1921 return elfcore_write_note (abfd, buf, bufsiz,
1922 "CORE", note_type, data, sizeof (data));
1923 }
1924
1925 case NT_PRSTATUS:
1926 {
1927 char data[504];
1928 va_list ap;
1929 long pid;
1930 int cursig;
1931 const void *greg;
1932
1933 va_start (ap, note_type);
1934 memset (data, 0, 112);
1935 pid = va_arg (ap, long);
1936 bfd_put_32 (abfd, pid, data + 32);
1937 cursig = va_arg (ap, int);
1938 bfd_put_16 (abfd, cursig, data + 12);
1939 greg = va_arg (ap, const void *);
1940 memcpy (data + 112, greg, 384);
1941 memset (data + 496, 0, 8);
1942 va_end (ap);
1943 return elfcore_write_note (abfd, buf, bufsiz,
1944 "CORE", note_type, data, sizeof (data));
1945 }
1946 }
1947}
1948
5d35169e
AM
1949/* Add extra PPC sections. */
1950
2cdcc330 1951static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1952{
07d6d2b8
AM
1953 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1954 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1955 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1956 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1957 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1958 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1959 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1960};
1961
7c8fe5c4
AM
1962enum _ppc64_sec_type {
1963 sec_normal = 0,
1964 sec_opd = 1,
1965 sec_toc = 2
1966};
1967
f0abc2a1
AM
1968struct _ppc64_elf_section_data
1969{
1970 struct bfd_elf_section_data elf;
411e1bfb 1971
f0abc2a1
AM
1972 union
1973 {
51aecdc5
AM
1974 /* An array with one entry for each opd function descriptor,
1975 and some spares since opd entries may be either 16 or 24 bytes. */
1976#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1977 struct _opd_sec_data
1978 {
1979 /* Points to the function code section for local opd entries. */
1980 asection **func_sec;
1981
1982 /* After editing .opd, adjust references to opd local syms. */
1983 long *adjust;
1984 } opd;
7c8fe5c4 1985
3a71aa26
AM
1986 /* An array for toc sections, indexed by offset/8. */
1987 struct _toc_sec_data
1988 {
1989 /* Specifies the relocation symbol index used at a given toc offset. */
1990 unsigned *symndx;
1991
1992 /* And the relocation addend. */
1993 bfd_vma *add;
1994 } toc;
7c8fe5c4
AM
1995 } u;
1996
1997 enum _ppc64_sec_type sec_type:2;
411e1bfb 1998
7c8fe5c4
AM
1999 /* Flag set when small branches are detected. Used to
2000 select suitable defaults for the stub group size. */
2001 unsigned int has_14bit_branch:1;
3e04d765
AM
2002
2003 /* Flag set when PLTCALL relocs are detected. */
2004 unsigned int has_pltcall:1;
066f4018 2005
903b777d
AM
2006 /* Flag set when section has PLT/GOT/TOC relocations that can be
2007 optimised. */
2008 unsigned int has_optrel:1;
f0abc2a1
AM
2009};
2010
2011#define ppc64_elf_section_data(sec) \
411e1bfb 2012 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2013
2014static bfd_boolean
4ce794b7 2015ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 2016{
f592407e
AM
2017 if (!sec->used_by_bfd)
2018 {
2019 struct _ppc64_elf_section_data *sdata;
986f0783 2020 size_t amt = sizeof (*sdata);
f0abc2a1 2021
f592407e
AM
2022 sdata = bfd_zalloc (abfd, amt);
2023 if (sdata == NULL)
2024 return FALSE;
2025 sec->used_by_bfd = sdata;
2026 }
f0abc2a1
AM
2027
2028 return _bfd_elf_new_section_hook (abfd, sec);
2029}
4025353c 2030
bf577467
AM
2031static bfd_boolean
2032ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2033{
2034 const char *name = hdr->bfd_section->name;
2035
2036 if (strncmp (name, ".sbss", 5) == 0
2037 || strncmp (name, ".sdata", 6) == 0)
2038 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2039
2040 return TRUE;
2041}
2042
74f0fb50 2043static struct _opd_sec_data *
4025353c
AM
2044get_opd_info (asection * sec)
2045{
2046 if (sec != NULL
2047 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2048 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2049 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2050 return NULL;
2051}
90e3cdf2
JJ
2052\f
2053/* Parameters for the qsort hook. */
90e3cdf2 2054static bfd_boolean synthetic_relocatable;
cd285db5 2055static asection *synthetic_opd;
90e3cdf2 2056
699733f6 2057/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2058
2059static int
2060compare_symbols (const void *ap, const void *bp)
2061{
2cdcc330
AM
2062 const asymbol *a = *(const asymbol **) ap;
2063 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2064
699733f6
AM
2065 /* Section symbols first. */
2066 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2067 return -1;
699733f6 2068 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2069 return 1;
2070
699733f6 2071 /* then .opd symbols. */
cd285db5
AM
2072 if (synthetic_opd != NULL)
2073 {
2074 if (strcmp (a->section->name, ".opd") == 0
2075 && strcmp (b->section->name, ".opd") != 0)
2076 return -1;
2077 if (strcmp (a->section->name, ".opd") != 0
2078 && strcmp (b->section->name, ".opd") == 0)
2079 return 1;
2080 }
90e3cdf2 2081
699733f6 2082 /* then other code symbols. */
2cdcc330
AM
2083 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2084 == (SEC_CODE | SEC_ALLOC))
2085 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2086 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2087 return -1;
2088
2cdcc330
AM
2089 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2090 != (SEC_CODE | SEC_ALLOC))
2091 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2092 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2093 return 1;
2094
2095 if (synthetic_relocatable)
2096 {
2097 if (a->section->id < b->section->id)
2098 return -1;
2099
2100 if (a->section->id > b->section->id)
2101 return 1;
2102 }
2103
2104 if (a->value + a->section->vma < b->value + b->section->vma)
2105 return -1;
2106
2107 if (a->value + a->section->vma > b->value + b->section->vma)
2108 return 1;
2109
4d35a0aa
AM
2110 /* For syms with the same value, prefer strong dynamic global function
2111 syms over other syms. */
2112 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2113 return -1;
2114
2115 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2116 return 1;
2117
2118 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2119 return -1;
2120
2121 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2122 return 1;
2123
2124 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2125 return -1;
2126
2127 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2128 return 1;
2129
2130 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2131 return -1;
2132
2133 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2134 return 1;
2135
dcea6a95
AM
2136 /* Finally, sort on where the symbol is in memory. The symbols will
2137 be in at most two malloc'd blocks, one for static syms, one for
2138 dynamic syms, and we distinguish the two blocks above by testing
2139 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2140 originally in the same order as the symbols (and we're not
2141 sorting the symbols themselves), this ensures a stable sort. */
2142 if (a < b)
2143 return -1;
2144 if (a > b)
2145 return 1;
2146 return 0;
90e3cdf2
JJ
2147}
2148
699733f6 2149/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2150
699733f6 2151static asymbol *
9ad9b810
AM
2152sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2153 bfd_vma value)
90e3cdf2 2154{
9ad9b810 2155 size_t mid;
90e3cdf2 2156
7292b3ac 2157 if (id == (unsigned) -1)
699733f6
AM
2158 {
2159 while (lo < hi)
2160 {
2161 mid = (lo + hi) >> 1;
2162 if (syms[mid]->value + syms[mid]->section->vma < value)
2163 lo = mid + 1;
2164 else if (syms[mid]->value + syms[mid]->section->vma > value)
2165 hi = mid;
2166 else
2167 return syms[mid];
2168 }
2169 }
2170 else
2171 {
2172 while (lo < hi)
2173 {
2174 mid = (lo + hi) >> 1;
2175 if (syms[mid]->section->id < id)
2176 lo = mid + 1;
2177 else if (syms[mid]->section->id > id)
2178 hi = mid;
2179 else if (syms[mid]->value < value)
2180 lo = mid + 1;
2181 else if (syms[mid]->value > value)
2182 hi = mid;
2183 else
2184 return syms[mid];
2185 }
2186 }
2187 return NULL;
90e3cdf2
JJ
2188}
2189
468392fb
AM
2190static bfd_boolean
2191section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2192{
2193 bfd_vma vma = *(bfd_vma *) ptr;
2194 return ((section->flags & SEC_ALLOC) != 0
2195 && section->vma <= vma
2196 && vma < section->vma + section->size);
2197}
2198
699733f6 2199/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2200 entry syms. Also generate @plt symbols for the glink branch table.
2201 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2202
2203static long
a7535cf3
AM
2204ppc64_elf_get_synthetic_symtab (bfd *abfd,
2205 long static_count, asymbol **static_syms,
2206 long dyn_count, asymbol **dyn_syms,
c9727e01 2207 asymbol **ret)
90e3cdf2
JJ
2208{
2209 asymbol *s;
0ccf57bd 2210 size_t i, j, count;
90e3cdf2 2211 char *names;
0ccf57bd 2212 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2213 asection *opd = NULL;
90e3cdf2 2214 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2215 asymbol **syms;
ee67d69a 2216 int abi = abiversion (abfd);
90e3cdf2
JJ
2217
2218 *ret = NULL;
2219
ee67d69a
AM
2220 if (abi < 2)
2221 {
2222 opd = bfd_get_section_by_name (abfd, ".opd");
2223 if (opd == NULL && abi == 1)
2224 return 0;
2225 }
90e3cdf2 2226
a5259595
AM
2227 syms = NULL;
2228 codesecsym = 0;
2229 codesecsymend = 0;
2230 secsymend = 0;
2231 opdsymend = 0;
2232 symcount = 0;
2233 if (opd != NULL)
c9727e01 2234 {
a5259595
AM
2235 symcount = static_count;
2236 if (!relocatable)
2237 symcount += dyn_count;
2238 if (symcount == 0)
2239 return 0;
c9727e01 2240
a5259595
AM
2241 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2242 if (syms == NULL)
2243 return -1;
90e3cdf2 2244
a5259595
AM
2245 if (!relocatable && static_count != 0 && dyn_count != 0)
2246 {
2247 /* Use both symbol tables. */
2248 memcpy (syms, static_syms, static_count * sizeof (*syms));
2249 memcpy (syms + static_count, dyn_syms,
2250 (dyn_count + 1) * sizeof (*syms));
2251 }
2252 else if (!relocatable && static_count == 0)
2253 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2254 else
2255 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2256
0ccf57bd
AM
2257 /* Trim uninteresting symbols. Interesting symbols are section,
2258 function, and notype symbols. */
2259 for (i = 0, j = 0; i < symcount; ++i)
2260 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2261 | BSF_RELC | BSF_SRELC)) == 0)
2262 syms[j++] = syms[i];
2263 symcount = j;
2264
a5259595
AM
2265 synthetic_relocatable = relocatable;
2266 synthetic_opd = opd;
2267 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2268
a5259595
AM
2269 if (!relocatable && symcount > 1)
2270 {
bfa5bd2a
PA
2271 /* Trim duplicate syms, since we may have merged the normal
2272 and dynamic symbols. Actually, we only care about syms
2273 that have different values, so trim any with the same
2274 value. Don't consider ifunc and ifunc resolver symbols
2275 duplicates however, because GDB wants to know whether a
2276 text symbol is an ifunc resolver. */
a5259595 2277 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2278 {
2279 const asymbol *s0 = syms[i - 1];
2280 const asymbol *s1 = syms[i];
2281
2282 if ((s0->value + s0->section->vma
2283 != s1->value + s1->section->vma)
2284 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2285 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2286 syms[j++] = syms[i];
2287 }
a5259595
AM
2288 symcount = j;
2289 }
699733f6 2290
a5259595
AM
2291 i = 0;
2292 /* Note that here and in compare_symbols we can't compare opd and
2293 sym->section directly. With separate debug info files, the
2294 symbols will be extracted from the debug file while abfd passed
2295 to this function is the real binary. */
0ccf57bd 2296 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2297 ++i;
2298 codesecsym = i;
2299
2300 for (; i < symcount; ++i)
2301 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2302 | SEC_THREAD_LOCAL))
2303 != (SEC_CODE | SEC_ALLOC))
2304 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2305 break;
2306 codesecsymend = i;
2307
2308 for (; i < symcount; ++i)
2309 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2310 break;
2311 secsymend = i;
2312
2313 for (; i < symcount; ++i)
2314 if (strcmp (syms[i]->section->name, ".opd") != 0)
2315 break;
2316 opdsymend = i;
2317
2318 for (; i < symcount; ++i)
2cdcc330
AM
2319 if (((syms[i]->section->flags
2320 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2321 != (SEC_CODE | SEC_ALLOC))
2322 break;
2323 symcount = i;
2324 }
c9727e01 2325 count = 0;
90e3cdf2 2326
699733f6 2327 if (relocatable)
90e3cdf2 2328 {
699733f6
AM
2329 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2330 arelent *r;
2331 size_t size;
0ccf57bd 2332 size_t relcount;
90e3cdf2 2333
468392fb
AM
2334 if (opdsymend == secsymend)
2335 goto done;
2336
699733f6 2337 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2338 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2339 if (relcount == 0)
c9727e01 2340 goto done;
90e3cdf2 2341
7356fed5
AM
2342 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2343 {
2344 count = -1;
2345 goto done;
2346 }
2347
699733f6 2348 size = 0;
595da8c5 2349 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2350 {
2351 asymbol *sym;
90e3cdf2 2352
595da8c5 2353 while (r < opd->relocation + relcount
699733f6
AM
2354 && r->address < syms[i]->value + opd->vma)
2355 ++r;
90e3cdf2 2356
595da8c5 2357 if (r == opd->relocation + relcount)
699733f6 2358 break;
90e3cdf2 2359
699733f6
AM
2360 if (r->address != syms[i]->value + opd->vma)
2361 continue;
90e3cdf2 2362
699733f6
AM
2363 if (r->howto->type != R_PPC64_ADDR64)
2364 continue;
90e3cdf2 2365
699733f6
AM
2366 sym = *r->sym_ptr_ptr;
2367 if (!sym_exists_at (syms, opdsymend, symcount,
2368 sym->section->id, sym->value + r->addend))
2369 {
2370 ++count;
2371 size += sizeof (asymbol);
2372 size += strlen (syms[i]->name) + 2;
2373 }
2374 }
90e3cdf2 2375
c4b0b099
AM
2376 if (size == 0)
2377 goto done;
699733f6
AM
2378 s = *ret = bfd_malloc (size);
2379 if (s == NULL)
2380 {
7356fed5 2381 count = -1;
c9727e01 2382 goto done;
699733f6 2383 }
90e3cdf2 2384
699733f6 2385 names = (char *) (s + count);
90e3cdf2 2386
595da8c5 2387 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2388 {
699733f6 2389 asymbol *sym;
90e3cdf2 2390
595da8c5 2391 while (r < opd->relocation + relcount
699733f6
AM
2392 && r->address < syms[i]->value + opd->vma)
2393 ++r;
90e3cdf2 2394
595da8c5 2395 if (r == opd->relocation + relcount)
699733f6
AM
2396 break;
2397
2398 if (r->address != syms[i]->value + opd->vma)
2399 continue;
2400
2401 if (r->howto->type != R_PPC64_ADDR64)
2402 continue;
90e3cdf2 2403
699733f6
AM
2404 sym = *r->sym_ptr_ptr;
2405 if (!sym_exists_at (syms, opdsymend, symcount,
2406 sym->section->id, sym->value + r->addend))
2407 {
2408 size_t len;
2409
2410 *s = *syms[i];
6ba2a415 2411 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2412 s->section = sym->section;
2413 s->value = sym->value + r->addend;
2414 s->name = names;
2415 *names++ = '.';
2416 len = strlen (syms[i]->name);
2417 memcpy (names, syms[i]->name, len + 1);
2418 names += len + 1;
6f610d07
UW
2419 /* Have udata.p point back to the original symbol this
2420 synthetic symbol was derived from. */
2421 s->udata.p = syms[i];
699733f6
AM
2422 s++;
2423 }
2424 }
2425 }
2426 else
90e3cdf2 2427 {
468392fb 2428 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2429 bfd_byte *contents = NULL;
699733f6 2430 size_t size;
0ccf57bd 2431 size_t plt_count = 0;
468392fb
AM
2432 bfd_vma glink_vma = 0, resolv_vma = 0;
2433 asection *dynamic, *glink = NULL, *relplt = NULL;
2434 arelent *p;
90e3cdf2 2435
ee67d69a 2436 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2437 {
c4b0b099
AM
2438 free_contents_and_exit_err:
2439 count = -1;
ee67d69a 2440 free_contents_and_exit:
c9594989 2441 free (contents);
c9727e01 2442 goto done;
699733f6 2443 }
90e3cdf2 2444
699733f6
AM
2445 size = 0;
2446 for (i = secsymend; i < opdsymend; ++i)
2447 {
2448 bfd_vma ent;
90e3cdf2 2449
5ef11c02
AM
2450 /* Ignore bogus symbols. */
2451 if (syms[i]->value > opd->size - 8)
2452 continue;
2453
699733f6
AM
2454 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2455 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2456 {
2457 ++count;
2458 size += sizeof (asymbol);
2459 size += strlen (syms[i]->name) + 2;
2460 }
2461 }
90e3cdf2 2462
468392fb 2463 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2464 if (dyn_count != 0
2465 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2466 {
2467 bfd_byte *dynbuf, *extdyn, *extdynend;
2468 size_t extdynsize;
2469 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2470
2471 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2472 goto free_contents_and_exit_err;
468392fb
AM
2473
2474 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2475 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2476
2477 extdyn = dynbuf;
2478 extdynend = extdyn + dynamic->size;
2479 for (; extdyn < extdynend; extdyn += extdynsize)
2480 {
2481 Elf_Internal_Dyn dyn;
2482 (*swap_dyn_in) (abfd, extdyn, &dyn);
2483
2484 if (dyn.d_tag == DT_NULL)
2485 break;
2486
2487 if (dyn.d_tag == DT_PPC64_GLINK)
2488 {
9e390558
AM
2489 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2490 See comment in ppc64_elf_finish_dynamic_sections. */
2491 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2492 /* The .glink section usually does not survive the final
2493 link; search for the section (usually .text) where the
2494 glink stubs now reside. */
2495 glink = bfd_sections_find_if (abfd, section_covers_vma,
2496 &glink_vma);
2497 break;
2498 }
2499 }
2500
2501 free (dynbuf);
2502 }
2503
2504 if (glink != NULL)
2505 {
2506 /* Determine __glink trampoline by reading the relative branch
2507 from the first glink stub. */
2508 bfd_byte buf[4];
b9e5796b
AM
2509 unsigned int off = 0;
2510
2511 while (bfd_get_section_contents (abfd, glink, buf,
2512 glink_vma + off - glink->vma, 4))
468392fb
AM
2513 {
2514 unsigned int insn = bfd_get_32 (abfd, buf);
2515 insn ^= B_DOT;
2516 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2517 {
2cdcc330
AM
2518 resolv_vma
2519 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2520 break;
2521 }
2522 off += 4;
2523 if (off > 4)
2524 break;
468392fb
AM
2525 }
2526
2527 if (resolv_vma)
2528 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2529
066ee829
AM
2530 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2531 if (relplt != NULL)
2532 {
2533 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2534 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2535 goto free_contents_and_exit_err;
68ffbac6 2536
066ee829
AM
2537 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2538 size += plt_count * sizeof (asymbol);
468392fb 2539
066ee829
AM
2540 p = relplt->relocation;
2541 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2542 {
2543 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2544 if (p->addend != 0)
2545 size += sizeof ("+0x") - 1 + 16;
2546 }
066ee829 2547 }
468392fb
AM
2548 }
2549
c4b0b099
AM
2550 if (size == 0)
2551 goto free_contents_and_exit;
699733f6
AM
2552 s = *ret = bfd_malloc (size);
2553 if (s == NULL)
c4b0b099 2554 goto free_contents_and_exit_err;
90e3cdf2 2555
468392fb 2556 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2557
699733f6 2558 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2559 {
699733f6 2560 bfd_vma ent;
90e3cdf2 2561
5ef11c02
AM
2562 if (syms[i]->value > opd->size - 8)
2563 continue;
2564
699733f6
AM
2565 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2566 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2567 {
0ccf57bd 2568 size_t lo, hi;
699733f6 2569 size_t len;
c9727e01 2570 asection *sec = abfd->sections;
90e3cdf2 2571
699733f6
AM
2572 *s = *syms[i];
2573 lo = codesecsym;
2574 hi = codesecsymend;
2575 while (lo < hi)
2576 {
0ccf57bd 2577 size_t mid = (lo + hi) >> 1;
699733f6
AM
2578 if (syms[mid]->section->vma < ent)
2579 lo = mid + 1;
2580 else if (syms[mid]->section->vma > ent)
2581 hi = mid;
2582 else
c9727e01
AM
2583 {
2584 sec = syms[mid]->section;
2585 break;
2586 }
699733f6
AM
2587 }
2588
c9727e01 2589 if (lo >= hi && lo > codesecsym)
699733f6 2590 sec = syms[lo - 1]->section;
699733f6
AM
2591
2592 for (; sec != NULL; sec = sec->next)
2593 {
2594 if (sec->vma > ent)
2595 break;
63524580
JK
2596 /* SEC_LOAD may not be set if SEC is from a separate debug
2597 info file. */
2598 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2599 break;
2600 if ((sec->flags & SEC_CODE) != 0)
2601 s->section = sec;
2602 }
6ba2a415 2603 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2604 s->value = ent - s->section->vma;
2605 s->name = names;
2606 *names++ = '.';
2607 len = strlen (syms[i]->name);
2608 memcpy (names, syms[i]->name, len + 1);
2609 names += len + 1;
6f610d07
UW
2610 /* Have udata.p point back to the original symbol this
2611 synthetic symbol was derived from. */
2612 s->udata.p = syms[i];
699733f6 2613 s++;
90e3cdf2 2614 }
90e3cdf2 2615 }
699733f6 2616 free (contents);
468392fb
AM
2617
2618 if (glink != NULL && relplt != NULL)
2619 {
2620 if (resolv_vma)
2621 {
2622 /* Add a symbol for the main glink trampoline. */
86a4952b 2623 memset (s, 0, sizeof *s);
468392fb 2624 s->the_bfd = abfd;
6ba2a415 2625 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2626 s->section = glink;
2627 s->value = resolv_vma - glink->vma;
2628 s->name = names;
2cdcc330
AM
2629 memcpy (names, "__glink_PLTresolve",
2630 sizeof ("__glink_PLTresolve"));
468392fb
AM
2631 names += sizeof ("__glink_PLTresolve");
2632 s++;
2633 count++;
2634 }
2635
2636 /* FIXME: It would be very much nicer to put sym@plt on the
2637 stub rather than on the glink branch table entry. The
2638 objdump disassembler would then use a sensible symbol
2639 name on plt calls. The difficulty in doing so is
2640 a) finding the stubs, and,
2641 b) matching stubs against plt entries, and,
2642 c) there can be multiple stubs for a given plt entry.
2643
2644 Solving (a) could be done by code scanning, but older
2645 ppc64 binaries used different stubs to current code.
2646 (b) is the tricky one since you need to known the toc
2647 pointer for at least one function that uses a pic stub to
2648 be able to calculate the plt address referenced.
2649 (c) means gdb would need to set multiple breakpoints (or
2650 find the glink branch itself) when setting breakpoints
2651 for pending shared library loads. */
2652 p = relplt->relocation;
2653 for (i = 0; i < plt_count; i++, p++)
2654 {
2655 size_t len;
2656
2657 *s = **p->sym_ptr_ptr;
2658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2659 we are defining a symbol, ensure one of them is set. */
2660 if ((s->flags & BSF_LOCAL) == 0)
2661 s->flags |= BSF_GLOBAL;
6ba2a415 2662 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2663 s->section = glink;
2664 s->value = glink_vma - glink->vma;
2665 s->name = names;
2666 s->udata.p = NULL;
2667 len = strlen ((*p->sym_ptr_ptr)->name);
2668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2669 names += len;
e054468f
AM
2670 if (p->addend != 0)
2671 {
2672 memcpy (names, "+0x", sizeof ("+0x") - 1);
2673 names += sizeof ("+0x") - 1;
2674 bfd_sprintf_vma (abfd, names, p->addend);
2675 names += strlen (names);
2676 }
468392fb
AM
2677 memcpy (names, "@plt", sizeof ("@plt"));
2678 names += sizeof ("@plt");
2679 s++;
b9e5796b
AM
2680 if (abi < 2)
2681 {
2682 glink_vma += 8;
2683 if (i >= 0x8000)
2684 glink_vma += 4;
2685 }
2686 else
468392fb
AM
2687 glink_vma += 4;
2688 }
2689 count += plt_count;
2690 }
90e3cdf2
JJ
2691 }
2692
c9727e01 2693 done:
a7535cf3 2694 free (syms);
90e3cdf2
JJ
2695 return count;
2696}
5bd4f169 2697\f
65f38f15
AM
2698/* The following functions are specific to the ELF linker, while
2699 functions above are used generally. Those named ppc64_elf_* are
2700 called by the main ELF linker code. They appear in this file more
2701 or less in the order in which they are called. eg.
2702 ppc64_elf_check_relocs is called early in the link process,
2703 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2704 called.
2705
2706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2707 functions have both a function code symbol and a function descriptor
2708 symbol. A call to foo in a relocatable object file looks like:
2709
2710 . .text
2711 . x:
2712 . bl .foo
2713 . nop
2714
2715 The function definition in another object file might be:
2716
2717 . .section .opd
2718 . foo: .quad .foo
2719 . .quad .TOC.@tocbase
2720 . .quad 0
2721 .
2722 . .text
2723 . .foo: blr
2724
2725 When the linker resolves the call during a static link, the branch
2726 unsurprisingly just goes to .foo and the .opd information is unused.
2727 If the function definition is in a shared library, things are a little
2728 different: The call goes via a plt call stub, the opd information gets
2729 copied to the plt, and the linker patches the nop.
2730
2731 . x:
2732 . bl .foo_stub
2733 . ld 2,40(1)
2734 .
2735 .
2736 . .foo_stub:
71a39c98
AM
2737 . std 2,40(1) # in practice, the call stub
2738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2739 . addi 11,11,Lfoo@toc@l # this is the general idea
2740 . ld 12,0(11)
2741 . ld 2,8(11)
2742 . mtctr 12
2743 . ld 11,16(11)
e86ce104
AM
2744 . bctr
2745 .
2746 . .section .plt
2747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2748
2749 The "reloc ()" notation is supposed to indicate that the linker emits
2750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2751 copying.
2752
2753 What are the difficulties here? Well, firstly, the relocations
2754 examined by the linker in check_relocs are against the function code
2755 sym .foo, while the dynamic relocation in the plt is emitted against
2756 the function descriptor symbol, foo. Somewhere along the line, we need
2757 to carefully copy dynamic link information from one symbol to the other.
2758 Secondly, the generic part of the elf linker will make .foo a dynamic
2759 symbol as is normal for most other backends. We need foo dynamic
2760 instead, at least for an application final link. However, when
2761 creating a shared library containing foo, we need to have both symbols
2762 dynamic so that references to .foo are satisfied during the early
2763 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2764 definition from some other object, eg. a static library.
2765
2766 Update: As of August 2004, we support a new convention. Function
2767 calls may use the function descriptor symbol, ie. "bl foo". This
2768 behaves exactly as "bl .foo". */
65f38f15 2769
7c8bbca5
AM
2770/* Of those relocs that might be copied as dynamic relocs, this
2771 function selects those that must be copied when linking a shared
2772 library or PIE, even when the symbol is local. */
65f38f15 2773
1d483afe
AM
2774static int
2775must_be_dyn_reloc (struct bfd_link_info *info,
2776 enum elf_ppc64_reloc_type r_type)
2777{
2778 switch (r_type)
2779 {
2780 default:
7c8bbca5
AM
2781 /* Only relative relocs can be resolved when the object load
2782 address isn't fixed. DTPREL64 is excluded because the
2783 dynamic linker needs to differentiate global dynamic from
2784 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2785 return 1;
2786
2787 case R_PPC64_REL32:
2788 case R_PPC64_REL64:
2789 case R_PPC64_REL30:
1bdd8fac
AM
2790 case R_PPC64_TOC16:
2791 case R_PPC64_TOC16_DS:
2792 case R_PPC64_TOC16_LO:
2793 case R_PPC64_TOC16_HI:
2794 case R_PPC64_TOC16_HA:
2795 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2796 return 0;
2797
2798 case R_PPC64_TPREL16:
2799 case R_PPC64_TPREL16_LO:
2800 case R_PPC64_TPREL16_HI:
2801 case R_PPC64_TPREL16_HA:
2802 case R_PPC64_TPREL16_DS:
2803 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2804 case R_PPC64_TPREL16_HIGH:
2805 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2806 case R_PPC64_TPREL16_HIGHER:
2807 case R_PPC64_TPREL16_HIGHERA:
2808 case R_PPC64_TPREL16_HIGHEST:
2809 case R_PPC64_TPREL16_HIGHESTA:
2810 case R_PPC64_TPREL64:
c213164a 2811 case R_PPC64_TPREL34:
7c8bbca5
AM
2812 /* These relocations are relative but in a shared library the
2813 linker doesn't know the thread pointer base. */
2814 return bfd_link_dll (info);
1d483afe
AM
2815 }
2816}
65f38f15 2817
f4656909 2818/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2819 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2820 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2821 shared lib. With code that gcc generates it is vital that this be
2822 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2823 actually the address of a function descriptor which resides in the
2824 .opd section. gcc uses the descriptor directly rather than going
2825 via the GOT as some other ABIs do, which means that initialized
2826 function pointers reference the descriptor. Thus, a function
2827 pointer initialized to the address of a function in a shared
2828 library will either require a .dynbss copy and a copy reloc, or a
2829 dynamic reloc. Using a .dynbss copy redefines the function
2830 descriptor symbol to point to the copy. This presents a problem as
2831 a PLT entry for that function is also initialized from the function
2832 descriptor symbol and the copy may not be initialized first. */
a23b6845 2833#define ELIMINATE_COPY_RELOCS 1
f4656909 2834
721956f4 2835/* Section name for stubs is the associated section name plus this
29942be8
NC
2836 string. */
2837#define STUB_SUFFIX ".stub"
721956f4
AM
2838
2839/* Linker stubs.
2840 ppc_stub_long_branch:
2841 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2842 destination, but a 24 bit branch in a stub section will reach.
2843 . b dest
2844
2845 ppc_stub_plt_branch:
2846 Similar to the above, but a 24 bit branch in the stub section won't
2847 reach its destination.
6df4c9c2
AM
2848 . addis %r12,%r2,xxx@toc@ha
2849 . ld %r12,xxx@toc@l(%r12)
71a39c98 2850 . mtctr %r12
721956f4
AM
2851 . bctr
2852
2853 ppc_stub_plt_call:
2c66dc6c
AM
2854 Used to call a function in a shared library. If it so happens that
2855 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2856 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2857 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2858 . addis %r11,%r2,xxx@toc@ha
2859 . ld %r12,xxx+0@toc@l(%r11)
2860 . mtctr %r12
2861 . ld %r2,xxx+8@toc@l(%r11)
2862 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2863 . bctr
ad8e1ba5
AM
2864
2865 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2866 code to adjust the value and save r2 to support multiple toc sections.
2867 A ppc_stub_long_branch with an r2 offset looks like:
2868 . std %r2,40(%r1)
2869 . addis %r2,%r2,off@ha
2870 . addi %r2,%r2,off@l
2871 . b dest
2872
2873 A ppc_stub_plt_branch with an r2 offset looks like:
2874 . std %r2,40(%r1)
6df4c9c2
AM
2875 . addis %r12,%r2,xxx@toc@ha
2876 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2877 . addis %r2,%r2,off@ha
2878 . addi %r2,%r2,off@l
71a39c98 2879 . mtctr %r12
ad8e1ba5 2880 . bctr
ac2df442 2881
05d0e962
AM
2882 All of the above stubs are shown as their ELFv1 variants. ELFv2
2883 variants exist too, simpler for plt calls since a new toc pointer
2884 and static chain are not loaded by the stub. In addition, ELFv2
2885 has some more complex stubs to handle calls marked with NOTOC
2886 relocs from functions where r2 is not a valid toc pointer. These
2887 come in two flavours, the ones shown below, and _both variants that
2888 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2889 one call is from a function where r2 is used as the toc pointer but
2890 needs a toc adjusting stub for small-model multi-toc, and another
2891 call is from a function where r2 is not valid.
2892 ppc_stub_long_branch_notoc:
2893 . mflr %r12
2894 . bcl 20,31,1f
2895 . 1:
2896 . mflr %r11
2897 . mtlr %r12
2cdcc330
AM
2898 . addis %r12,%r11,dest-1b@ha
2899 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2900 . b dest
2901
2902 ppc_stub_plt_branch_notoc:
2903 . mflr %r12
2904 . bcl 20,31,1f
2905 . 1:
2906 . mflr %r11
2907 . mtlr %r12
2908 . lis %r12,xxx-1b@highest
f891966f 2909 . ori %r12,%r12,xxx-1b@higher
05d0e962 2910 . sldi %r12,%r12,32
f891966f 2911 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2912 . ori %r12,%r12,xxx-1b@l
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916
2917 ppc_stub_plt_call_notoc:
2918 . mflr %r12
2919 . bcl 20,31,1f
2920 . 1:
2921 . mflr %r11
2922 . mtlr %r12
2923 . lis %r12,xxx-1b@highest
f891966f 2924 . ori %r12,%r12,xxx-1b@higher
05d0e962 2925 . sldi %r12,%r12,32
f891966f 2926 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2927 . ori %r12,%r12,xxx-1b@l
2928 . ldx %r12,%r11,%r12
2929 . mtctr %r12
2930 . bctr
2931
7c1f4227 2932 There are also ELFv1 power10 variants of these stubs.
04bdff6a 2933 ppc_stub_long_branch_notoc:
d4b87b1e 2934 . pla %r12,dest@pcrel
04bdff6a
AM
2935 . b dest
2936 ppc_stub_plt_branch_notoc:
2937 . lis %r11,(dest-1f)@highesta34
2938 . ori %r11,%r11,(dest-1f)@highera34
2939 . sldi %r11,%r11,34
d4b87b1e 2940 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2941 . add %r12,%r11,%r12
2942 . mtctr %r12
2943 . bctr
2944 ppc_stub_plt_call_notoc:
2945 . lis %r11,(xxx-1f)@highesta34
2946 . ori %r11,%r11,(xxx-1f)@highera34
2947 . sldi %r11,%r11,34
d4b87b1e 2948 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2949 . ldx %r12,%r11,%r12
2950 . mtctr %r12
2951 . bctr
2952
05d0e962
AM
2953 In cases where the high instructions would add zero, they are
2954 omitted and following instructions modified in some cases.
7c1f4227 2955 For example, a power10 ppc_stub_plt_call_notoc might simplify down
04bdff6a
AM
2956 to
2957 . pld %r12,xxx@pcrel
2958 . mtctr %r12
2959 . bctr
05d0e962
AM
2960
2961 For a given stub group (a set of sections all using the same toc
2962 pointer value) there will be just one stub type used for any
2963 particular function symbol. For example, if printf is called from
2964 code with the tocsave optimization (ie. r2 saved in function
2965 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2966 and from other code without the tocsave optimization requiring a
2967 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2968 type will be created. Calls with the tocsave optimization will
2969 enter this stub after the instruction saving r2. A similar
2970 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2971 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2972 to call an external function like printf. If other calls to printf
2973 require a ppc_stub_plt_call linkage stub then a single
2974 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2975 call. If other calls to printf require a ppc_stub_plt_call_r2save
2976 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2977 be created and calls not requiring r2 to be saved will enter the
2978 stub after the r2 save instruction. There is an analogous
2979 hierarchy of long branch and plt branch stubs for local call
2980 linkage. */
721956f4 2981
2cdcc330
AM
2982enum ppc_stub_type
2983{
721956f4
AM
2984 ppc_stub_none,
2985 ppc_stub_long_branch,
ad8e1ba5 2986 ppc_stub_long_branch_r2off,
05d0e962
AM
2987 ppc_stub_long_branch_notoc,
2988 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2989 ppc_stub_plt_branch,
ad8e1ba5 2990 ppc_stub_plt_branch_r2off,
05d0e962
AM
2991 ppc_stub_plt_branch_notoc,
2992 ppc_stub_plt_branch_both,
794e51c0 2993 ppc_stub_plt_call,
7341d5e2 2994 ppc_stub_plt_call_r2save,
05d0e962
AM
2995 ppc_stub_plt_call_notoc,
2996 ppc_stub_plt_call_both,
a4b6fadd
AM
2997 ppc_stub_global_entry,
2998 ppc_stub_save_res
721956f4
AM
2999};
3000
6f20ed8a
AM
3001/* Information on stub grouping. */
3002struct map_stub
3003{
3004 /* The stub section. */
3005 asection *stub_sec;
3006 /* This is the section to which stubs in the group will be attached. */
3007 asection *link_sec;
a4b6fadd
AM
3008 /* Next group. */
3009 struct map_stub *next;
3010 /* Whether to emit a copy of register save/restore functions in this
3011 group. */
3012 int needs_save_res;
df136d64
AM
3013 /* Current offset within stubs after the insn restoring lr in a
3014 _notoc or _both stub using bcl for pc-relative addressing, or
3015 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3016 unsigned int lr_restore;
3017 /* Accumulated size of EH info emitted to describe return address
3018 if stubs modify lr. Does not include 17 byte FDE header. */
3019 unsigned int eh_size;
3020 /* Offset in glink_eh_frame to the start of EH info for this group. */
3021 unsigned int eh_base;
6f20ed8a
AM
3022};
3023
2cdcc330
AM
3024struct ppc_stub_hash_entry
3025{
721956f4
AM
3026 /* Base hash table entry structure. */
3027 struct bfd_hash_entry root;
3028
ad8e1ba5
AM
3029 enum ppc_stub_type stub_type;
3030
6f20ed8a
AM
3031 /* Group information. */
3032 struct map_stub *group;
721956f4
AM
3033
3034 /* Offset within stub_sec of the beginning of this stub. */
3035 bfd_vma stub_offset;
3036
3037 /* Given the symbol's value and its section we can determine its final
3038 value when building the stubs (so the stub knows where to jump. */
3039 bfd_vma target_value;
3040 asection *target_section;
3041
721956f4
AM
3042 /* The symbol table entry, if any, that this was derived from. */
3043 struct ppc_link_hash_entry *h;
e054468f 3044 struct plt_entry *plt_ent;
721956f4 3045
2d7ad24e
AM
3046 /* Symbol type. */
3047 unsigned char symtype;
3048
6911b7dc
AM
3049 /* Symbol st_other. */
3050 unsigned char other;
721956f4
AM
3051};
3052
2cdcc330
AM
3053struct ppc_branch_hash_entry
3054{
721956f4
AM
3055 /* Base hash table entry structure. */
3056 struct bfd_hash_entry root;
3057
c456f082 3058 /* Offset within branch lookup table. */
721956f4
AM
3059 unsigned int offset;
3060
3061 /* Generation marker. */
3062 unsigned int iter;
3063};
65f38f15 3064
19e08130
AM
3065/* Used to track dynamic relocations for local symbols. */
3066struct ppc_dyn_relocs
3067{
3068 struct ppc_dyn_relocs *next;
3069
3070 /* The input section of the reloc. */
3071 asection *sec;
3072
3073 /* Total number of relocs copied for the input section. */
3074 unsigned int count : 31;
3075
3076 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3077 unsigned int ifunc : 1;
3078};
3079
65f38f15
AM
3080struct ppc_link_hash_entry
3081{
3082 struct elf_link_hash_entry elf;
3083
2cdcc330
AM
3084 union
3085 {
b3fac117
AM
3086 /* A pointer to the most recently used stub hash entry against this
3087 symbol. */
3088 struct ppc_stub_hash_entry *stub_cache;
3089
3090 /* A pointer to the next symbol starting with a '.' */
3091 struct ppc_link_hash_entry *next_dot_sym;
3092 } u;
721956f4 3093
721956f4 3094 /* Link between function code and descriptor symbols. */
34814b9f 3095 struct ppc_link_hash_entry *oh;
721956f4 3096
e86ce104
AM
3097 /* Flag function code and descriptor symbols. */
3098 unsigned int is_func:1;
3099 unsigned int is_func_descriptor:1;
908b32fc 3100 unsigned int fake:1;
411e1bfb 3101
c5614fa4
AM
3102 /* Whether global opd/toc sym has been adjusted or not.
3103 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3104 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3105 unsigned int adjust_done:1;
3106
a4b6fadd
AM
3107 /* Set if this is an out-of-line register save/restore function,
3108 with non-standard calling convention. */
3109 unsigned int save_res:1;
3110
8b5f1ed8
AM
3111 /* Set if a duplicate symbol with non-zero localentry is detected,
3112 even when the duplicate symbol does not provide a definition. */
3113 unsigned int non_zero_localentry:1;
3114
411e1bfb 3115 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3116 Bits are or'd into the mask as the corresponding relocs are
3117 encountered during check_relocs, with TLS_TLS being set when any
3118 of the other TLS bits are set. tls_optimize clears bits when
3119 optimizing to indicate the corresponding GOT entry type is not
3120 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3121 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3122 These flags are also kept for local symbols. */
3123#define TLS_TLS 1 /* Any TLS reloc. */
3124#define TLS_GD 2 /* GD reloc. */
3125#define TLS_LD 4 /* LD reloc. */
3126#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3127#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3128#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3129#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3130#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3131 unsigned char tls_mask;
37da22e5
AM
3132
3133 /* The above field is also used to mark function symbols. In which
3134 case TLS_TLS will be 0. */
3135#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3136#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3137#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3138};
3139
ed7007c1
AM
3140static inline struct ppc_link_hash_entry *
3141ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3142{
3143 return (struct ppc_link_hash_entry *) ent;
3144}
3145
65f38f15
AM
3146/* ppc64 ELF linker hash table. */
3147
3148struct ppc_link_hash_table
3149{
3150 struct elf_link_hash_table elf;
3151
721956f4
AM
3152 /* The stub hash table. */
3153 struct bfd_hash_table stub_hash_table;
3154
3155 /* Another hash table for plt_branch stubs. */
3156 struct bfd_hash_table branch_hash_table;
3157
3b421ab3
AM
3158 /* Hash table for function prologue tocsave. */
3159 htab_t tocsave_htab;
3160
e7d1c40c
AM
3161 /* Various options and other info passed from the linker. */
3162 struct ppc64_elf_params *params;
721956f4 3163
6f20ed8a
AM
3164 /* The size of sec_info below. */
3165 unsigned int sec_info_arr_size;
3166
3167 /* Per-section array of extra section info. Done this way rather
3168 than as part of ppc64_elf_section_data so we have the info for
3169 non-ppc64 sections. */
3170 struct
3171 {
3172 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3173 bfd_vma toc_off;
6f20ed8a
AM
3174
3175 union
3176 {
3177 /* The section group that this section belongs to. */
3178 struct map_stub *group;
3179 /* A temp section list pointer. */
3180 asection *list;
3181 } u;
3182 } *sec_info;
721956f4 3183
a4b6fadd
AM
3184 /* Linked list of groups. */
3185 struct map_stub *group;
3186
ad8e1ba5
AM
3187 /* Temp used when calculating TOC pointers. */
3188 bfd_vma toc_curr;
bf102f86
AM
3189 bfd *toc_bfd;
3190 asection *toc_first_sec;
ad8e1ba5 3191
b3fac117
AM
3192 /* Used when adding symbols. */
3193 struct ppc_link_hash_entry *dot_syms;
3194
33e44f2e 3195 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3196 asection *glink;
9e390558 3197 asection *global_entry;
82bd7b59 3198 asection *sfpr;
2d7ad24e
AM
3199 asection *pltlocal;
3200 asection *relpltlocal;
4ce794b7
AM
3201 asection *brlt;
3202 asection *relbrlt;
58d180e8 3203 asection *glink_eh_frame;
ec338859 3204
8387904d
AM
3205 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3206 struct ppc_link_hash_entry *tls_get_addr;
3207 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3208 struct ppc_link_hash_entry *tga_desc;
3209 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3210 struct map_stub *tga_group;
411e1bfb 3211
927be08e
AM
3212 /* The size of reliplt used by got entry relocs. */
3213 bfd_size_type got_reli_size;
3214
9b5ecbd0 3215 /* Statistics. */
7341d5e2 3216 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3217
ee75fd95
AM
3218 /* Number of stubs against global syms. */
3219 unsigned long stub_globals;
3220
ee67d69a
AM
3221 /* Set if we're linking code with function descriptors. */
3222 unsigned int opd_abi:1;
3223
4c52953f 3224 /* Support for multiple toc sections. */
33c0ec9d 3225 unsigned int do_multi_toc:1;
4c52953f 3226 unsigned int multi_toc_needed:1;
927be08e 3227 unsigned int second_toc_pass:1;
67f0cbdb 3228 unsigned int do_toc_opt:1;
4c52953f 3229
9a23f96e
AM
3230 /* Set if tls optimization is enabled. */
3231 unsigned int do_tls_opt:1;
3232
3e04d765
AM
3233 /* Set if inline plt calls should be converted to direct calls. */
3234 unsigned int can_convert_all_inline_plt:1;
3235
5d1634d7 3236 /* Set on error. */
99877b66 3237 unsigned int stub_error:1;
721956f4 3238
8c5b4e52
AM
3239 /* Whether func_desc_adjust needs to be run over symbols. */
3240 unsigned int need_func_desc_adj:1;
721956f4 3241
f378ab09
AM
3242 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3243 unsigned int has_plt_localentry0:1;
3244
5663e321
AM
3245 /* Whether calls are made via the PLT from NOTOC functions. */
3246 unsigned int notoc_plt:1;
3247
721956f4
AM
3248 /* Incremented every time we size stubs. */
3249 unsigned int stub_iteration;
5d1634d7 3250
87d72d41
AM
3251 /* Small local sym cache. */
3252 struct sym_cache sym_cache;
65f38f15
AM
3253};
3254
4c52953f
AM
3255/* Rename some of the generic section flags to better document how they
3256 are used here. */
b0dddeec
AM
3257
3258/* Nonzero if this section has TLS related relocations. */
3259#define has_tls_reloc sec_flg0
3260
9737e8af
AM
3261/* Nonzero if this section has a call to __tls_get_addr lacking marker
3262 relocations. */
3263#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3264
3265/* Nonzero if this section has any toc or got relocs. */
3266#define has_toc_reloc sec_flg2
3267
3268/* Nonzero if this section has a call to another section that uses
3269 the toc or got. */
d77c8a4b 3270#define makes_toc_func_call sec_flg3
b0dddeec
AM
3271
3272/* Recursion protection when determining above flag. */
d77c8a4b 3273#define call_check_in_progress sec_flg4
70cc837d 3274#define call_check_done sec_flg5
4c52953f 3275
65f38f15
AM
3276/* Get the ppc64 ELF linker hash table from a link_info structure. */
3277
3278#define ppc_hash_table(p) \
4dfe6ac6
NC
3279 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3280 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3281
721956f4
AM
3282#define ppc_stub_hash_lookup(table, string, create, copy) \
3283 ((struct ppc_stub_hash_entry *) \
3284 bfd_hash_lookup ((table), (string), (create), (copy)))
3285
3286#define ppc_branch_hash_lookup(table, string, create, copy) \
3287 ((struct ppc_branch_hash_entry *) \
3288 bfd_hash_lookup ((table), (string), (create), (copy)))
3289
3290/* Create an entry in the stub hash table. */
3291
3292static struct bfd_hash_entry *
4ce794b7
AM
3293stub_hash_newfunc (struct bfd_hash_entry *entry,
3294 struct bfd_hash_table *table,
3295 const char *string)
721956f4
AM
3296{
3297 /* Allocate the structure if it has not already been allocated by a
3298 subclass. */
3299 if (entry == NULL)
3300 {
3301 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3302 if (entry == NULL)
3303 return entry;
3304 }
3305
3306 /* Call the allocation method of the superclass. */
3307 entry = bfd_hash_newfunc (entry, table, string);
3308 if (entry != NULL)
3309 {
3310 struct ppc_stub_hash_entry *eh;
3311
3312 /* Initialize the local fields. */
3313 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3314 eh->stub_type = ppc_stub_none;
6f20ed8a 3315 eh->group = NULL;
721956f4
AM
3316 eh->stub_offset = 0;
3317 eh->target_value = 0;
3318 eh->target_section = NULL;
721956f4 3319 eh->h = NULL;
6911b7dc 3320 eh->plt_ent = NULL;
6911b7dc 3321 eh->other = 0;
721956f4
AM
3322 }
3323
3324 return entry;
3325}
3326
3327/* Create an entry in the branch hash table. */
3328
3329static struct bfd_hash_entry *
4ce794b7
AM
3330branch_hash_newfunc (struct bfd_hash_entry *entry,
3331 struct bfd_hash_table *table,
3332 const char *string)
721956f4
AM
3333{
3334 /* Allocate the structure if it has not already been allocated by a
3335 subclass. */
3336 if (entry == NULL)
3337 {
3338 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3339 if (entry == NULL)
3340 return entry;
3341 }
3342
3343 /* Call the allocation method of the superclass. */
3344 entry = bfd_hash_newfunc (entry, table, string);
3345 if (entry != NULL)
3346 {
3347 struct ppc_branch_hash_entry *eh;
3348
3349 /* Initialize the local fields. */
3350 eh = (struct ppc_branch_hash_entry *) entry;
3351 eh->offset = 0;
3352 eh->iter = 0;
3353 }
3354
3355 return entry;
3356}
3357
65f38f15
AM
3358/* Create an entry in a ppc64 ELF linker hash table. */
3359
3360static struct bfd_hash_entry *
4ce794b7
AM
3361link_hash_newfunc (struct bfd_hash_entry *entry,
3362 struct bfd_hash_table *table,
3363 const char *string)
65f38f15
AM
3364{
3365 /* Allocate the structure if it has not already been allocated by a
3366 subclass. */
3367 if (entry == NULL)
3368 {
3369 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3370 if (entry == NULL)
3371 return entry;
3372 }
3373
3374 /* Call the allocation method of the superclass. */
3375 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3376 if (entry != NULL)
3377 {
3378 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3379
b3fac117 3380 memset (&eh->u.stub_cache, 0,
908b32fc 3381 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3382 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3383
3384 /* When making function calls, old ABI code references function entry
3385 points (dot symbols), while new ABI code references the function
3386 descriptor symbol. We need to make any combination of reference and
3387 definition work together, without breaking archive linking.
3388
3389 For a defined function "foo" and an undefined call to "bar":
3390 An old object defines "foo" and ".foo", references ".bar" (possibly
3391 "bar" too).
3392 A new object defines "foo" and references "bar".
3393
3394 A new object thus has no problem with its undefined symbols being
3395 satisfied by definitions in an old object. On the other hand, the
3396 old object won't have ".bar" satisfied by a new object.
3397
3398 Keep a list of newly added dot-symbols. */
3399
3400 if (string[0] == '.')
3401 {
3402 struct ppc_link_hash_table *htab;
3403
3404 htab = (struct ppc_link_hash_table *) table;
3405 eh->u.next_dot_sym = htab->dot_syms;
3406 htab->dot_syms = eh;
3407 }
65f38f15
AM
3408 }
3409
3410 return entry;
3411}
3412
2cdcc330
AM
3413struct tocsave_entry
3414{
3b421ab3
AM
3415 asection *sec;
3416 bfd_vma offset;
3417};
3418
3419static hashval_t
3420tocsave_htab_hash (const void *p)
3421{
3422 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3423 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3424}
3425
3426static int
3427tocsave_htab_eq (const void *p1, const void *p2)
3428{
3429 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3430 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3431 return e1->sec == e2->sec && e1->offset == e2->offset;
3432}
3433
68faa637
AM
3434/* Destroy a ppc64 ELF linker hash table. */
3435
3436static void
d495ab0d 3437ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3438{
d495ab0d 3439 struct ppc_link_hash_table *htab;
68faa637 3440
d495ab0d 3441 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3442 if (htab->tocsave_htab)
3443 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3444 bfd_hash_table_free (&htab->branch_hash_table);
3445 bfd_hash_table_free (&htab->stub_hash_table);
3446 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3447}
3448
65f38f15
AM
3449/* Create a ppc64 ELF linker hash table. */
3450
3451static struct bfd_link_hash_table *
4ce794b7 3452ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3453{
3454 struct ppc_link_hash_table *htab;
986f0783 3455 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3456
4ce794b7 3457 htab = bfd_zmalloc (amt);
65f38f15
AM
3458 if (htab == NULL)
3459 return NULL;
3460
66eb6687 3461 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3462 sizeof (struct ppc_link_hash_entry),
3463 PPC64_ELF_DATA))
65f38f15 3464 {
e2d34d7d 3465 free (htab);
65f38f15
AM
3466 return NULL;
3467 }
3468
721956f4 3469 /* Init the stub hash table too. */
66eb6687
AM
3470 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3471 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3472 {
d495ab0d 3473 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3474 return NULL;
3475 }
721956f4
AM
3476
3477 /* And the branch hash table. */
66eb6687
AM
3478 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3479 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3480 {
3481 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3482 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3483 return NULL;
3484 }
721956f4 3485
3b421ab3
AM
3486 htab->tocsave_htab = htab_try_create (1024,
3487 tocsave_htab_hash,
3488 tocsave_htab_eq,
3489 NULL);
3490 if (htab->tocsave_htab == NULL)
2915c55b 3491 {
d495ab0d 3492 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3493 return NULL;
3494 }
d495ab0d 3495 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3496
3254fd24
AM
3497 /* Initializing two fields of the union is just cosmetic. We really
3498 only care about glist, but when compiled on a 32-bit host the
3499 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3500 debugger inspection of these fields look nicer. */
a6aa5195
AM
3501 htab->elf.init_got_refcount.refcount = 0;
3502 htab->elf.init_got_refcount.glist = NULL;
3503 htab->elf.init_plt_refcount.refcount = 0;
3504 htab->elf.init_plt_refcount.glist = NULL;
3505 htab->elf.init_got_offset.offset = 0;
3506 htab->elf.init_got_offset.glist = NULL;
3507 htab->elf.init_plt_offset.offset = 0;
3508 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3509
65f38f15
AM
3510 return &htab->elf.root;
3511}
3512
bfeb4a28
AM
3513/* Create sections for linker generated code. */
3514
3515static bfd_boolean
3516create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3517{
3518 struct ppc_link_hash_table *htab;
3519 flagword flags;
3520
3521 htab = ppc_hash_table (info);
3522
bfeb4a28
AM
3523 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3524 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3525 if (htab->params->save_restore_funcs)
3526 {
3527 /* Create .sfpr for code to save and restore fp regs. */
3528 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3529 flags);
3530 if (htab->sfpr == NULL
fd361982 3531 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3532 return FALSE;
3533 }
3534
3535 if (bfd_link_relocatable (info))
3536 return TRUE;
bfeb4a28
AM
3537
3538 /* Create .glink for lazy dynamic linking support. */
3539 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3540 flags);
3541 if (htab->glink == NULL
fd361982 3542 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3543 return FALSE;
3544
9e390558
AM
3545 /* The part of .glink used by global entry stubs, separate so that
3546 it can be aligned appropriately without affecting htab->glink. */
3547 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3548 flags);
3549 if (htab->global_entry == NULL
fd361982 3550 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3551 return FALSE;
3552
bfeb4a28
AM
3553 if (!info->no_ld_generated_unwind_info)
3554 {
3555 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3556 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3557 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3558 ".eh_frame",
3559 flags);
3560 if (htab->glink_eh_frame == NULL
fd361982 3561 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3562 return FALSE;
3563 }
3564
3565 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3566 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3567 if (htab->elf.iplt == NULL
fd361982 3568 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3569 return FALSE;
3570
3571 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3572 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3573 htab->elf.irelplt
3574 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3575 if (htab->elf.irelplt == NULL
fd361982 3576 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3577 return FALSE;
3578
3579 /* Create branch lookup table for plt_branch stubs. */
3580 flags = (SEC_ALLOC | SEC_LOAD
3581 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3582 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3583 flags);
3584 if (htab->brlt == NULL
fd361982 3585 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3586 return FALSE;
3587
2d7ad24e
AM
3588 /* Local plt entries, put in .branch_lt but a separate section for
3589 convenience. */
3590 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3591 flags);
3592 if (htab->pltlocal == NULL
fd361982 3593 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3594 return FALSE;
3595
0e1862bb 3596 if (!bfd_link_pic (info))
bfeb4a28
AM
3597 return TRUE;
3598
3599 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3600 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3601 htab->relbrlt
3602 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3603 if (htab->relbrlt == NULL
fd361982 3604 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3605 return FALSE;
3606
2d7ad24e
AM
3607 htab->relpltlocal
3608 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3609 if (htab->relpltlocal == NULL
fd361982 3610 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3611 return FALSE;
3612
bfeb4a28
AM
3613 return TRUE;
3614}
3615
e717da7e
AM
3616/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3617
bfeb4a28 3618bfd_boolean
e7d1c40c
AM
3619ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3620 struct ppc64_elf_params *params)
e717da7e
AM
3621{
3622 struct ppc_link_hash_table *htab;
3623
e7d1c40c 3624 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3625
3626/* Always hook our dynamic sections into the first bfd, which is the
3627 linker created stub bfd. This ensures that the GOT header is at
3628 the start of the output TOC section. */
3629 htab = ppc_hash_table (info);
e7d1c40c
AM
3630 htab->elf.dynobj = params->stub_bfd;
3631 htab->params = params;
bfeb4a28 3632
bfeb4a28 3633 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3634}
3635
721956f4
AM
3636/* Build a name for an entry in the stub hash table. */
3637
3638static char *
4ce794b7
AM
3639ppc_stub_name (const asection *input_section,
3640 const asection *sym_sec,
3641 const struct ppc_link_hash_entry *h,
3642 const Elf_Internal_Rela *rel)
721956f4
AM
3643{
3644 char *stub_name;
bcaa2f82 3645 ssize_t len;
721956f4
AM
3646
3647 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3648 offsets from a sym as a branch target? In fact, we could
3649 probably assume the addend is always zero. */
3650 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3651
3652 if (h)
3653 {
3654 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3655 stub_name = bfd_malloc (len);
46de2a7c
AM
3656 if (stub_name == NULL)
3657 return stub_name;
3658
bcaa2f82
AM
3659 len = sprintf (stub_name, "%08x.%s+%x",
3660 input_section->id & 0xffffffff,
3661 h->elf.root.root.string,
3662 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3663 }
3664 else
3665 {
ad8e1ba5 3666 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3667 stub_name = bfd_malloc (len);
46de2a7c
AM
3668 if (stub_name == NULL)
3669 return stub_name;
3670
bcaa2f82
AM
3671 len = sprintf (stub_name, "%08x.%x:%x+%x",
3672 input_section->id & 0xffffffff,
3673 sym_sec->id & 0xffffffff,
3674 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3675 (int) rel->r_addend & 0xffffffff);
721956f4 3676 }
bcaa2f82 3677 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3678 stub_name[len - 2] = 0;
721956f4
AM
3679 return stub_name;
3680}
3681
3682/* Look up an entry in the stub hash. Stub entries are cached because
3683 creating the stub name takes a bit of time. */
3684
3685static struct ppc_stub_hash_entry *
4ce794b7
AM
3686ppc_get_stub_entry (const asection *input_section,
3687 const asection *sym_sec,
039b3fef 3688 struct ppc_link_hash_entry *h,
4ce794b7
AM
3689 const Elf_Internal_Rela *rel,
3690 struct ppc_link_hash_table *htab)
721956f4
AM
3691{
3692 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3693 struct map_stub *group;
721956f4
AM
3694
3695 /* If this input section is part of a group of sections sharing one
3696 stub section, then use the id of the first section in the group.
3697 Stub names need to include a section id, as there may well be
3698 more than one stub used to reach say, printf, and we need to
3699 distinguish between them. */
6f20ed8a 3700 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3701 if (group == NULL)
3702 return NULL;
721956f4 3703
b3fac117
AM
3704 if (h != NULL && h->u.stub_cache != NULL
3705 && h->u.stub_cache->h == h
6f20ed8a 3706 && h->u.stub_cache->group == group)
721956f4 3707 {
b3fac117 3708 stub_entry = h->u.stub_cache;
721956f4
AM
3709 }
3710 else
3711 {
3712 char *stub_name;
3713
6f20ed8a 3714 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3715 if (stub_name == NULL)
3716 return NULL;
3717
3718 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3719 stub_name, FALSE, FALSE);
721956f4 3720 if (h != NULL)
b3fac117 3721 h->u.stub_cache = stub_entry;
721956f4
AM
3722
3723 free (stub_name);
3724 }
3725
3726 return stub_entry;
3727}
3728
3729/* Add a new stub entry to the stub hash. Not all fields of the new
3730 stub entry are initialised. */
3731
3732static struct ppc_stub_hash_entry *
4ce794b7
AM
3733ppc_add_stub (const char *stub_name,
3734 asection *section,
25f53a85 3735 struct bfd_link_info *info)
721956f4 3736{
25f53a85 3737 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3738 struct map_stub *group;
721956f4
AM
3739 asection *link_sec;
3740 asection *stub_sec;
3741 struct ppc_stub_hash_entry *stub_entry;
3742
6f20ed8a
AM
3743 group = htab->sec_info[section->id].u.group;
3744 link_sec = group->link_sec;
3745 stub_sec = group->stub_sec;
721956f4
AM
3746 if (stub_sec == NULL)
3747 {
6f20ed8a
AM
3748 size_t namelen;
3749 bfd_size_type len;
3750 char *s_name;
721956f4 3751
6f20ed8a
AM
3752 namelen = strlen (link_sec->name);
3753 len = namelen + sizeof (STUB_SUFFIX);
3754 s_name = bfd_alloc (htab->params->stub_bfd, len);
3755 if (s_name == NULL)
3756 return NULL;
721956f4 3757
6f20ed8a
AM
3758 memcpy (s_name, link_sec->name, namelen);
3759 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3760 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3761 if (stub_sec == NULL)
3762 return NULL;
3763 group->stub_sec = stub_sec;
721956f4
AM
3764 }
3765
3766 /* Enter this entry into the linker stub hash table. */
3767 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3768 TRUE, FALSE);
721956f4
AM
3769 if (stub_entry == NULL)
3770 {
695344c0 3771 /* xgettext:c-format */
cf97bcb0
AM
3772 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3773 section->owner, stub_name);
721956f4
AM
3774 return NULL;
3775 }
3776
6f20ed8a 3777 stub_entry->group = group;
721956f4 3778 stub_entry->stub_offset = 0;
721956f4
AM
3779 return stub_entry;
3780}
3781
e717da7e
AM
3782/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3783 not already done. */
65f38f15 3784
b34976b6 3785static bfd_boolean
e717da7e 3786create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3787{
e717da7e
AM
3788 asection *got, *relgot;
3789 flagword flags;
3790 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3791
0c8d6e5c 3792 if (!is_ppc64_elf (abfd))
0ffa91dd 3793 return FALSE;
4dfe6ac6
NC
3794 if (htab == NULL)
3795 return FALSE;
0ffa91dd 3796
33e44f2e
AM
3797 if (!htab->elf.sgot
3798 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3799 return FALSE;
e717da7e
AM
3800
3801 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3802 | SEC_LINKER_CREATED);
3803
c456f082 3804 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3805 if (!got
fd361982 3806 || !bfd_set_section_alignment (got, 3))
e717da7e 3807 return FALSE;
65f38f15 3808
c456f082
AM
3809 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3810 flags | SEC_READONLY);
e717da7e 3811 if (!relgot
fd361982 3812 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3813 return FALSE;
e717da7e
AM
3814
3815 ppc64_elf_tdata (abfd)->got = got;
3816 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3817 return TRUE;
65f38f15 3818}
5bd4f169 3819
b31867b6
AM
3820/* Follow indirect and warning symbol links. */
3821
3822static inline struct bfd_link_hash_entry *
3823follow_link (struct bfd_link_hash_entry *h)
3824{
3825 while (h->type == bfd_link_hash_indirect
3826 || h->type == bfd_link_hash_warning)
3827 h = h->u.i.link;
3828 return h;
3829}
3830
3831static inline struct elf_link_hash_entry *
3832elf_follow_link (struct elf_link_hash_entry *h)
3833{
3834 return (struct elf_link_hash_entry *) follow_link (&h->root);
3835}
3836
3837static inline struct ppc_link_hash_entry *
3838ppc_follow_link (struct ppc_link_hash_entry *h)
3839{
ed7007c1 3840 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3841}
3842
40d16e0b
AM
3843/* Merge PLT info on FROM with that on TO. */
3844
3845static void
3846move_plt_plist (struct ppc_link_hash_entry *from,
3847 struct ppc_link_hash_entry *to)
3848{
3849 if (from->elf.plt.plist != NULL)
3850 {
3851 if (to->elf.plt.plist != NULL)
3852 {
3853 struct plt_entry **entp;
3854 struct plt_entry *ent;
3855
3856 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3857 {
3858 struct plt_entry *dent;
3859
3860 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3861 if (dent->addend == ent->addend)
3862 {
3863 dent->plt.refcount += ent->plt.refcount;
3864 *entp = ent->next;
3865 break;
3866 }
3867 if (dent == NULL)
3868 entp = &ent->next;
3869 }
3870 *entp = to->elf.plt.plist;
3871 }
3872
3873 to->elf.plt.plist = from->elf.plt.plist;
3874 from->elf.plt.plist = NULL;
3875 }
3876}
3877
65f38f15
AM
3878/* Copy the extra info we tack onto an elf_link_hash_entry. */
3879
3880static void
fcfa13d2
AM
3881ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3882 struct elf_link_hash_entry *dir,
3883 struct elf_link_hash_entry *ind)
65f38f15
AM
3884{
3885 struct ppc_link_hash_entry *edir, *eind;
3886
ed7007c1
AM
3887 edir = ppc_elf_hash_entry (dir);
3888 eind = ppc_elf_hash_entry (ind);
65f38f15 3889
c79d6685
AM
3890 edir->is_func |= eind->is_func;
3891 edir->is_func_descriptor |= eind->is_func_descriptor;
3892 edir->tls_mask |= eind->tls_mask;
3893 if (eind->oh != NULL)
3894 edir->oh = ppc_follow_link (eind->oh);
3895
474436e6 3896 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3897 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3898 edir->elf.ref_regular |= eind->elf.ref_regular;
3899 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3900 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3901 edir->elf.needs_plt |= eind->elf.needs_plt;
3902 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3903
d311bc8b
AM
3904 /* If we were called to copy over info for a weak sym, don't copy
3905 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3906 in order to simplify readonly_dynrelocs and save a field in the
3907 symbol hash entry, but that means dyn_relocs can't be used in any
3908 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3909 are then tested. */
d311bc8b 3910 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3911 return;
d311bc8b 3912
411e1bfb 3913 /* Copy over any dynamic relocs we may have on the indirect sym. */
190eb1dd 3914 if (ind->dyn_relocs != NULL)
65f38f15 3915 {
190eb1dd 3916 if (dir->dyn_relocs != NULL)
bbd7ec4a 3917 {
6061a67d
AM
3918 struct elf_dyn_relocs **pp;
3919 struct elf_dyn_relocs *p;
bbd7ec4a 3920
fcfa13d2 3921 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 3922 list. Merge any entries against the same section. */
190eb1dd 3923 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
bbd7ec4a 3924 {
6061a67d 3925 struct elf_dyn_relocs *q;
bbd7ec4a 3926
190eb1dd 3927 for (q = dir->dyn_relocs; q != NULL; q = q->next)
bbd7ec4a
AM
3928 if (q->sec == p->sec)
3929 {
3930 q->pc_count += p->pc_count;
3931 q->count += p->count;
3932 *pp = p->next;
3933 break;
3934 }
3935 if (q == NULL)
3936 pp = &p->next;
3937 }
190eb1dd 3938 *pp = dir->dyn_relocs;
bbd7ec4a
AM
3939 }
3940
190eb1dd
L
3941 dir->dyn_relocs = ind->dyn_relocs;
3942 ind->dyn_relocs = NULL;
65f38f15 3943 }
65f38f15 3944
81848ca0
AM
3945 /* Copy over got entries that we may have already seen to the
3946 symbol which just became indirect. */
411e1bfb
AM
3947 if (eind->elf.got.glist != NULL)
3948 {
3949 if (edir->elf.got.glist != NULL)
3950 {
3951 struct got_entry **entp;
3952 struct got_entry *ent;
3953
3954 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3955 {
3956 struct got_entry *dent;
3957
3958 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3959 if (dent->addend == ent->addend
e717da7e 3960 && dent->owner == ent->owner
411e1bfb
AM
3961 && dent->tls_type == ent->tls_type)
3962 {
3963 dent->got.refcount += ent->got.refcount;
3964 *entp = ent->next;
3965 break;
3966 }
3967 if (dent == NULL)
3968 entp = &ent->next;
3969 }
3970 *entp = edir->elf.got.glist;
3971 }
3972
3973 edir->elf.got.glist = eind->elf.got.glist;
3974 eind->elf.got.glist = NULL;
3975 }
3976
3977 /* And plt entries. */
40d16e0b 3978 move_plt_plist (eind, edir);
411e1bfb 3979
fcfa13d2 3980 if (eind->elf.dynindx != -1)
411e1bfb 3981 {
fcfa13d2
AM
3982 if (edir->elf.dynindx != -1)
3983 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3984 edir->elf.dynstr_index);
411e1bfb
AM
3985 edir->elf.dynindx = eind->elf.dynindx;
3986 edir->elf.dynstr_index = eind->elf.dynstr_index;
3987 eind->elf.dynindx = -1;
3988 eind->elf.dynstr_index = 0;
3989 }
411e1bfb
AM
3990}
3991
8387904d
AM
3992/* Find the function descriptor hash entry from the given function code
3993 hash entry FH. Link the entries via their OH fields. */
3994
3995static struct ppc_link_hash_entry *
b31867b6 3996lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3997{
3998 struct ppc_link_hash_entry *fdh = fh->oh;
3999
4000 if (fdh == NULL)
4001 {
4002 const char *fd_name = fh->elf.root.root.string + 1;
4003
ed7007c1
AM
4004 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4005 FALSE, FALSE, FALSE));
b31867b6
AM
4006 if (fdh == NULL)
4007 return fdh;
4008
4009 fdh->is_func_descriptor = 1;
4010 fdh->oh = fh;
4011 fh->is_func = 1;
4012 fh->oh = fdh;
8387904d
AM
4013 }
4014
8c5b4e52
AM
4015 fdh = ppc_follow_link (fdh);
4016 fdh->is_func_descriptor = 1;
4017 fdh->oh = fh;
4018 return fdh;
8387904d
AM
4019}
4020
8c5b4e52 4021/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4022
4023static struct ppc_link_hash_entry *
4024make_fdh (struct bfd_link_info *info,
908b32fc 4025 struct ppc_link_hash_entry *fh)
bb700d78 4026{
8c5b4e52
AM
4027 bfd *abfd = fh->elf.root.u.undef.abfd;
4028 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4029 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4030 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4031 ? BSF_WEAK
4032 : BSF_GLOBAL);
4033
4034 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4035 fh->elf.root.root.string + 1,
4036 flags, bfd_und_section_ptr, 0,
4037 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4038 return NULL;
4039
4040 fdh = (struct ppc_link_hash_entry *) bh;
4041 fdh->elf.non_elf = 0;
908b32fc
AM
4042 fdh->fake = 1;
4043 fdh->is_func_descriptor = 1;
4044 fdh->oh = fh;
4045 fh->is_func = 1;
4046 fh->oh = fdh;
bb700d78
AM
4047 return fdh;
4048}
4049
8387904d
AM
4050/* Fix function descriptor symbols defined in .opd sections to be
4051 function type. */
555cd476
AM
4052
4053static bfd_boolean
c16153ae 4054ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4055 struct bfd_link_info *info,
555cd476 4056 Elf_Internal_Sym *isym,
6911b7dc 4057 const char **name,
555cd476
AM
4058 flagword *flags ATTRIBUTE_UNUSED,
4059 asection **sec,
b53dfeb2 4060 bfd_vma *value)
555cd476 4061{
b53dfeb2 4062 if (*sec != NULL
f1885d1e 4063 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4064 {
4065 asection *code_sec;
4066
4067 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4068 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4069 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4070
4071 /* If the symbol is a function defined in .opd, and the function
4072 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4073 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4074 && (*sec)->reloc_count != 0
4075 && opd_entry_value (*sec, *value, &code_sec, NULL,
4076 FALSE) != (bfd_vma) -1
4077 && discarded_section (code_sec))
4078 {
4079 *sec = bfd_und_section_ptr;
4080 isym->st_shndx = SHN_UNDEF;
4081 }
4082 }
dbd1e97e
AM
4083 else if (*sec != NULL
4084 && strcmp ((*sec)->name, ".toc") == 0
4085 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4086 {
4087 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4088 if (htab != NULL)
4089 htab->params->object_in_toc = 1;
4090 }
433817dd 4091
6911b7dc
AM
4092 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4093 {
4094 if (abiversion (ibfd) == 0)
4095 set_abiversion (ibfd, 2);
4096 else if (abiversion (ibfd) == 1)
4097 {
cf97bcb0
AM
4098 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4099 " for ABI version 1"), *name);
6911b7dc
AM
4100 bfd_set_error (bfd_error_bad_value);
4101 return FALSE;
4102 }
4103 }
4104
555cd476
AM
4105 return TRUE;
4106}
4107
6911b7dc
AM
4108/* Merge non-visibility st_other attributes: local entry point. */
4109
4110static void
4111ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4112 const Elf_Internal_Sym *isym,
4113 bfd_boolean definition,
4114 bfd_boolean dynamic)
4115{
f378ab09 4116 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4117 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4118 | ELF_ST_VISIBILITY (h->other));
4119}
4120
8c5b4e52
AM
4121/* Hook called on merging a symbol. We use this to clear "fake" since
4122 we now have a real symbol. */
4123
4124static bfd_boolean
4125ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4126 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4127 asection **psec ATTRIBUTE_UNUSED,
4128 bfd_boolean newdef ATTRIBUTE_UNUSED,
4129 bfd_boolean olddef ATTRIBUTE_UNUSED,
4130 bfd *oldbfd ATTRIBUTE_UNUSED,
4131 const asection *oldsec ATTRIBUTE_UNUSED)
4132{
ed7007c1 4133 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4134 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4135 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4136 return TRUE;
4137}
4138
8387904d 4139/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4140 inclusion of a new ABI object archive that defines "bar".
4141 NAME is a symbol defined in an archive. Return a symbol in the hash
4142 table that might be satisfied by the archive symbols. */
8387904d
AM
4143
4144static struct elf_link_hash_entry *
4145ppc64_elf_archive_symbol_lookup (bfd *abfd,
4146 struct bfd_link_info *info,
4147 const char *name)
4148{
4149 struct elf_link_hash_entry *h;
4150 char *dot_name;
4151 size_t len;
4152
4153 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4154 if (h != NULL
4155 /* Don't return this sym if it is a fake function descriptor
4156 created by add_symbol_adjust. */
ed7007c1 4157 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4158 return h;
4159
4160 if (name[0] == '.')
4161 return h;
4162
4163 len = strlen (name);
4164 dot_name = bfd_alloc (abfd, len + 2);
4165 if (dot_name == NULL)
e99955cd 4166 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4167 dot_name[0] = '.';
4168 memcpy (dot_name + 1, name, len + 1);
4169 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4170 bfd_release (abfd, dot_name);
a804e476
AM
4171 if (h != NULL)
4172 return h;
4173
4174 if (strcmp (name, "__tls_get_addr_opt") == 0)
4175 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4176 return h;
4177}
4178
4179/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4180 new ABI object defines "bar". Well, at least, undefined dot symbols
4181 are made weak. This stops later archive searches from including an
4182 object if we already have a function descriptor definition. It also
35b0ce59
AM
4183 prevents the linker complaining about undefined symbols.
4184 We also check and correct mismatched symbol visibility here. The
4185 most restrictive visibility of the function descriptor and the
4186 function entry symbol is used. */
8387904d
AM
4187
4188static bfd_boolean
b3fac117 4189add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4190{
8387904d
AM
4191 struct ppc_link_hash_table *htab;
4192 struct ppc_link_hash_entry *fdh;
4193
b3fac117
AM
4194 if (eh->elf.root.type == bfd_link_hash_warning)
4195 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4196
8400d40d
AM
4197 if (eh->elf.root.type == bfd_link_hash_indirect)
4198 return TRUE;
4199
b3fac117
AM
4200 if (eh->elf.root.root.string[0] != '.')
4201 abort ();
8387904d 4202
b3fac117 4203 htab = ppc_hash_table (info);
4dfe6ac6
NC
4204 if (htab == NULL)
4205 return FALSE;
4206
b31867b6 4207 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4208 if (fdh == NULL
4209 && !bfd_link_relocatable (info)
4210 && (eh->elf.root.type == bfd_link_hash_undefined
4211 || eh->elf.root.type == bfd_link_hash_undefweak)
4212 && eh->elf.ref_regular)
4213 {
4214 /* Make an undefined function descriptor sym, in order to
4215 pull in an --as-needed shared lib. Archives are handled
4216 elsewhere. */
4217 fdh = make_fdh (info, eh);
4218 if (fdh == NULL)
4219 return FALSE;
bb700d78 4220 }
8c5b4e52
AM
4221
4222 if (fdh != NULL)
8387904d 4223 {
35b0ce59
AM
4224 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4225 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4226
4227 /* Make both descriptor and entry symbol have the most
4228 constraining visibility of either symbol. */
35b0ce59
AM
4229 if (entry_vis < descr_vis)
4230 fdh->elf.other += entry_vis - descr_vis;
4231 else if (entry_vis > descr_vis)
4232 eh->elf.other += descr_vis - entry_vis;
4233
8c5b4e52
AM
4234 /* Propagate reference flags from entry symbol to function
4235 descriptor symbol. */
bc4e12de 4236 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4237 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4238 fdh->elf.ref_regular |= eh->elf.ref_regular;
4239 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4240
4241 if (!fdh->elf.forced_local
4242 && fdh->elf.dynindx == -1
4243 && fdh->elf.versioned != versioned_hidden
4244 && (bfd_link_dll (info)
4245 || fdh->elf.def_dynamic
4246 || fdh->elf.ref_dynamic)
4247 && (eh->elf.ref_regular
4248 || eh->elf.def_regular))
4249 {
2cdcc330 4250 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4251 return FALSE;
35b0ce59 4252 }
8387904d 4253 }
99877b66 4254
8387904d
AM
4255 return TRUE;
4256}
4257
f6c7c3e8
AM
4258/* Set up opd section info and abiversion for IBFD, and process list
4259 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4260
8387904d 4261static bfd_boolean
f6c7c3e8 4262ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4263{
99877b66 4264 struct ppc_link_hash_table *htab;
b3fac117 4265 struct ppc_link_hash_entry **p, *eh;
459609d6 4266 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4267
459609d6 4268 if (opd != NULL && opd->size != 0)
b3fac117 4269 {
b9399fcf
AM
4270 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4271 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4272
459609d6
AM
4273 if (abiversion (ibfd) == 0)
4274 set_abiversion (ibfd, 1);
8a2058b5 4275 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4276 {
695344c0 4277 /* xgettext:c-format */
cf97bcb0
AM
4278 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4279 ibfd, abiversion (ibfd));
459609d6
AM
4280 bfd_set_error (bfd_error_bad_value);
4281 return FALSE;
f6c7c3e8 4282 }
b9399fcf 4283 }
f6c7c3e8 4284
b9399fcf
AM
4285 if (is_ppc64_elf (info->output_bfd))
4286 {
4287 /* For input files without an explicit abiversion in e_flags
4288 we should have flagged any with symbol st_other bits set
4289 as ELFv1 and above flagged those with .opd as ELFv2.
4290 Set the output abiversion if not yet set, and for any input
4291 still ambiguous, take its abiversion from the output.
4292 Differences in ABI are reported later. */
4293 if (abiversion (info->output_bfd) == 0)
4294 set_abiversion (info->output_bfd, abiversion (ibfd));
4295 else if (abiversion (ibfd) == 0)
4296 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4297 }
4298
459609d6
AM
4299 htab = ppc_hash_table (info);
4300 if (htab == NULL)
b9399fcf 4301 return TRUE;
459609d6 4302
b9399fcf
AM
4303 if (opd != NULL && opd->size != 0
4304 && (ibfd->flags & DYNAMIC) == 0
4305 && (opd->flags & SEC_RELOC) != 0
4306 && opd->reloc_count != 0
4307 && !bfd_is_abs_section (opd->output_section)
4308 && info->gc_sections)
4309 {
4310 /* Garbage collection needs some extra help with .opd sections.
4311 We don't want to necessarily keep everything referenced by
4312 relocs in .opd, as that would keep all functions. Instead,
4313 if we reference an .opd symbol (a function descriptor), we
4314 want to keep the function code symbol's section. This is
4315 easy for global symbols, but for local syms we need to keep
4316 information about the associated function section. */
4317 bfd_size_type amt;
4318 asection **opd_sym_map;
4319 Elf_Internal_Shdr *symtab_hdr;
4320 Elf_Internal_Rela *relocs, *rel_end, *rel;
4321
4322 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4323 opd_sym_map = bfd_zalloc (ibfd, amt);
4324 if (opd_sym_map == NULL)
4325 return FALSE;
4326 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4327 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4328 info->keep_memory);
4329 if (relocs == NULL)
4330 return FALSE;
4331 symtab_hdr = &elf_symtab_hdr (ibfd);
4332 rel_end = relocs + opd->reloc_count - 1;
4333 for (rel = relocs; rel < rel_end; rel++)
4334 {
4335 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4336 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4337
4338 if (r_type == R_PPC64_ADDR64
4339 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4340 && r_symndx < symtab_hdr->sh_info)
4341 {
4342 Elf_Internal_Sym *isym;
4343 asection *s;
4344
4345 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4346 if (isym == NULL)
4347 {
4348 if (elf_section_data (opd)->relocs != relocs)
4349 free (relocs);
4350 return FALSE;
4351 }
4352
4353 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4354 if (s != NULL && s != opd)
4355 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4356 }
4357 }
4358 if (elf_section_data (opd)->relocs != relocs)
4359 free (relocs);
4360 }
459609d6
AM
4361
4362 p = &htab->dot_syms;
4363 while ((eh = *p) != NULL)
4364 {
4365 *p = NULL;
4366 if (&eh->elf == htab->elf.hgot)
4367 ;
4368 else if (htab->elf.hgot == NULL
4369 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4370 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4371 else if (abiversion (ibfd) <= 1)
4372 {
4373 htab->need_func_desc_adj = 1;
4374 if (!add_symbol_adjust (eh, info))
4375 return FALSE;
4376 }
459609d6
AM
4377 p = &eh->u.next_dot_sym;
4378 }
b3fac117 4379 return TRUE;
8387904d
AM
4380}
4381
97fed1c9
JJ
4382/* Undo hash table changes when an --as-needed input file is determined
4383 not to be needed. */
4384
4385static bfd_boolean
e5034e59
AM
4386ppc64_elf_notice_as_needed (bfd *ibfd,
4387 struct bfd_link_info *info,
4388 enum notice_asneeded_action act)
97fed1c9 4389{
e5034e59
AM
4390 if (act == notice_not_needed)
4391 {
4392 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4393
e5034e59
AM
4394 if (htab == NULL)
4395 return FALSE;
4dfe6ac6 4396
e5034e59
AM
4397 htab->dot_syms = NULL;
4398 }
4399 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4400}
4401
aa374f67
AM
4402/* If --just-symbols against a final linked binary, then assume we need
4403 toc adjusting stubs when calling functions defined there. */
4404
4405static void
4406ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4407{
4408 if ((sec->flags & SEC_CODE) != 0
4409 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4410 && is_ppc64_elf (sec->owner))
4411 {
2c3f079f
AM
4412 if (abiversion (sec->owner) >= 2
4413 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4414 sec->has_toc_reloc = 1;
4415 }
4416 _bfd_elf_link_just_syms (sec, info);
4417}
4418
e054468f 4419static struct plt_entry **
4ce794b7
AM
4420update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4421 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4422{
4423 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4424 struct plt_entry **local_plt;
f961d9dd 4425 unsigned char *local_got_tls_masks;
411e1bfb
AM
4426
4427 if (local_got_ents == NULL)
4428 {
4429 bfd_size_type size = symtab_hdr->sh_info;
4430
e054468f
AM
4431 size *= (sizeof (*local_got_ents)
4432 + sizeof (*local_plt)
4433 + sizeof (*local_got_tls_masks));
4ce794b7 4434 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4435 if (local_got_ents == NULL)
e054468f 4436 return NULL;
411e1bfb
AM
4437 elf_local_got_ents (abfd) = local_got_ents;
4438 }
4439
37da22e5 4440 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4441 {
4442 struct got_entry *ent;
4443
4444 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4445 if (ent->addend == r_addend
4446 && ent->owner == abfd
4447 && ent->tls_type == tls_type)
411e1bfb
AM
4448 break;
4449 if (ent == NULL)
4450 {
986f0783 4451 size_t amt = sizeof (*ent);
4ce794b7 4452 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4453 if (ent == NULL)
4454 return FALSE;
4455 ent->next = local_got_ents[r_symndx];
4456 ent->addend = r_addend;
e717da7e 4457 ent->owner = abfd;
411e1bfb 4458 ent->tls_type = tls_type;
927be08e 4459 ent->is_indirect = FALSE;
411e1bfb
AM
4460 ent->got.refcount = 0;
4461 local_got_ents[r_symndx] = ent;
4462 }
4463 ent->got.refcount += 1;
4464 }
4465
e054468f 4466 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4467 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4468 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4469
4470 return local_plt + r_symndx;
65f38f15
AM
4471}
4472
411e1bfb 4473static bfd_boolean
e054468f 4474update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4475{
411e1bfb 4476 struct plt_entry *ent;
1e2f5b6e 4477
e054468f 4478 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4479 if (ent->addend == addend)
4480 break;
4481 if (ent == NULL)
1e2f5b6e 4482 {
986f0783 4483 size_t amt = sizeof (*ent);
4ce794b7 4484 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4485 if (ent == NULL)
4486 return FALSE;
e054468f 4487 ent->next = *plist;
411e1bfb
AM
4488 ent->addend = addend;
4489 ent->plt.refcount = 0;
e054468f 4490 *plist = ent;
1e2f5b6e 4491 }
411e1bfb 4492 ent->plt.refcount += 1;
b34976b6 4493 return TRUE;
1e2f5b6e
AM
4494}
4495
e054468f
AM
4496static bfd_boolean
4497is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4498{
4499 return (r_type == R_PPC64_REL24
05d0e962 4500 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4501 || r_type == R_PPC64_REL14
4502 || r_type == R_PPC64_REL14_BRTAKEN
4503 || r_type == R_PPC64_REL14_BRNTAKEN
4504 || r_type == R_PPC64_ADDR24
4505 || r_type == R_PPC64_ADDR14
4506 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4507 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4508 || r_type == R_PPC64_PLTCALL
4509 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4510}
4511
4512/* Relocs on inline plt call sequence insns prior to the call. */
4513
4514static bfd_boolean
4515is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4516{
4517 return (r_type == R_PPC64_PLT16_HA
4518 || r_type == R_PPC64_PLT16_HI
4519 || r_type == R_PPC64_PLT16_LO
4520 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4521 || r_type == R_PPC64_PLT_PCREL34
4522 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4523 || r_type == R_PPC64_PLTSEQ
4524 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4525}
4526
5bd4f169 4527/* Look through the relocs for a section during the first phase, and
65f38f15 4528 calculate needed space in the global offset table, procedure
5d1634d7 4529 linkage table, and dynamic reloc sections. */
5bd4f169 4530
b34976b6 4531static bfd_boolean
4ce794b7
AM
4532ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4533 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4534{
65f38f15 4535 struct ppc_link_hash_table *htab;
5bd4f169 4536 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4537 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4538 const Elf_Internal_Rela *rel;
4539 const Elf_Internal_Rela *rel_end;
5bd4f169 4540 asection *sreloc;
3a71aa26 4541 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4542 bfd_boolean is_opd;
5bd4f169 4543
0e1862bb 4544 if (bfd_link_relocatable (info))
b34976b6 4545 return TRUE;
5bd4f169 4546
0c8d6e5c 4547 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4548
65f38f15 4549 htab = ppc_hash_table (info);
4dfe6ac6
NC
4550 if (htab == NULL)
4551 return FALSE;
4552
3a71aa26
AM
4553 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4554 FALSE, FALSE, TRUE);
4555 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4556 FALSE, FALSE, TRUE);
0ffa91dd 4557 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4558 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4559 sreloc = NULL;
b9399fcf 4560 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4561 rel_end = relocs + sec->reloc_count;
4562 for (rel = relocs; rel < rel_end; rel++)
4563 {
4564 unsigned long r_symndx;
4565 struct elf_link_hash_entry *h;
04c9666a 4566 enum elf_ppc64_reloc_type r_type;
727fc41e 4567 int tls_type;
7c8fe5c4 4568 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4569 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4570
4571 r_symndx = ELF64_R_SYM (rel->r_info);
4572 if (r_symndx < symtab_hdr->sh_info)
4573 h = NULL;
4574 else
973a3492
L
4575 {
4576 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4577 h = elf_follow_link (h);
1c865ab2
AM
4578
4579 if (h == htab->elf.hgot)
4580 sec->has_toc_reloc = 1;
973a3492 4581 }
5bd4f169 4582
5663e321
AM
4583 r_type = ELF64_R_TYPE (rel->r_info);
4584 switch (r_type)
4585 {
04bdff6a
AM
4586 case R_PPC64_D34:
4587 case R_PPC64_D34_LO:
4588 case R_PPC64_D34_HI30:
4589 case R_PPC64_D34_HA30:
4590 case R_PPC64_D28:
c213164a
AM
4591 case R_PPC64_TPREL34:
4592 case R_PPC64_DTPREL34:
04bdff6a 4593 case R_PPC64_PCREL34:
5663e321 4594 case R_PPC64_GOT_PCREL34:
87c69f97
AM
4595 case R_PPC64_GOT_TLSGD_PCREL34:
4596 case R_PPC64_GOT_TLSLD_PCREL34:
4597 case R_PPC64_GOT_TPREL_PCREL34:
4598 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
4599 case R_PPC64_PLT_PCREL34:
4600 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a 4601 case R_PPC64_PCREL28:
d3b10ee7
AM
4602 if (htab->params->power10_stubs < 0)
4603 htab->params->power10_stubs = 1;
133a1f60
AM
4604 break;
4605 default:
5663e321
AM
4606 break;
4607 }
903b777d
AM
4608
4609 switch (r_type)
4610 {
4611 case R_PPC64_PLT16_HA:
4612 case R_PPC64_GOT_TLSLD16_HA:
4613 case R_PPC64_GOT_TLSGD16_HA:
4614 case R_PPC64_GOT_TPREL16_HA:
4615 case R_PPC64_GOT_DTPREL16_HA:
4616 case R_PPC64_GOT16_HA:
4617 case R_PPC64_TOC16_HA:
4618 case R_PPC64_PLT16_LO:
4619 case R_PPC64_PLT16_LO_DS:
4620 case R_PPC64_GOT_TLSLD16_LO:
4621 case R_PPC64_GOT_TLSGD16_LO:
4622 case R_PPC64_GOT_TPREL16_LO_DS:
4623 case R_PPC64_GOT_DTPREL16_LO_DS:
4624 case R_PPC64_GOT16_LO:
4625 case R_PPC64_GOT16_LO_DS:
4626 case R_PPC64_TOC16_LO:
4627 case R_PPC64_TOC16_LO_DS:
4628 case R_PPC64_GOT_PCREL34:
4629 ppc64_elf_tdata (abfd)->has_optrel = 1;
4630 ppc64_elf_section_data (sec)->has_optrel = 1;
4631 break;
4632 default:
4633 break;
4634 }
4635
f749f26e 4636 ifunc = NULL;
25f23106
AM
4637 if (h != NULL)
4638 {
4639 if (h->type == STT_GNU_IFUNC)
4640 {
4641 h->needs_plt = 1;
4642 ifunc = &h->plt.plist;
4643 }
4644 }
4645 else
4646 {
4647 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4648 abfd, r_symndx);
4649 if (isym == NULL)
4650 return FALSE;
4651
4652 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4653 {
4654 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4655 rel->r_addend,
37da22e5 4656 NON_GOT | PLT_IFUNC);
25f23106
AM
4657 if (ifunc == NULL)
4658 return FALSE;
4659 }
4660 }
727fc41e 4661
f749f26e 4662 tls_type = 0;
a33d1f77 4663 switch (r_type)
5bd4f169 4664 {
727fc41e
AM
4665 case R_PPC64_TLSGD:
4666 case R_PPC64_TLSLD:
4667 /* These special tls relocs tie a call to __tls_get_addr with
4668 its parameter symbol. */
37da22e5 4669 if (h != NULL)
ed7007c1 4670 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4671 else
4672 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4673 rel->r_addend,
37da22e5
AM
4674 NON_GOT | TLS_TLS | TLS_MARK))
4675 return FALSE;
4676 sec->has_tls_reloc = 1;
727fc41e
AM
4677 break;
4678
411e1bfb
AM
4679 case R_PPC64_GOT_TLSLD16:
4680 case R_PPC64_GOT_TLSLD16_LO:
4681 case R_PPC64_GOT_TLSLD16_HI:
4682 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 4683 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 4684 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4685 goto dogottls;
4686
4687 case R_PPC64_GOT_TLSGD16:
4688 case R_PPC64_GOT_TLSGD16_LO:
4689 case R_PPC64_GOT_TLSGD16_HI:
4690 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 4691 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 4692 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4693 goto dogottls;
4694
4695 case R_PPC64_GOT_TPREL16_DS:
4696 case R_PPC64_GOT_TPREL16_LO_DS:
4697 case R_PPC64_GOT_TPREL16_HI:
4698 case R_PPC64_GOT_TPREL16_HA:
87c69f97 4699 case R_PPC64_GOT_TPREL_PCREL34:
7c8bbca5 4700 if (bfd_link_dll (info))
411e1bfb
AM
4701 info->flags |= DF_STATIC_TLS;
4702 tls_type = TLS_TLS | TLS_TPREL;
4703 goto dogottls;
4704
4705 case R_PPC64_GOT_DTPREL16_DS:
4706 case R_PPC64_GOT_DTPREL16_LO_DS:
4707 case R_PPC64_GOT_DTPREL16_HI:
4708 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 4709 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
4710 tls_type = TLS_TLS | TLS_DTPREL;
4711 dogottls:
4712 sec->has_tls_reloc = 1;
066f4018 4713 goto dogot;
411e1bfb 4714
903b777d
AM
4715 case R_PPC64_GOT16:
4716 case R_PPC64_GOT16_LO:
4717 case R_PPC64_GOT16_HI:
65f38f15 4718 case R_PPC64_GOT16_HA:
903b777d 4719 case R_PPC64_GOT16_DS:
066f4018 4720 case R_PPC64_GOT16_LO_DS:
4a421c53 4721 case R_PPC64_GOT_PCREL34:
066f4018 4722 dogot:
65f38f15 4723 /* This symbol requires a global offset table entry. */
4c52953f 4724 sec->has_toc_reloc = 1;
33c0ec9d
AM
4725 if (r_type == R_PPC64_GOT_TLSLD16
4726 || r_type == R_PPC64_GOT_TLSGD16
4727 || r_type == R_PPC64_GOT_TPREL16_DS
4728 || r_type == R_PPC64_GOT_DTPREL16_DS
4729 || r_type == R_PPC64_GOT16
4730 || r_type == R_PPC64_GOT16_DS)
4731 {
4732 htab->do_multi_toc = 1;
d77c8a4b 4733 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4734 }
4735
e717da7e
AM
4736 if (ppc64_elf_tdata (abfd)->got == NULL
4737 && !create_got_section (abfd, info))
b34976b6 4738 return FALSE;
5bd4f169
AM
4739
4740 if (h != NULL)
4741 {
411e1bfb
AM
4742 struct ppc_link_hash_entry *eh;
4743 struct got_entry *ent;
65f38f15 4744
ed7007c1 4745 eh = ppc_elf_hash_entry (h);
411e1bfb 4746 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4747 if (ent->addend == rel->r_addend
e717da7e 4748 && ent->owner == abfd
411e1bfb
AM
4749 && ent->tls_type == tls_type)
4750 break;
4751 if (ent == NULL)
5bd4f169 4752 {
986f0783 4753 size_t amt = sizeof (*ent);
4ce794b7 4754 ent = bfd_alloc (abfd, amt);
411e1bfb 4755 if (ent == NULL)
b34976b6 4756 return FALSE;
411e1bfb 4757 ent->next = eh->elf.got.glist;
133a1f60 4758 ent->addend = rel->r_addend;
e717da7e 4759 ent->owner = abfd;
411e1bfb 4760 ent->tls_type = tls_type;
927be08e 4761 ent->is_indirect = FALSE;
411e1bfb
AM
4762 ent->got.refcount = 0;
4763 eh->elf.got.glist = ent;
5bd4f169 4764 }
411e1bfb 4765 ent->got.refcount += 1;
e7b938ca 4766 eh->tls_mask |= tls_type;
5bd4f169 4767 }
411e1bfb
AM
4768 else
4769 /* This is a global offset table entry for a local symbol. */
4770 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4771 rel->r_addend, tls_type))
411e1bfb 4772 return FALSE;
5bd4f169
AM
4773 break;
4774
5bd4f169 4775 case R_PPC64_PLT16_HA:
65f38f15
AM
4776 case R_PPC64_PLT16_HI:
4777 case R_PPC64_PLT16_LO:
08be3224 4778 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4779 case R_PPC64_PLT_PCREL34:
4780 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4781 case R_PPC64_PLT32:
4782 case R_PPC64_PLT64:
cbf95972
AM
4783 /* This symbol requires a procedure linkage table entry. */
4784 plt_list = ifunc;
4785 if (h != NULL)
e054468f 4786 {
e054468f
AM
4787 h->needs_plt = 1;
4788 if (h->root.root.string[0] == '.'
4789 && h->root.root.string[1] != '\0')
ed7007c1
AM
4790 ppc_elf_hash_entry (h)->is_func = 1;
4791 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4792 plt_list = &h->plt.plist;
4793 }
4794 if (plt_list == NULL)
2d7ad24e 4795 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4796 rel->r_addend,
2d7ad24e 4797 NON_GOT | PLT_KEEP);
133a1f60 4798 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4799 return FALSE;
5bd4f169
AM
4800 break;
4801
4802 /* The following relocations don't need to propagate the
4803 relocation if linking a shared object since they are
4804 section relative. */
4805 case R_PPC64_SECTOFF:
4806 case R_PPC64_SECTOFF_LO:
4807 case R_PPC64_SECTOFF_HI:
4808 case R_PPC64_SECTOFF_HA:
4809 case R_PPC64_SECTOFF_DS:
4810 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4811 case R_PPC64_DTPREL16:
4812 case R_PPC64_DTPREL16_LO:
4813 case R_PPC64_DTPREL16_HI:
4814 case R_PPC64_DTPREL16_HA:
4815 case R_PPC64_DTPREL16_DS:
4816 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4817 case R_PPC64_DTPREL16_HIGH:
4818 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4819 case R_PPC64_DTPREL16_HIGHER:
4820 case R_PPC64_DTPREL16_HIGHERA:
4821 case R_PPC64_DTPREL16_HIGHEST:
4822 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4823 break;
4824
ad8e1ba5 4825 /* Nor do these. */
25f23106
AM
4826 case R_PPC64_REL16:
4827 case R_PPC64_REL16_LO:
4828 case R_PPC64_REL16_HI:
4829 case R_PPC64_REL16_HA:
4a969973
AM
4830 case R_PPC64_REL16_HIGH:
4831 case R_PPC64_REL16_HIGHA:
4832 case R_PPC64_REL16_HIGHER:
4833 case R_PPC64_REL16_HIGHERA:
4834 case R_PPC64_REL16_HIGHEST:
4835 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4836 case R_PPC64_REL16_HIGHER34:
4837 case R_PPC64_REL16_HIGHERA34:
4838 case R_PPC64_REL16_HIGHEST34:
4839 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4840 case R_PPC64_REL16DX_HA:
25f23106
AM
4841 break;
4842
45965137
AM
4843 /* Not supported as a dynamic relocation. */
4844 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4845 if (bfd_link_pic (info))
45965137
AM
4846 {
4847 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4848 ppc_howto_init ();
695344c0 4849 /* xgettext:c-format */
174d0a74 4850 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4851 "in shared libraries and PIEs\n"),
45965137
AM
4852 abfd, sec, rel->r_offset,
4853 ppc64_elf_howto_table[r_type]->name);
4854 bfd_set_error (bfd_error_bad_value);
4855 return FALSE;
4856 }
4857 break;
4858
ad8e1ba5 4859 case R_PPC64_TOC16:
33c0ec9d
AM
4860 case R_PPC64_TOC16_DS:
4861 htab->do_multi_toc = 1;
d77c8a4b 4862 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4863 /* Fall through. */
ad8e1ba5
AM
4864 case R_PPC64_TOC16_LO:
4865 case R_PPC64_TOC16_HI:
4866 case R_PPC64_TOC16_HA:
ad8e1ba5 4867 case R_PPC64_TOC16_LO_DS:
4c52953f 4868 sec->has_toc_reloc = 1;
ec73ddcd 4869 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4870 {
4871 /* We may need a copy reloc. */
4872 h->non_got_ref = 1;
4873 /* Strongly prefer a copy reloc over a dynamic reloc.
4874 glibc ld.so as of 2019-08 will error out if one of
4875 these relocations is emitted. */
4876 h->needs_copy = 1;
4877 goto dodyn;
4878 }
ad8e1ba5
AM
4879 break;
4880
006589cf
AM
4881 /* Marker reloc. */
4882 case R_PPC64_ENTRY:
4883 break;
4884
5bd4f169
AM
4885 /* This relocation describes the C++ object vtable hierarchy.
4886 Reconstruct it for later use during GC. */
4887 case R_PPC64_GNU_VTINHERIT:
c152c796 4888 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4889 return FALSE;
5bd4f169
AM
4890 break;
4891
4892 /* This relocation describes which C++ vtable entries are actually
4893 used. Record for later use during GC. */
4894 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4895 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4896 return FALSE;
5bd4f169
AM
4897 break;
4898
721956f4
AM
4899 case R_PPC64_REL14:
4900 case R_PPC64_REL14_BRTAKEN:
4901 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4902 {
4903 asection *dest = NULL;
4904
4905 /* Heuristic: If jumping outside our section, chances are
4906 we are going to need a stub. */
4907 if (h != NULL)
4908 {
4909 /* If the sym is weak it may be overridden later, so
4910 don't assume we know where a weak sym lives. */
4911 if (h->root.type == bfd_link_hash_defined)
4912 dest = h->root.u.def.section;
4913 }
4914 else
87d72d41
AM
4915 {
4916 Elf_Internal_Sym *isym;
4917
4918 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4919 abfd, r_symndx);
4920 if (isym == NULL)
4921 return FALSE;
4922
4923 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4924 }
4925
220c76dd 4926 if (dest != sec)
7c8fe5c4 4927 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4928 }
3e04d765
AM
4929 goto rel24;
4930
4931 case R_PPC64_PLTCALL:
5663e321 4932 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4933 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4934 /* Fall through. */
4935
5d1634d7 4936 case R_PPC64_REL24:
05d0e962 4937 case R_PPC64_REL24_NOTOC:
3e04d765 4938 rel24:
cbf95972
AM
4939 plt_list = ifunc;
4940 if (h != NULL)
5d1634d7 4941 {
e054468f
AM
4942 h->needs_plt = 1;
4943 if (h->root.root.string[0] == '.'
4944 && h->root.root.string[1] != '\0')
ed7007c1 4945 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4946
3a71aa26 4947 if (h == tga || h == dottga)
cbf95972
AM
4948 {
4949 sec->has_tls_reloc = 1;
4950 if (rel != relocs
4951 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4952 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4953 /* We have a new-style __tls_get_addr call with
4954 a marker reloc. */
4955 ;
4956 else
4957 /* Mark this section as having an old-style call. */
9737e8af 4958 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4959 }
4960 plt_list = &h->plt.plist;
411e1bfb 4961 }
cbf95972
AM
4962
4963 /* We may need a .plt entry if the function this reloc
4964 refers to is in a shared lib. */
4965 if (plt_list
133a1f60 4966 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4967 return FALSE;
411e1bfb
AM
4968 break;
4969
cbf95972
AM
4970 case R_PPC64_ADDR14:
4971 case R_PPC64_ADDR14_BRNTAKEN:
4972 case R_PPC64_ADDR14_BRTAKEN:
4973 case R_PPC64_ADDR24:
4974 goto dodyn;
4975
411e1bfb
AM
4976 case R_PPC64_TPREL64:
4977 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4978 if (bfd_link_dll (info))
411e1bfb
AM
4979 info->flags |= DF_STATIC_TLS;
4980 goto dotlstoc;
4981
4982 case R_PPC64_DTPMOD64:
4983 if (rel + 1 < rel_end
4984 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4985 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4986 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4987 else
951fd09b 4988 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4989 goto dotlstoc;
4990
4991 case R_PPC64_DTPREL64:
4992 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4993 if (rel != relocs
4994 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4995 && rel[-1].r_offset == rel->r_offset - 8)
4996 /* This is the second reloc of a dtpmod, dtprel pair.
4997 Don't mark with TLS_DTPREL. */
4998 goto dodyn;
4999
5000 dotlstoc:
5001 sec->has_tls_reloc = 1;
5002 if (h != NULL)
ed7007c1 5003 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5004 else
5005 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5006 rel->r_addend, tls_type))
411e1bfb
AM
5007 return FALSE;
5008
7c8fe5c4
AM
5009 ppc64_sec = ppc64_elf_section_data (sec);
5010 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5011 {
3a71aa26
AM
5012 bfd_size_type amt;
5013
e7b938ca 5014 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5015 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5016 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5017 if (ppc64_sec->u.toc.symndx == NULL)
5018 return FALSE;
5019 amt = sec->size * sizeof (bfd_vma) / 8;
5020 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5021 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5022 return FALSE;
7c8fe5c4
AM
5023 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5024 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5025 }
5026 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5027 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5028 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5029
5030 /* Mark the second slot of a GD or LD entry.
5031 -1 to indicate GD and -2 to indicate LD. */
5032 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5033 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5034 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5035 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5036 goto dodyn;
5037
5038 case R_PPC64_TPREL16:
5039 case R_PPC64_TPREL16_LO:
5040 case R_PPC64_TPREL16_HI:
5041 case R_PPC64_TPREL16_HA:
5042 case R_PPC64_TPREL16_DS:
5043 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5044 case R_PPC64_TPREL16_HIGH:
5045 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5046 case R_PPC64_TPREL16_HIGHER:
5047 case R_PPC64_TPREL16_HIGHERA:
5048 case R_PPC64_TPREL16_HIGHEST:
5049 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5050 case R_PPC64_TPREL34:
7c8bbca5
AM
5051 if (bfd_link_dll (info))
5052 info->flags |= DF_STATIC_TLS;
5053 goto dodyn;
5d1634d7 5054
e86ce104 5055 case R_PPC64_ADDR64:
b9399fcf 5056 if (is_opd
1e2f5b6e 5057 && rel + 1 < rel_end
4ce794b7 5058 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5059 {
8387904d 5060 if (h != NULL)
ed7007c1 5061 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5062 }
e86ce104
AM
5063 /* Fall through. */
5064
65f38f15
AM
5065 case R_PPC64_ADDR16:
5066 case R_PPC64_ADDR16_DS:
5067 case R_PPC64_ADDR16_HA:
5068 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5069 case R_PPC64_ADDR16_HIGH:
5070 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5071 case R_PPC64_ADDR16_HIGHER:
5072 case R_PPC64_ADDR16_HIGHERA:
5073 case R_PPC64_ADDR16_HIGHEST:
5074 case R_PPC64_ADDR16_HIGHESTA:
5075 case R_PPC64_ADDR16_LO:
5076 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5077 case R_PPC64_D34:
5078 case R_PPC64_D34_LO:
5079 case R_PPC64_D34_HI30:
5080 case R_PPC64_D34_HA30:
5081 case R_PPC64_ADDR16_HIGHER34:
5082 case R_PPC64_ADDR16_HIGHERA34:
5083 case R_PPC64_ADDR16_HIGHEST34:
5084 case R_PPC64_ADDR16_HIGHESTA34:
5085 case R_PPC64_D28:
0e1862bb 5086 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5087 && rel->r_addend == 0)
5088 {
5089 /* We may need a .plt entry if this reloc refers to a
5090 function in a shared lib. */
5663e321 5091 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5092 return FALSE;
5093 h->pointer_equality_needed = 1;
5094 }
5095 /* Fall through. */
5096
5097 case R_PPC64_REL30:
5098 case R_PPC64_REL32:
5099 case R_PPC64_REL64:
65f38f15 5100 case R_PPC64_ADDR32:
65f38f15
AM
5101 case R_PPC64_UADDR16:
5102 case R_PPC64_UADDR32:
5103 case R_PPC64_UADDR64:
5bd4f169 5104 case R_PPC64_TOC:
ec73ddcd 5105 if (h != NULL && bfd_link_executable (info))
81848ca0 5106 /* We may need a copy reloc. */
f5385ebf 5107 h->non_got_ref = 1;
81848ca0 5108
41bd81ab 5109 /* Don't propagate .opd relocs. */
b9399fcf 5110 if (NO_OPD_RELOCS && is_opd)
e86ce104 5111 break;
e86ce104 5112
65f38f15
AM
5113 /* If we are creating a shared library, and this is a reloc
5114 against a global symbol, or a non PC relative reloc
5115 against a local symbol, then we need to copy the reloc
5116 into the shared library. However, if we are linking with
5117 -Bsymbolic, we do not need to copy a reloc against a
5118 global symbol which is defined in an object we are
5119 including in the link (i.e., DEF_REGULAR is set). At
5120 this point we have not seen all the input files, so it is
5121 possible that DEF_REGULAR is not set now but will be set
5122 later (it is never cleared). In case of a weak definition,
5123 DEF_REGULAR may be cleared later by a strong definition in
5124 a shared library. We account for that possibility below by
f4656909 5125 storing information in the dyn_relocs field of the hash
65f38f15
AM
5126 table entry. A similar situation occurs when creating
5127 shared libraries and symbol visibility changes render the
5128 symbol local.
5129
5130 If on the other hand, we are creating an executable, we
5131 may need to keep relocations for symbols satisfied by a
5132 dynamic library if we manage to avoid copy relocs for the
5133 symbol. */
411e1bfb 5134 dodyn:
ec73ddcd
AM
5135 if ((h != NULL
5136 && (h->root.type == bfd_link_hash_defweak
5137 || !h->def_regular))
5138 || (h != NULL
5139 && !bfd_link_executable (info)
5140 && !SYMBOLIC_BIND (info, h))
5141 || (bfd_link_pic (info)
5142 && must_be_dyn_reloc (info, r_type))
0e1862bb 5143 || (!bfd_link_pic (info)
25f23106 5144 && ifunc != NULL))
5bd4f169 5145 {
65f38f15
AM
5146 /* We must copy these reloc types into the output file.
5147 Create a reloc section in dynobj and make room for
5148 this reloc. */
5bd4f169
AM
5149 if (sreloc == NULL)
5150 {
83bac4b0
NC
5151 sreloc = _bfd_elf_make_dynamic_reloc_section
5152 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5153
5bd4f169 5154 if (sreloc == NULL)
83bac4b0 5155 return FALSE;
5bd4f169
AM
5156 }
5157
65f38f15
AM
5158 /* If this is a global symbol, we count the number of
5159 relocations we need for this symbol. */
5160 if (h != NULL)
5161 {
19e08130
AM
5162 struct elf_dyn_relocs *p;
5163 struct elf_dyn_relocs **head;
5164
190eb1dd 5165 head = &h->dyn_relocs;
19e08130
AM
5166 p = *head;
5167 if (p == NULL || p->sec != sec)
5168 {
5169 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5170 if (p == NULL)
5171 return FALSE;
5172 p->next = *head;
5173 *head = p;
5174 p->sec = sec;
5175 p->count = 0;
5176 p->pc_count = 0;
5177 }
5178 p->count += 1;
5179 if (!must_be_dyn_reloc (info, r_type))
5180 p->pc_count += 1;
65f38f15
AM
5181 }
5182 else
5183 {
ec338859
AM
5184 /* Track dynamic relocs needed for local syms too.
5185 We really need local syms available to do this
5186 easily. Oh well. */
19e08130
AM
5187 struct ppc_dyn_relocs *p;
5188 struct ppc_dyn_relocs **head;
5189 bfd_boolean is_ifunc;
ec338859 5190 asection *s;
6edfbbad 5191 void *vpp;
87d72d41 5192 Elf_Internal_Sym *isym;
6edfbbad 5193
87d72d41
AM
5194 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5195 abfd, r_symndx);
5196 if (isym == NULL)
b34976b6 5197 return FALSE;
ec338859 5198
87d72d41
AM
5199 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5200 if (s == NULL)
5201 s = sec;
5202
6edfbbad 5203 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5204 head = (struct ppc_dyn_relocs **) vpp;
5205 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5206 p = *head;
5207 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5208 p = p->next;
5209 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5210 {
5211 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5212 if (p == NULL)
5213 return FALSE;
5214 p->next = *head;
5215 *head = p;
5216 p->sec = sec;
5217 p->ifunc = is_ifunc;
5218 p->count = 0;
5219 }
5220 p->count += 1;
ec338859 5221 }
65f38f15 5222 }
5bd4f169 5223 break;
65f38f15
AM
5224
5225 default:
96e0dda4 5226 break;
5bd4f169
AM
5227 }
5228 }
5229
b34976b6 5230 return TRUE;
5bd4f169
AM
5231}
5232
ee67d69a
AM
5233/* Merge backend specific data from an object file to the output
5234 object file when linking. */
5235
5236static bfd_boolean
50e03d47 5237ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5238{
50e03d47 5239 bfd *obfd = info->output_bfd;
ee67d69a
AM
5240 unsigned long iflags, oflags;
5241
5242 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5243 return TRUE;
5244
5245 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5246 return TRUE;
5247
50e03d47 5248 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5249 return FALSE;
5250
5251 iflags = elf_elfheader (ibfd)->e_flags;
5252 oflags = elf_elfheader (obfd)->e_flags;
5253
f6c7c3e8 5254 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5255 {
4eca0228 5256 _bfd_error_handler
695344c0 5257 /* xgettext:c-format */
871b3ab2 5258 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5259 bfd_set_error (bfd_error_bad_value);
5260 return FALSE;
5261 }
f6c7c3e8 5262 else if (iflags != oflags && iflags != 0)
ee67d69a 5263 {
4eca0228 5264 _bfd_error_handler
695344c0 5265 /* xgettext:c-format */
871b3ab2 5266 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5267 ibfd, iflags, oflags);
5268 bfd_set_error (bfd_error_bad_value);
5269 return FALSE;
5270 }
5271
4a91d0ba
AM
5272 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5273 return FALSE;
005d79fd 5274
ee67d69a 5275 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5276 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5277}
5278
5279static bfd_boolean
5280ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5281{
5282 /* Print normal ELF private data. */
5283 _bfd_elf_print_private_bfd_data (abfd, ptr);
5284
5285 if (elf_elfheader (abfd)->e_flags != 0)
5286 {
5287 FILE *file = ptr;
5288
ee67d69a
AM
5289 fprintf (file, _("private flags = 0x%lx:"),
5290 elf_elfheader (abfd)->e_flags);
5291
5292 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5293 fprintf (file, _(" [abiv%ld]"),
5294 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5295 fputc ('\n', file);
5296 }
5297
5298 return TRUE;
5299}
5300
8387904d 5301/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5302 of the code entry point, and its section, which must be in the same
5303 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5304
5305static bfd_vma
5306opd_entry_value (asection *opd_sec,
5307 bfd_vma offset,
5308 asection **code_sec,
aef36ac1
AM
5309 bfd_vma *code_off,
5310 bfd_boolean in_code_sec)
8387904d
AM
5311{
5312 bfd *opd_bfd = opd_sec->owner;
8860955f 5313 Elf_Internal_Rela *relocs;
8387904d 5314 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5315 bfd_vma val;
8387904d 5316
9f296da3
AM
5317 /* No relocs implies we are linking a --just-symbols object, or looking
5318 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5319 if (opd_sec->reloc_count == 0)
5320 {
729eabd5 5321 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5322
729eabd5
AM
5323 if (contents == NULL)
5324 {
5325 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5326 return (bfd_vma) -1;
5327 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5328 }
ee1e4ede 5329
dbb3fbbb 5330 /* PR 17512: file: 64b9dfbb. */
451dfd38 5331 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5332 return (bfd_vma) -1;
5333
729eabd5 5334 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5335 if (code_sec != NULL)
5336 {
5337 asection *sec, *likely = NULL;
ee1e4ede 5338
aef36ac1 5339 if (in_code_sec)
4b85d634 5340 {
aef36ac1
AM
5341 sec = *code_sec;
5342 if (sec->vma <= val
5343 && val < sec->vma + sec->size)
5344 likely = sec;
5345 else
5346 val = -1;
5347 }
5348 else
5349 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5350 if (sec->vma <= val
5351 && (sec->flags & SEC_LOAD) != 0
5352 && (sec->flags & SEC_ALLOC) != 0)
5353 likely = sec;
5354 if (likely != NULL)
5355 {
5356 *code_sec = likely;
5357 if (code_off != NULL)
5358 *code_off = val - likely->vma;
4b85d634
AM
5359 }
5360 }
aef36ac1 5361 return val;
4b85d634
AM
5362 }
5363
0c8d6e5c 5364 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5365
729eabd5 5366 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5367 if (relocs == NULL)
5368 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5369 /* PR 17512: file: df8e1fd6. */
5370 if (relocs == NULL)
5371 return (bfd_vma) -1;
645ea6a9 5372
8387904d 5373 /* Go find the opd reloc at the sym address. */
8860955f 5374 lo = relocs;
8387904d 5375 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5376 val = (bfd_vma) -1;
8387904d
AM
5377 while (lo < hi)
5378 {
5379 look = lo + (hi - lo) / 2;
5380 if (look->r_offset < offset)
5381 lo = look + 1;
5382 else if (look->r_offset > offset)
5383 hi = look;
5384 else
5385 {
0ffa91dd
NC
5386 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5387
8387904d
AM
5388 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5389 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5390 {
5391 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5392 asection *sec = NULL;
8387904d 5393
b53dfeb2
AM
5394 if (symndx >= symtab_hdr->sh_info
5395 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5396 {
5397 struct elf_link_hash_entry **sym_hashes;
5398 struct elf_link_hash_entry *rh;
5399
5400 sym_hashes = elf_sym_hashes (opd_bfd);
5401 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5402 if (rh != NULL)
5403 {
5404 rh = elf_follow_link (rh);
bb854a36
AM
5405 if (rh->root.type != bfd_link_hash_defined
5406 && rh->root.type != bfd_link_hash_defweak)
5407 break;
5408 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5409 {
bb854a36
AM
5410 val = rh->root.u.def.value;
5411 sec = rh->root.u.def.section;
b53dfeb2
AM
5412 }
5413 }
5414 }
5415
5416 if (sec == NULL)
5417 {
5418 Elf_Internal_Sym *sym;
5419
5420 if (symndx < symtab_hdr->sh_info)
5421 {
5422 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5423 if (sym == NULL)
5424 {
5425 size_t symcnt = symtab_hdr->sh_info;
5426 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5427 symcnt, 0,
5428 NULL, NULL, NULL);
5429 if (sym == NULL)
5430 break;
5431 symtab_hdr->contents = (bfd_byte *) sym;
5432 }
5433 sym += symndx;
128205bb
AM
5434 }
5435 else
5436 {
b53dfeb2
AM
5437 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5438 1, symndx,
5439 NULL, NULL, NULL);
128205bb
AM
5440 if (sym == NULL)
5441 break;
128205bb 5442 }
b53dfeb2
AM
5443 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5444 if (sec == NULL)
5445 break;
5446 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5447 val = sym->st_value;
8387904d 5448 }
b53dfeb2 5449
8387904d
AM
5450 val += look->r_addend;
5451 if (code_off != NULL)
5452 *code_off = val;
5453 if (code_sec != NULL)
aef36ac1
AM
5454 {
5455 if (in_code_sec && *code_sec != sec)
5456 return -1;
5457 else
5458 *code_sec = sec;
5459 }
b53dfeb2 5460 if (sec->output_section != NULL)
8387904d 5461 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5462 }
5463 break;
5464 }
5465 }
645ea6a9 5466
645ea6a9 5467 return val;
8387904d
AM
5468}
5469
aef36ac1
AM
5470/* If the ELF symbol SYM might be a function in SEC, return the
5471 function size and set *CODE_OFF to the function's entry point,
5472 otherwise return zero. */
9f296da3 5473
aef36ac1
AM
5474static bfd_size_type
5475ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5476 bfd_vma *code_off)
9f296da3 5477{
aef36ac1
AM
5478 bfd_size_type size;
5479
5480 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5481 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5482 return 0;
5483
5484 size = 0;
5485 if (!(sym->flags & BSF_SYNTHETIC))
5486 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5487
5488 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5489 {
b07bca4e
AM
5490 struct _opd_sec_data *opd = get_opd_info (sym->section);
5491 bfd_vma symval = sym->value;
5492
5493 if (opd != NULL
5494 && opd->adjust != NULL
5495 && elf_section_data (sym->section)->relocs != NULL)
5496 {
5497 /* opd_entry_value will use cached relocs that have been
5498 adjusted, but with raw symbols. That means both local
5499 and global symbols need adjusting. */
5500 long adjust = opd->adjust[OPD_NDX (symval)];
5501 if (adjust == -1)
5502 return 0;
5503 symval += adjust;
5504 }
5505
5506 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5507 &sec, code_off, TRUE) == (bfd_vma) -1)
5508 return 0;
5509 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5510 symbol. This size has nothing to do with the code size of the
5511 function, which is what we're supposed to return, but the
5512 code size isn't available without looking up the dot-sym.
5513 However, doing that would be a waste of time particularly
5514 since elf_find_function will look at the dot-sym anyway.
5515 Now, elf_find_function will keep the largest size of any
5516 function sym found at the code address of interest, so return
5517 1 here to avoid it incorrectly caching a larger function size
5518 for a small function. This does mean we return the wrong
5519 size for a new-ABI function of size 24, but all that does is
5520 disable caching for such functions. */
5521 if (size == 24)
5522 size = 1;
9f296da3 5523 }
aef36ac1
AM
5524 else
5525 {
5526 if (sym->section != sec)
5527 return 0;
5528 *code_off = sym->value;
5529 }
5530 if (size == 0)
5531 size = 1;
5532 return size;
9f296da3
AM
5533}
5534
f378ab09
AM
5535/* Return true if symbol is a strong function defined in an ELFv2
5536 object with st_other localentry bits of zero, ie. its local entry
5537 point coincides with its global entry point. */
5538
5539static bfd_boolean
5540is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5541{
5542 return (h != NULL
5543 && h->type == STT_FUNC
5544 && h->root.type == bfd_link_hash_defined
5545 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5546 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5547 && is_ppc64_elf (h->root.u.def.section->owner)
5548 && abiversion (h->root.u.def.section->owner) >= 2);
5549}
5550
854b41e7
AM
5551/* Return true if symbol is defined in a regular object file. */
5552
5553static bfd_boolean
5554is_static_defined (struct elf_link_hash_entry *h)
5555{
5556 return ((h->root.type == bfd_link_hash_defined
5557 || h->root.type == bfd_link_hash_defweak)
5558 && h->root.u.def.section != NULL
5559 && h->root.u.def.section->output_section != NULL);
5560}
5561
b31867b6
AM
5562/* If FDH is a function descriptor symbol, return the associated code
5563 entry symbol if it is defined. Return NULL otherwise. */
5564
5565static struct ppc_link_hash_entry *
5566defined_code_entry (struct ppc_link_hash_entry *fdh)
5567{
5568 if (fdh->is_func_descriptor)
5569 {
5570 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5571 if (fh->elf.root.type == bfd_link_hash_defined
5572 || fh->elf.root.type == bfd_link_hash_defweak)
5573 return fh;
5574 }
5575 return NULL;
5576}
5577
5578/* If FH is a function code entry symbol, return the associated
5579 function descriptor symbol if it is defined. Return NULL otherwise. */
5580
5581static struct ppc_link_hash_entry *
5582defined_func_desc (struct ppc_link_hash_entry *fh)
5583{
5584 if (fh->oh != NULL
5585 && fh->oh->is_func_descriptor)
5586 {
5587 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5588 if (fdh->elf.root.type == bfd_link_hash_defined
5589 || fdh->elf.root.type == bfd_link_hash_defweak)
5590 return fdh;
5591 }
5592 return NULL;
5593}
5594
ed7007c1
AM
5595/* Given H is a symbol that satisfies is_static_defined, return the
5596 value in the output file. */
5597
5598static bfd_vma
5599defined_sym_val (struct elf_link_hash_entry *h)
5600{
5601 return (h->root.u.def.section->output_section->vma
5602 + h->root.u.def.section->output_offset
5603 + h->root.u.def.value);
5604}
5605
5606/* Return true if H matches __tls_get_addr or one of its variants. */
5607
5608static bfd_boolean
5609is_tls_get_addr (struct elf_link_hash_entry *h,
5610 struct ppc_link_hash_table *htab)
5611{
9e7028aa
AM
5612 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5613 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
ed7007c1
AM
5614}
5615
8c5b4e52
AM
5616static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5617
5618/* Garbage collect sections, after first dealing with dot-symbols. */
5619
5620static bfd_boolean
5621ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5622{
5623 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5624
5625 if (htab != NULL && htab->need_func_desc_adj)
5626 {
5627 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5628 htab->need_func_desc_adj = 0;
5629 }
5630 return bfd_elf_gc_sections (abfd, info);
5631}
5632
74f0fb50
AM
5633/* Mark all our entry sym sections, both opd and code section. */
5634
5635static void
5636ppc64_elf_gc_keep (struct bfd_link_info *info)
5637{
5638 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5639 struct bfd_sym_chain *sym;
5640
4dfe6ac6
NC
5641 if (htab == NULL)
5642 return;
5643
74f0fb50
AM
5644 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5645 {
b31867b6 5646 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5647 asection *sec;
5648
ed7007c1
AM
5649 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5650 FALSE, FALSE, TRUE));
74f0fb50
AM
5651 if (eh == NULL)
5652 continue;
5653 if (eh->elf.root.type != bfd_link_hash_defined
5654 && eh->elf.root.type != bfd_link_hash_defweak)
5655 continue;
5656
b31867b6
AM
5657 fh = defined_code_entry (eh);
5658 if (fh != NULL)
74f0fb50 5659 {
b31867b6 5660 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5661 sec->flags |= SEC_KEEP;
5662 }
5663 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5664 && opd_entry_value (eh->elf.root.u.def.section,
5665 eh->elf.root.u.def.value,
aef36ac1 5666 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5667 sec->flags |= SEC_KEEP;
5668
5669 sec = eh->elf.root.u.def.section;
5670 sec->flags |= SEC_KEEP;
5671 }
5672}
5673
64d03ab5
AM
5674/* Mark sections containing dynamically referenced symbols. When
5675 building shared libraries, we must assume that any visible symbol is
5676 referenced. */
5677
5678static bfd_boolean
5679ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5680{
5681 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5682 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5683 struct ppc_link_hash_entry *fdh;
b407645f 5684 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5685
64d03ab5 5686 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5687 fdh = defined_func_desc (eh);
5688 if (fdh != NULL)
5689 eh = fdh;
64d03ab5
AM
5690
5691 if ((eh->elf.root.type == bfd_link_hash_defined
5692 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5693 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5694 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5695 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5696 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5697 && (!bfd_link_executable (info)
e278ae05 5698 || info->gc_keep_exported
b407645f
AM
5699 || info->export_dynamic
5700 || (eh->elf.dynamic
5701 && d != NULL
2cdcc330
AM
5702 && (*d->match) (&d->head, NULL,
5703 eh->elf.root.root.string)))
e278ae05 5704 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5705 || !bfd_hide_sym_by_version (info->version_info,
5706 eh->elf.root.root.string)))))
64d03ab5
AM
5707 {
5708 asection *code_sec;
b31867b6 5709 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5710
5711 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5712
5713 /* Function descriptor syms cause the associated
5714 function code sym section to be marked. */
b31867b6
AM
5715 fh = defined_code_entry (eh);
5716 if (fh != NULL)
5717 {
5718 code_sec = fh->elf.root.u.def.section;
5719 code_sec->flags |= SEC_KEEP;
5720 }
64d03ab5
AM
5721 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5722 && opd_entry_value (eh->elf.root.u.def.section,
5723 eh->elf.root.u.def.value,
aef36ac1 5724 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5725 code_sec->flags |= SEC_KEEP;
5726 }
5727
5728 return TRUE;
5729}
5730
5bd4f169
AM
5731/* Return the section that should be marked against GC for a given
5732 relocation. */
5733
5734static asection *
4ce794b7 5735ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5736 struct bfd_link_info *info,
4ce794b7
AM
5737 Elf_Internal_Rela *rel,
5738 struct elf_link_hash_entry *h,
5739 Elf_Internal_Sym *sym)
5bd4f169 5740{
ccfa59ea
AM
5741 asection *rsec;
5742
ccfa59ea
AM
5743 /* Syms return NULL if we're marking .opd, so we avoid marking all
5744 function sections, as all functions are referenced in .opd. */
5745 rsec = NULL;
5746 if (get_opd_info (sec) != NULL)
5747 return rsec;
1e2f5b6e 5748
5bd4f169
AM
5749 if (h != NULL)
5750 {
04c9666a 5751 enum elf_ppc64_reloc_type r_type;
b31867b6 5752 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5753
4ce794b7 5754 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5755 switch (r_type)
5bd4f169
AM
5756 {
5757 case R_PPC64_GNU_VTINHERIT:
5758 case R_PPC64_GNU_VTENTRY:
5759 break;
5760
5761 default:
5762 switch (h->root.type)
5763 {
5764 case bfd_link_hash_defined:
5765 case bfd_link_hash_defweak:
ed7007c1 5766 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5767 fdh = defined_func_desc (eh);
5768 if (fdh != NULL)
8c5b4e52
AM
5769 {
5770 /* -mcall-aixdesc code references the dot-symbol on
5771 a call reloc. Mark the function descriptor too
5772 against garbage collection. */
5773 fdh->elf.mark = 1;
60d67dc8
AM
5774 if (fdh->elf.is_weakalias)
5775 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5776 eh = fdh;
5777 }
1e2f5b6e
AM
5778
5779 /* Function descriptor syms cause the associated
5780 function code sym section to be marked. */
b31867b6
AM
5781 fh = defined_code_entry (eh);
5782 if (fh != NULL)
ccfa59ea
AM
5783 {
5784 /* They also mark their opd section. */
74f0fb50 5785 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5786
b31867b6 5787 rsec = fh->elf.root.u.def.section;
ccfa59ea 5788 }
8387904d
AM
5789 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5790 && opd_entry_value (eh->elf.root.u.def.section,
5791 eh->elf.root.u.def.value,
aef36ac1 5792 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5793 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5794 else
1e2f5b6e
AM
5795 rsec = h->root.u.def.section;
5796 break;
5bd4f169
AM
5797
5798 case bfd_link_hash_common:
1e2f5b6e
AM
5799 rsec = h->root.u.c.p->section;
5800 break;
5bd4f169
AM
5801
5802 default:
fb34365b 5803 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5804 }
5805 }
5806 }
5807 else
5808 {
74f0fb50 5809 struct _opd_sec_data *opd;
1e2f5b6e
AM
5810
5811 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5812 opd = get_opd_info (rsec);
5813 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5814 {
74f0fb50 5815 rsec->gc_mark = 1;
ccfa59ea 5816
51aecdc5 5817 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5818 }
5bd4f169
AM
5819 }
5820
1e2f5b6e 5821 return rsec;
5bd4f169
AM
5822}
5823
deb0e272
AM
5824/* The maximum size of .sfpr. */
5825#define SFPR_MAX (218*4)
5826
5827struct sfpr_def_parms
5828{
699733f6
AM
5829 const char name[12];
5830 unsigned char lo, hi;
2cdcc330
AM
5831 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5832 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5833};
5834
a4b6fadd
AM
5835/* Auto-generate _save*, _rest* functions in .sfpr.
5836 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5837 instead. */
deb0e272 5838
4dfe6ac6 5839static bfd_boolean
a4b6fadd
AM
5840sfpr_define (struct bfd_link_info *info,
5841 const struct sfpr_def_parms *parm,
5842 asection *stub_sec)
deb0e272
AM
5843{
5844 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5845 unsigned int i;
5846 size_t len = strlen (parm->name);
5847 bfd_boolean writing = FALSE;
699733f6 5848 char sym[16];
deb0e272 5849
4dfe6ac6
NC
5850 if (htab == NULL)
5851 return FALSE;
5852
deb0e272
AM
5853 memcpy (sym, parm->name, len);
5854 sym[len + 2] = 0;
5855
5856 for (i = parm->lo; i <= parm->hi; i++)
5857 {
a4b6fadd 5858 struct ppc_link_hash_entry *h;
deb0e272
AM
5859
5860 sym[len + 0] = i / 10 + '0';
5861 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5862 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5863 writing, TRUE, TRUE));
a4b6fadd 5864 if (stub_sec != NULL)
deb0e272 5865 {
a4b6fadd
AM
5866 if (h != NULL
5867 && h->elf.root.type == bfd_link_hash_defined
5868 && h->elf.root.u.def.section == htab->sfpr)
5869 {
5870 struct elf_link_hash_entry *s;
5871 char buf[32];
5872 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5873 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5874 if (s == NULL)
5875 return FALSE;
779f2ae7 5876 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5877 {
5878 s->root.type = bfd_link_hash_defined;
5879 s->root.u.def.section = stub_sec;
7dda8d3c 5880 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5881 + h->elf.root.u.def.value);
5882 s->ref_regular = 1;
5883 s->def_regular = 1;
5884 s->ref_regular_nonweak = 1;
5885 s->forced_local = 1;
5886 s->non_elf = 0;
5887 s->root.linker_def = 1;
5888 }
5889 }
5890 continue;
5891 }
5892 if (h != NULL)
5893 {
5894 h->save_res = 1;
5895 if (!h->elf.def_regular)
deb0e272 5896 {
a4b6fadd
AM
5897 h->elf.root.type = bfd_link_hash_defined;
5898 h->elf.root.u.def.section = htab->sfpr;
5899 h->elf.root.u.def.value = htab->sfpr->size;
5900 h->elf.type = STT_FUNC;
5901 h->elf.def_regular = 1;
b32547cd 5902 h->elf.non_elf = 0;
a4b6fadd
AM
5903 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5904 writing = TRUE;
deb0e272 5905 if (htab->sfpr->contents == NULL)
a4b6fadd 5906 {
2cdcc330
AM
5907 htab->sfpr->contents
5908 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5909 if (htab->sfpr->contents == NULL)
5910 return FALSE;
5911 }
deb0e272
AM
5912 }
5913 }
5914 if (writing)
5915 {
5916 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5917 if (i != parm->hi)
5918 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5919 else
5920 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5921 htab->sfpr->size = p - htab->sfpr->contents;
5922 }
5923 }
5924
5925 return TRUE;
5926}
5927
5928static bfd_byte *
5929savegpr0 (bfd *abfd, bfd_byte *p, int r)
5930{
5931 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5932 return p + 4;
5933}
5934
5935static bfd_byte *
5936savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5937{
5938 p = savegpr0 (abfd, p, r);
a078d95a 5939 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5940 p = p + 4;
5941 bfd_put_32 (abfd, BLR, p);
5942 return p + 4;
5943}
5944
5945static bfd_byte *
5946restgpr0 (bfd *abfd, bfd_byte *p, int r)
5947{
5948 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5949 return p + 4;
5950}
5951
5952static bfd_byte *
5953restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5954{
a078d95a 5955 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5956 p = p + 4;
5957 p = restgpr0 (abfd, p, r);
5958 bfd_put_32 (abfd, MTLR_R0, p);
5959 p = p + 4;
5960 if (r == 29)
5961 {
5962 p = restgpr0 (abfd, p, 30);
5963 p = restgpr0 (abfd, p, 31);
5964 }
5965 bfd_put_32 (abfd, BLR, p);
5966 return p + 4;
5967}
5968
5969static bfd_byte *
5970savegpr1 (bfd *abfd, bfd_byte *p, int r)
5971{
5972 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5973 return p + 4;
5974}
5975
5976static bfd_byte *
5977savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5978{
5979 p = savegpr1 (abfd, p, r);
5980 bfd_put_32 (abfd, BLR, p);
5981 return p + 4;
5982}
5983
5984static bfd_byte *
5985restgpr1 (bfd *abfd, bfd_byte *p, int r)
5986{
5987 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5988 return p + 4;
5989}
5990
5991static bfd_byte *
5992restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5993{
5994 p = restgpr1 (abfd, p, r);
5995 bfd_put_32 (abfd, BLR, p);
5996 return p + 4;
5997}
5998
5999static bfd_byte *
6000savefpr (bfd *abfd, bfd_byte *p, int r)
6001{
6002 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6003 return p + 4;
6004}
6005
6006static bfd_byte *
6007savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6008{
6009 p = savefpr (abfd, p, r);
a078d95a 6010 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6011 p = p + 4;
6012 bfd_put_32 (abfd, BLR, p);
6013 return p + 4;
6014}
6015
6016static bfd_byte *
6017restfpr (bfd *abfd, bfd_byte *p, int r)
6018{
6019 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6020 return p + 4;
6021}
6022
6023static bfd_byte *
6024restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6025{
a078d95a 6026 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6027 p = p + 4;
6028 p = restfpr (abfd, p, r);
6029 bfd_put_32 (abfd, MTLR_R0, p);
6030 p = p + 4;
6031 if (r == 29)
6032 {
6033 p = restfpr (abfd, p, 30);
6034 p = restfpr (abfd, p, 31);
6035 }
6036 bfd_put_32 (abfd, BLR, p);
6037 return p + 4;
6038}
6039
6040static bfd_byte *
6041savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6042{
6043 p = savefpr (abfd, p, r);
6044 bfd_put_32 (abfd, BLR, p);
6045 return p + 4;
6046}
6047
6048static bfd_byte *
6049restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6050{
6051 p = restfpr (abfd, p, r);
6052 bfd_put_32 (abfd, BLR, p);
6053 return p + 4;
6054}
6055
6056static bfd_byte *
6057savevr (bfd *abfd, bfd_byte *p, int r)
6058{
6059 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6060 p = p + 4;
6061 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6062 return p + 4;
6063}
6064
6065static bfd_byte *
6066savevr_tail (bfd *abfd, bfd_byte *p, int r)
6067{
6068 p = savevr (abfd, p, r);
6069 bfd_put_32 (abfd, BLR, p);
6070 return p + 4;
6071}
6072
6073static bfd_byte *
6074restvr (bfd *abfd, bfd_byte *p, int r)
6075{
6076 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6077 p = p + 4;
6078 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6079 return p + 4;
6080}
6081
6082static bfd_byte *
6083restvr_tail (bfd *abfd, bfd_byte *p, int r)
6084{
6085 p = restvr (abfd, p, r);
6086 bfd_put_32 (abfd, BLR, p);
6087 return p + 4;
6088}
6089
9e7028aa
AM
6090#define STDU_R1_0R1 0xf8210001
6091#define ADDI_R1_R1 0x38210000
6092
6093/* Emit prologue of wrapper preserving regs around a call to
6094 __tls_get_addr_opt. */
6095
6096static bfd_byte *
6097tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6098{
6099 unsigned int i;
6100
6101 bfd_put_32 (obfd, MFLR_R0, p);
6102 p += 4;
6103 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6104 p += 4;
6105
6106 if (htab->opd_abi)
6107 {
6108 for (i = 4; i < 12; i++)
6109 {
6110 bfd_put_32 (obfd,
6111 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6112 p += 4;
6113 }
6114 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6115 p += 4;
6116 }
6117 else
6118 {
6119 for (i = 4; i < 12; i++)
6120 {
6121 bfd_put_32 (obfd,
6122 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6123 p += 4;
6124 }
6125 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6126 p += 4;
6127 }
6128 return p;
6129}
6130
6131/* Emit epilogue of wrapper preserving regs around a call to
6132 __tls_get_addr_opt. */
6133
6134static bfd_byte *
6135tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6136{
6137 unsigned int i;
6138
6139 if (htab->opd_abi)
6140 {
6141 for (i = 4; i < 12; i++)
6142 {
6143 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6144 p += 4;
6145 }
6146 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6147 p += 4;
6148 }
6149 else
6150 {
6151 for (i = 4; i < 12; i++)
6152 {
6153 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6154 p += 4;
6155 }
6156 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6157 p += 4;
6158 }
6159 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6160 p += 4;
6161 bfd_put_32 (obfd, MTLR_R0, p);
6162 p += 4;
6163 bfd_put_32 (obfd, BLR, p);
6164 p += 4;
6165 return p;
6166}
6167
e86ce104
AM
6168/* Called via elf_link_hash_traverse to transfer dynamic linking
6169 information on function code symbol entries to their corresponding
6170 function descriptor symbol entries. */
deb0e272 6171
b34976b6 6172static bfd_boolean
4ce794b7 6173func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6174{
e86ce104 6175 struct bfd_link_info *info;
65f38f15 6176 struct ppc_link_hash_table *htab;
50bc7936
AM
6177 struct ppc_link_hash_entry *fh;
6178 struct ppc_link_hash_entry *fdh;
6179 bfd_boolean force_local;
5bd4f169 6180
ed7007c1 6181 fh = ppc_elf_hash_entry (h);
50bc7936 6182 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6183 return TRUE;
e86ce104 6184
8c5b4e52
AM
6185 if (!fh->is_func)
6186 return TRUE;
6187
6188 if (fh->elf.root.root.string[0] != '.'
6189 || fh->elf.root.root.string[1] == '\0')
6190 return TRUE;
6191
4ce794b7 6192 info = inf;
65f38f15 6193 htab = ppc_hash_table (info);
4dfe6ac6
NC
6194 if (htab == NULL)
6195 return FALSE;
5bd4f169 6196
8c5b4e52
AM
6197 /* Find the corresponding function descriptor symbol. */
6198 fdh = lookup_fdh (fh, htab);
6199
c09bdfe5
AM
6200 /* Resolve undefined references to dot-symbols as the value
6201 in the function descriptor, if we have one in a regular object.
6202 This is to satisfy cases like ".quad .foo". Calls to functions
6203 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6204 if ((fh->elf.root.type == bfd_link_hash_undefined
6205 || fh->elf.root.type == bfd_link_hash_undefweak)
6206 && (fdh->elf.root.type == bfd_link_hash_defined
6207 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6208 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6209 && opd_entry_value (fdh->elf.root.u.def.section,
6210 fdh->elf.root.u.def.value,
c09bdfe5 6211 &fh->elf.root.u.def.section,
aef36ac1 6212 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6213 {
b31867b6 6214 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6215 fh->elf.forced_local = 1;
b31867b6
AM
6216 fh->elf.def_regular = fdh->elf.def_regular;
6217 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6218 }
6219
8c5b4e52
AM
6220 if (!fh->elf.dynamic)
6221 {
6222 struct plt_entry *ent;
5bd4f169 6223
8c5b4e52
AM
6224 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6225 if (ent->plt.refcount > 0)
6226 break;
6227 if (ent == NULL)
6228 return TRUE;
6229 }
5bd4f169 6230
8c5b4e52 6231 /* Create a descriptor as undefined if necessary. */
50bc7936 6232 if (fdh == NULL
0e1862bb 6233 && !bfd_link_executable (info)
50bc7936
AM
6234 && (fh->elf.root.type == bfd_link_hash_undefined
6235 || fh->elf.root.type == bfd_link_hash_undefweak))
6236 {
908b32fc 6237 fdh = make_fdh (info, fh);
bb700d78
AM
6238 if (fdh == NULL)
6239 return FALSE;
50bc7936 6240 }
648cca2c 6241
8c5b4e52 6242 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6243 if (fdh != NULL
6244 && fdh->fake
8c5b4e52
AM
6245 && (fh->elf.root.type == bfd_link_hash_defined
6246 || fh->elf.root.type == bfd_link_hash_defweak))
6247 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6248
8c5b4e52
AM
6249 /* Transfer dynamic linking information to the function descriptor. */
6250 if (fdh != NULL)
6251 {
f5385ebf
AM
6252 fdh->elf.ref_regular |= fh->elf.ref_regular;
6253 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6254 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6255 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6256 fdh->elf.dynamic |= fh->elf.dynamic;
6257 fdh->elf.needs_plt |= (fh->elf.needs_plt
6258 || fh->elf.type == STT_FUNC
6259 || fh->elf.type == STT_GNU_IFUNC);
6260 move_plt_plist (fh, fdh);
6261
6262 if (!fdh->elf.forced_local
6263 && fh->elf.dynindx != -1)
6264 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6265 return FALSE;
e86ce104
AM
6266 }
6267
50bc7936
AM
6268 /* Now that the info is on the function descriptor, clear the
6269 function code sym info. Any function code syms for which we
6270 don't have a definition in a regular file, we force local.
6271 This prevents a shared library from exporting syms that have
6272 been imported from another library. Function code syms that
6273 are really in the library we must leave global to prevent the
6274 linker dragging in a definition from a static library. */
93f3fa99
AM
6275 force_local = (!fh->elf.def_regular
6276 || fdh == NULL
6277 || !fdh->elf.def_regular
6278 || fdh->elf.forced_local);
50bc7936
AM
6279 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6280
b34976b6 6281 return TRUE;
e86ce104 6282}
40b8271b 6283
a4b6fadd
AM
6284static const struct sfpr_def_parms save_res_funcs[] =
6285 {
6286 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6287 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6288 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6289 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6290 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6291 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6292 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6293 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6294 { "._savef", 14, 31, savefpr, savefpr1_tail },
6295 { "._restf", 14, 31, restfpr, restfpr1_tail },
6296 { "_savevr_", 20, 31, savevr, savevr_tail },
6297 { "_restvr_", 20, 31, restvr, restvr_tail }
6298 };
6299
e86ce104 6300/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6301 this hook to a) provide some gcc support functions, and b) transfer
6302 dynamic linking information gathered so far on function code symbol
6303 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6304
b34976b6 6305static bfd_boolean
4ce794b7
AM
6306ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6307 struct bfd_link_info *info)
e86ce104
AM
6308{
6309 struct ppc_link_hash_table *htab;
6310
6311 htab = ppc_hash_table (info);
4dfe6ac6
NC
6312 if (htab == NULL)
6313 return FALSE;
6314
b32547cd
AM
6315 /* Provide any missing _save* and _rest* functions. */
6316 if (htab->sfpr != NULL)
6317 {
6318 unsigned int i;
6319
6320 htab->sfpr->size = 0;
6321 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6322 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6323 return FALSE;
6324 if (htab->sfpr->size == 0)
6325 htab->sfpr->flags |= SEC_EXCLUDE;
6326 }
6327
6328 if (bfd_link_relocatable (info))
6329 return TRUE;
6330
6331 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6332 {
6333 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6334 /* Make .TOC. defined so as to prevent it being made dynamic.
6335 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6336 if (!htab->elf.hgot->def_regular
6337 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6338 {
6339 htab->elf.hgot->root.type = bfd_link_hash_defined;
6340 htab->elf.hgot->root.u.def.value = 0;
6341 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6342 htab->elf.hgot->def_regular = 1;
6343 htab->elf.hgot->root.linker_def = 1;
6344 }
dba6fa9b 6345 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6346 htab->elf.hgot->other
6347 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6348 }
c66bb0ee 6349
8c5b4e52
AM
6350 if (htab->need_func_desc_adj)
6351 {
6352 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6353 htab->need_func_desc_adj = 0;
6354 }
805fc799 6355
b34976b6 6356 return TRUE;
e86ce104
AM
6357}
6358
d311bc8b 6359/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6360 aliases, that apply to read-only sections. Cannot be used after
6361 size_dynamic_sections. */
d311bc8b
AM
6362
6363static bfd_boolean
6364alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6365{
ed7007c1 6366 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6367 do
6368 {
5dbc8b37 6369 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
d311bc8b 6370 return TRUE;
ed7007c1 6371 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6372 }
6373 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6374
6375 return FALSE;
6376}
8a2058b5 6377
8a9e8e72
AM
6378/* Return whether EH has pc-relative dynamic relocs. */
6379
6380static bfd_boolean
6381pc_dynrelocs (struct ppc_link_hash_entry *eh)
6382{
6383 struct elf_dyn_relocs *p;
6384
190eb1dd 6385 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
8a9e8e72
AM
6386 if (p->pc_count != 0)
6387 return TRUE;
6388 return FALSE;
6389}
6390
8a2058b5
AM
6391/* Return true if a global entry stub will be created for H. Valid
6392 for ELFv2 before plt entries have been allocated. */
6393
6394static bfd_boolean
6395global_entry_stub (struct elf_link_hash_entry *h)
6396{
6397 struct plt_entry *pent;
6398
6399 if (!h->pointer_equality_needed
6400 || h->def_regular)
6401 return FALSE;
6402
6403 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6404 if (pent->plt.refcount > 0
6405 && pent->addend == 0)
6406 return TRUE;
6407
6408 return FALSE;
6409}
6410
e86ce104
AM
6411/* Adjust a symbol defined by a dynamic object and referenced by a
6412 regular object. The current definition is in some section of the
6413 dynamic object, but we're not including those sections. We have to
6414 change the definition to something the rest of the link can
6415 understand. */
6416
b34976b6 6417static bfd_boolean
4ce794b7
AM
6418ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6419 struct elf_link_hash_entry *h)
e86ce104
AM
6420{
6421 struct ppc_link_hash_table *htab;
5474d94f 6422 asection *s, *srel;
e86ce104
AM
6423
6424 htab = ppc_hash_table (info);
4dfe6ac6
NC
6425 if (htab == NULL)
6426 return FALSE;
e86ce104
AM
6427
6428 /* Deal with function syms. */
6429 if (h->type == STT_FUNC
e054468f 6430 || h->type == STT_GNU_IFUNC
f5385ebf 6431 || h->needs_plt)
e86ce104 6432 {
ed7007c1 6433 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6434 || SYMBOL_CALLS_LOCAL (info, h)
6435 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6436 /* Discard dyn_relocs when non-pic if we've decided that a
6437 function symbol is local and not an ifunc. We keep dynamic
6438 relocs for ifuncs when local rather than always emitting a
6439 plt call stub for them and defining the symbol on the call
6440 stub. We can't do that for ELFv1 anyway (a function symbol
6441 is defined on a descriptor, not code) and it can be faster at
6442 run-time due to not needing to bounce through a stub. The
6443 dyn_relocs for ifuncs will be applied even in a static
6444 executable. */
6445 if (!bfd_link_pic (info)
6446 && h->type != STT_GNU_IFUNC
6447 && local)
190eb1dd 6448 h->dyn_relocs = NULL;
529fe20e 6449
e86ce104
AM
6450 /* Clear procedure linkage table information for any symbol that
6451 won't need a .plt entry. */
411e1bfb
AM
6452 struct plt_entry *ent;
6453 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6454 if (ent->plt.refcount > 0)
6455 break;
8387904d 6456 if (ent == NULL
2d7ad24e
AM
6457 || (h->type != STT_GNU_IFUNC
6458 && local
3e04d765 6459 && (htab->can_convert_all_inline_plt
ed7007c1 6460 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6461 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6462 {
411e1bfb 6463 h->plt.plist = NULL;
f5385ebf 6464 h->needs_plt = 0;
d1eca1e4 6465 h->pointer_equality_needed = 0;
40b8271b 6466 }
8a2058b5 6467 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6468 {
d1eca1e4
AM
6469 /* Taking a function's address in a read/write section
6470 doesn't require us to define the function symbol in the
6471 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6472 be used instead. The reason we prefer a few more dynamic
6473 relocs is that calling via a global entry stub costs a
6474 few more instructions, and pointer_equality_needed causes
6475 extra work in ld.so when resolving these symbols. */
529fe20e 6476 if (global_entry_stub (h))
d1eca1e4 6477 {
5dbc8b37 6478 if (!_bfd_elf_readonly_dynrelocs (h))
529fe20e
AM
6479 {
6480 h->pointer_equality_needed = 0;
04383fd1
AM
6481 /* If we haven't seen a branch reloc and the symbol
6482 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6483 if (!h->needs_plt)
6484 h->plt.plist = NULL;
6485 }
6486 else if (!bfd_link_pic (info))
6487 /* We are going to be defining the function symbol on the
6488 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 6489 h->dyn_relocs = NULL;
d1eca1e4
AM
6490 }
6491
3988aed5
AM
6492 /* ELFv2 function symbols can't have copy relocs. */
6493 return TRUE;
6494 }
6495 else if (!h->needs_plt
5dbc8b37 6496 && !_bfd_elf_readonly_dynrelocs (h))
3988aed5 6497 {
04383fd1
AM
6498 /* If we haven't seen a branch reloc and the symbol isn't an
6499 ifunc then we don't need a plt entry. */
3988aed5
AM
6500 h->plt.plist = NULL;
6501 h->pointer_equality_needed = 0;
a345bc8d
AM
6502 return TRUE;
6503 }
5bd4f169 6504 }
bbd7ec4a 6505 else
411e1bfb 6506 h->plt.plist = NULL;
5bd4f169
AM
6507
6508 /* If this is a weak symbol, and there is a real definition, the
6509 processor independent code will have arranged for us to see the
6510 real definition first, and we can just use the same value. */
60d67dc8 6511 if (h->is_weakalias)
5bd4f169 6512 {
60d67dc8
AM
6513 struct elf_link_hash_entry *def = weakdef (h);
6514 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6515 h->root.u.def.section = def->root.u.def.section;
6516 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6517 if (def->root.u.def.section == htab->elf.sdynbss
6518 || def->root.u.def.section == htab->elf.sdynrelro)
190eb1dd 6519 h->dyn_relocs = NULL;
b34976b6 6520 return TRUE;
5bd4f169
AM
6521 }
6522
5bd4f169
AM
6523 /* If we are creating a shared library, we must presume that the
6524 only references to the symbol are via the global offset table.
6525 For such cases we need not do anything here; the relocations will
6526 be handled correctly by relocate_section. */
ec73ddcd 6527 if (!bfd_link_executable (info))
b34976b6 6528 return TRUE;
5bd4f169 6529
65f38f15
AM
6530 /* If there are no references to this symbol that do not use the
6531 GOT, we don't need to generate a copy reloc. */
f5385ebf 6532 if (!h->non_got_ref)
b34976b6 6533 return TRUE;
65f38f15 6534
b186458a 6535 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6536 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6537
d93d1c80
AM
6538 /* If -z nocopyreloc was given, don't generate them either. */
6539 || info->nocopyreloc
a127494f 6540
dce2246a 6541 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6542 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6543 || (ELIMINATE_COPY_RELOCS
6544 && !h->needs_copy
6545 && !alias_readonly_dynrelocs (h))
65f38f15 6546
d93d1c80
AM
6547 /* Protected variables do not work with .dynbss. The copy in
6548 .dynbss won't be used by the shared library with the protected
6549 definition for the variable. Text relocations are preferable
6550 to an incorrect program. */
6551 || h->protected_def)
529fe20e 6552 return TRUE;
a127494f 6553
e1c6cf61
AM
6554 if (h->type == STT_FUNC
6555 || h->type == STT_GNU_IFUNC)
97b639ba 6556 {
e1c6cf61
AM
6557 /* .dynbss copies of function symbols only work if we have
6558 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6559 use dot-symbols and set the function symbol size to the text
6560 size of the function rather than the size of the descriptor.
6561 That's wrong for copying a descriptor. */
ed7007c1 6562 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6563 || !(h->size == 24 || h->size == 16))
6564 return TRUE;
6565
6566 /* We should never get here, but unfortunately there are old
6567 versions of gcc (circa gcc-3.2) that improperly for the
6568 ELFv1 ABI put initialized function pointers, vtable refs and
6569 suchlike in read-only sections. Allow them to proceed, but
6570 warn that this might break at runtime. */
25f53a85 6571 info->callbacks->einfo
c1c8c1ef 6572 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6573 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6574 h->root.root.string);
6575 }
5d35169e
AM
6576
6577 /* This is a reference to a symbol defined by a dynamic object which
6578 is not a function. */
6579
5bd4f169
AM
6580 /* We must allocate the symbol in our .dynbss section, which will
6581 become part of the .bss section of the executable. There will be
6582 an entry for this symbol in the .dynsym section. The dynamic
6583 object will contain position independent code, so all references
6584 from the dynamic object to this symbol will go through the global
6585 offset table. The dynamic linker will use the .dynsym entry to
6586 determine the address it must put in the global offset table, so
6587 both the dynamic object and the regular object will refer to the
6588 same memory location for the variable. */
5474d94f
AM
6589 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6590 {
6591 s = htab->elf.sdynrelro;
6592 srel = htab->elf.sreldynrelro;
6593 }
6594 else
6595 {
6596 s = htab->elf.sdynbss;
6597 srel = htab->elf.srelbss;
6598 }
1d7e9d18 6599 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6600 {
4a7e5234
AM
6601 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6602 linker to copy the initial value out of the dynamic object
6603 and into the runtime process image. */
5474d94f 6604 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6605 h->needs_copy = 1;
5bd4f169
AM
6606 }
6607
529fe20e 6608 /* We no longer want dyn_relocs. */
190eb1dd 6609 h->dyn_relocs = NULL;
6cabe1ea 6610 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6611}
6612
e86ce104
AM
6613/* If given a function descriptor symbol, hide both the function code
6614 sym and the descriptor. */
6615static void
4ce794b7
AM
6616ppc64_elf_hide_symbol (struct bfd_link_info *info,
6617 struct elf_link_hash_entry *h,
6618 bfd_boolean force_local)
e86ce104 6619{
34814b9f 6620 struct ppc_link_hash_entry *eh;
e86ce104
AM
6621 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6622
87469ba2
AM
6623 if (ppc_hash_table (info) == NULL)
6624 return;
6625
ed7007c1 6626 eh = ppc_elf_hash_entry (h);
34814b9f 6627 if (eh->is_func_descriptor)
e86ce104 6628 {
34814b9f 6629 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6630
721956f4 6631 if (fh == NULL)
d1329ca3
AM
6632 {
6633 const char *p, *q;
b8ac2841 6634 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6635 char save;
6636
6637 /* We aren't supposed to use alloca in BFD because on
6638 systems which do not have alloca the version in libiberty
6639 calls xmalloc, which might cause the program to crash
6640 when it runs out of memory. This function doesn't have a
6641 return status, so there's no way to gracefully return an
6642 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6643 accessed; It's either a string in an ELF string table,
6644 or allocated in an objalloc structure. */
d1329ca3 6645
34814b9f 6646 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6647 save = *p;
6648 *(char *) p = '.';
ed7007c1
AM
6649 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6650 FALSE, FALSE));
d1329ca3
AM
6651 *(char *) p = save;
6652
6653 /* Unfortunately, if it so happens that the string we were
6654 looking for was allocated immediately before this string,
6655 then we overwrote the string terminator. That's the only
6656 reason the lookup should fail. */
6657 if (fh == NULL)
6658 {
34814b9f
AM
6659 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6660 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6661 --q, --p;
34814b9f 6662 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6663 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6664 FALSE, FALSE));
d1329ca3
AM
6665 }
6666 if (fh != NULL)
6667 {
34814b9f
AM
6668 eh->oh = fh;
6669 fh->oh = eh;
d1329ca3
AM
6670 }
6671 }
e86ce104 6672 if (fh != NULL)
34814b9f 6673 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6674 }
6675}
6676
411e1bfb 6677static bfd_boolean
8843416a
AM
6678get_sym_h (struct elf_link_hash_entry **hp,
6679 Elf_Internal_Sym **symp,
6680 asection **symsecp,
f961d9dd 6681 unsigned char **tls_maskp,
8843416a
AM
6682 Elf_Internal_Sym **locsymsp,
6683 unsigned long r_symndx,
6684 bfd *ibfd)
411e1bfb 6685{
0ffa91dd 6686 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6687
6688 if (r_symndx >= symtab_hdr->sh_info)
6689 {
6690 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6691 struct elf_link_hash_entry *h;
6692
6693 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6694 h = elf_follow_link (h);
411e1bfb
AM
6695
6696 if (hp != NULL)
6697 *hp = h;
6698
6699 if (symp != NULL)
6700 *symp = NULL;
6701
6702 if (symsecp != NULL)
6703 {
6704 asection *symsec = NULL;
6705 if (h->root.type == bfd_link_hash_defined
6706 || h->root.type == bfd_link_hash_defweak)
6707 symsec = h->root.u.def.section;
6708 *symsecp = symsec;
6709 }
6710
e7b938ca 6711 if (tls_maskp != NULL)
ed7007c1 6712 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6713 }
6714 else
6715 {
6716 Elf_Internal_Sym *sym;
6717 Elf_Internal_Sym *locsyms = *locsymsp;
6718
6719 if (locsyms == NULL)
6720 {
6721 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6722 if (locsyms == NULL)
6723 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6724 symtab_hdr->sh_info,
6725 0, NULL, NULL, NULL);
6726 if (locsyms == NULL)
6727 return FALSE;
6728 *locsymsp = locsyms;
6729 }
6730 sym = locsyms + r_symndx;
6731
6732 if (hp != NULL)
6733 *hp = NULL;
6734
6735 if (symp != NULL)
6736 *symp = sym;
6737
6738 if (symsecp != NULL)
cb33740c 6739 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6740
e7b938ca 6741 if (tls_maskp != NULL)
411e1bfb
AM
6742 {
6743 struct got_entry **lgot_ents;
f961d9dd 6744 unsigned char *tls_mask;
411e1bfb 6745
e7b938ca 6746 tls_mask = NULL;
411e1bfb
AM
6747 lgot_ents = elf_local_got_ents (ibfd);
6748 if (lgot_ents != NULL)
6749 {
e054468f
AM
6750 struct plt_entry **local_plt = (struct plt_entry **)
6751 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6752 unsigned char *lgot_masks = (unsigned char *)
e054468f 6753 (local_plt + symtab_hdr->sh_info);
e7b938ca 6754 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6755 }
e7b938ca 6756 *tls_maskp = tls_mask;
411e1bfb
AM
6757 }
6758 }
6759 return TRUE;
6760}
6761
e7b938ca 6762/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6763 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6764 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6765
6766static int
f961d9dd 6767get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6768 unsigned long *toc_symndx,
6769 bfd_vma *toc_addend,
0d4792f7 6770 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6771 const Elf_Internal_Rela *rel,
6772 bfd *ibfd)
411e1bfb
AM
6773{
6774 unsigned long r_symndx;
0d4792f7 6775 int next_r;
411e1bfb
AM
6776 struct elf_link_hash_entry *h;
6777 Elf_Internal_Sym *sym;
6778 asection *sec;
6779 bfd_vma off;
6780
6781 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6782 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6783 return 0;
411e1bfb 6784
37da22e5
AM
6785 if ((*tls_maskp != NULL
6786 && (**tls_maskp & TLS_TLS) != 0
6787 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6788 || sec == NULL
6bee8834 6789 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6790 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6791 return 1;
411e1bfb
AM
6792
6793 /* Look inside a TOC section too. */
6794 if (h != NULL)
6795 {
6796 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6797 off = h->root.u.def.value;
6798 }
6799 else
6800 off = sym->st_value;
6801 off += rel->r_addend;
6802 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6803 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6804 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6805 if (toc_symndx != NULL)
6806 *toc_symndx = r_symndx;
3a71aa26
AM
6807 if (toc_addend != NULL)
6808 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6809 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6810 return 0;
854b41e7 6811 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6812 && (next_r == -1 || next_r == -2))
6813 return 1 - next_r;
951fd09b 6814 return 1;
411e1bfb
AM
6815}
6816
3b421ab3
AM
6817/* Find (or create) an entry in the tocsave hash table. */
6818
6819static struct tocsave_entry *
6820tocsave_find (struct ppc_link_hash_table *htab,
6821 enum insert_option insert,
6822 Elf_Internal_Sym **local_syms,
6823 const Elf_Internal_Rela *irela,
6824 bfd *ibfd)
6825{
6826 unsigned long r_indx;
6827 struct elf_link_hash_entry *h;
6828 Elf_Internal_Sym *sym;
6829 struct tocsave_entry ent, *p;
6830 hashval_t hash;
6831 struct tocsave_entry **slot;
6832
6833 r_indx = ELF64_R_SYM (irela->r_info);
6834 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6835 return NULL;
6836 if (ent.sec == NULL || ent.sec->output_section == NULL)
6837 {
4eca0228 6838 _bfd_error_handler
871b3ab2 6839 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6840 return NULL;
6841 }
6842
6843 if (h != NULL)
6844 ent.offset = h->root.u.def.value;
6845 else
6846 ent.offset = sym->st_value;
6847 ent.offset += irela->r_addend;
6848
6849 hash = tocsave_htab_hash (&ent);
6850 slot = ((struct tocsave_entry **)
6851 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6852 if (slot == NULL)
6853 return NULL;
6854
6855 if (*slot == NULL)
6856 {
6857 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6858 if (p == NULL)
6859 return NULL;
6860 *p = ent;
6861 *slot = p;
6862 }
6863 return *slot;
6864}
6865
754021d0 6866/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6867 code for the old ABI, these will already have been done. */
754021d0
AM
6868
6869static bfd_boolean
6870adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6871{
6872 struct ppc_link_hash_entry *eh;
6873 asection *sym_sec;
74f0fb50 6874 struct _opd_sec_data *opd;
754021d0
AM
6875
6876 if (h->root.type == bfd_link_hash_indirect)
6877 return TRUE;
6878
754021d0
AM
6879 if (h->root.type != bfd_link_hash_defined
6880 && h->root.type != bfd_link_hash_defweak)
6881 return TRUE;
6882
ed7007c1 6883 eh = ppc_elf_hash_entry (h);
754021d0
AM
6884 if (eh->adjust_done)
6885 return TRUE;
6886
6887 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6888 opd = get_opd_info (sym_sec);
6889 if (opd != NULL && opd->adjust != NULL)
754021d0 6890 {
51aecdc5 6891 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6892 if (adjust == -1)
6893 {
6894 /* This entry has been deleted. */
b3fac117 6895 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6896 if (dsec == NULL)
6897 {
6898 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6899 if (discarded_section (dsec))
81688140 6900 {
b3fac117 6901 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6902 break;
6903 }
6904 }
4025353c 6905 eh->elf.root.u.def.value = 0;
81688140 6906 eh->elf.root.u.def.section = dsec;
4025353c
AM
6907 }
6908 else
6909 eh->elf.root.u.def.value += adjust;
754021d0
AM
6910 eh->adjust_done = 1;
6911 }
6912 return TRUE;
6913}
6914
8c1d1bb8 6915/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6916 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6917 have already been determined. */
6918
6919static bfd_boolean
6920dec_dynrel_count (bfd_vma r_info,
6921 asection *sec,
6922 struct bfd_link_info *info,
6923 Elf_Internal_Sym **local_syms,
6924 struct elf_link_hash_entry *h,
19e08130 6925 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6926{
6927 enum elf_ppc64_reloc_type r_type;
19e08130 6928 asection *sym_sec = NULL;
8c1d1bb8
AM
6929
6930 /* Can this reloc be dynamic? This switch, and later tests here
6931 should be kept in sync with the code in check_relocs. */
6932 r_type = ELF64_R_TYPE (r_info);
6933 switch (r_type)
6934 {
6935 default:
6936 return TRUE;
6937
1bdd8fac
AM
6938 case R_PPC64_TOC16:
6939 case R_PPC64_TOC16_DS:
6940 case R_PPC64_TOC16_LO:
6941 case R_PPC64_TOC16_HI:
6942 case R_PPC64_TOC16_HA:
6943 case R_PPC64_TOC16_LO_DS:
6944 if (h == NULL)
6945 return TRUE;
6946 break;
6947
8c1d1bb8
AM
6948 case R_PPC64_TPREL16:
6949 case R_PPC64_TPREL16_LO:
6950 case R_PPC64_TPREL16_HI:
6951 case R_PPC64_TPREL16_HA:
6952 case R_PPC64_TPREL16_DS:
6953 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6954 case R_PPC64_TPREL16_HIGH:
6955 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6956 case R_PPC64_TPREL16_HIGHER:
6957 case R_PPC64_TPREL16_HIGHERA:
6958 case R_PPC64_TPREL16_HIGHEST:
6959 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6960 case R_PPC64_TPREL64:
c213164a 6961 case R_PPC64_TPREL34:
8c1d1bb8
AM
6962 case R_PPC64_DTPMOD64:
6963 case R_PPC64_DTPREL64:
6964 case R_PPC64_ADDR64:
6965 case R_PPC64_REL30:
6966 case R_PPC64_REL32:
6967 case R_PPC64_REL64:
6968 case R_PPC64_ADDR14:
6969 case R_PPC64_ADDR14_BRNTAKEN:
6970 case R_PPC64_ADDR14_BRTAKEN:
6971 case R_PPC64_ADDR16:
6972 case R_PPC64_ADDR16_DS:
6973 case R_PPC64_ADDR16_HA:
6974 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6975 case R_PPC64_ADDR16_HIGH:
6976 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6977 case R_PPC64_ADDR16_HIGHER:
6978 case R_PPC64_ADDR16_HIGHERA:
6979 case R_PPC64_ADDR16_HIGHEST:
6980 case R_PPC64_ADDR16_HIGHESTA:
6981 case R_PPC64_ADDR16_LO:
6982 case R_PPC64_ADDR16_LO_DS:
6983 case R_PPC64_ADDR24:
6984 case R_PPC64_ADDR32:
6985 case R_PPC64_UADDR16:
6986 case R_PPC64_UADDR32:
6987 case R_PPC64_UADDR64:
6988 case R_PPC64_TOC:
5663e321
AM
6989 case R_PPC64_D34:
6990 case R_PPC64_D34_LO:
6991 case R_PPC64_D34_HI30:
6992 case R_PPC64_D34_HA30:
6993 case R_PPC64_ADDR16_HIGHER34:
6994 case R_PPC64_ADDR16_HIGHERA34:
6995 case R_PPC64_ADDR16_HIGHEST34:
6996 case R_PPC64_ADDR16_HIGHESTA34:
6997 case R_PPC64_D28:
8c1d1bb8
AM
6998 break;
6999 }
7000
7001 if (local_syms != NULL)
7002 {
7003 unsigned long r_symndx;
8c1d1bb8
AM
7004 bfd *ibfd = sec->owner;
7005
7006 r_symndx = ELF64_R_SYM (r_info);
7007 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7008 return FALSE;
7009 }
7010
ec73ddcd
AM
7011 if ((h != NULL
7012 && (h->root.type == bfd_link_hash_defweak
7013 || !h->def_regular))
7014 || (h != NULL
7015 && !bfd_link_executable (info)
7016 && !SYMBOLIC_BIND (info, h))
7017 || (bfd_link_pic (info)
7018 && must_be_dyn_reloc (info, r_type))
7019 || (!bfd_link_pic (info)
7020 && (h != NULL
7021 ? h->type == STT_GNU_IFUNC
7022 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7023 ;
7024 else
7025 return TRUE;
7026
7027 if (h != NULL)
6edfbbad 7028 {
19e08130
AM
7029 struct elf_dyn_relocs *p;
7030 struct elf_dyn_relocs **pp;
190eb1dd 7031 pp = &h->dyn_relocs;
19e08130
AM
7032
7033 /* elf_gc_sweep may have already removed all dyn relocs associated
7034 with local syms for a given section. Also, symbol flags are
7035 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7036 report a dynreloc miscount. */
7037 if (*pp == NULL && info->gc_sections)
7038 return TRUE;
7039
7040 while ((p = *pp) != NULL)
60124e18 7041 {
19e08130
AM
7042 if (p->sec == sec)
7043 {
7044 if (!must_be_dyn_reloc (info, r_type))
7045 p->pc_count -= 1;
7046 p->count -= 1;
7047 if (p->count == 0)
7048 *pp = p->next;
7049 return TRUE;
7050 }
7051 pp = &p->next;
60124e18 7052 }
6edfbbad 7053 }
19e08130
AM
7054 else
7055 {
7056 struct ppc_dyn_relocs *p;
7057 struct ppc_dyn_relocs **pp;
7058 void *vpp;
7059 bfd_boolean is_ifunc;
8c1d1bb8 7060
19e08130
AM
7061 if (local_syms == NULL)
7062 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7063 if (sym_sec == NULL)
7064 sym_sec = sec;
c57da1a7 7065
19e08130
AM
7066 vpp = &elf_section_data (sym_sec)->local_dynrel;
7067 pp = (struct ppc_dyn_relocs **) vpp;
7068
7069 if (*pp == NULL && info->gc_sections)
7070 return TRUE;
7071
7072 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7073 while ((p = *pp) != NULL)
8c1d1bb8 7074 {
19e08130
AM
7075 if (p->sec == sec && p->ifunc == is_ifunc)
7076 {
7077 p->count -= 1;
7078 if (p->count == 0)
7079 *pp = p->next;
7080 return TRUE;
7081 }
7082 pp = &p->next;
8c1d1bb8 7083 }
8c1d1bb8
AM
7084 }
7085
695344c0 7086 /* xgettext:c-format */
cf97bcb0
AM
7087 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7088 sec->owner, sec);
8c1d1bb8
AM
7089 bfd_set_error (bfd_error_bad_value);
7090 return FALSE;
7091}
7092
754021d0
AM
7093/* Remove unused Official Procedure Descriptor entries. Currently we
7094 only remove those associated with functions in discarded link-once
7095 sections, or weakly defined functions that have been overridden. It
7096 would be possible to remove many more entries for statically linked
7097 applications. */
7098
b34976b6 7099bfd_boolean
e7d1c40c 7100ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7101{
7102 bfd *ibfd;
754021d0 7103 bfd_boolean some_edited = FALSE;
3f764659 7104 asection *need_pad = NULL;
e7d1c40c
AM
7105 struct ppc_link_hash_table *htab;
7106
7107 htab = ppc_hash_table (info);
7108 if (htab == NULL)
7109 return FALSE;
1e2f5b6e 7110
c72f2fb2 7111 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7112 {
7113 asection *sec;
7114 Elf_Internal_Rela *relstart, *rel, *relend;
7115 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7116 Elf_Internal_Sym *local_syms;
74f0fb50 7117 struct _opd_sec_data *opd;
51aecdc5 7118 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7119 bfd_size_type cnt_16b = 0;
1e2f5b6e 7120
854b41e7
AM
7121 if (!is_ppc64_elf (ibfd))
7122 continue;
7123
1e2f5b6e 7124 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7125 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7126 continue;
7127
dbaa2011 7128 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7129 continue;
7130
1e2f5b6e
AM
7131 if (sec->output_section == bfd_abs_section_ptr)
7132 continue;
7133
7134 /* Look through the section relocs. */
7135 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7136 continue;
7137
6cdc0ccc 7138 local_syms = NULL;
0ffa91dd 7139 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7140
7141 /* Read the relocations. */
4ce794b7 7142 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7143 info->keep_memory);
1e2f5b6e 7144 if (relstart == NULL)
b34976b6 7145 return FALSE;
1e2f5b6e
AM
7146
7147 /* First run through the relocs to check they are sane, and to
7148 determine whether we need to edit this opd section. */
b34976b6 7149 need_edit = FALSE;
51aecdc5 7150 broken = FALSE;
3f764659 7151 need_pad = sec;
1e2f5b6e 7152 relend = relstart + sec->reloc_count;
50bc7936 7153 for (rel = relstart; rel < relend; )
1e2f5b6e 7154 {
04c9666a 7155 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7156 unsigned long r_symndx;
7157 asection *sym_sec;
7158 struct elf_link_hash_entry *h;
7159 Elf_Internal_Sym *sym;
51aecdc5 7160 bfd_vma offset;
1e2f5b6e 7161
51aecdc5 7162 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7163 only interested in the reloc pointing to a function entry
7164 point. */
51aecdc5
AM
7165 offset = rel->r_offset;
7166 if (rel + 1 == relend
7167 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7168 {
7169 /* If someone messes with .opd alignment then after a
7170 "ld -r" we might have padding in the middle of .opd.
7171 Also, there's nothing to prevent someone putting
7172 something silly in .opd with the assembler. No .opd
b34976b6 7173 optimization for them! */
3f764659 7174 broken_opd:
4eca0228 7175 _bfd_error_handler
871b3ab2 7176 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7177 broken = TRUE;
1e2f5b6e
AM
7178 break;
7179 }
7180
50bc7936
AM
7181 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7182 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7183 {
4eca0228 7184 _bfd_error_handler
695344c0 7185 /* xgettext:c-format */
871b3ab2 7186 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7187 ibfd, r_type);
51aecdc5 7188 broken = TRUE;
50bc7936
AM
7189 break;
7190 }
7191
1e2f5b6e 7192 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7193 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7194 r_symndx, ibfd))
50bc7936 7195 goto error_ret;
1e2f5b6e
AM
7196
7197 if (sym_sec == NULL || sym_sec->owner == NULL)
7198 {
411e1bfb
AM
7199 const char *sym_name;
7200 if (h != NULL)
7201 sym_name = h->root.root.string;
7202 else
26c61ae5
L
7203 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7204 sym_sec);
411e1bfb 7205
4eca0228 7206 _bfd_error_handler
695344c0 7207 /* xgettext:c-format */
871b3ab2 7208 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7209 ibfd, sym_name);
51aecdc5 7210 broken = TRUE;
1e2f5b6e
AM
7211 break;
7212 }
7213
51020317
AM
7214 /* opd entries are always for functions defined in the
7215 current input bfd. If the symbol isn't defined in the
7216 input bfd, then we won't be using the function in this
7217 bfd; It must be defined in a linkonce section in another
7218 bfd, or is weak. It's also possible that we are
7219 discarding the function due to a linker script /DISCARD/,
7220 which we test for via the output_section. */
7221 if (sym_sec->owner != ibfd
7222 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7223 need_edit = TRUE;
1e2f5b6e 7224
50bc7936 7225 rel += 2;
51aecdc5
AM
7226 if (rel + 1 == relend
7227 || (rel + 2 < relend
7228 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7229 ++rel;
7230
7231 if (rel == relend)
3f764659
JJ
7232 {
7233 if (sec->size == offset + 24)
7234 {
7235 need_pad = NULL;
7236 break;
7237 }
51aecdc5 7238 if (sec->size == offset + 16)
3f764659
JJ
7239 {
7240 cnt_16b++;
7241 break;
7242 }
7243 goto broken_opd;
7244 }
3f764659
JJ
7245 else if (rel + 1 < relend
7246 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7247 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7248 {
51aecdc5
AM
7249 if (rel[0].r_offset == offset + 16)
7250 cnt_16b++;
7251 else if (rel[0].r_offset != offset + 24)
7252 goto broken_opd;
3f764659
JJ
7253 }
7254 else
7255 goto broken_opd;
1e2f5b6e
AM
7256 }
7257
e7d1c40c 7258 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7259
51aecdc5 7260 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7261 {
7262 Elf_Internal_Rela *write_rel;
d4730f92 7263 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7264 bfd_byte *rptr, *wptr;
983bddc8 7265 bfd_byte *new_contents;
74f0fb50
AM
7266 bfd_size_type amt;
7267
983bddc8 7268 new_contents = NULL;
51aecdc5 7269 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7270 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7271 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7272 if (opd->adjust == NULL)
7273 return FALSE;
1e2f5b6e
AM
7274
7275 /* This seems a waste of time as input .opd sections are all
7276 zeros as generated by gcc, but I suppose there's no reason
7277 this will always be so. We might start putting something in
7278 the third word of .opd entries. */
7279 if ((sec->flags & SEC_IN_MEMORY) == 0)
7280 {
eea6121a
AM
7281 bfd_byte *loc;
7282 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7283 {
c9594989 7284 free (loc);
50bc7936 7285 error_ret:
c9594989 7286 if (symtab_hdr->contents != (unsigned char *) local_syms)
6cdc0ccc 7287 free (local_syms);
6cdc0ccc
AM
7288 if (elf_section_data (sec)->relocs != relstart)
7289 free (relstart);
b34976b6 7290 return FALSE;
6cdc0ccc 7291 }
1e2f5b6e
AM
7292 sec->contents = loc;
7293 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7294 }
7295
7296 elf_section_data (sec)->relocs = relstart;
7297
3f764659 7298 new_contents = sec->contents;
3f764659
JJ
7299 if (add_aux_fields)
7300 {
7301 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7302 if (new_contents == NULL)
7303 return FALSE;
51aecdc5 7304 need_pad = NULL;
3f764659 7305 }
b4f4e59f
AM
7306 wptr = new_contents;
7307 rptr = sec->contents;
1e2f5b6e 7308 write_rel = relstart;
51aecdc5 7309 for (rel = relstart; rel < relend; )
1e2f5b6e 7310 {
50bc7936
AM
7311 unsigned long r_symndx;
7312 asection *sym_sec;
7313 struct elf_link_hash_entry *h;
51aecdc5 7314 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7315 Elf_Internal_Sym *sym;
51aecdc5
AM
7316 long opd_ent_size;
7317 Elf_Internal_Rela *next_rel;
7318 bfd_boolean skip;
50bc7936
AM
7319
7320 r_symndx = ELF64_R_SYM (rel->r_info);
7321 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7322 r_symndx, ibfd))
50bc7936
AM
7323 goto error_ret;
7324
51aecdc5
AM
7325 next_rel = rel + 2;
7326 if (next_rel + 1 == relend
7327 || (next_rel + 2 < relend
7328 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7329 ++next_rel;
7330
7331 /* See if the .opd entry is full 24 byte or
7332 16 byte (with fd_aux entry overlapped with next
7333 fd_func). */
7334 opd_ent_size = 24;
7335 if (next_rel == relend)
1e2f5b6e 7336 {
51aecdc5 7337 if (sec->size == rel->r_offset + 16)
3f764659 7338 opd_ent_size = 16;
51aecdc5
AM
7339 }
7340 else if (next_rel->r_offset == rel->r_offset + 16)
7341 opd_ent_size = 16;
3f764659 7342
51aecdc5
AM
7343 if (h != NULL
7344 && h->root.root.string[0] == '.')
7345 {
ed7007c1 7346 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7347 if (fdh != NULL)
7348 {
7349 fdh = ppc_follow_link (fdh);
7350 if (fdh->elf.root.type != bfd_link_hash_defined
7351 && fdh->elf.root.type != bfd_link_hash_defweak)
7352 fdh = NULL;
7353 }
51aecdc5 7354 }
1e2f5b6e 7355
51aecdc5
AM
7356 skip = (sym_sec->owner != ibfd
7357 || sym_sec->output_section == bfd_abs_section_ptr);
7358 if (skip)
7359 {
7360 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7361 {
51aecdc5
AM
7362 /* Arrange for the function descriptor sym
7363 to be dropped. */
7364 fdh->elf.root.u.def.value = 0;
7365 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7366 }
51aecdc5 7367 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7368
0e1862bb 7369 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7370 rel = next_rel;
7371 else
7372 while (1)
7373 {
7374 if (!dec_dynrel_count (rel->r_info, sec, info,
7375 NULL, h, sym))
7376 goto error_ret;
754021d0 7377
51aecdc5
AM
7378 if (++rel == next_rel)
7379 break;
1e2f5b6e 7380
51aecdc5
AM
7381 r_symndx = ELF64_R_SYM (rel->r_info);
7382 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7383 r_symndx, ibfd))
7384 goto error_ret;
7385 }
50bc7936
AM
7386 }
7387 else
1e2f5b6e 7388 {
51aecdc5
AM
7389 /* We'll be keeping this opd entry. */
7390 long adjust;
7391
7392 if (fdh != NULL)
7393 {
7394 /* Redefine the function descriptor symbol to
7395 this location in the opd section. It is
7396 necessary to update the value here rather
7397 than using an array of adjustments as we do
7398 for local symbols, because various places
7399 in the generic ELF code use the value
7400 stored in u.def.value. */
7401 fdh->elf.root.u.def.value = wptr - new_contents;
7402 fdh->adjust_done = 1;
7403 }
7404
7405 /* Local syms are a bit tricky. We could
7406 tweak them as they can be cached, but
7407 we'd need to look through the local syms
7408 for the function descriptor sym which we
7409 don't have at the moment. So keep an
7410 array of adjustments. */
7411 adjust = (wptr - new_contents) - (rptr - sec->contents);
7412 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7413
7414 if (wptr != rptr)
7415 memcpy (wptr, rptr, opd_ent_size);
7416 wptr += opd_ent_size;
7417 if (add_aux_fields && opd_ent_size == 16)
7418 {
7419 memset (wptr, '\0', 8);
7420 wptr += 8;
7421 }
7422
50bc7936 7423 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7424 new opd entries. */
7425 for ( ; rel != next_rel; ++rel)
7426 {
7427 rel->r_offset += adjust;
7428 if (write_rel != rel)
7429 memcpy (write_rel, rel, sizeof (*rel));
7430 ++write_rel;
7431 }
1e2f5b6e 7432 }
51aecdc5
AM
7433
7434 rptr += opd_ent_size;
1e2f5b6e
AM
7435 }
7436
3f764659 7437 sec->size = wptr - new_contents;
1e2f5b6e 7438 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7439 if (add_aux_fields)
7440 {
7441 free (sec->contents);
7442 sec->contents = new_contents;
7443 }
7444
05bf9422 7445 /* Fudge the header size too, as this is used later in
cdcf6e38 7446 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7447 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7448 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7449 some_edited = TRUE;
1e2f5b6e 7450 }
6cdc0ccc 7451 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7452 free (relstart);
6cdc0ccc 7453
411e1bfb
AM
7454 if (local_syms != NULL
7455 && symtab_hdr->contents != (unsigned char *) local_syms)
7456 {
7457 if (!info->keep_memory)
7458 free (local_syms);
7459 else
7460 symtab_hdr->contents = (unsigned char *) local_syms;
7461 }
7462 }
7463
754021d0
AM
7464 if (some_edited)
7465 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7466
3f764659
JJ
7467 /* If we are doing a final link and the last .opd entry is just 16 byte
7468 long, add a 8 byte padding after it. */
0e1862bb 7469 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7470 {
7471 bfd_byte *p;
7472
7473 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7474 {
7475 BFD_ASSERT (need_pad->size > 0);
7476
7477 p = bfd_malloc (need_pad->size + 8);
7478 if (p == NULL)
7479 return FALSE;
699733f6 7480
2cdcc330
AM
7481 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7482 p, 0, need_pad->size))
3f764659
JJ
7483 return FALSE;
7484
7485 need_pad->contents = p;
7486 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7487 }
7488 else
7489 {
7490 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7491 if (p == NULL)
7492 return FALSE;
7493
7494 need_pad->contents = p;
7495 }
7496
7497 memset (need_pad->contents + need_pad->size, 0, 8);
7498 need_pad->size += 8;
7499 }
7500
411e1bfb
AM
7501 return TRUE;
7502}
7503
3e04d765
AM
7504/* Analyze inline PLT call relocations to see whether calls to locally
7505 defined functions can be converted to direct calls. */
7506
7507bfd_boolean
7508ppc64_elf_inline_plt (struct bfd_link_info *info)
7509{
7510 struct ppc_link_hash_table *htab;
7511 bfd *ibfd;
7512 asection *sec;
7513 bfd_vma low_vma, high_vma, limit;
7514
7515 htab = ppc_hash_table (info);
7516 if (htab == NULL)
7517 return FALSE;
7518
7519 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7520 reduced somewhat to cater for possible stubs that might be added
7521 between the call and its destination. */
7522 if (htab->params->group_size < 0)
7523 {
7524 limit = -htab->params->group_size;
7525 if (limit == 1)
7526 limit = 0x1e00000;
7527 }
7528 else
7529 {
7530 limit = htab->params->group_size;
7531 if (limit == 1)
7532 limit = 0x1c00000;
7533 }
7534
7535 low_vma = -1;
7536 high_vma = 0;
7537 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7538 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7539 {
7540 if (low_vma > sec->vma)
7541 low_vma = sec->vma;
7542 if (high_vma < sec->vma + sec->size)
7543 high_vma = sec->vma + sec->size;
7544 }
7545
7546 /* If a "bl" can reach anywhere in local code sections, then we can
7547 convert all inline PLT sequences to direct calls when the symbol
7548 is local. */
7549 if (high_vma - low_vma < limit)
7550 {
7551 htab->can_convert_all_inline_plt = 1;
7552 return TRUE;
7553 }
7554
7555 /* Otherwise, go looking through relocs for cases where a direct
7556 call won't reach. Mark the symbol on any such reloc to disable
7557 the optimization and keep the PLT entry as it seems likely that
7558 this will be better than creating trampolines. Note that this
7559 will disable the optimization for all inline PLT calls to a
7560 particular symbol, not just those that won't reach. The
7561 difficulty in doing a more precise optimization is that the
7562 linker needs to make a decision depending on whether a
7563 particular R_PPC64_PLTCALL insn can be turned into a direct
7564 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7565 the sequence, and there is nothing that ties those relocs
7566 together except their symbol. */
7567
7568 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7569 {
7570 Elf_Internal_Shdr *symtab_hdr;
7571 Elf_Internal_Sym *local_syms;
7572
7573 if (!is_ppc64_elf (ibfd))
7574 continue;
7575
7576 local_syms = NULL;
7577 symtab_hdr = &elf_symtab_hdr (ibfd);
7578
7579 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7580 if (ppc64_elf_section_data (sec)->has_pltcall
7581 && !bfd_is_abs_section (sec->output_section))
7582 {
7583 Elf_Internal_Rela *relstart, *rel, *relend;
7584
7585 /* Read the relocations. */
7586 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7587 info->keep_memory);
7588 if (relstart == NULL)
7589 return FALSE;
7590
7591 relend = relstart + sec->reloc_count;
435edf0b 7592 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
7593 {
7594 enum elf_ppc64_reloc_type r_type;
7595 unsigned long r_symndx;
7596 asection *sym_sec;
7597 struct elf_link_hash_entry *h;
7598 Elf_Internal_Sym *sym;
7599 unsigned char *tls_maskp;
7600
7601 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7602 if (r_type != R_PPC64_PLTCALL
7603 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7604 continue;
7605
7606 r_symndx = ELF64_R_SYM (rel->r_info);
7607 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7608 r_symndx, ibfd))
7609 {
7610 if (elf_section_data (sec)->relocs != relstart)
7611 free (relstart);
c9594989 7612 if (symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7613 free (local_syms);
7614 return FALSE;
7615 }
7616
7617 if (sym_sec != NULL && sym_sec->output_section != NULL)
7618 {
7619 bfd_vma from, to;
7620 if (h != NULL)
7621 to = h->root.u.def.value;
7622 else
7623 to = sym->st_value;
7624 to += (rel->r_addend
7625 + sym_sec->output_offset
7626 + sym_sec->output_section->vma);
7627 from = (rel->r_offset
7628 + sec->output_offset
7629 + sec->output_section->vma);
5663e321
AM
7630 if (to - from + limit < 2 * limit
7631 && !(r_type == R_PPC64_PLTCALL_NOTOC
7632 && (((h ? h->other : sym->st_other)
7633 & STO_PPC64_LOCAL_MASK)
4a4e7361 7634 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7635 *tls_maskp &= ~PLT_KEEP;
7636 }
7637 }
7638 if (elf_section_data (sec)->relocs != relstart)
7639 free (relstart);
7640 }
7641
7642 if (local_syms != NULL
7643 && symtab_hdr->contents != (unsigned char *) local_syms)
7644 {
7645 if (!info->keep_memory)
7646 free (local_syms);
7647 else
7648 symtab_hdr->contents = (unsigned char *) local_syms;
7649 }
7650 }
7651
7652 return TRUE;
7653}
7654
e1918d23 7655/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7656
e1918d23 7657asection *
e7d1c40c 7658ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7659{
411e1bfb 7660 struct ppc_link_hash_table *htab;
9e7028aa 7661 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7662
411e1bfb 7663 htab = ppc_hash_table (info);
4dfe6ac6
NC
7664 if (htab == NULL)
7665 return NULL;
7666
ee67d69a
AM
7667 if (abiversion (info->output_bfd) == 1)
7668 htab->opd_abi = 1;
7669
e7d1c40c 7670 if (htab->params->no_multi_toc)
33c0ec9d
AM
7671 htab->do_multi_toc = 0;
7672 else if (!htab->do_multi_toc)
e7d1c40c 7673 htab->params->no_multi_toc = 1;
33c0ec9d 7674
8b5f1ed8
AM
7675 /* Default to --no-plt-localentry, as this option can cause problems
7676 with symbol interposition. For example, glibc libpthread.so and
7677 libc.so duplicate many pthread symbols, with a fallback
7678 implementation in libc.so. In some cases the fallback does more
7679 work than the pthread implementation. __pthread_condattr_destroy
7680 is one such symbol: the libpthread.so implementation is
7681 localentry:0 while the libc.so implementation is localentry:8.
7682 An app that "cleverly" uses dlopen to only load necessary
7683 libraries at runtime may omit loading libpthread.so when not
7684 running multi-threaded, which then results in the libc.so
7685 fallback symbols being used and ld.so complaining. Now there
7686 are workarounds in ld (see non_zero_localentry) to detect the
7687 pthread situation, but that may not be the only case where
7688 --plt-localentry can cause trouble. */
f378ab09 7689 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7690 htab->params->plt_localentry0 = 0;
d44c746a
AM
7691 if (htab->params->plt_localentry0
7692 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7693 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7694 _bfd_error_handler
7695 (_("warning: --plt-localentry is especially dangerous without "
7696 "ld.so support to detect ABI violations"));
f378ab09 7697
9e7028aa
AM
7698 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7699 FALSE, FALSE, TRUE);
7700 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7701
a7f2871e 7702 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7703 if (tga != NULL)
7704 func_desc_adjust (tga, info);
7705 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7706 FALSE, FALSE, TRUE);
7707 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7708
7709 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7710 FALSE, FALSE, TRUE);
7711 htab->tga_desc = ppc_elf_hash_entry (desc);
7712 if (desc != NULL)
7713 func_desc_adjust (desc, info);
7714 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7715 FALSE, FALSE, TRUE);
7716 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7717
7c9cf415 7718 if (htab->params->tls_get_addr_opt)
a7f2871e 7719 {
9e7028aa 7720 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7721
7722 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7723 FALSE, FALSE, TRUE);
7724 if (opt != NULL)
7725 func_desc_adjust (opt, info);
7726 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7727 FALSE, FALSE, TRUE);
7728 if (opt_fd != NULL
7729 && (opt_fd->root.type == bfd_link_hash_defined
7730 || opt_fd->root.type == bfd_link_hash_defweak))
7731 {
7732 /* If glibc supports an optimized __tls_get_addr call stub,
7733 signalled by the presence of __tls_get_addr_opt, and we'll
7734 be calling __tls_get_addr via a plt call stub, then
7735 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7736 if (!(htab->elf.dynamic_sections_created
7737 && tga_fd != NULL
7738 && (tga_fd->type == STT_FUNC
7739 || tga_fd->needs_plt)
7740 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7741 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7742 tga_fd = NULL;
7743 if (!(htab->elf.dynamic_sections_created
7744 && desc_fd != NULL
7745 && (desc_fd->type == STT_FUNC
7746 || desc_fd->needs_plt)
7747 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7748 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7749 desc_fd = NULL;
7750
7751 if (tga_fd != NULL || desc_fd != NULL)
7752 {
7753 struct plt_entry *ent = NULL;
7754
7755 if (tga_fd != NULL)
7756 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7757 if (ent->plt.refcount > 0)
7758 break;
7759 if (ent == NULL && desc_fd != NULL)
7760 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7761 if (ent->plt.refcount > 0)
7762 break;
a7f2871e
AM
7763 if (ent != NULL)
7764 {
9e7028aa
AM
7765 if (tga_fd != NULL)
7766 {
7767 tga_fd->root.type = bfd_link_hash_indirect;
7768 tga_fd->root.u.i.link = &opt_fd->root;
7769 tga_fd->root.u.i.warning = NULL;
7770 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7771 }
7772 if (desc_fd != NULL)
7773 {
7774 desc_fd->root.type = bfd_link_hash_indirect;
7775 desc_fd->root.u.i.link = &opt_fd->root;
7776 desc_fd->root.u.i.warning = NULL;
7777 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7778 }
b531344c 7779 opt_fd->mark = 1;
a7f2871e
AM
7780 if (opt_fd->dynindx != -1)
7781 {
7782 /* Use __tls_get_addr_opt in dynamic relocations. */
7783 opt_fd->dynindx = -1;
7784 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7785 opt_fd->dynstr_index);
7786 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7787 return NULL;
a7f2871e 7788 }
9e7028aa 7789 if (tga_fd != NULL)
a7f2871e 7790 {
9e7028aa
AM
7791 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7792 tga = &htab->tls_get_addr->elf;
7793 if (opt != NULL && tga != NULL)
7794 {
7795 tga->root.type = bfd_link_hash_indirect;
7796 tga->root.u.i.link = &opt->root;
7797 tga->root.u.i.warning = NULL;
7798 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7799 opt->mark = 1;
7800 _bfd_elf_link_hash_hide_symbol (info, opt,
7801 tga->forced_local);
7802 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7803 }
7804 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7805 htab->tls_get_addr_fd->is_func_descriptor = 1;
7806 if (htab->tls_get_addr != NULL)
7807 {
7808 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7809 htab->tls_get_addr->is_func = 1;
7810 }
a7f2871e 7811 }
9e7028aa 7812 if (desc_fd != NULL)
a7f2871e 7813 {
9e7028aa
AM
7814 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7815 if (opt != NULL && desc != NULL)
7816 {
7817 desc->root.type = bfd_link_hash_indirect;
7818 desc->root.u.i.link = &opt->root;
7819 desc->root.u.i.warning = NULL;
7820 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7821 opt->mark = 1;
7822 _bfd_elf_link_hash_hide_symbol (info, opt,
7823 desc->forced_local);
7824 htab->tga_desc = ppc_elf_hash_entry (opt);
7825 }
7826 htab->tga_desc_fd->oh = htab->tga_desc;
7827 htab->tga_desc_fd->is_func_descriptor = 1;
7828 if (htab->tga_desc != NULL)
7829 {
7830 htab->tga_desc->oh = htab->tga_desc_fd;
7831 htab->tga_desc->is_func = 1;
7832 }
a7f2871e
AM
7833 }
7834 }
7835 }
7836 }
7c9cf415
AM
7837 else if (htab->params->tls_get_addr_opt < 0)
7838 htab->params->tls_get_addr_opt = 0;
a7f2871e 7839 }
9e7028aa
AM
7840
7841 if (htab->tga_desc_fd != NULL
7842 && htab->params->tls_get_addr_opt
7843 && htab->params->no_tls_get_addr_regsave == -1)
7844 htab->params->no_tls_get_addr_regsave = 0;
7845
33c0ec9d 7846 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7847}
8387904d 7848
3a71aa26 7849/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7850 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7851
3a71aa26
AM
7852static bfd_boolean
7853branch_reloc_hash_match (const bfd *ibfd,
7854 const Elf_Internal_Rela *rel,
7855 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7856 const struct ppc_link_hash_entry *hash2,
7857 const struct ppc_link_hash_entry *hash3,
7858 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7859{
7860 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7861 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7862 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7863
e054468f 7864 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7865 {
3a71aa26
AM
7866 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7867 struct elf_link_hash_entry *h;
8387904d 7868
3a71aa26 7869 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7870 h = elf_follow_link (h);
9e7028aa
AM
7871 if (h == &hash1->elf || h == &hash2->elf
7872 || h == &hash3->elf || h == &hash4->elf)
3a71aa26 7873 return TRUE;
a48ebf4d 7874 }
3a71aa26 7875 return FALSE;
951fd09b 7876}
411e1bfb 7877
951fd09b
AM
7878/* Run through all the TLS relocs looking for optimization
7879 opportunities. The linker has been hacked (see ppc64elf.em) to do
7880 a preliminary section layout so that we know the TLS segment
7881 offsets. We can't optimize earlier because some optimizations need
7882 to know the tp offset, and we need to optimize before allocating
7883 dynamic relocations. */
7884
7885bfd_boolean
33c0ec9d 7886ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7887{
7888 bfd *ibfd;
7889 asection *sec;
7890 struct ppc_link_hash_table *htab;
663a1470 7891 unsigned char *toc_ref;
102890f0 7892 int pass;
951fd09b 7893
3cbc1e5e 7894 if (!bfd_link_executable (info))
411e1bfb
AM
7895 return TRUE;
7896
951fd09b 7897 htab = ppc_hash_table (info);
4dfe6ac6
NC
7898 if (htab == NULL)
7899 return FALSE;
7900
663a1470
AM
7901 /* Make two passes over the relocs. On the first pass, mark toc
7902 entries involved with tls relocs, and check that tls relocs
7903 involved in setting up a tls_get_addr call are indeed followed by
7904 such a call. If they are not, we can't do any tls optimization.
7905 On the second pass twiddle tls_mask flags to notify
7906 relocate_section that optimization can be done, and adjust got
7907 and plt refcounts. */
7908 toc_ref = NULL;
7909 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7910 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7911 {
7912 Elf_Internal_Sym *locsyms = NULL;
7913 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7914
102890f0
AM
7915 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7916 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7917 {
7918 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7919 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7920
102890f0
AM
7921 /* Read the relocations. */
7922 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7923 info->keep_memory);
7924 if (relstart == NULL)
2915c55b
JK
7925 {
7926 free (toc_ref);
7927 return FALSE;
7928 }
411e1bfb 7929
102890f0
AM
7930 relend = relstart + sec->reloc_count;
7931 for (rel = relstart; rel < relend; rel++)
7932 {
7933 enum elf_ppc64_reloc_type r_type;
7934 unsigned long r_symndx;
7935 struct elf_link_hash_entry *h;
7936 Elf_Internal_Sym *sym;
7937 asection *sym_sec;
f961d9dd 7938 unsigned char *tls_mask;
46e9995a 7939 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7940 bfd_vma value;
7941 bfd_boolean ok_tprel, is_local;
7942 long toc_ref_index = 0;
7943 int expecting_tls_get_addr = 0;
663a1470 7944 bfd_boolean ret = FALSE;
411e1bfb 7945
102890f0
AM
7946 r_symndx = ELF64_R_SYM (rel->r_info);
7947 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7948 r_symndx, ibfd))
7949 {
7950 err_free_rel:
7951 if (elf_section_data (sec)->relocs != relstart)
7952 free (relstart);
c9594989
AM
7953 free (toc_ref);
7954 if (elf_symtab_hdr (ibfd).contents
7955 != (unsigned char *) locsyms)
102890f0 7956 free (locsyms);
663a1470 7957 return ret;
102890f0 7958 }
411e1bfb 7959
102890f0
AM
7960 if (h != NULL)
7961 {
766bc656
AM
7962 if (h->root.type == bfd_link_hash_defined
7963 || h->root.type == bfd_link_hash_defweak)
7964 value = h->root.u.def.value;
7965 else if (h->root.type == bfd_link_hash_undefweak)
7966 value = 0;
7967 else
663a1470
AM
7968 {
7969 found_tls_get_addr_arg = 0;
7970 continue;
7971 }
102890f0
AM
7972 }
7973 else
7974 /* Symbols referenced by TLS relocs must be of type
7975 STT_TLS. So no need for .opd local sym adjust. */
7976 value = sym->st_value;
7977
7978 ok_tprel = FALSE;
f749f26e
AM
7979 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7980 if (is_local)
102890f0 7981 {
766bc656
AM
7982 if (h != NULL
7983 && h->root.type == bfd_link_hash_undefweak)
7984 ok_tprel = TRUE;
c27b8c2a
AM
7985 else if (sym_sec != NULL
7986 && sym_sec->output_section != NULL)
766bc656
AM
7987 {
7988 value += sym_sec->output_offset;
7989 value += sym_sec->output_section->vma;
0b147428 7990 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
7991 /* Note that even though the prefix insns
7992 allow a 1<<33 offset we use the same test
7993 as for addis;addi. There may be a mix of
7994 pcrel and non-pcrel code and the decision
7995 to optimise is per symbol, not per TLS
7996 sequence. */
0b147428 7997 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 7998 }
102890f0 7999 }
951fd09b 8000
102890f0 8001 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8002 /* If this section has old-style __tls_get_addr calls
8003 without marker relocs, then check that each
8004 __tls_get_addr call reloc is preceded by a reloc
8005 that conceivably belongs to the __tls_get_addr arg
8006 setup insn. If we don't find matching arg setup
8007 relocs, don't do any tls optimization. */
8008 if (pass == 0
9737e8af 8009 && sec->nomark_tls_get_addr
663a1470 8010 && h != NULL
ed7007c1 8011 && is_tls_get_addr (h, htab)
663a1470
AM
8012 && !found_tls_get_addr_arg
8013 && is_branch_reloc (r_type))
8014 {
25f53a85 8015 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8016 "TLS optimization disabled\n"),
8017 ibfd, sec, rel->r_offset);
8018 ret = TRUE;
8019 goto err_free_rel;
8020 }
8021
8022 found_tls_get_addr_arg = 0;
102890f0
AM
8023 switch (r_type)
8024 {
8025 case R_PPC64_GOT_TLSLD16:
8026 case R_PPC64_GOT_TLSLD16_LO:
87c69f97 8027 case R_PPC64_GOT_TLSLD_PCREL34:
102890f0 8028 expecting_tls_get_addr = 1;
663a1470 8029 found_tls_get_addr_arg = 1;
1a0670f3 8030 /* Fall through. */
102890f0
AM
8031
8032 case R_PPC64_GOT_TLSLD16_HI:
8033 case R_PPC64_GOT_TLSLD16_HA:
8034 /* These relocs should never be against a symbol
8035 defined in a shared lib. Leave them alone if
8036 that turns out to be the case. */
8037 if (!is_local)
8038 continue;
411e1bfb 8039
102890f0 8040 /* LD -> LE */
411e1bfb 8041 tls_set = 0;
102890f0
AM
8042 tls_clear = TLS_LD;
8043 tls_type = TLS_TLS | TLS_LD;
8044 break;
411e1bfb 8045
102890f0
AM
8046 case R_PPC64_GOT_TLSGD16:
8047 case R_PPC64_GOT_TLSGD16_LO:
87c69f97 8048 case R_PPC64_GOT_TLSGD_PCREL34:
102890f0 8049 expecting_tls_get_addr = 1;
663a1470 8050 found_tls_get_addr_arg = 1;
1a0670f3 8051 /* Fall through. */
102890f0
AM
8052
8053 case R_PPC64_GOT_TLSGD16_HI:
8054 case R_PPC64_GOT_TLSGD16_HA:
8055 if (ok_tprel)
8056 /* GD -> LE */
411e1bfb 8057 tls_set = 0;
102890f0
AM
8058 else
8059 /* GD -> IE */
b00a0a86 8060 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8061 tls_clear = TLS_GD;
8062 tls_type = TLS_TLS | TLS_GD;
8063 break;
8064
87c69f97 8065 case R_PPC64_GOT_TPREL_PCREL34:
102890f0
AM
8066 case R_PPC64_GOT_TPREL16_DS:
8067 case R_PPC64_GOT_TPREL16_LO_DS:
8068 case R_PPC64_GOT_TPREL16_HI:
8069 case R_PPC64_GOT_TPREL16_HA:
8070 if (ok_tprel)
8071 {
8072 /* IE -> LE */
8073 tls_set = 0;
8074 tls_clear = TLS_TPREL;
8075 tls_type = TLS_TLS | TLS_TPREL;
8076 break;
8077 }
411e1bfb
AM
8078 continue;
8079
727fc41e 8080 case R_PPC64_TLSLD:
7d04a20a
AM
8081 if (!is_local)
8082 continue;
8083 /* Fall through. */
8084 case R_PPC64_TLSGD:
23cedd1d
AM
8085 if (rel + 1 < relend
8086 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8087 {
8088 if (pass != 0
2cdcc330 8089 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8090 != R_PPC64_PLTSEQ)
8091 && (ELF64_R_TYPE (rel[1].r_info)
8092 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8093 {
8094 r_symndx = ELF64_R_SYM (rel[1].r_info);
8095 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8096 r_symndx, ibfd))
23cedd1d
AM
8097 goto err_free_rel;
8098 if (h != NULL)
8099 {
8100 struct plt_entry *ent = NULL;
8101
8102 for (ent = h->plt.plist;
8103 ent != NULL;
8104 ent = ent->next)
8105 if (ent->addend == rel[1].r_addend)
8106 break;
8107
8108 if (ent != NULL
8109 && ent->plt.refcount > 0)
8110 ent->plt.refcount -= 1;
8111 }
8112 }
8113 continue;
8114 }
663a1470 8115 found_tls_get_addr_arg = 1;
1a0670f3 8116 /* Fall through. */
663a1470
AM
8117
8118 case R_PPC64_TLS:
8119 case R_PPC64_TOC16:
8120 case R_PPC64_TOC16_LO:
102890f0
AM
8121 if (sym_sec == NULL || sym_sec != toc)
8122 continue;
8123
8124 /* Mark this toc entry as referenced by a TLS
8125 code sequence. We can do that now in the
8126 case of R_PPC64_TLS, and after checking for
8127 tls_get_addr for the TOC16 relocs. */
8128 if (toc_ref == NULL)
2cdcc330
AM
8129 toc_ref
8130 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8131 if (toc_ref == NULL)
8132 goto err_free_rel;
8133
102890f0
AM
8134 if (h != NULL)
8135 value = h->root.u.def.value;
8136 else
8137 value = sym->st_value;
8138 value += rel->r_addend;
73242275
AM
8139 if (value % 8 != 0)
8140 continue;
8141 BFD_ASSERT (value < toc->size
8142 && toc->output_offset % 8 == 0);
663a1470 8143 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8144 if (r_type == R_PPC64_TLS
8145 || r_type == R_PPC64_TLSGD
8146 || r_type == R_PPC64_TLSLD)
102890f0
AM
8147 {
8148 toc_ref[toc_ref_index] = 1;
8149 continue;
8150 }
8151
8152 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8153 continue;
8154
8155 tls_set = 0;
8156 tls_clear = 0;
8157 expecting_tls_get_addr = 2;
8158 break;
8159
8160 case R_PPC64_TPREL64:
8161 if (pass == 0
8162 || sec != toc
8163 || toc_ref == NULL
663a1470 8164 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8165 continue;
8166 if (ok_tprel)
8167 {
8168 /* IE -> LE */
8169 tls_set = TLS_EXPLICIT;
8170 tls_clear = TLS_TPREL;
8171 break;
8172 }
8173 continue;
8174
8175 case R_PPC64_DTPMOD64:
8176 if (pass == 0
8177 || sec != toc
8178 || toc_ref == NULL
663a1470 8179 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8180 continue;
8181 if (rel + 1 < relend
8182 && (rel[1].r_info
8183 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8184 && rel[1].r_offset == rel->r_offset + 8)
8185 {
8186 if (ok_tprel)
8187 /* GD -> LE */
8188 tls_set = TLS_EXPLICIT | TLS_GD;
8189 else
8190 /* GD -> IE */
b00a0a86 8191 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8192 tls_clear = TLS_GD;
8193 }
8194 else
8195 {
8196 if (!is_local)
8197 continue;
8198
8199 /* LD -> LE */
8200 tls_set = TLS_EXPLICIT;
8201 tls_clear = TLS_LD;
8202 }
8203 break;
8204
8205 default:
8206 continue;
8207 }
8208
8209 if (pass == 0)
8210 {
727fc41e 8211 if (!expecting_tls_get_addr
9737e8af 8212 || !sec->nomark_tls_get_addr)
102890f0
AM
8213 continue;
8214
3a71aa26
AM
8215 if (rel + 1 < relend
8216 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8217 htab->tls_get_addr_fd,
8218 htab->tga_desc_fd,
3a71aa26 8219 htab->tls_get_addr,
9e7028aa 8220 htab->tga_desc))
102890f0 8221 {
3a71aa26 8222 if (expecting_tls_get_addr == 2)
102890f0 8223 {
3a71aa26 8224 /* Check for toc tls entries. */
f961d9dd 8225 unsigned char *toc_tls;
3a71aa26
AM
8226 int retval;
8227
8228 retval = get_tls_mask (&toc_tls, NULL, NULL,
8229 &locsyms,
8230 rel, ibfd);
8231 if (retval == 0)
8232 goto err_free_rel;
663a1470
AM
8233 if (toc_tls != NULL)
8234 {
37da22e5
AM
8235 if ((*toc_tls & TLS_TLS) != 0
8236 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8237 found_tls_get_addr_arg = 1;
8238 if (retval > 1)
8239 toc_ref[toc_ref_index] = 1;
8240 }
102890f0 8241 }
3a71aa26 8242 continue;
102890f0
AM
8243 }
8244
102890f0
AM
8245 /* Uh oh, we didn't find the expected call. We
8246 could just mark this symbol to exclude it
8247 from tls optimization but it's safer to skip
663a1470 8248 the entire optimization. */
695344c0 8249 /* xgettext:c-format */
25f53a85 8250 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8251 "TLS optimization disabled\n"),
8252 ibfd, sec, rel->r_offset);
8253 ret = TRUE;
8254 goto err_free_rel;
102890f0
AM
8255 }
8256
37da22e5
AM
8257 /* If we don't have old-style __tls_get_addr calls
8258 without TLSGD/TLSLD marker relocs, and we haven't
8259 found a new-style __tls_get_addr call with a
8260 marker for this symbol, then we either have a
8261 broken object file or an -mlongcall style
8262 indirect call to __tls_get_addr without a marker.
8263 Disable optimization in this case. */
8264 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8265 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8266 && !sec->nomark_tls_get_addr
37da22e5
AM
8267 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8268 != (TLS_TLS | TLS_MARK)))
8269 continue;
8270
7d04a20a 8271 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8272 {
23cedd1d
AM
8273 struct plt_entry *ent = NULL;
8274
9e7028aa
AM
8275 if (htab->tls_get_addr_fd != NULL)
8276 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8277 ent != NULL;
8278 ent = ent->next)
8279 if (ent->addend == 0)
8280 break;
8281
8282 if (ent == NULL && htab->tga_desc_fd != NULL)
8283 for (ent = htab->tga_desc_fd->elf.plt.plist;
8284 ent != NULL;
8285 ent = ent->next)
8286 if (ent->addend == 0)
8287 break;
8288
8289 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8290 for (ent = htab->tls_get_addr->elf.plt.plist;
8291 ent != NULL;
8292 ent = ent->next)
8293 if (ent->addend == 0)
102890f0 8294 break;
411e1bfb 8295
9e7028aa
AM
8296 if (ent == NULL && htab->tga_desc != NULL)
8297 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8298 ent != NULL;
8299 ent = ent->next)
8300 if (ent->addend == 0)
102890f0 8301 break;
23cedd1d
AM
8302
8303 if (ent != NULL
8304 && ent->plt.refcount > 0)
8305 ent->plt.refcount -= 1;
102890f0 8306 }
411e1bfb 8307
102890f0 8308 if (tls_clear == 0)
30038c59
AM
8309 continue;
8310
102890f0
AM
8311 if ((tls_set & TLS_EXPLICIT) == 0)
8312 {
8313 struct got_entry *ent;
411e1bfb 8314
102890f0
AM
8315 /* Adjust got entry for this reloc. */
8316 if (h != NULL)
8317 ent = h->got.glist;
8318 else
8319 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8320
102890f0
AM
8321 for (; ent != NULL; ent = ent->next)
8322 if (ent->addend == rel->r_addend
8323 && ent->owner == ibfd
8324 && ent->tls_type == tls_type)
8325 break;
8326 if (ent == NULL)
8327 abort ();
411e1bfb 8328
102890f0
AM
8329 if (tls_set == 0)
8330 {
8331 /* We managed to get rid of a got entry. */
8332 if (ent->got.refcount > 0)
8333 ent->got.refcount -= 1;
8334 }
8335 }
8336 else
8337 {
8338 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8339 we'll lose one or two dyn relocs. */
8340 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8341 NULL, h, sym))
102890f0 8342 return FALSE;
411e1bfb 8343
102890f0
AM
8344 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8345 {
8346 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8347 NULL, h, sym))
102890f0
AM
8348 return FALSE;
8349 }
8350 }
411e1bfb 8351
46e9995a 8352 *tls_mask |= tls_set & 0xff;
102890f0
AM
8353 *tls_mask &= ~tls_clear;
8354 }
8c1d1bb8 8355
102890f0
AM
8356 if (elf_section_data (sec)->relocs != relstart)
8357 free (relstart);
8358 }
411e1bfb 8359
663a1470
AM
8360 if (locsyms != NULL
8361 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8362 {
8363 if (!info->keep_memory)
8364 free (locsyms);
8365 else
8366 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8367 }
8368 }
411e1bfb 8369
c9594989 8370 free (toc_ref);
9a23f96e 8371 htab->do_tls_opt = 1;
b34976b6 8372 return TRUE;
1e2f5b6e 8373}
b34976b6 8374
c5614fa4
AM
8375/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8376 the values of any global symbols in a toc section that has been
8377 edited. Globals in toc sections should be a rarity, so this function
8378 sets a flag if any are found in toc sections other than the one just
de194d85 8379 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8380
8381struct adjust_toc_info
8382{
8383 asection *toc;
8384 unsigned long *skip;
8385 bfd_boolean global_toc_syms;
8386};
8387
ba761f19
AM
8388enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8389
c5614fa4
AM
8390static bfd_boolean
8391adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8392{
8393 struct ppc_link_hash_entry *eh;
8394 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8395 unsigned long i;
c5614fa4 8396
c5614fa4
AM
8397 if (h->root.type != bfd_link_hash_defined
8398 && h->root.type != bfd_link_hash_defweak)
8399 return TRUE;
8400
ed7007c1 8401 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8402 if (eh->adjust_done)
8403 return TRUE;
8404
8405 if (eh->elf.root.u.def.section == toc_inf->toc)
8406 {
854b41e7
AM
8407 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8408 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8409 else
854b41e7
AM
8410 i = eh->elf.root.u.def.value >> 3;
8411
ba761f19 8412 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8413 {
4eca0228 8414 _bfd_error_handler
854b41e7
AM
8415 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8416 do
8417 ++i;
ba761f19 8418 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8419 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8420 }
854b41e7
AM
8421
8422 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8423 eh->adjust_done = 1;
8424 }
8425 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8426 toc_inf->global_toc_syms = TRUE;
8427
8428 return TRUE;
8429}
8430
39eeab25
AM
8431/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8432 on a _LO variety toc/got reloc. */
560c8763
AM
8433
8434static bfd_boolean
39eeab25 8435ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8436{
2365f8d7
AM
8437 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8438 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8439 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8440 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8441 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8442 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8443 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8444 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8445 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8446 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8447 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8448 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8449 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8450 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8451 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8452 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8453 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8454 /* Exclude lfqu by testing reloc. If relocs are ever
8455 defined for the reduced D field in psq_lu then those
8456 will need testing too. */
8457 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8458 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8459 && (insn & 1) == 0)
2365f8d7
AM
8460 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8461 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8462 /* Exclude stfqu. psq_stu as above for psq_lu. */
8463 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8464 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8465 && (insn & 1) == 0));
560c8763
AM
8466}
8467
4a421c53
AM
8468/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8469 pld ra,symbol@got@pcrel
dd9b12c2 8470 load/store rt,off(ra)
4a421c53 8471 or
d4b87b1e 8472 pla ra,symbol@pcrel
dd9b12c2 8473 load/store rt,off(ra)
4a421c53 8474 may be translated to
dd9b12c2 8475 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8476 nop.
8477 This function returns true if the optimization is possible, placing
dd9b12c2 8478 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8479
8480 On entry to this function, the linker has already determined that
d4b87b1e 8481 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8482 while *PINSN2 is the second instruction. */
8483
8484static bfd_boolean
dd9b12c2 8485xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8486{
77486630
AM
8487 uint64_t insn1 = *pinsn1;
8488 uint64_t insn2 = *pinsn2;
dd9b12c2 8489 bfd_signed_vma off;
4a421c53 8490
77486630
AM
8491 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8492 {
8493 /* Check that regs match. */
8494 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8495 return FALSE;
8496
8497 /* P8LS or PMLS form, non-pcrel. */
8498 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8499 return FALSE;
8500
8501 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8502 *pinsn2 = PNOP;
8503 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8504 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8505 return TRUE;
8506 }
8507
8508 insn2 >>= 32;
8509
4a421c53 8510 /* Check that regs match. */
77486630 8511 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8512 return FALSE;
8513
8514 switch ((insn2 >> 26) & 63)
8515 {
8516 default:
8517 return FALSE;
8518
8519 case 32: /* lwz */
8520 case 34: /* lbz */
8521 case 36: /* stw */
8522 case 38: /* stb */
8523 case 40: /* lhz */
8524 case 42: /* lha */
8525 case 44: /* sth */
8526 case 48: /* lfs */
8527 case 50: /* lfd */
8528 case 52: /* stfs */
8529 case 54: /* stfd */
8530 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8531 on the insn. */
77486630 8532 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8533 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8534 off = insn2 & 0xffff;
4a421c53
AM
8535 break;
8536
8537 case 58: /* lwa, ld */
dd9b12c2 8538 if ((insn2 & 1) != 0)
4a421c53 8539 return FALSE;
77486630 8540 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8541 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8542 | (insn2 & (31ULL << 21)));
dd9b12c2 8543 off = insn2 & 0xfffc;
4a421c53
AM
8544 break;
8545
8546 case 57: /* lxsd, lxssp */
dd9b12c2 8547 if ((insn2 & 3) < 2)
4a421c53 8548 return FALSE;
77486630 8549 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8550 | ((40ULL | (insn2 & 3)) << 26)
8551 | (insn2 & (31ULL << 21)));
dd9b12c2 8552 off = insn2 & 0xfffc;
4a421c53
AM
8553 break;
8554
8555 case 61: /* stxsd, stxssp, lxv, stxv */
8556 if ((insn2 & 3) == 0)
8557 return FALSE;
8558 else if ((insn2 & 3) >= 2)
8559 {
77486630 8560 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8561 | ((44ULL | (insn2 & 3)) << 26)
8562 | (insn2 & (31ULL << 21)));
dd9b12c2 8563 off = insn2 & 0xfffc;
4a421c53
AM
8564 }
8565 else
8566 {
77486630 8567 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8568 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8569 | (insn2 & (31ULL << 21)));
dd9b12c2 8570 off = insn2 & 0xfff0;
4a421c53
AM
8571 }
8572 break;
8573
8574 case 56: /* lq */
77486630 8575 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8576 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8577 off = insn2 & 0xffff;
4a421c53
AM
8578 break;
8579
94ba9882
AM
8580 case 6: /* lxvp, stxvp */
8581 if ((insn2 & 0xe) != 0)
8582 return FALSE;
8583 insn1 = ((1ULL << 58) | (1ULL << 52)
8584 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8585 | (insn2 & (31ULL << 21)));
8586 off = insn2 & 0xfff0;
8587 break;
8588
4a421c53 8589 case 62: /* std, stq */
dd9b12c2 8590 if ((insn2 & 1) != 0)
4a421c53 8591 return FALSE;
77486630 8592 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8593 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8594 | (insn2 & (31ULL << 21)));
dd9b12c2 8595 off = insn2 & 0xfffc;
4a421c53
AM
8596 break;
8597 }
8598
77486630 8599 *pinsn1 = insn1;
4a421c53 8600 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8601 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8602 return TRUE;
8603}
8604
c5614fa4
AM
8605/* Examine all relocs referencing .toc sections in order to remove
8606 unused .toc entries. */
8607
8608bfd_boolean
33c0ec9d 8609ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8610{
8611 bfd *ibfd;
8612 struct adjust_toc_info toc_inf;
67f0cbdb 8613 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8614
67f0cbdb 8615 htab->do_toc_opt = 1;
c5614fa4 8616 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8617 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8618 {
8619 asection *toc, *sec;
8620 Elf_Internal_Shdr *symtab_hdr;
8621 Elf_Internal_Sym *local_syms;
425b145b 8622 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8623 unsigned long *skip, *drop;
8624 unsigned char *used;
8625 unsigned char *keep, last, some_unused;
8626
854b41e7
AM
8627 if (!is_ppc64_elf (ibfd))
8628 continue;
8629
c5614fa4
AM
8630 toc = bfd_get_section_by_name (ibfd, ".toc");
8631 if (toc == NULL
92b7a70f 8632 || toc->size == 0
dbaa2011
AM
8633 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8634 || discarded_section (toc))
c5614fa4
AM
8635 continue;
8636
425b145b 8637 toc_relocs = NULL;
c5614fa4 8638 local_syms = NULL;
0ffa91dd 8639 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8640
8641 /* Look at sections dropped from the final link. */
8642 skip = NULL;
8643 relstart = NULL;
8644 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8645 {
8646 if (sec->reloc_count == 0
dbaa2011 8647 || !discarded_section (sec)
c5614fa4
AM
8648 || get_opd_info (sec)
8649 || (sec->flags & SEC_ALLOC) == 0
8650 || (sec->flags & SEC_DEBUGGING) != 0)
8651 continue;
8652
8653 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8654 if (relstart == NULL)
8655 goto error_ret;
8656
8657 /* Run through the relocs to see which toc entries might be
8658 unused. */
8659 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8660 {
8661 enum elf_ppc64_reloc_type r_type;
8662 unsigned long r_symndx;
8663 asection *sym_sec;
8664 struct elf_link_hash_entry *h;
8665 Elf_Internal_Sym *sym;
8666 bfd_vma val;
8667
8668 r_type = ELF64_R_TYPE (rel->r_info);
8669 switch (r_type)
8670 {
8671 default:
8672 continue;
8673
8674 case R_PPC64_TOC16:
8675 case R_PPC64_TOC16_LO:
8676 case R_PPC64_TOC16_HI:
8677 case R_PPC64_TOC16_HA:
8678 case R_PPC64_TOC16_DS:
8679 case R_PPC64_TOC16_LO_DS:
8680 break;
8681 }
8682
8683 r_symndx = ELF64_R_SYM (rel->r_info);
8684 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8685 r_symndx, ibfd))
8686 goto error_ret;
8687
8688 if (sym_sec != toc)
8689 continue;
8690
8691 if (h != NULL)
8692 val = h->root.u.def.value;
8693 else
8694 val = sym->st_value;
8695 val += rel->r_addend;
8696
8697 if (val >= toc->size)
8698 continue;
8699
8700 /* Anything in the toc ought to be aligned to 8 bytes.
8701 If not, don't mark as unused. */
8702 if (val & 7)
8703 continue;
8704
8705 if (skip == NULL)
8706 {
854b41e7 8707 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8708 if (skip == NULL)
8709 goto error_ret;
8710 }
8711
ba761f19 8712 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8713 }
8714
8715 if (elf_section_data (sec)->relocs != relstart)
8716 free (relstart);
8717 }
8718
ba761f19
AM
8719 /* For largetoc loads of address constants, we can convert
8720 . addis rx,2,addr@got@ha
8721 . ld ry,addr@got@l(rx)
8722 to
8723 . addis rx,2,addr@toc@ha
8724 . addi ry,rx,addr@toc@l
8725 when addr is within 2G of the toc pointer. This then means
8726 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8727
ba761f19
AM
8728 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8729 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8730 && toc->reloc_count != 0)
8731 {
8732 /* Read toc relocs. */
425b145b
AM
8733 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8734 info->keep_memory);
8735 if (toc_relocs == NULL)
ba761f19
AM
8736 goto error_ret;
8737
425b145b 8738 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8739 {
8740 enum elf_ppc64_reloc_type r_type;
8741 unsigned long r_symndx;
8742 asection *sym_sec;
8743 struct elf_link_hash_entry *h;
8744 Elf_Internal_Sym *sym;
8745 bfd_vma val, addr;
8746
8747 r_type = ELF64_R_TYPE (rel->r_info);
8748 if (r_type != R_PPC64_ADDR64)
8749 continue;
8750
8751 r_symndx = ELF64_R_SYM (rel->r_info);
8752 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8753 r_symndx, ibfd))
8754 goto error_ret;
8755
425b145b 8756 if (sym_sec == NULL
c27b8c2a 8757 || sym_sec->output_section == NULL
dbaa2011 8758 || discarded_section (sym_sec))
425b145b
AM
8759 continue;
8760
afe397ea 8761 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8762 continue;
8763
8764 if (h != NULL)
bddc25c9
AM
8765 {
8766 if (h->type == STT_GNU_IFUNC)
8767 continue;
8768 val = h->root.u.def.value;
8769 }
ba761f19 8770 else
bddc25c9
AM
8771 {
8772 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8773 continue;
8774 val = sym->st_value;
8775 }
ba761f19
AM
8776 val += rel->r_addend;
8777 val += sym_sec->output_section->vma + sym_sec->output_offset;
8778
8779 /* We don't yet know the exact toc pointer value, but we
8780 know it will be somewhere in the toc section. Don't
8781 optimize if the difference from any possible toc
8782 pointer is outside [ff..f80008000, 7fff7fff]. */
8783 addr = toc->output_section->vma + TOC_BASE_OFF;
8784 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8785 continue;
8786
8787 addr = toc->output_section->vma + toc->output_section->rawsize;
8788 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8789 continue;
8790
8791 if (skip == NULL)
8792 {
8793 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8794 if (skip == NULL)
8795 goto error_ret;
8796 }
8797
8798 skip[rel->r_offset >> 3]
425b145b 8799 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8800 }
ba761f19
AM
8801 }
8802
c5614fa4
AM
8803 if (skip == NULL)
8804 continue;
8805
8806 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8807 if (used == NULL)
8808 {
8809 error_ret:
c9594989 8810 if (symtab_hdr->contents != (unsigned char *) local_syms)
c5614fa4
AM
8811 free (local_syms);
8812 if (sec != NULL
c5614fa4
AM
8813 && elf_section_data (sec)->relocs != relstart)
8814 free (relstart);
c9594989 8815 if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 8816 free (toc_relocs);
c9594989 8817 free (skip);
c5614fa4
AM
8818 return FALSE;
8819 }
8820
30038c59
AM
8821 /* Now check all kept sections that might reference the toc.
8822 Check the toc itself last. */
8823 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8824 : ibfd->sections);
c5614fa4 8825 sec != NULL;
c5614fa4 8826 sec = (sec == toc ? NULL
c5614fa4 8827 : sec->next == NULL ? toc
30038c59 8828 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8829 : sec->next))
8830 {
8831 int repeat;
8832
8833 if (sec->reloc_count == 0
dbaa2011 8834 || discarded_section (sec)
c5614fa4
AM
8835 || get_opd_info (sec)
8836 || (sec->flags & SEC_ALLOC) == 0
8837 || (sec->flags & SEC_DEBUGGING) != 0)
8838 continue;
8839
854b41e7
AM
8840 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8841 info->keep_memory);
c5614fa4 8842 if (relstart == NULL)
2915c55b
JK
8843 {
8844 free (used);
8845 goto error_ret;
8846 }
c5614fa4
AM
8847
8848 /* Mark toc entries referenced as used. */
c5614fa4 8849 do
d4f1ee75
AM
8850 {
8851 repeat = 0;
8852 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8853 {
8854 enum elf_ppc64_reloc_type r_type;
8855 unsigned long r_symndx;
8856 asection *sym_sec;
8857 struct elf_link_hash_entry *h;
8858 Elf_Internal_Sym *sym;
8859 bfd_vma val;
98528052 8860
d4f1ee75 8861 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8862 switch (r_type)
8863 {
8864 case R_PPC64_TOC16:
8865 case R_PPC64_TOC16_LO:
8866 case R_PPC64_TOC16_HI:
8867 case R_PPC64_TOC16_HA:
8868 case R_PPC64_TOC16_DS:
8869 case R_PPC64_TOC16_LO_DS:
8870 /* In case we're taking addresses of toc entries. */
8871 case R_PPC64_ADDR64:
8872 break;
c5614fa4 8873
d4f1ee75
AM
8874 default:
8875 continue;
8876 }
c5614fa4 8877
d4f1ee75
AM
8878 r_symndx = ELF64_R_SYM (rel->r_info);
8879 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8880 r_symndx, ibfd))
8881 {
8882 free (used);
8883 goto error_ret;
8884 }
c5614fa4 8885
d4f1ee75
AM
8886 if (sym_sec != toc)
8887 continue;
c5614fa4 8888
d4f1ee75
AM
8889 if (h != NULL)
8890 val = h->root.u.def.value;
8891 else
8892 val = sym->st_value;
8893 val += rel->r_addend;
ba761f19 8894
d4f1ee75
AM
8895 if (val >= toc->size)
8896 continue;
ba761f19 8897
d4f1ee75
AM
8898 if ((skip[val >> 3] & can_optimize) != 0)
8899 {
8900 bfd_vma off;
8901 unsigned char opc;
8902
8903 switch (r_type)
8904 {
8905 case R_PPC64_TOC16_HA:
ba761f19 8906 break;
ba761f19 8907
d4f1ee75
AM
8908 case R_PPC64_TOC16_LO_DS:
8909 off = rel->r_offset;
8910 off += (bfd_big_endian (ibfd) ? -2 : 3);
8911 if (!bfd_get_section_contents (ibfd, sec, &opc,
8912 off, 1))
8913 {
8914 free (used);
8915 goto error_ret;
8916 }
8917 if ((opc & (0x3f << 2)) == (58u << 2))
8918 break;
1a0670f3 8919 /* Fall through. */
ba761f19 8920
d4f1ee75
AM
8921 default:
8922 /* Wrong sort of reloc, or not a ld. We may
8923 as well clear ref_from_discarded too. */
8924 skip[val >> 3] = 0;
8925 }
8926 }
8927
8928 if (sec != toc)
8929 used[val >> 3] = 1;
8930 /* For the toc section, we only mark as used if this
8931 entry itself isn't unused. */
8932 else if ((used[rel->r_offset >> 3]
8933 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8934 && !used[val >> 3])
8935 {
8936 /* Do all the relocs again, to catch reference
8937 chains. */
8938 repeat = 1;
8939 used[val >> 3] = 1;
8940 }
8941 }
8942 }
c5614fa4 8943 while (repeat);
854b41e7
AM
8944
8945 if (elf_section_data (sec)->relocs != relstart)
8946 free (relstart);
c5614fa4
AM
8947 }
8948
8949 /* Merge the used and skip arrays. Assume that TOC
8950 doublewords not appearing as either used or unused belong
de194d85 8951 to an entry more than one doubleword in size. */
c5614fa4
AM
8952 for (drop = skip, keep = used, last = 0, some_unused = 0;
8953 drop < skip + (toc->size + 7) / 8;
8954 ++drop, ++keep)
8955 {
8956 if (*keep)
8957 {
ba761f19
AM
8958 *drop &= ~ref_from_discarded;
8959 if ((*drop & can_optimize) != 0)
8960 some_unused = 1;
c5614fa4
AM
8961 last = 0;
8962 }
b140b010 8963 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8964 {
8965 some_unused = 1;
ba761f19 8966 last = ref_from_discarded;
c5614fa4
AM
8967 }
8968 else
8969 *drop = last;
8970 }
8971
8972 free (used);
8973
8974 if (some_unused)
8975 {
8976 bfd_byte *contents, *src;
8977 unsigned long off;
d62b3684 8978 Elf_Internal_Sym *sym;
ba761f19 8979 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8980
8981 /* Shuffle the toc contents, and at the same time convert the
8982 skip array from booleans into offsets. */
8983 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8984 goto error_ret;
8985
8986 elf_section_data (toc)->this_hdr.contents = contents;
8987
8988 for (src = contents, off = 0, drop = skip;
8989 src < contents + toc->size;
8990 src += 8, ++drop)
8991 {
ba761f19
AM
8992 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8993 off += 8;
c5614fa4
AM
8994 else if (off != 0)
8995 {
8996 *drop = off;
8997 memcpy (src - off, src, 8);
8998 }
8999 }
854b41e7 9000 *drop = off;
c5614fa4
AM
9001 toc->rawsize = toc->size;
9002 toc->size = src - contents - off;
9003
ba761f19
AM
9004 /* Adjust addends for relocs against the toc section sym,
9005 and optimize any accesses we can. */
c5614fa4
AM
9006 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9007 {
9008 if (sec->reloc_count == 0
dbaa2011 9009 || discarded_section (sec))
c5614fa4
AM
9010 continue;
9011
9012 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9013 info->keep_memory);
c5614fa4
AM
9014 if (relstart == NULL)
9015 goto error_ret;
9016
9017 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9018 {
9019 enum elf_ppc64_reloc_type r_type;
9020 unsigned long r_symndx;
9021 asection *sym_sec;
9022 struct elf_link_hash_entry *h;
854b41e7 9023 bfd_vma val;
c5614fa4
AM
9024
9025 r_type = ELF64_R_TYPE (rel->r_info);
9026 switch (r_type)
9027 {
9028 default:
9029 continue;
9030
9031 case R_PPC64_TOC16:
9032 case R_PPC64_TOC16_LO:
9033 case R_PPC64_TOC16_HI:
9034 case R_PPC64_TOC16_HA:
9035 case R_PPC64_TOC16_DS:
9036 case R_PPC64_TOC16_LO_DS:
9037 case R_PPC64_ADDR64:
9038 break;
9039 }
9040
9041 r_symndx = ELF64_R_SYM (rel->r_info);
9042 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9043 r_symndx, ibfd))
9044 goto error_ret;
9045
ba761f19 9046 if (sym_sec != toc)
c5614fa4
AM
9047 continue;
9048
ba761f19
AM
9049 if (h != NULL)
9050 val = h->root.u.def.value;
9051 else
9052 {
9053 val = sym->st_value;
9054 if (val != 0)
9055 local_toc_syms = TRUE;
9056 }
9057
9058 val += rel->r_addend;
854b41e7
AM
9059
9060 if (val > toc->rawsize)
9061 val = toc->rawsize;
ba761f19
AM
9062 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9063 continue;
9064 else if ((skip[val >> 3] & can_optimize) != 0)
9065 {
9066 Elf_Internal_Rela *tocrel
425b145b 9067 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9068 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9069
9070 switch (r_type)
9071 {
9072 case R_PPC64_TOC16_HA:
9073 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9074 break;
9075
9076 case R_PPC64_TOC16_LO_DS:
9077 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9078 break;
9079
9080 default:
28942f62
AM
9081 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9082 ppc_howto_init ();
b140b010 9083 info->callbacks->einfo
695344c0 9084 /* xgettext:c-format */
174d0a74 9085 (_("%H: %s references "
b140b010
AM
9086 "optimized away TOC entry\n"),
9087 ibfd, sec, rel->r_offset,
9088 ppc64_elf_howto_table[r_type]->name);
9089 bfd_set_error (bfd_error_bad_value);
9090 goto error_ret;
ba761f19
AM
9091 }
9092 rel->r_addend = tocrel->r_addend;
9093 elf_section_data (sec)->relocs = relstart;
9094 continue;
9095 }
9096
9097 if (h != NULL || sym->st_value != 0)
9098 continue;
854b41e7
AM
9099
9100 rel->r_addend -= skip[val >> 3];
9101 elf_section_data (sec)->relocs = relstart;
c5614fa4 9102 }
854b41e7
AM
9103
9104 if (elf_section_data (sec)->relocs != relstart)
9105 free (relstart);
c5614fa4
AM
9106 }
9107
9108 /* We shouldn't have local or global symbols defined in the TOC,
9109 but handle them anyway. */
df22d223
AM
9110 if (local_syms != NULL)
9111 for (sym = local_syms;
9112 sym < local_syms + symtab_hdr->sh_info;
9113 ++sym)
9114 if (sym->st_value != 0
9115 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9116 {
9117 unsigned long i;
854b41e7 9118
df22d223
AM
9119 if (sym->st_value > toc->rawsize)
9120 i = toc->rawsize >> 3;
9121 else
9122 i = sym->st_value >> 3;
854b41e7 9123
df22d223
AM
9124 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9125 {
9126 if (local_toc_syms)
4eca0228 9127 _bfd_error_handler
df22d223
AM
9128 (_("%s defined on removed toc entry"),
9129 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9130 do
9131 ++i;
9132 while ((skip[i] & (ref_from_discarded | can_optimize)));
9133 sym->st_value = (bfd_vma) i << 3;
9134 }
d62b3684 9135
df22d223
AM
9136 sym->st_value -= skip[i];
9137 symtab_hdr->contents = (unsigned char *) local_syms;
9138 }
c5614fa4 9139
854b41e7 9140 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9141 if (toc_inf.global_toc_syms)
9142 {
9143 toc_inf.toc = toc;
9144 toc_inf.skip = skip;
9145 toc_inf.global_toc_syms = FALSE;
9146 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9147 &toc_inf);
9148 }
854b41e7
AM
9149
9150 if (toc->reloc_count != 0)
9151 {
d4730f92 9152 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9153 Elf_Internal_Rela *wrel;
9154 bfd_size_type sz;
9155
854b41e7 9156 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9157 if (toc_relocs == NULL)
9158 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9159 info->keep_memory);
9160 if (toc_relocs == NULL)
9161 goto error_ret;
9162
425b145b
AM
9163 wrel = toc_relocs;
9164 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9165 if ((skip[rel->r_offset >> 3]
9166 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9167 {
9168 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9169 wrel->r_info = rel->r_info;
9170 wrel->r_addend = rel->r_addend;
9171 ++wrel;
9172 }
9173 else if (!dec_dynrel_count (rel->r_info, toc, info,
9174 &local_syms, NULL, NULL))
9175 goto error_ret;
9176
425b145b
AM
9177 elf_section_data (toc)->relocs = toc_relocs;
9178 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9179 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9180 sz = rel_hdr->sh_entsize;
9181 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9182 }
c5614fa4 9183 }
c9594989 9184 else if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 9185 free (toc_relocs);
c5614fa4
AM
9186
9187 if (local_syms != NULL
9188 && symtab_hdr->contents != (unsigned char *) local_syms)
9189 {
9190 if (!info->keep_memory)
9191 free (local_syms);
9192 else
9193 symtab_hdr->contents = (unsigned char *) local_syms;
9194 }
9195 free (skip);
9196 }
9197
066f4018 9198 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9199 a GOT relative or PC relative access, possibly reducing the
9200 number of GOT entries. */
066f4018
AM
9201 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9202 {
9203 asection *sec;
9204 Elf_Internal_Shdr *symtab_hdr;
9205 Elf_Internal_Sym *local_syms;
9206 Elf_Internal_Rela *relstart, *rel;
9207 bfd_vma got;
9208
9209 if (!is_ppc64_elf (ibfd))
9210 continue;
9211
903b777d 9212 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9213 continue;
9214
9215 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9216 got = 0;
9217 if (sec != NULL)
9218 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9219
9220 local_syms = NULL;
9221 symtab_hdr = &elf_symtab_hdr (ibfd);
9222
9223 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9224 {
9225 if (sec->reloc_count == 0
903b777d 9226 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9227 || discarded_section (sec))
9228 continue;
9229
9230 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9231 info->keep_memory);
9232 if (relstart == NULL)
9233 {
9234 got_error_ret:
c9594989 9235 if (symtab_hdr->contents != (unsigned char *) local_syms)
066f4018
AM
9236 free (local_syms);
9237 if (sec != NULL
066f4018
AM
9238 && elf_section_data (sec)->relocs != relstart)
9239 free (relstart);
9240 return FALSE;
9241 }
9242
9243 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9244 {
9245 enum elf_ppc64_reloc_type r_type;
9246 unsigned long r_symndx;
9247 Elf_Internal_Sym *sym;
9248 asection *sym_sec;
9249 struct elf_link_hash_entry *h;
9250 struct got_entry *ent;
133a1f60 9251 bfd_vma val, pc;
4a421c53 9252 unsigned char buf[8];
066f4018 9253 unsigned int insn;
903b777d 9254 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9255
9256 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9257 switch (r_type)
9258 {
9259 default:
9260 insn_check = no_check;
9261 break;
9262
9263 case R_PPC64_PLT16_HA:
9264 case R_PPC64_GOT_TLSLD16_HA:
9265 case R_PPC64_GOT_TLSGD16_HA:
9266 case R_PPC64_GOT_TPREL16_HA:
9267 case R_PPC64_GOT_DTPREL16_HA:
9268 case R_PPC64_GOT16_HA:
9269 case R_PPC64_TOC16_HA:
9270 insn_check = check_ha;
9271 break;
9272
9273 case R_PPC64_PLT16_LO:
9274 case R_PPC64_PLT16_LO_DS:
9275 case R_PPC64_GOT_TLSLD16_LO:
9276 case R_PPC64_GOT_TLSGD16_LO:
9277 case R_PPC64_GOT_TPREL16_LO_DS:
9278 case R_PPC64_GOT_DTPREL16_LO_DS:
9279 case R_PPC64_GOT16_LO:
9280 case R_PPC64_GOT16_LO_DS:
9281 case R_PPC64_TOC16_LO:
9282 case R_PPC64_TOC16_LO_DS:
9283 insn_check = check_lo;
9284 break;
9285 }
9286
9287 if (insn_check != no_check)
9288 {
9289 bfd_vma off = rel->r_offset & ~3;
9290
9291 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9292 goto got_error_ret;
9293
9294 insn = bfd_get_32 (ibfd, buf);
9295 if (insn_check == check_lo
9296 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9297 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9298 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9299 {
9300 char str[12];
9301
9302 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9303 sprintf (str, "%#08x", insn);
9304 info->callbacks->einfo
9305 /* xgettext:c-format */
9306 (_("%H: got/toc optimization is not supported for"
9307 " %s instruction\n"),
9308 ibfd, sec, rel->r_offset & ~3, str);
9309 continue;
9310 }
9311 }
9312
066f4018
AM
9313 switch (r_type)
9314 {
bb22a418
AM
9315 /* Note that we don't delete GOT entries for
9316 R_PPC64_GOT16_DS since we'd need a lot more
9317 analysis. For starters, the preliminary layout is
9318 before the GOT, PLT, dynamic sections and stubs are
9319 laid out. Then we'd need to allow for changes in
9320 distance between sections caused by alignment. */
066f4018
AM
9321 default:
9322 continue;
9323
066f4018
AM
9324 case R_PPC64_GOT16_HA:
9325 case R_PPC64_GOT16_LO_DS:
4a421c53 9326 case R_PPC64_GOT_PCREL34:
066f4018
AM
9327 break;
9328 }
9329
9330 r_symndx = ELF64_R_SYM (rel->r_info);
9331 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9332 r_symndx, ibfd))
9333 goto got_error_ret;
9334
6d5554a6
AM
9335 if (sym_sec == NULL
9336 || sym_sec->output_section == NULL
9337 || discarded_section (sym_sec))
9338 continue;
9339
06507dab
AM
9340 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9341 continue;
9342
066f4018
AM
9343 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9344 continue;
9345
9346 if (h != NULL)
9347 val = h->root.u.def.value;
9348 else
9349 val = sym->st_value;
133a1f60 9350 val += rel->r_addend;
066f4018
AM
9351 val += sym_sec->output_section->vma + sym_sec->output_offset;
9352
bb22a418
AM
9353/* Fudge factor to allow for the fact that the preliminary layout
9354 isn't exact. Reduce limits by this factor. */
9355#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9356
066f4018
AM
9357 switch (r_type)
9358 {
9359 default:
9360 continue;
9361
066f4018 9362 case R_PPC64_GOT16_HA:
bb22a418
AM
9363 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9364 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9365 continue;
9366
9367 if (!bfd_get_section_contents (ibfd, sec, buf,
9368 rel->r_offset & ~3, 4))
9369 goto got_error_ret;
9370 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9371 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9372 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9373 continue;
9374 break;
9375
9376 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9377 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9378 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9379 continue;
9380 if (!bfd_get_section_contents (ibfd, sec, buf,
9381 rel->r_offset & ~3, 4))
9382 goto got_error_ret;
9383 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9384 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9385 continue;
9386 break;
4a421c53
AM
9387
9388 case R_PPC64_GOT_PCREL34:
9389 pc = rel->r_offset;
9390 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9391 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9392 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9393 continue;
9394 if (!bfd_get_section_contents (ibfd, sec, buf,
9395 rel->r_offset & ~3, 8))
9396 goto got_error_ret;
9397 insn = bfd_get_32 (ibfd, buf);
9398 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9399 continue;
9400 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9401 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9402 continue;
9403 break;
066f4018 9404 }
bb22a418 9405#undef LIMIT_ADJUST
066f4018
AM
9406
9407 if (h != NULL)
9408 ent = h->got.glist;
9409 else
9410 {
9411 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9412 ent = local_got_ents[r_symndx];
9413 }
9414 for (; ent != NULL; ent = ent->next)
133a1f60 9415 if (ent->addend == rel->r_addend
066f4018
AM
9416 && ent->owner == ibfd
9417 && ent->tls_type == 0)
9418 break;
9419 BFD_ASSERT (ent && ent->got.refcount > 0);
9420 ent->got.refcount -= 1;
9421 }
9422
9423 if (elf_section_data (sec)->relocs != relstart)
9424 free (relstart);
9425 }
9426
9427 if (local_syms != NULL
9428 && symtab_hdr->contents != (unsigned char *) local_syms)
9429 {
9430 if (!info->keep_memory)
9431 free (local_syms);
9432 else
9433 symtab_hdr->contents = (unsigned char *) local_syms;
9434 }
9435 }
9436
c5614fa4
AM
9437 return TRUE;
9438}
9439
1bbe0902
AM
9440/* Return true iff input section I references the TOC using
9441 instructions limited to +/-32k offsets. */
9442
9443bfd_boolean
9444ppc64_elf_has_small_toc_reloc (asection *i)
9445{
9446 return (is_ppc64_elf (i->owner)
9447 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9448}
9449
927be08e
AM
9450/* Allocate space for one GOT entry. */
9451
9452static void
9453allocate_got (struct elf_link_hash_entry *h,
9454 struct bfd_link_info *info,
9455 struct got_entry *gent)
9456{
9457 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9458 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9459 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9460 ? 16 : 8);
9461 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9462 ? 2 : 1) * sizeof (Elf64_External_Rela);
9463 asection *got = ppc64_elf_tdata (gent->owner)->got;
9464
9465 gent->got.offset = got->size;
9466 got->size += entsize;
9467
19e08130 9468 if (h->type == STT_GNU_IFUNC)
927be08e 9469 {
33e44f2e 9470 htab->elf.irelplt->size += rentsize;
19e08130 9471 htab->got_reli_size += rentsize;
927be08e 9472 }
f15d0b54 9473 else if (((bfd_link_pic (info)
f749f26e 9474 && !(gent->tls_type != 0
f15d0b54
AM
9475 && bfd_link_executable (info)
9476 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9477 || (htab->elf.dynamic_sections_created
9478 && h->dynindx != -1
9479 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9480 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9481 {
19e08130 9482 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9483 relgot->size += rentsize;
927be08e
AM
9484 }
9485}
9486
7865406b
AM
9487/* This function merges got entries in the same toc group. */
9488
9489static void
9490merge_got_entries (struct got_entry **pent)
9491{
9492 struct got_entry *ent, *ent2;
9493
9494 for (ent = *pent; ent != NULL; ent = ent->next)
9495 if (!ent->is_indirect)
9496 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9497 if (!ent2->is_indirect
9498 && ent2->addend == ent->addend
9499 && ent2->tls_type == ent->tls_type
9500 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9501 {
9502 ent2->is_indirect = TRUE;
9503 ent2->got.ent = ent;
9504 }
9505}
9506
46434633 9507/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9508
9509static bfd_boolean
46434633
AM
9510ensure_undef_dynamic (struct bfd_link_info *info,
9511 struct elf_link_hash_entry *h)
f0158f44
AM
9512{
9513 struct elf_link_hash_table *htab = elf_hash_table (info);
9514
9515 if (htab->dynamic_sections_created
46434633
AM
9516 && ((info->dynamic_undefined_weak != 0
9517 && h->root.type == bfd_link_hash_undefweak)
9518 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9519 && h->dynindx == -1
9520 && !h->forced_local
9521 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9522 return bfd_elf_link_record_dynamic_symbol (info, h);
9523 return TRUE;
9524}
9525
65f38f15
AM
9526/* Allocate space in .plt, .got and associated reloc sections for
9527 dynamic relocs. */
5bd4f169 9528
b34976b6 9529static bfd_boolean
4ce794b7 9530allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9531{
65f38f15
AM
9532 struct bfd_link_info *info;
9533 struct ppc_link_hash_table *htab;
5bd4f169 9534 asection *s;
65f38f15 9535 struct ppc_link_hash_entry *eh;
0b8bcf0d 9536 struct got_entry **pgent, *gent;
5bd4f169 9537
e92d460e 9538 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9539 return TRUE;
5bd4f169 9540
65f38f15
AM
9541 info = (struct bfd_link_info *) inf;
9542 htab = ppc_hash_table (info);
4dfe6ac6
NC
9543 if (htab == NULL)
9544 return FALSE;
5bd4f169 9545
ed7007c1 9546 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9547 /* Run through the TLS GD got entries first if we're changing them
9548 to TPREL. */
b00a0a86 9549 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9550 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9551 if (gent->got.refcount > 0
9552 && (gent->tls_type & TLS_GD) != 0)
9553 {
9554 /* This was a GD entry that has been converted to TPREL. If
9555 there happens to be a TPREL entry we can use that one. */
9556 struct got_entry *ent;
9557 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9558 if (ent->got.refcount > 0
9559 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9560 && ent->addend == gent->addend
9561 && ent->owner == gent->owner)
951fd09b
AM
9562 {
9563 gent->got.refcount = 0;
9564 break;
9565 }
9566
9567 /* If not, then we'll be using our own TPREL entry. */
9568 if (gent->got.refcount != 0)
9569 gent->tls_type = TLS_TLS | TLS_TPREL;
9570 }
9571
7865406b
AM
9572 /* Remove any list entry that won't generate a word in the GOT before
9573 we call merge_got_entries. Otherwise we risk merging to empty
9574 entries. */
0b8bcf0d
AM
9575 pgent = &h->got.glist;
9576 while ((gent = *pgent) != NULL)
411e1bfb 9577 if (gent->got.refcount > 0)
7865406b
AM
9578 {
9579 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9580 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9581 {
9582 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9583 *pgent = gent->next;
9584 }
9585 else
9586 pgent = &gent->next;
9587 }
9588 else
9589 *pgent = gent->next;
9590
9591 if (!htab->do_multi_toc)
9592 merge_got_entries (&h->got.glist);
9593
9594 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9595 if (!gent->is_indirect)
411e1bfb 9596 {
ec73ddcd
AM
9597 /* Ensure we catch all the cases where this symbol should
9598 be made dynamic. */
46434633 9599 if (!ensure_undef_dynamic (info, h))
f0158f44 9600 return FALSE;
65f38f15 9601
0c8d6e5c 9602 if (!is_ppc64_elf (gent->owner))
927be08e 9603 abort ();
0ffa91dd 9604
927be08e 9605 allocate_got (h, info, gent);
411e1bfb 9606 }
65f38f15 9607
954b63d4
AM
9608 /* If no dynamic sections we can't have dynamic relocs, except for
9609 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9610 if (!htab->elf.dynamic_sections_created
9611 && h->type != STT_GNU_IFUNC)
190eb1dd 9612 h->dyn_relocs = NULL;
8a2058b5 9613
529fe20e
AM
9614 /* Discard relocs on undefined symbols that must be local. */
9615 else if (h->root.type == bfd_link_hash_undefined
9616 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 9617 h->dyn_relocs = NULL;
529fe20e 9618
954b63d4
AM
9619 /* Also discard relocs on undefined weak syms with non-default
9620 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9621 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 9622 h->dyn_relocs = NULL;
954b63d4 9623
190eb1dd 9624 if (h->dyn_relocs != NULL)
65f38f15 9625 {
8a2058b5
AM
9626 struct elf_dyn_relocs *p, **pp;
9627
57e7d118
AM
9628 /* In the shared -Bsymbolic case, discard space allocated for
9629 dynamic pc-relative relocs against symbols which turn out to
9630 be defined in regular objects. For the normal shared case,
9631 discard space for relocs that have become local due to symbol
9632 visibility changes. */
57e7d118 9633 if (bfd_link_pic (info))
65f38f15 9634 {
57e7d118
AM
9635 /* Relocs that use pc_count are those that appear on a call
9636 insn, or certain REL relocs (see must_be_dyn_reloc) that
9637 can be generated via assembly. We want calls to
9638 protected symbols to resolve directly to the function
9639 rather than going via the plt. If people want function
9640 pointer comparisons to work as expected then they should
9641 avoid writing weird assembly. */
9642 if (SYMBOL_CALLS_LOCAL (info, h))
9643 {
190eb1dd 9644 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
57e7d118
AM
9645 {
9646 p->count -= p->pc_count;
9647 p->pc_count = 0;
9648 if (p->count == 0)
9649 *pp = p->next;
9650 else
9651 pp = &p->next;
9652 }
9653 }
65f38f15 9654
190eb1dd 9655 if (h->dyn_relocs != NULL)
5bd4f169 9656 {
ec73ddcd
AM
9657 /* Ensure we catch all the cases where this symbol
9658 should be made dynamic. */
46434633 9659 if (!ensure_undef_dynamic (info, h))
f0158f44 9660 return FALSE;
5bd4f169 9661 }
65f38f15 9662 }
ec73ddcd
AM
9663
9664 /* For a fixed position executable, discard space for
9665 relocs against symbols which are not dynamic. */
9666 else if (h->type != STT_GNU_IFUNC)
57e7d118 9667 {
529fe20e
AM
9668 if (h->dynamic_adjusted
9669 && !h->def_regular
9670 && !ELF_COMMON_DEF_P (h))
f0158f44 9671 {
ec73ddcd
AM
9672 /* Ensure we catch all the cases where this symbol
9673 should be made dynamic. */
46434633 9674 if (!ensure_undef_dynamic (info, h))
f0158f44 9675 return FALSE;
dfbb6ac9 9676
ec73ddcd 9677 /* But if that didn't work out, discard dynamic relocs. */
f0158f44 9678 if (h->dynindx == -1)
190eb1dd 9679 h->dyn_relocs = NULL;
f0158f44
AM
9680 }
9681 else
190eb1dd 9682 h->dyn_relocs = NULL;
57e7d118
AM
9683 }
9684
9685 /* Finally, allocate space. */
190eb1dd 9686 for (p = h->dyn_relocs; p != NULL; p = p->next)
57e7d118
AM
9687 {
9688 asection *sreloc = elf_section_data (p->sec)->sreloc;
9689 if (eh->elf.type == STT_GNU_IFUNC)
9690 sreloc = htab->elf.irelplt;
9691 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9692 }
65f38f15 9693 }
57e7d118 9694
2d7ad24e
AM
9695 /* We might need a PLT entry when the symbol
9696 a) is dynamic, or
9697 b) is an ifunc, or
9698 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9699 d) has plt16 relocs and we are linking statically. */
9700 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9701 || h->type == STT_GNU_IFUNC
9702 || (h->needs_plt && h->dynamic_adjusted)
9703 || (h->needs_plt
9704 && h->def_regular
9705 && !htab->elf.dynamic_sections_created
3e04d765 9706 && !htab->can_convert_all_inline_plt
ed7007c1 9707 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9708 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9709 {
57e7d118
AM
9710 struct plt_entry *pent;
9711 bfd_boolean doneone = FALSE;
9712 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9713 if (pent->plt.refcount > 0)
9714 {
9715 if (!htab->elf.dynamic_sections_created
9716 || h->dynindx == -1)
9717 {
2d7ad24e
AM
9718 if (h->type == STT_GNU_IFUNC)
9719 {
9720 s = htab->elf.iplt;
9721 pent->plt.offset = s->size;
9722 s->size += PLT_ENTRY_SIZE (htab);
9723 s = htab->elf.irelplt;
9724 }
9725 else
9726 {
9727 s = htab->pltlocal;
9728 pent->plt.offset = s->size;
9729 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9730 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9731 }
57e7d118
AM
9732 }
9733 else
9734 {
9735 /* If this is the first .plt entry, make room for the special
9736 first entry. */
9737 s = htab->elf.splt;
9738 if (s->size == 0)
9739 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9740
57e7d118 9741 pent->plt.offset = s->size;
65f38f15 9742
57e7d118
AM
9743 /* Make room for this entry. */
9744 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9745
57e7d118
AM
9746 /* Make room for the .glink code. */
9747 s = htab->glink;
9748 if (s->size == 0)
9e390558 9749 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9750 if (htab->opd_abi)
9751 {
9752 /* We need bigger stubs past index 32767. */
9e390558 9753 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9754 s->size += 4;
9755 s->size += 2*4;
9756 }
9757 else
9758 s->size += 4;
65f38f15 9759
57e7d118
AM
9760 /* We also need to make an entry in the .rela.plt section. */
9761 s = htab->elf.srelplt;
9762 }
2d7ad24e
AM
9763 if (s != NULL)
9764 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9765 doneone = TRUE;
9766 }
9767 else
9768 pent->plt.offset = (bfd_vma) -1;
9769 if (!doneone)
9770 {
9771 h->plt.plist = NULL;
9772 h->needs_plt = 0;
9773 }
65f38f15 9774 }
57e7d118 9775 else
65f38f15 9776 {
57e7d118
AM
9777 h->plt.plist = NULL;
9778 h->needs_plt = 0;
65f38f15
AM
9779 }
9780
b34976b6 9781 return TRUE;
65f38f15
AM
9782}
9783
9e390558
AM
9784#define PPC_LO(v) ((v) & 0xffff)
9785#define PPC_HI(v) (((v) >> 16) & 0xffff)
9786#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9787#define D34(v) \
9788 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9789#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9790
a345bc8d
AM
9791/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9792 to set up space for global entry stubs. These are put in glink,
9793 after the branch table. */
65f38f15 9794
b34976b6 9795static bfd_boolean
a345bc8d 9796size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9797{
a345bc8d
AM
9798 struct bfd_link_info *info;
9799 struct ppc_link_hash_table *htab;
9800 struct plt_entry *pent;
9e390558 9801 asection *s, *plt;
65f38f15 9802
a345bc8d
AM
9803 if (h->root.type == bfd_link_hash_indirect)
9804 return TRUE;
65f38f15 9805
a345bc8d
AM
9806 if (!h->pointer_equality_needed)
9807 return TRUE;
65f38f15 9808
a345bc8d
AM
9809 if (h->def_regular)
9810 return TRUE;
65f38f15 9811
a345bc8d
AM
9812 info = inf;
9813 htab = ppc_hash_table (info);
9814 if (htab == NULL)
9815 return FALSE;
9816
9e390558
AM
9817 s = htab->global_entry;
9818 plt = htab->elf.splt;
a345bc8d
AM
9819 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9820 if (pent->plt.offset != (bfd_vma) -1
9821 && pent->addend == 0)
9822 {
afe397ea
AM
9823 /* For ELFv2, if this symbol is not defined in a regular file
9824 and we are not generating a shared library or pie, then we
9825 need to define the symbol in the executable on a call stub.
9826 This is to avoid text relocations. */
9e390558
AM
9827 bfd_vma off, stub_align, stub_off, stub_size;
9828 unsigned int align_power;
9829
9830 stub_size = 16;
9831 stub_off = s->size;
9832 if (htab->params->plt_stub_align >= 0)
9833 align_power = htab->params->plt_stub_align;
9834 else
9835 align_power = -htab->params->plt_stub_align;
9836 /* Setting section alignment is delayed until we know it is
9837 non-empty. Otherwise the .text output section will be
9838 aligned at least to plt_stub_align even when no global
9839 entry stubs are needed. */
9840 if (s->alignment_power < align_power)
9841 s->alignment_power = align_power;
9842 stub_align = (bfd_vma) 1 << align_power;
9843 if (htab->params->plt_stub_align >= 0
9844 || ((((stub_off + stub_size - 1) & -stub_align)
9845 - (stub_off & -stub_align))
9846 > ((stub_size - 1) & -stub_align)))
9847 stub_off = (stub_off + stub_align - 1) & -stub_align;
9848 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9849 off -= stub_off + s->output_offset + s->output_section->vma;
9850 /* Note that for --plt-stub-align negative we have a possible
9851 dependency between stub offset and size. Break that
9852 dependency by assuming the max stub size when calculating
9853 the stub offset. */
9854 if (PPC_HA (off) == 0)
9855 stub_size -= 4;
8a2058b5 9856 h->root.type = bfd_link_hash_defined;
afe397ea 9857 h->root.u.def.section = s;
9e390558
AM
9858 h->root.u.def.value = stub_off;
9859 s->size = stub_off + stub_size;
a345bc8d
AM
9860 break;
9861 }
9862 return TRUE;
9863}
9864
65f38f15
AM
9865/* Set the sizes of the dynamic sections. */
9866
b34976b6 9867static bfd_boolean
ee67d69a 9868ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9869 struct bfd_link_info *info)
65f38f15
AM
9870{
9871 struct ppc_link_hash_table *htab;
9872 bfd *dynobj;
9873 asection *s;
b34976b6 9874 bfd_boolean relocs;
65f38f15 9875 bfd *ibfd;
7865406b 9876 struct got_entry *first_tlsld;
65f38f15
AM
9877
9878 htab = ppc_hash_table (info);
4dfe6ac6
NC
9879 if (htab == NULL)
9880 return FALSE;
9881
65f38f15
AM
9882 dynobj = htab->elf.dynobj;
9883 if (dynobj == NULL)
9884 abort ();
9885
9886 if (htab->elf.dynamic_sections_created)
9887 {
9888 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9889 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9890 {
3d4d4302 9891 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9892 if (s == NULL)
9893 abort ();
eea6121a 9894 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9895 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9896 }
9897 }
9898
9899 /* Set up .got offsets for local syms, and space for local dynamic
9900 relocs. */
c72f2fb2 9901 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9902 {
411e1bfb
AM
9903 struct got_entry **lgot_ents;
9904 struct got_entry **end_lgot_ents;
e054468f
AM
9905 struct plt_entry **local_plt;
9906 struct plt_entry **end_local_plt;
f961d9dd 9907 unsigned char *lgot_masks;
65f38f15
AM
9908 bfd_size_type locsymcount;
9909 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9910
0c8d6e5c 9911 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9912 continue;
9913
9914 for (s = ibfd->sections; s != NULL; s = s->next)
9915 {
19e08130 9916 struct ppc_dyn_relocs *p;
65f38f15 9917
6edfbbad 9918 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9919 {
ec338859
AM
9920 if (!bfd_is_abs_section (p->sec)
9921 && bfd_is_abs_section (p->sec->output_section))
9922 {
9923 /* Input section has been discarded, either because
9924 it is a copy of a linkonce section or due to
9925 linker script /DISCARD/, so we'll be discarding
9926 the relocs too. */
9927 }
248866a8 9928 else if (p->count != 0)
ec338859 9929 {
19e08130
AM
9930 asection *srel = elf_section_data (p->sec)->sreloc;
9931 if (p->ifunc)
33e44f2e 9932 srel = htab->elf.irelplt;
eea6121a 9933 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9934 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9935 info->flags |= DF_TEXTREL;
ec338859 9936 }
65f38f15
AM
9937 }
9938 }
9939
411e1bfb
AM
9940 lgot_ents = elf_local_got_ents (ibfd);
9941 if (!lgot_ents)
65f38f15
AM
9942 continue;
9943
0ffa91dd 9944 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9945 locsymcount = symtab_hdr->sh_info;
411e1bfb 9946 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9947 local_plt = (struct plt_entry **) end_lgot_ents;
9948 end_local_plt = local_plt + locsymcount;
f961d9dd 9949 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9950 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9951 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9952 {
0b8bcf0d 9953 struct got_entry **pent, *ent;
411e1bfb 9954
0b8bcf0d
AM
9955 pent = lgot_ents;
9956 while ((ent = *pent) != NULL)
411e1bfb
AM
9957 if (ent->got.refcount > 0)
9958 {
e7b938ca 9959 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9960 {
927be08e 9961 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9962 *pent = ent->next;
411e1bfb
AM
9963 }
9964 else
9965 {
19e08130
AM
9966 unsigned int ent_size = 8;
9967 unsigned int rel_size = sizeof (Elf64_External_Rela);
9968
eea6121a 9969 ent->got.offset = s->size;
e7b938ca 9970 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9971 {
19e08130
AM
9972 ent_size *= 2;
9973 rel_size *= 2;
9974 }
9975 s->size += ent_size;
37da22e5 9976 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9977 {
33e44f2e 9978 htab->elf.irelplt->size += rel_size;
19e08130
AM
9979 htab->got_reli_size += rel_size;
9980 }
93370e8e
AM
9981 else if (bfd_link_pic (info)
9982 && !(ent->tls_type != 0
9983 && bfd_link_executable (info)))
19e08130
AM
9984 {
9985 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9986 srel->size += rel_size;
927be08e 9987 }
0b8bcf0d 9988 pent = &ent->next;
411e1bfb
AM
9989 }
9990 }
9991 else
0b8bcf0d 9992 *pent = ent->next;
65f38f15 9993 }
e054468f 9994
2d7ad24e
AM
9995 /* Allocate space for plt calls to local syms. */
9996 lgot_masks = (unsigned char *) end_local_plt;
9997 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9998 {
9999 struct plt_entry *ent;
10000
10001 for (ent = *local_plt; ent != NULL; ent = ent->next)
10002 if (ent->plt.refcount > 0)
10003 {
2d7ad24e
AM
10004 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10005 {
10006 s = htab->elf.iplt;
10007 ent->plt.offset = s->size;
10008 s->size += PLT_ENTRY_SIZE (htab);
10009 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10010 }
3e04d765
AM
10011 else if (htab->can_convert_all_inline_plt
10012 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10013 ent->plt.offset = (bfd_vma) -1;
10014 else
10015 {
10016 s = htab->pltlocal;
10017 ent->plt.offset = s->size;
10018 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10019 if (bfd_link_pic (info))
10020 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10021 }
e054468f
AM
10022 }
10023 else
10024 ent->plt.offset = (bfd_vma) -1;
10025 }
65f38f15
AM
10026 }
10027
10028 /* Allocate global sym .plt and .got entries, and space for global
10029 sym dynamic relocs. */
4ce794b7 10030 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10031
0e1862bb 10032 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10033 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10034
7865406b 10035 first_tlsld = NULL;
c72f2fb2 10036 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10037 {
7865406b
AM
10038 struct got_entry *ent;
10039
0c8d6e5c 10040 if (!is_ppc64_elf (ibfd))
102890f0
AM
10041 continue;
10042
7865406b
AM
10043 ent = ppc64_tlsld_got (ibfd);
10044 if (ent->got.refcount > 0)
102890f0 10045 {
7865406b 10046 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10047 {
7865406b
AM
10048 ent->is_indirect = TRUE;
10049 ent->got.ent = first_tlsld;
10050 }
10051 else
10052 {
10053 if (first_tlsld == NULL)
10054 first_tlsld = ent;
10055 s = ppc64_elf_tdata (ibfd)->got;
10056 ent->got.offset = s->size;
10057 ent->owner = ibfd;
10058 s->size += 16;
f749f26e 10059 if (bfd_link_dll (info))
7865406b
AM
10060 {
10061 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10062 srel->size += sizeof (Elf64_External_Rela);
10063 }
102890f0
AM
10064 }
10065 }
10066 else
7865406b 10067 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10068 }
10069
65f38f15
AM
10070 /* We now have determined the sizes of the various dynamic sections.
10071 Allocate memory for them. */
b34976b6 10072 relocs = FALSE;
65f38f15
AM
10073 for (s = dynobj->sections; s != NULL; s = s->next)
10074 {
10075 if ((s->flags & SEC_LINKER_CREATED) == 0)
10076 continue;
10077
4ce794b7 10078 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10079 /* These haven't been allocated yet; don't strip. */
10080 continue;
33e44f2e
AM
10081 else if (s == htab->elf.sgot
10082 || s == htab->elf.splt
10083 || s == htab->elf.iplt
2d7ad24e 10084 || s == htab->pltlocal
c456f082 10085 || s == htab->glink
9e390558 10086 || s == htab->global_entry
5474d94f
AM
10087 || s == htab->elf.sdynbss
10088 || s == htab->elf.sdynrelro)
65f38f15
AM
10089 {
10090 /* Strip this section if we don't need it; see the
10091 comment below. */
5bd4f169 10092 }
58d180e8
AM
10093 else if (s == htab->glink_eh_frame)
10094 {
10095 if (!bfd_is_abs_section (s->output_section))
10096 /* Not sized yet. */
10097 continue;
10098 }
70cc837d 10099 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10100 {
c456f082 10101 if (s->size != 0)
5bd4f169 10102 {
33e44f2e 10103 if (s != htab->elf.srelplt)
b34976b6 10104 relocs = TRUE;
5bd4f169
AM
10105
10106 /* We use the reloc_count field as a counter if we need
10107 to copy relocs into the output file. */
10108 s->reloc_count = 0;
10109 }
10110 }
65f38f15 10111 else
5bd4f169
AM
10112 {
10113 /* It's not one of our sections, so don't allocate space. */
10114 continue;
10115 }
10116
eea6121a 10117 if (s->size == 0)
5bd4f169 10118 {
c456f082
AM
10119 /* If we don't need this section, strip it from the
10120 output file. This is mostly to handle .rela.bss and
10121 .rela.plt. We must create both sections in
10122 create_dynamic_sections, because they must be created
10123 before the linker maps input sections to output
10124 sections. The linker does that before
10125 adjust_dynamic_symbol is called, and it is that
10126 function which decides whether anything needs to go
10127 into these sections. */
8423293d 10128 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10129 continue;
10130 }
10131
06bcf541
AM
10132 if (bfd_is_abs_section (s->output_section))
10133 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10134 s->name);
10135
c456f082 10136 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10137 continue;
10138
65f38f15
AM
10139 /* Allocate memory for the section contents. We use bfd_zalloc
10140 here in case unused entries are not reclaimed before the
10141 section's contents are written out. This should not happen,
411e1bfb
AM
10142 but this way if it does we get a R_PPC64_NONE reloc in .rela
10143 sections instead of garbage.
10144 We also rely on the section contents being zero when writing
5474d94f 10145 the GOT and .dynrelro. */
eea6121a 10146 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10147 if (s->contents == NULL)
b34976b6 10148 return FALSE;
5bd4f169
AM
10149 }
10150
c72f2fb2 10151 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10152 {
0c8d6e5c 10153 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10154 continue;
10155
e717da7e 10156 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10157 if (s != NULL && s != htab->elf.sgot)
e717da7e 10158 {
eea6121a 10159 if (s->size == 0)
8423293d 10160 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10161 else
10162 {
eea6121a 10163 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10164 if (s->contents == NULL)
10165 return FALSE;
10166 }
10167 }
10168 s = ppc64_elf_tdata (ibfd)->relgot;
10169 if (s != NULL)
10170 {
eea6121a 10171 if (s->size == 0)
8423293d 10172 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10173 else
10174 {
eea6121a 10175 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10176 if (s->contents == NULL)
10177 return FALSE;
10178 relocs = TRUE;
10179 s->reloc_count = 0;
10180 }
10181 }
10182 }
10183
e86ce104 10184 if (htab->elf.dynamic_sections_created)
5bd4f169 10185 {
e8910a83
AM
10186 bfd_boolean tls_opt;
10187
5bd4f169
AM
10188 /* Add some entries to the .dynamic section. We fill in the
10189 values later, in ppc64_elf_finish_dynamic_sections, but we
10190 must add the entries now so that we get the correct size for
10191 the .dynamic section. The DT_DEBUG entry is filled in by the
10192 dynamic linker and used by the debugger. */
dc810e39 10193#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10194 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10195
0e1862bb 10196 if (bfd_link_executable (info))
5bd4f169 10197 {
dc810e39 10198 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10199 return FALSE;
5bd4f169
AM
10200 }
10201
33e44f2e 10202 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10203 {
dc810e39
AM
10204 if (!add_dynamic_entry (DT_PLTGOT, 0)
10205 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10206 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10207 || !add_dynamic_entry (DT_JMPREL, 0)
10208 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10209 return FALSE;
5bd4f169
AM
10210 }
10211
ee67d69a 10212 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10213 {
10214 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10215 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10216 return FALSE;
19397422
AM
10217 }
10218
7c9cf415 10219 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10220 && ((htab->tls_get_addr_fd != NULL
10221 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10222 || (htab->tga_desc_fd != NULL
10223 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10224 if (tls_opt || !htab->opd_abi)
10225 {
10226 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10227 return FALSE;
10228 }
a7f2871e 10229
5bd4f169
AM
10230 if (relocs)
10231 {
dc810e39
AM
10232 if (!add_dynamic_entry (DT_RELA, 0)
10233 || !add_dynamic_entry (DT_RELASZ, 0)
10234 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10235 return FALSE;
5bd4f169 10236
65f38f15
AM
10237 /* If any dynamic relocs apply to a read-only section,
10238 then we need a DT_TEXTREL entry. */
248866a8 10239 if ((info->flags & DF_TEXTREL) == 0)
d49e5065
L
10240 elf_link_hash_traverse (&htab->elf,
10241 _bfd_elf_maybe_set_textrel, info);
5bd4f169 10242
65f38f15 10243 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10244 {
65f38f15 10245 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10246 return FALSE;
5bd4f169 10247 }
5bd4f169 10248 }
5bd4f169 10249 }
65f38f15 10250#undef add_dynamic_entry
5bd4f169 10251
b34976b6 10252 return TRUE;
5bd4f169
AM
10253}
10254
a345bc8d
AM
10255/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10256
10257static bfd_boolean
10258ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10259{
10260 if (h->plt.plist != NULL
10261 && !h->def_regular
10262 && !h->pointer_equality_needed)
10263 return FALSE;
10264
10265 return _bfd_elf_hash_symbol (h);
10266}
10267
721956f4 10268/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10269
4ce794b7
AM
10270static inline enum ppc_stub_type
10271ppc_type_of_stub (asection *input_sec,
10272 const Elf_Internal_Rela *rel,
10273 struct ppc_link_hash_entry **hash,
e054468f 10274 struct plt_entry **plt_ent,
6911b7dc
AM
10275 bfd_vma destination,
10276 unsigned long local_off)
5bd4f169 10277{
721956f4
AM
10278 struct ppc_link_hash_entry *h = *hash;
10279 bfd_vma location;
10280 bfd_vma branch_offset;
10281 bfd_vma max_branch_offset;
4ce794b7 10282 enum elf_ppc64_reloc_type r_type;
5bd4f169 10283
721956f4
AM
10284 if (h != NULL)
10285 {
e054468f 10286 struct plt_entry *ent;
7fe2b9a6 10287 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10288 if (h->oh != NULL
10289 && h->oh->is_func_descriptor)
7b8f6675
AM
10290 {
10291 fdh = ppc_follow_link (h->oh);
10292 *hash = fdh;
10293 }
8387904d 10294
e054468f
AM
10295 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10296 if (ent->addend == rel->r_addend
10297 && ent->plt.offset != (bfd_vma) -1)
10298 {
e054468f
AM
10299 *plt_ent = ent;
10300 return ppc_stub_plt_call;
10301 }
5bd4f169 10302
7fe2b9a6
AM
10303 /* Here, we know we don't have a plt entry. If we don't have a
10304 either a defined function descriptor or a defined entry symbol
10305 in a regular object file, then it is pointless trying to make
10306 any other type of stub. */
854b41e7
AM
10307 if (!is_static_defined (&fdh->elf)
10308 && !is_static_defined (&h->elf))
721956f4 10309 return ppc_stub_none;
5d1634d7 10310 }
e054468f
AM
10311 else if (elf_local_got_ents (input_sec->owner) != NULL)
10312 {
10313 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10314 struct plt_entry **local_plt = (struct plt_entry **)
10315 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10316 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10317
10318 if (local_plt[r_symndx] != NULL)
10319 {
10320 struct plt_entry *ent;
10321
10322 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10323 if (ent->addend == rel->r_addend
10324 && ent->plt.offset != (bfd_vma) -1)
10325 {
10326 *plt_ent = ent;
10327 return ppc_stub_plt_call;
10328 }
10329 }
10330 }
5d1634d7 10331
721956f4
AM
10332 /* Determine where the call point is. */
10333 location = (input_sec->output_offset
10334 + input_sec->output_section->vma
10335 + rel->r_offset);
5d1634d7 10336
721956f4
AM
10337 branch_offset = destination - location;
10338 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10339
721956f4
AM
10340 /* Determine if a long branch stub is needed. */
10341 max_branch_offset = 1 << 25;
23cedd1d
AM
10342 if (r_type == R_PPC64_REL14
10343 || r_type == R_PPC64_REL14_BRTAKEN
10344 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10345 max_branch_offset = 1 << 15;
5d1634d7 10346
6911b7dc 10347 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10348 /* We need a stub. Figure out whether a long_branch or plt_branch
10349 is needed later. */
10350 return ppc_stub_long_branch;
5d1634d7 10351
721956f4 10352 return ppc_stub_none;
5d1634d7
AM
10353}
10354
f891966f
AM
10355/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10356 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10357 . mflr %r12
10358 . bcl 20,31,1f
10359 .1: mflr %r11
10360 . mtlr %r12
05d0e962 10361 . lis %r12,xxx-1b@highest
f891966f 10362 . ori %r12,%r12,xxx-1b@higher
05d0e962 10363 . sldi %r12,%r12,32
f891966f 10364 . oris %r12,%r12,xxx-1b@high
05d0e962 10365 . ori %r12,%r12,xxx-1b@l
f891966f 10366 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10367
10368static bfd_byte *
10369build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10370{
f891966f
AM
10371 bfd_put_32 (abfd, MFLR_R12, p);
10372 p += 4;
10373 bfd_put_32 (abfd, BCL_20_31, p);
10374 p += 4;
10375 bfd_put_32 (abfd, MFLR_R11, p);
10376 p += 4;
10377 bfd_put_32 (abfd, MTLR_R12, p);
10378 p += 4;
05d0e962
AM
10379 if (off + 0x8000 < 0x10000)
10380 {
10381 if (load)
10382 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10383 else
10384 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10385 p += 4;
10386 }
10387 else if (off + 0x80008000ULL < 0x100000000ULL)
10388 {
10389 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10390 p += 4;
10391 if (load)
10392 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10393 else
10394 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10395 p += 4;
10396 }
10397 else
10398 {
10399 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10400 {
10401 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10402 p += 4;
10403 }
10404 else
10405 {
10406 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10407 p += 4;
10408 if (((off >> 32) & 0xffff) != 0)
10409 {
10410 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10411 p += 4;
10412 }
10413 }
10414 if (((off >> 32) & 0xffffffffULL) != 0)
10415 {
10416 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10417 p += 4;
10418 }
10419 if (PPC_HI (off) != 0)
10420 {
10421 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10422 p += 4;
10423 }
10424 if (PPC_LO (off) != 0)
10425 {
10426 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10427 p += 4;
10428 }
10429 if (load)
10430 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10431 else
10432 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10433 p += 4;
10434 }
10435 return p;
10436}
10437
10438static unsigned int
10439size_offset (bfd_vma off)
10440{
10441 unsigned int size;
10442 if (off + 0x8000 < 0x10000)
10443 size = 4;
10444 else if (off + 0x80008000ULL < 0x100000000ULL)
10445 size = 8;
10446 else
10447 {
10448 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10449 size = 4;
10450 else
10451 {
10452 size = 4;
10453 if (((off >> 32) & 0xffff) != 0)
10454 size += 4;
10455 }
10456 if (((off >> 32) & 0xffffffffULL) != 0)
10457 size += 4;
10458 if (PPC_HI (off) != 0)
10459 size += 4;
10460 if (PPC_LO (off) != 0)
10461 size += 4;
10462 size += 4;
10463 }
f891966f 10464 return size + 16;
05d0e962
AM
10465}
10466
3d58e1fc
AM
10467static unsigned int
10468num_relocs_for_offset (bfd_vma off)
10469{
10470 unsigned int num_rel;
10471 if (off + 0x8000 < 0x10000)
10472 num_rel = 1;
10473 else if (off + 0x80008000ULL < 0x100000000ULL)
10474 num_rel = 2;
10475 else
10476 {
10477 num_rel = 1;
10478 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10479 && ((off >> 32) & 0xffff) != 0)
10480 num_rel += 1;
10481 if (PPC_HI (off) != 0)
10482 num_rel += 1;
10483 if (PPC_LO (off) != 0)
10484 num_rel += 1;
10485 }
10486 return num_rel;
10487}
10488
10489static Elf_Internal_Rela *
10490emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10491 bfd_vma roff, bfd_vma targ, bfd_vma off)
10492{
10493 bfd_vma relative_targ = targ - (roff - 8);
10494 if (bfd_big_endian (info->output_bfd))
10495 roff += 2;
10496 r->r_offset = roff;
10497 r->r_addend = relative_targ + roff;
10498 if (off + 0x8000 < 0x10000)
10499 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10500 else if (off + 0x80008000ULL < 0x100000000ULL)
10501 {
10502 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10503 ++r;
10504 roff += 4;
10505 r->r_offset = roff;
10506 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10507 r->r_addend = relative_targ + roff;
10508 }
10509 else
10510 {
10511 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10512 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10513 else
10514 {
10515 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10516 if (((off >> 32) & 0xffff) != 0)
10517 {
10518 ++r;
10519 roff += 4;
10520 r->r_offset = roff;
10521 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10522 r->r_addend = relative_targ + roff;
10523 }
10524 }
10525 if (((off >> 32) & 0xffffffffULL) != 0)
10526 roff += 4;
10527 if (PPC_HI (off) != 0)
10528 {
10529 ++r;
10530 roff += 4;
10531 r->r_offset = roff;
10532 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10533 r->r_addend = relative_targ + roff;
10534 }
10535 if (PPC_LO (off) != 0)
10536 {
10537 ++r;
10538 roff += 4;
10539 r->r_offset = roff;
10540 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10541 r->r_addend = relative_targ + roff;
10542 }
10543 }
10544 return r;
10545}
10546
04bdff6a 10547static bfd_byte *
7c1f4227 10548build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
04bdff6a
AM
10549 bfd_boolean load)
10550{
10551 uint64_t insn;
10552 if (off - odd + (1ULL << 33) < 1ULL << 34)
10553 {
10554 off -= odd;
10555 if (odd)
10556 {
10557 bfd_put_32 (abfd, NOP, p);
10558 p += 4;
10559 }
10560 if (load)
10561 insn = PLD_R12_PC;
10562 else
10563 insn = PADDI_R12_PC;
10564 insn |= D34 (off);
10565 bfd_put_32 (abfd, insn >> 32, p);
10566 p += 4;
10567 bfd_put_32 (abfd, insn, p);
10568 }
10569 /* The minimum value for paddi is -0x200000000. The minimum value
10570 for li is -0x8000, which when shifted by 34 and added gives a
10571 minimum value of -0x2000200000000. The maximum value is
10572 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10573 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10574 {
10575 off -= 8 - odd;
10576 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10577 p += 4;
10578 if (!odd)
10579 {
10580 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10581 p += 4;
10582 }
10583 insn = PADDI_R12_PC | D34 (off);
10584 bfd_put_32 (abfd, insn >> 32, p);
10585 p += 4;
10586 bfd_put_32 (abfd, insn, p);
10587 p += 4;
10588 if (odd)
10589 {
10590 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10591 p += 4;
10592 }
10593 if (load)
10594 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10595 else
10596 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10597 }
10598 else
10599 {
10600 off -= odd + 8;
10601 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10602 p += 4;
10603 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10604 p += 4;
10605 if (odd)
10606 {
10607 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10608 p += 4;
10609 }
10610 insn = PADDI_R12_PC | D34 (off);
10611 bfd_put_32 (abfd, insn >> 32, p);
10612 p += 4;
10613 bfd_put_32 (abfd, insn, p);
10614 p += 4;
10615 if (!odd)
10616 {
10617 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10618 p += 4;
10619 }
10620 if (load)
10621 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10622 else
10623 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10624 }
10625 p += 4;
10626 return p;
10627}
10628
10629static unsigned int
7c1f4227 10630size_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10631{
10632 if (off - odd + (1ULL << 33) < 1ULL << 34)
10633 return odd + 8;
10634 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10635 return 20;
10636 else
10637 return 24;
10638}
10639
10640static unsigned int
7c1f4227 10641num_relocs_for_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10642{
10643 if (off - odd + (1ULL << 33) < 1ULL << 34)
10644 return 1;
10645 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10646 return 2;
10647 else
10648 return 3;
10649}
10650
10651static Elf_Internal_Rela *
7c1f4227 10652emit_relocs_for_power10_offset (struct bfd_link_info *info,
04bdff6a
AM
10653 Elf_Internal_Rela *r, bfd_vma roff,
10654 bfd_vma targ, bfd_vma off, int odd)
10655{
10656 if (off - odd + (1ULL << 33) < 1ULL << 34)
10657 roff += odd;
10658 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10659 {
10660 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10661 r->r_offset = roff + d_offset;
10662 r->r_addend = targ + 8 - odd - d_offset;
10663 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10664 ++r;
10665 roff += 8 - odd;
10666 }
10667 else
10668 {
10669 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10670 r->r_offset = roff + d_offset;
10671 r->r_addend = targ + 8 + odd - d_offset;
10672 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10673 ++r;
10674 roff += 4;
10675 r->r_offset = roff + d_offset;
10676 r->r_addend = targ + 4 + odd - d_offset;
10677 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10678 ++r;
10679 roff += 4 + odd;
10680 }
10681 r->r_offset = roff;
10682 r->r_addend = targ;
10683 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10684 return r;
10685}
10686
df136d64
AM
10687/* Emit .eh_frame opcode to advance pc by DELTA. */
10688
10689static bfd_byte *
10690eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10691{
10692 delta /= 4;
10693 if (delta < 64)
10694 *eh++ = DW_CFA_advance_loc + delta;
10695 else if (delta < 256)
10696 {
10697 *eh++ = DW_CFA_advance_loc1;
10698 *eh++ = delta;
10699 }
10700 else if (delta < 65536)
10701 {
10702 *eh++ = DW_CFA_advance_loc2;
10703 bfd_put_16 (abfd, delta, eh);
10704 eh += 2;
10705 }
10706 else
10707 {
10708 *eh++ = DW_CFA_advance_loc4;
10709 bfd_put_32 (abfd, delta, eh);
10710 eh += 4;
10711 }
10712 return eh;
10713}
10714
10715/* Size of required .eh_frame opcode to advance pc by DELTA. */
10716
10717static unsigned int
10718eh_advance_size (unsigned int delta)
10719{
10720 if (delta < 64 * 4)
10721 /* DW_CFA_advance_loc+[1..63]. */
10722 return 1;
10723 if (delta < 256 * 4)
10724 /* DW_CFA_advance_loc1, byte. */
10725 return 2;
10726 if (delta < 65536 * 4)
10727 /* DW_CFA_advance_loc2, 2 bytes. */
10728 return 3;
10729 /* DW_CFA_advance_loc4, 4 bytes. */
10730 return 5;
10731}
10732
794e51c0
AM
10733/* With power7 weakly ordered memory model, it is possible for ld.so
10734 to update a plt entry in one thread and have another thread see a
10735 stale zero toc entry. To avoid this we need some sort of acquire
10736 barrier in the call stub. One solution is to make the load of the
10737 toc word seem to appear to depend on the load of the function entry
10738 word. Another solution is to test for r2 being zero, and branch to
10739 the appropriate glink entry if so.
10740
10741 . fake dep barrier compare
71a39c98
AM
10742 . ld 12,xxx(2) ld 12,xxx(2)
10743 . mtctr 12 mtctr 12
10744 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10745 . add 2,2,11 cmpldi 2,0
10746 . ld 2,xxx+8(2) bnectr+
10747 . bctr b <glink_entry>
10748
10749 The solution involving the compare turns out to be faster, so
10750 that's what we use unless the branch won't reach. */
10751
10752#define ALWAYS_USE_FAKE_DEP 0
10753#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10754
794e51c0
AM
10755static inline unsigned int
10756plt_stub_size (struct ppc_link_hash_table *htab,
10757 struct ppc_stub_hash_entry *stub_entry,
10758 bfd_vma off)
10759{
05d0e962 10760 unsigned size;
b9e5796b 10761
05d0e962
AM
10762 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10763 {
d3b10ee7 10764 if (htab->params->power10_stubs > 0)
04bdff6a
AM
10765 {
10766 bfd_vma start = (stub_entry->stub_offset
10767 + stub_entry->group->stub_sec->output_offset
10768 + stub_entry->group->stub_sec->output_section->vma);
10769 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10770 start += 4;
7c1f4227 10771 size = 8 + size_power10_offset (off, start & 4);
04bdff6a
AM
10772 }
10773 else
10774 size = 8 + size_offset (off - 8);
05d0e962
AM
10775 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10776 size += 4;
10777 return size;
10778 }
10779
10780 size = 12;
b9e5796b
AM
10781 if (ALWAYS_EMIT_R2SAVE
10782 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10783 size += 4;
10784 if (PPC_HA (off) != 0)
794e51c0 10785 size += 4;
b9e5796b
AM
10786 if (htab->opd_abi)
10787 {
10788 size += 4;
e7d1c40c 10789 if (htab->params->plt_static_chain)
b9e5796b 10790 size += 4;
bd4d2eaa
AM
10791 if (htab->params->plt_thread_safe
10792 && htab->elf.dynamic_sections_created
10793 && stub_entry->h != NULL
10794 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10795 size += 8;
e7d1c40c 10796 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10797 size += 4;
10798 }
794e51c0 10799 if (stub_entry->h != NULL
ed7007c1 10800 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10801 && htab->params->tls_get_addr_opt)
f378ab09 10802 {
9e7028aa
AM
10803 if (htab->params->no_tls_get_addr_regsave)
10804 {
10805 size += 7 * 4;
10806 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10807 size += 6 * 4;
10808 }
10809 else
10810 {
10811 size += 30 * 4;
10812 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10813 size += 4;
10814 }
f378ab09 10815 }
794e51c0
AM
10816 return size;
10817}
10818
2420fff6
AM
10819/* Depending on the sign of plt_stub_align:
10820 If positive, return the padding to align to a 2**plt_stub_align
10821 boundary.
10822 If negative, if this stub would cross fewer 2**plt_stub_align
10823 boundaries if we align, then return the padding needed to do so. */
10824
794e51c0
AM
10825static inline unsigned int
10826plt_stub_pad (struct ppc_link_hash_table *htab,
10827 struct ppc_stub_hash_entry *stub_entry,
10828 bfd_vma plt_off)
10829{
2420fff6 10830 int stub_align;
1aa42141 10831 unsigned stub_size;
6f20ed8a 10832 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10833
2420fff6
AM
10834 if (htab->params->plt_stub_align >= 0)
10835 {
10836 stub_align = 1 << htab->params->plt_stub_align;
10837 if ((stub_off & (stub_align - 1)) != 0)
10838 return stub_align - (stub_off & (stub_align - 1));
10839 return 0;
10840 }
10841
10842 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10843 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10844 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10845 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10846 return stub_align - (stub_off & (stub_align - 1));
10847 return 0;
10848}
10849
10850/* Build a .plt call stub. */
10851
10852static inline bfd_byte *
10853build_plt_stub (struct ppc_link_hash_table *htab,
10854 struct ppc_stub_hash_entry *stub_entry,
10855 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10856{
e7d1c40c 10857 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10858 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10859 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10860 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10861 && htab->elf.dynamic_sections_created
10862 && stub_entry->h != NULL
10863 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10864 bfd_boolean use_fake_dep = plt_thread_safe;
10865 bfd_vma cmp_branch_off = 0;
10866
10867 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10868 && plt_load_toc
794e51c0 10869 && plt_thread_safe
ed7007c1 10870 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10871 && htab->params->tls_get_addr_opt))
794e51c0
AM
10872 {
10873 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10874 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10875 / PLT_ENTRY_SIZE (htab));
9e390558 10876 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10877 bfd_vma to, from;
10878
68d62958
AM
10879 if (pltindex > 32768)
10880 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10881 to = (glinkoff
10882 + htab->glink->output_offset
10883 + htab->glink->output_section->vma);
6f20ed8a 10884 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10885 + 4 * (ALWAYS_EMIT_R2SAVE
10886 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10887 + 4 * (PPC_HA (offset) != 0)
10888 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10889 != PPC_HA (offset))
10890 + 4 * (plt_static_chain != 0)
10891 + 20
6f20ed8a
AM
10892 + stub_entry->group->stub_sec->output_offset
10893 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10894 cmp_branch_off = to - from;
10895 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10896 }
10897
ac2df442
AM
10898 if (PPC_HA (offset) != 0)
10899 {
176a0d42
AM
10900 if (r != NULL)
10901 {
794e51c0
AM
10902 if (ALWAYS_EMIT_R2SAVE
10903 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10904 r[0].r_offset += 4;
176a0d42 10905 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10906 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10907 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10908 r[1].r_addend = r[0].r_addend;
b9e5796b 10909 if (plt_load_toc)
176a0d42 10910 {
b9e5796b 10911 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10912 {
b9e5796b
AM
10913 r[2].r_offset = r[1].r_offset + 4;
10914 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10915 r[2].r_addend = r[0].r_addend;
10916 }
10917 else
10918 {
10919 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10920 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10921 r[2].r_addend = r[0].r_addend + 8;
10922 if (plt_static_chain)
10923 {
10924 r[3].r_offset = r[2].r_offset + 4;
10925 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10926 r[3].r_addend = r[0].r_addend + 16;
10927 }
c7131b65 10928 }
176a0d42
AM
10929 }
10930 }
794e51c0
AM
10931 if (ALWAYS_EMIT_R2SAVE
10932 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10933 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10934 if (plt_load_toc)
10935 {
10936 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10937 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10938 }
10939 else
10940 {
10941 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10942 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10943 }
b9e5796b
AM
10944 if (plt_load_toc
10945 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10946 {
71a39c98 10947 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10948 offset = 0;
10949 }
71a39c98 10950 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10951 if (plt_load_toc)
794e51c0 10952 {
b9e5796b
AM
10953 if (use_fake_dep)
10954 {
10955 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10956 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10957 }
10958 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10959 if (plt_static_chain)
10960 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10961 }
ac2df442
AM
10962 }
10963 else
10964 {
176a0d42
AM
10965 if (r != NULL)
10966 {
794e51c0
AM
10967 if (ALWAYS_EMIT_R2SAVE
10968 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10969 r[0].r_offset += 4;
176a0d42 10970 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10971 if (plt_load_toc)
176a0d42 10972 {
b9e5796b 10973 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10974 {
b9e5796b
AM
10975 r[1].r_offset = r[0].r_offset + 4;
10976 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10977 r[1].r_addend = r[0].r_addend;
10978 }
10979 else
10980 {
10981 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10982 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10983 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10984 if (plt_static_chain)
10985 {
10986 r[2].r_offset = r[1].r_offset + 4;
10987 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10988 r[2].r_addend = r[0].r_addend + 8;
10989 }
c7131b65 10990 }
176a0d42
AM
10991 }
10992 }
794e51c0
AM
10993 if (ALWAYS_EMIT_R2SAVE
10994 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10995 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10996 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10997 if (plt_load_toc
10998 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10999 {
11000 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11001 offset = 0;
11002 }
71a39c98 11003 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11004 if (plt_load_toc)
794e51c0 11005 {
b9e5796b
AM
11006 if (use_fake_dep)
11007 {
11008 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11009 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11010 }
11011 if (plt_static_chain)
11012 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11013 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11014 }
ac2df442 11015 }
b9e5796b 11016 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11017 {
11018 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11019 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11020 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11021 }
11022 else
407aa07c 11023 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11024 return p;
11025}
11026
a7f2871e
AM
11027/* Build a special .plt call stub for __tls_get_addr. */
11028
b9ca1af6 11029#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11030#define LD_R12_0R3 0xe9830000
11031#define MR_R0_R3 0x7c601b78
b9ca1af6 11032#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11033#define ADD_R3_R12_R13 0x7c6c6a14
11034#define BEQLR 0x4d820020
11035#define MR_R3_R0 0x7c030378
a7f2871e 11036#define BCTRL 0x4e800421
a7f2871e
AM
11037
11038static inline bfd_byte *
794e51c0
AM
11039build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11040 struct ppc_stub_hash_entry *stub_entry,
11041 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11042{
e7d1c40c 11043 bfd *obfd = htab->params->stub_bfd;
df136d64 11044 bfd_byte *loc = p;
9e7028aa 11045 unsigned int i;
794e51c0 11046
b9ca1af6 11047 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11048 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11049 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11050 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11051 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11052 bfd_put_32 (obfd, BEQLR, p), p += 4;
11053 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa
AM
11054 if (htab->params->no_tls_get_addr_regsave)
11055 {
11056 if (r != NULL)
11057 r[0].r_offset += 7 * 4;
11058 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11059 return build_plt_stub (htab, stub_entry, p, offset, r);
11060
11061 bfd_put_32 (obfd, MFLR_R0, p);
11062 p += 4;
11063 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11064 p += 4;
11065
11066 if (r != NULL)
11067 r[0].r_offset += 2 * 4;
11068 p = build_plt_stub (htab, stub_entry, p, offset, r);
11069 bfd_put_32 (obfd, BCTRL, p - 4);
11070
11071 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11072 p += 4;
11073 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11074 p += 4;
11075 bfd_put_32 (obfd, MTLR_R0, p);
11076 p += 4;
11077 bfd_put_32 (obfd, BLR, p);
11078 p += 4;
11079 }
11080 else
11081 {
11082 p = tls_get_addr_prologue (obfd, p, htab);
f378ab09 11083
9e7028aa
AM
11084 if (r != NULL)
11085 r[0].r_offset += 18 * 4;
a7f2871e 11086
9e7028aa
AM
11087 p = build_plt_stub (htab, stub_entry, p, offset, r);
11088 bfd_put_32 (obfd, BCTRL, p - 4);
11089
11090 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11091 {
11092 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11093 p += 4;
11094 }
a7f2871e 11095
9e7028aa
AM
11096 p = tls_get_addr_epilogue (obfd, p, htab);
11097 }
a7f2871e 11098
df136d64
AM
11099 if (htab->glink_eh_frame != NULL
11100 && htab->glink_eh_frame->size != 0)
11101 {
11102 bfd_byte *base, *eh;
df136d64
AM
11103
11104 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11105 eh = base + stub_entry->group->eh_size;
9e7028aa
AM
11106 if (htab->params->no_tls_get_addr_regsave)
11107 {
11108 unsigned int lr_used, delta;
11109 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11110 delta = lr_used - stub_entry->group->lr_restore;
11111 stub_entry->group->lr_restore = lr_used + 16;
11112 eh = eh_advance (htab->elf.dynobj, eh, delta);
11113 *eh++ = DW_CFA_offset_extended_sf;
11114 *eh++ = 65;
11115 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11116 *eh++ = DW_CFA_advance_loc + 4;
11117 }
11118 else
11119 {
11120 unsigned int cfa_updt, delta;
11121 /* After the bctrl, lr has been modified so we need to emit
11122 .eh_frame info saying the return address is on the stack. In
11123 fact we must put the EH info at or before the call rather
11124 than after it, because the EH info for a call needs to be
11125 specified by that point.
11126 See libgcc/unwind-dw2.c execute_cfa_program.
11127 Any stack pointer update must be described immediately after
11128 the instruction making the change, and since the stdu occurs
11129 after saving regs we put all the reg saves and the cfa
11130 change there. */
11131 cfa_updt = stub_entry->stub_offset + 18 * 4;
11132 delta = cfa_updt - stub_entry->group->lr_restore;
11133 stub_entry->group->lr_restore
11134 = stub_entry->stub_offset + (p - loc) - 4;
11135 eh = eh_advance (htab->elf.dynobj, eh, delta);
11136 *eh++ = DW_CFA_def_cfa_offset;
11137 if (htab->opd_abi)
11138 {
11139 *eh++ = 128;
11140 *eh++ = 1;
11141 }
11142 else
11143 *eh++ = 96;
11144 *eh++ = DW_CFA_offset_extended_sf;
11145 *eh++ = 65;
11146 *eh++ = (-16 / 8) & 0x7f;
11147 for (i = 4; i < 12; i++)
11148 {
11149 *eh++ = DW_CFA_offset + i;
11150 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11151 }
11152 *eh++ = (DW_CFA_advance_loc
11153 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11154 *eh++ = DW_CFA_def_cfa_offset;
11155 *eh++ = 0;
11156 for (i = 4; i < 12; i++)
11157 *eh++ = DW_CFA_restore + i;
11158 *eh++ = DW_CFA_advance_loc + 2;
11159 }
df136d64
AM
11160 *eh++ = DW_CFA_restore_extended;
11161 *eh++ = 65;
11162 stub_entry->group->eh_size = eh - base;
11163 }
a7f2871e
AM
11164 return p;
11165}
11166
176a0d42
AM
11167static Elf_Internal_Rela *
11168get_relocs (asection *sec, int count)
11169{
11170 Elf_Internal_Rela *relocs;
11171 struct bfd_elf_section_data *elfsec_data;
11172
11173 elfsec_data = elf_section_data (sec);
11174 relocs = elfsec_data->relocs;
11175 if (relocs == NULL)
11176 {
11177 bfd_size_type relsize;
11178 relsize = sec->reloc_count * sizeof (*relocs);
11179 relocs = bfd_alloc (sec->owner, relsize);
11180 if (relocs == NULL)
11181 return NULL;
11182 elfsec_data->relocs = relocs;
d4730f92
BS
11183 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11184 sizeof (Elf_Internal_Shdr));
11185 if (elfsec_data->rela.hdr == NULL)
11186 return NULL;
11187 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11188 * sizeof (Elf64_External_Rela));
11189 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11190 sec->reloc_count = 0;
11191 }
11192 relocs += sec->reloc_count;
11193 sec->reloc_count += count;
11194 return relocs;
11195}
11196
3d58e1fc
AM
11197/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11198 forms, to the equivalent relocs against the global symbol given by
11199 STUB_ENTRY->H. */
11200
11201static bfd_boolean
11202use_global_in_relocs (struct ppc_link_hash_table *htab,
11203 struct ppc_stub_hash_entry *stub_entry,
11204 Elf_Internal_Rela *r, unsigned int num_rel)
11205{
11206 struct elf_link_hash_entry **hashes;
11207 unsigned long symndx;
11208 struct ppc_link_hash_entry *h;
11209 bfd_vma symval;
11210
11211 /* Relocs are always against symbols in their own object file. Fake
11212 up global sym hashes for the stub bfd (which has no symbols). */
11213 hashes = elf_sym_hashes (htab->params->stub_bfd);
11214 if (hashes == NULL)
11215 {
11216 bfd_size_type hsize;
11217
11218 /* When called the first time, stub_globals will contain the
11219 total number of symbols seen during stub sizing. After
11220 allocating, stub_globals is used as an index to fill the
11221 hashes array. */
11222 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11223 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11224 if (hashes == NULL)
11225 return FALSE;
11226 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11227 htab->stub_globals = 1;
11228 }
11229 symndx = htab->stub_globals++;
11230 h = stub_entry->h;
11231 hashes[symndx] = &h->elf;
11232 if (h->oh != NULL && h->oh->is_func)
11233 h = ppc_follow_link (h->oh);
11234 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11235 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11236 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11237 while (num_rel-- != 0)
11238 {
11239 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11240 if (h->elf.root.u.def.section != stub_entry->target_section)
11241 {
11242 /* H is an opd symbol. The addend must be zero, and the
11243 branch reloc is the only one we can convert. */
11244 r->r_addend = 0;
11245 break;
11246 }
11247 else
11248 r->r_addend -= symval;
11249 --r;
11250 }
11251 return TRUE;
11252}
11253
aa374f67 11254static bfd_vma
25f53a85 11255get_r2off (struct bfd_link_info *info,
aa374f67
AM
11256 struct ppc_stub_hash_entry *stub_entry)
11257{
25f53a85 11258 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11259 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11260
11261 if (r2off == 0)
11262 {
11263 /* Support linking -R objects. Get the toc pointer from the
11264 opd entry. */
11265 char buf[8];
b9e5796b
AM
11266 if (!htab->opd_abi)
11267 return r2off;
aa374f67
AM
11268 asection *opd = stub_entry->h->elf.root.u.def.section;
11269 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11270
11271 if (strcmp (opd->name, ".opd") != 0
11272 || opd->reloc_count != 0)
11273 {
2cdcc330
AM
11274 info->callbacks->einfo
11275 (_("%P: cannot find opd entry toc for `%pT'\n"),
11276 stub_entry->h->elf.root.root.string);
aa374f67 11277 bfd_set_error (bfd_error_bad_value);
a7c49797 11278 return (bfd_vma) -1;
aa374f67
AM
11279 }
11280 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11281 return (bfd_vma) -1;
aa374f67 11282 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11283 r2off -= elf_gp (info->output_bfd);
aa374f67 11284 }
6f20ed8a 11285 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11286 return r2off;
11287}
11288
b34976b6 11289static bfd_boolean
4ce794b7 11290ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11291{
721956f4
AM
11292 struct ppc_stub_hash_entry *stub_entry;
11293 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11294 struct bfd_link_info *info;
11295 struct ppc_link_hash_table *htab;
721956f4 11296 bfd_byte *loc;
3d58e1fc 11297 bfd_byte *p, *relp;
1aa42141 11298 bfd_vma targ, off;
176a0d42 11299 Elf_Internal_Rela *r;
e054468f 11300 asection *plt;
3d58e1fc 11301 int num_rel;
04bdff6a 11302 int odd;
5d1634d7 11303
721956f4
AM
11304 /* Massage our args to the form they really have. */
11305 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11306 info = in_arg;
5d1634d7 11307
abf874aa
CL
11308 /* Fail if the target section could not be assigned to an output
11309 section. The user should fix his linker script. */
11310 if (stub_entry->target_section != NULL
11311 && stub_entry->target_section->output_section == NULL
11312 && info->non_contiguous_regions)
53215f21
CL
11313 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11314 "Retry without --enable-non-contiguous-regions.\n"),
11315 stub_entry->target_section);
abf874aa
CL
11316
11317 /* Same for the group. */
11318 if (stub_entry->group->stub_sec != NULL
11319 && stub_entry->group->stub_sec->output_section == NULL
11320 && info->non_contiguous_regions)
53215f21
CL
11321 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11322 "output section. Retry without "
11323 "--enable-non-contiguous-regions.\n"),
11324 stub_entry->group->stub_sec,
11325 stub_entry->target_section);
abf874aa 11326
5d1634d7 11327 htab = ppc_hash_table (info);
4dfe6ac6
NC
11328 if (htab == NULL)
11329 return FALSE;
5d1634d7 11330
1aa42141 11331 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11332 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11333
4ce794b7 11334 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11335 switch (stub_entry->stub_type)
5d1634d7 11336 {
721956f4 11337 case ppc_stub_long_branch:
ad8e1ba5 11338 case ppc_stub_long_branch_r2off:
721956f4 11339 /* Branches are relative. This is where we are going to. */
1aa42141 11340 targ = (stub_entry->target_value
6911b7dc
AM
11341 + stub_entry->target_section->output_offset
11342 + stub_entry->target_section->output_section->vma);
1aa42141 11343 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11344
721956f4 11345 /* And this is where we are coming from. */
1aa42141
AM
11346 off = (stub_entry->stub_offset
11347 + stub_entry->group->stub_sec->output_offset
11348 + stub_entry->group->stub_sec->output_section->vma);
11349 off = targ - off;
e86ce104 11350
9e390558 11351 p = loc;
ac2df442 11352 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11353 {
25f53a85 11354 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11355
a7c49797 11356 if (r2off == (bfd_vma) -1)
aa374f67
AM
11357 {
11358 htab->stub_error = TRUE;
11359 return FALSE;
11360 }
9e390558
AM
11361 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11362 p += 4;
ac2df442
AM
11363 if (PPC_HA (r2off) != 0)
11364 {
e7d1c40c 11365 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11366 ADDIS_R2_R2 | PPC_HA (r2off), p);
11367 p += 4;
a7c49797
AM
11368 }
11369 if (PPC_LO (r2off) != 0)
11370 {
11371 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11372 ADDI_R2_R2 | PPC_LO (r2off), p);
11373 p += 4;
ac2df442 11374 }
9e390558 11375 off -= p - loc;
ad8e1ba5 11376 }
9e390558
AM
11377 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11378 p += 4;
ad8e1ba5 11379
5c3dead3
AM
11380 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11381 {
cf97bcb0
AM
11382 _bfd_error_handler
11383 (_("long branch stub `%s' offset overflow"),
bc30df16 11384 stub_entry->root.string);
5c3dead3
AM
11385 htab->stub_error = TRUE;
11386 return FALSE;
11387 }
ee75fd95
AM
11388
11389 if (info->emitrelocations)
11390 {
6f20ed8a 11391 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11392 if (r == NULL)
11393 return FALSE;
9e390558 11394 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11395 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11396 r->r_addend = targ;
3d58e1fc
AM
11397 if (stub_entry->h != NULL
11398 && !use_global_in_relocs (htab, stub_entry, r, 1))
11399 return FALSE;
ee75fd95 11400 }
721956f4 11401 break;
e86ce104 11402
721956f4 11403 case ppc_stub_plt_branch:
ad8e1ba5 11404 case ppc_stub_plt_branch_r2off:
721956f4
AM
11405 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11406 stub_entry->root.string + 9,
b34976b6 11407 FALSE, FALSE);
721956f4
AM
11408 if (br_entry == NULL)
11409 {
cf97bcb0
AM
11410 _bfd_error_handler (_("can't find branch stub `%s'"),
11411 stub_entry->root.string);
b34976b6
AM
11412 htab->stub_error = TRUE;
11413 return FALSE;
721956f4
AM
11414 }
11415
1aa42141 11416 targ = (stub_entry->target_value
176a0d42
AM
11417 + stub_entry->target_section->output_offset
11418 + stub_entry->target_section->output_section->vma);
6911b7dc 11419 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11420 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11421
1aa42141 11422 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11423 htab->brlt->contents + br_entry->offset);
721956f4 11424
f94498ff 11425 if (br_entry->iter == htab->stub_iteration)
721956f4 11426 {
f94498ff 11427 br_entry->iter = 0;
84f5d08e 11428
f94498ff 11429 if (htab->relbrlt != NULL)
84f5d08e 11430 {
f94498ff
AM
11431 /* Create a reloc for the branch lookup table entry. */
11432 Elf_Internal_Rela rela;
11433 bfd_byte *rl;
11434
11435 rela.r_offset = (br_entry->offset
11436 + htab->brlt->output_offset
11437 + htab->brlt->output_section->vma);
11438 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11439 rela.r_addend = targ;
f94498ff
AM
11440
11441 rl = htab->relbrlt->contents;
11442 rl += (htab->relbrlt->reloc_count++
11443 * sizeof (Elf64_External_Rela));
11444 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11445 }
11446 else if (info->emitrelocations)
11447 {
176a0d42
AM
11448 r = get_relocs (htab->brlt, 1);
11449 if (r == NULL)
11450 return FALSE;
11451 /* brlt, being SEC_LINKER_CREATED does not go through the
11452 normal reloc processing. Symbols and offsets are not
11453 translated from input file to output file form, so
11454 set up the offset per the output file. */
f94498ff
AM
11455 r->r_offset = (br_entry->offset
11456 + htab->brlt->output_offset
11457 + htab->brlt->output_section->vma);
11458 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11459 r->r_addend = targ;
84f5d08e 11460 }
84f5d08e 11461 }
721956f4 11462
1aa42141 11463 targ = (br_entry->offset
176a0d42
AM
11464 + htab->brlt->output_offset
11465 + htab->brlt->output_section->vma);
11466
1aa42141
AM
11467 off = (elf_gp (info->output_bfd)
11468 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11469 off = targ - off;
721956f4 11470
ad8e1ba5 11471 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11472 {
25f53a85 11473 info->callbacks->einfo
c1c8c1ef 11474 (_("%P: linkage table error against `%pT'\n"),
721956f4 11475 stub_entry->root.string);
5d1634d7 11476 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11477 htab->stub_error = TRUE;
11478 return FALSE;
5d1634d7 11479 }
41bd81ab 11480
176a0d42
AM
11481 if (info->emitrelocations)
11482 {
6f20ed8a 11483 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11484 if (r == NULL)
11485 return FALSE;
6f20ed8a 11486 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11487 if (bfd_big_endian (info->output_bfd))
11488 r[0].r_offset += 2;
00f412ee 11489 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11490 r[0].r_offset += 4;
11491 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11492 r[0].r_addend = targ;
176a0d42
AM
11493 if (PPC_HA (off) != 0)
11494 {
11495 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11496 r[1].r_offset = r[0].r_offset + 4;
11497 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11498 r[1].r_addend = r[0].r_addend;
11499 }
11500 }
11501
9e390558 11502 p = loc;
00f412ee 11503 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11504 {
176a0d42 11505 if (PPC_HA (off) != 0)
ac2df442 11506 {
e7d1c40c 11507 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11508 ADDIS_R12_R2 | PPC_HA (off), p);
11509 p += 4;
e7d1c40c 11510 bfd_put_32 (htab->params->stub_bfd,
9e390558 11511 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11512 }
11513 else
9e390558
AM
11514 bfd_put_32 (htab->params->stub_bfd,
11515 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11516 }
11517 else
11518 {
25f53a85 11519 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11520
a7c49797 11521 if (r2off == (bfd_vma) -1)
aa374f67
AM
11522 {
11523 htab->stub_error = TRUE;
11524 return FALSE;
11525 }
ad8e1ba5 11526
9e390558
AM
11527 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11528 p += 4;
176a0d42 11529 if (PPC_HA (off) != 0)
ac2df442 11530 {
e7d1c40c 11531 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11532 ADDIS_R12_R2 | PPC_HA (off), p);
11533 p += 4;
e7d1c40c 11534 bfd_put_32 (htab->params->stub_bfd,
9e390558 11535 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11536 }
11537 else
9e390558 11538 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11539
11540 if (PPC_HA (r2off) != 0)
11541 {
9e390558 11542 p += 4;
e7d1c40c 11543 bfd_put_32 (htab->params->stub_bfd,
9e390558 11544 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11545 }
11546 if (PPC_LO (r2off) != 0)
11547 {
9e390558 11548 p += 4;
e7d1c40c 11549 bfd_put_32 (htab->params->stub_bfd,
9e390558 11550 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11551 }
ad8e1ba5 11552 }
9e390558
AM
11553 p += 4;
11554 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11555 p += 4;
407aa07c
AM
11556 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11557 p += 4;
721956f4 11558 break;
5d1634d7 11559
05d0e962
AM
11560 case ppc_stub_long_branch_notoc:
11561 case ppc_stub_long_branch_both:
11562 case ppc_stub_plt_branch_notoc:
11563 case ppc_stub_plt_branch_both:
11564 case ppc_stub_plt_call_notoc:
11565 case ppc_stub_plt_call_both:
11566 p = loc;
f891966f 11567 off = (stub_entry->stub_offset
05d0e962
AM
11568 + stub_entry->group->stub_sec->output_offset
11569 + stub_entry->group->stub_sec->output_section->vma);
11570 if (stub_entry->stub_type == ppc_stub_long_branch_both
11571 || stub_entry->stub_type == ppc_stub_plt_branch_both
11572 || stub_entry->stub_type == ppc_stub_plt_call_both)
11573 {
11574 off += 4;
11575 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11576 p += 4;
11577 }
11578 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11579 {
11580 targ = stub_entry->plt_ent->plt.offset & ~1;
11581 if (targ >= (bfd_vma) -2)
11582 abort ();
11583
11584 plt = htab->elf.splt;
11585 if (!htab->elf.dynamic_sections_created
11586 || stub_entry->h == NULL
11587 || stub_entry->h->elf.dynindx == -1)
11588 {
11589 if (stub_entry->symtype == STT_GNU_IFUNC)
11590 plt = htab->elf.iplt;
11591 else
11592 plt = htab->pltlocal;
11593 }
11594 targ += plt->output_offset + plt->output_section->vma;
11595 }
11596 else
11597 targ = (stub_entry->target_value
11598 + stub_entry->target_section->output_offset
11599 + stub_entry->target_section->output_section->vma);
04bdff6a 11600 odd = off & 4;
05d0e962 11601 off = targ - off;
f891966f 11602
3d58e1fc
AM
11603 relp = p;
11604 num_rel = 0;
d3b10ee7 11605 if (htab->params->power10_stubs > 0)
04bdff6a
AM
11606 {
11607 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
7c1f4227 11608 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
04bdff6a
AM
11609 }
11610 else
11611 {
11612 /* The notoc stubs calculate their target (either a PLT entry or
11613 the global entry point of a function) relative to the PC
11614 returned by the "bcl" two instructions past the start of the
11615 sequence emitted by build_offset. The offset is therefore 8
11616 less than calculated from the start of the sequence. */
11617 off -= 8;
11618 p = build_offset (htab->params->stub_bfd, p, off,
11619 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11620 }
11621
f891966f 11622 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11623 {
f891966f 11624 bfd_vma from;
3d58e1fc 11625 num_rel = 1;
f891966f
AM
11626 from = (stub_entry->stub_offset
11627 + stub_entry->group->stub_sec->output_offset
11628 + stub_entry->group->stub_sec->output_section->vma
11629 + (p - loc));
05d0e962 11630 bfd_put_32 (htab->params->stub_bfd,
f891966f 11631 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11632 }
11633 else
11634 {
11635 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11636 p += 4;
11637 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11638 }
11639 p += 4;
df136d64 11640
3d58e1fc
AM
11641 if (info->emitrelocations)
11642 {
04bdff6a 11643 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
d3b10ee7 11644 if (htab->params->power10_stubs > 0)
7c1f4227 11645 num_rel += num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
11646 else
11647 {
11648 num_rel += num_relocs_for_offset (off);
11649 roff += 16;
11650 }
3d58e1fc
AM
11651 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11652 if (r == NULL)
11653 return FALSE;
d3b10ee7 11654 if (htab->params->power10_stubs > 0)
7c1f4227 11655 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
04bdff6a
AM
11656 else
11657 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11658 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11659 || stub_entry->stub_type == ppc_stub_long_branch_both)
11660 {
11661 ++r;
11662 roff = p - 4 - stub_entry->group->stub_sec->contents;
11663 r->r_offset = roff;
11664 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11665 r->r_addend = targ;
11666 if (stub_entry->h != NULL
11667 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11668 return FALSE;
11669 }
11670 }
11671
d3b10ee7 11672 if (htab->params->power10_stubs <= 0
04bdff6a
AM
11673 && htab->glink_eh_frame != NULL
11674 && htab->glink_eh_frame->size != 0)
df136d64
AM
11675 {
11676 bfd_byte *base, *eh;
11677 unsigned int lr_used, delta;
11678
11679 base = (htab->glink_eh_frame->contents
11680 + stub_entry->group->eh_base + 17);
11681 eh = base + stub_entry->group->eh_size;
11682 lr_used = stub_entry->stub_offset + 8;
11683 if (stub_entry->stub_type == ppc_stub_long_branch_both
11684 || stub_entry->stub_type == ppc_stub_plt_branch_both
11685 || stub_entry->stub_type == ppc_stub_plt_call_both)
11686 lr_used += 4;
11687 delta = lr_used - stub_entry->group->lr_restore;
11688 stub_entry->group->lr_restore = lr_used + 8;
11689 eh = eh_advance (htab->elf.dynobj, eh, delta);
11690 *eh++ = DW_CFA_register;
11691 *eh++ = 65;
11692 *eh++ = 12;
11693 *eh++ = DW_CFA_advance_loc + 2;
11694 *eh++ = DW_CFA_restore_extended;
11695 *eh++ = 65;
11696 stub_entry->group->eh_size = eh - base;
11697 }
05d0e962
AM
11698 break;
11699
721956f4 11700 case ppc_stub_plt_call:
794e51c0 11701 case ppc_stub_plt_call_r2save:
e054468f 11702 if (stub_entry->h != NULL
b31867b6
AM
11703 && stub_entry->h->is_func_descriptor
11704 && stub_entry->h->oh != NULL)
c862ae31 11705 {
b31867b6
AM
11706 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11707
11708 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11709 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11710 if (fh->elf.root.type == bfd_link_hash_undefined
11711 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11712 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11713 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11714 }
11715
721956f4 11716 /* Now build the stub. */
1aa42141
AM
11717 targ = stub_entry->plt_ent->plt.offset & ~1;
11718 if (targ >= (bfd_vma) -2)
721956f4
AM
11719 abort ();
11720
33e44f2e 11721 plt = htab->elf.splt;
25f23106
AM
11722 if (!htab->elf.dynamic_sections_created
11723 || stub_entry->h == NULL
11724 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11725 {
11726 if (stub_entry->symtype == STT_GNU_IFUNC)
11727 plt = htab->elf.iplt;
11728 else
11729 plt = htab->pltlocal;
11730 }
1aa42141 11731 targ += plt->output_offset + plt->output_section->vma;
e054468f 11732
1aa42141
AM
11733 off = (elf_gp (info->output_bfd)
11734 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11735 off = targ - off;
721956f4 11736
ad8e1ba5 11737 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11738 {
25f53a85 11739 info->callbacks->einfo
695344c0 11740 /* xgettext:c-format */
c1c8c1ef 11741 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11742 stub_entry->h != NULL
11743 ? stub_entry->h->elf.root.root.string
11744 : "<local sym>");
721956f4 11745 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11746 htab->stub_error = TRUE;
11747 return FALSE;
721956f4
AM
11748 }
11749
176a0d42
AM
11750 r = NULL;
11751 if (info->emitrelocations)
11752 {
6f20ed8a 11753 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11754 ((PPC_HA (off) != 0)
11755 + (htab->opd_abi
e7d1c40c 11756 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11757 && PPC_HA (off + 16) == PPC_HA (off))
11758 : 1)));
176a0d42
AM
11759 if (r == NULL)
11760 return FALSE;
6f20ed8a 11761 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11762 if (bfd_big_endian (info->output_bfd))
11763 r[0].r_offset += 2;
1aa42141 11764 r[0].r_addend = targ;
176a0d42 11765 }
a7f2871e 11766 if (stub_entry->h != NULL
ed7007c1 11767 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 11768 && htab->params->tls_get_addr_opt)
794e51c0 11769 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11770 else
794e51c0 11771 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11772 break;
11773
a4b6fadd
AM
11774 case ppc_stub_save_res:
11775 return TRUE;
11776
721956f4
AM
11777 default:
11778 BFD_FAIL ();
b34976b6 11779 return FALSE;
721956f4
AM
11780 }
11781
1aa42141 11782 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11783
e7d1c40c 11784 if (htab->params->emit_stub_syms)
97b639ba
AM
11785 {
11786 struct elf_link_hash_entry *h;
ee75fd95
AM
11787 size_t len1, len2;
11788 char *name;
11789 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11790 "long_branch",
11791 "long_branch",
3f6ff479
AM
11792 "long_branch",
11793 "plt_branch",
ee75fd95 11794 "plt_branch",
05d0e962
AM
11795 "plt_branch",
11796 "plt_branch",
11797 "plt_call",
11798 "plt_call",
794e51c0 11799 "plt_call",
ee75fd95
AM
11800 "plt_call" };
11801
11802 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11803 len2 = strlen (stub_entry->root.string);
11804 name = bfd_malloc (len1 + len2 + 2);
11805 if (name == NULL)
11806 return FALSE;
11807 memcpy (name, stub_entry->root.string, 9);
11808 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11809 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11810 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11811 if (h == NULL)
11812 return FALSE;
11813 if (h->root.type == bfd_link_hash_new)
11814 {
11815 h->root.type = bfd_link_hash_defined;
6f20ed8a 11816 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11817 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11818 h->ref_regular = 1;
11819 h->def_regular = 1;
11820 h->ref_regular_nonweak = 1;
11821 h->forced_local = 1;
11822 h->non_elf = 0;
2ec55de3 11823 h->root.linker_def = 1;
97b639ba
AM
11824 }
11825 }
11826
b34976b6 11827 return TRUE;
721956f4
AM
11828}
11829
11830/* As above, but don't actually build the stub. Just bump offset so
11831 we know stub section sizes, and select plt_branch stubs where
11832 long_branch stubs won't do. */
11833
b34976b6 11834static bfd_boolean
4ce794b7 11835ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11836{
11837 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11838 struct bfd_link_info *info;
721956f4 11839 struct ppc_link_hash_table *htab;
f891966f
AM
11840 asection *plt;
11841 bfd_vma targ, off, r2off;
04bdff6a 11842 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11843
11844 /* Massage our args to the form they really have. */
11845 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11846 info = in_arg;
11847
11848 htab = ppc_hash_table (info);
4dfe6ac6
NC
11849 if (htab == NULL)
11850 return FALSE;
721956f4 11851
abf874aa
CL
11852 /* Fail if the target section could not be assigned to an output
11853 section. The user should fix his linker script. */
11854 if (stub_entry->target_section != NULL
11855 && stub_entry->target_section->output_section == NULL
11856 && info->non_contiguous_regions)
53215f21
CL
11857 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11858 "Retry without --enable-non-contiguous-regions.\n"),
11859 stub_entry->target_section);
abf874aa
CL
11860
11861 /* Same for the group. */
11862 if (stub_entry->group->stub_sec != NULL
11863 && stub_entry->group->stub_sec->output_section == NULL
11864 && info->non_contiguous_regions)
53215f21
CL
11865 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11866 "output section. Retry without "
11867 "--enable-non-contiguous-regions.\n"),
11868 stub_entry->group->stub_sec,
11869 stub_entry->target_section);
abf874aa 11870
1aa42141
AM
11871 /* Make a note of the offset within the stubs for this entry. */
11872 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11873
a4b6fadd
AM
11874 if (stub_entry->h != NULL
11875 && stub_entry->h->save_res
11876 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11877 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11878 {
11879 /* Don't make stubs to out-of-line register save/restore
11880 functions. Instead, emit copies of the functions. */
11881 stub_entry->group->needs_save_res = 1;
11882 stub_entry->stub_type = ppc_stub_save_res;
11883 return TRUE;
11884 }
11885
f891966f 11886 switch (stub_entry->stub_type)
721956f4 11887 {
f891966f
AM
11888 case ppc_stub_plt_branch:
11889 case ppc_stub_plt_branch_r2off:
11890 /* Reset the stub type from the plt branch variant in case we now
11891 can reach with a shorter stub. */
11892 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11893 /* Fall through. */
11894 case ppc_stub_long_branch:
11895 case ppc_stub_long_branch_r2off:
1aa42141
AM
11896 targ = (stub_entry->target_value
11897 + stub_entry->target_section->output_offset
11898 + stub_entry->target_section->output_section->vma);
f891966f 11899 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11900 off = (stub_entry->stub_offset
11901 + stub_entry->group->stub_sec->output_offset
11902 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11903
ad8e1ba5 11904 size = 4;
f891966f 11905 r2off = 0;
ad8e1ba5
AM
11906 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11907 {
25f53a85 11908 r2off = get_r2off (info, stub_entry);
a7c49797 11909 if (r2off == (bfd_vma) -1)
aa374f67
AM
11910 {
11911 htab->stub_error = TRUE;
11912 return FALSE;
11913 }
a7c49797 11914 size = 8;
ac2df442 11915 if (PPC_HA (r2off) != 0)
a7c49797
AM
11916 size += 4;
11917 if (PPC_LO (r2off) != 0)
11918 size += 4;
1aa42141 11919 off += size - 4;
ad8e1ba5 11920 }
1aa42141 11921 off = targ - off;
ad8e1ba5 11922
f891966f
AM
11923 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11924 Do the same for -R objects without function descriptors. */
11925 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11926 && r2off == 0
11927 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11928 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11929 {
f891966f 11930 struct ppc_branch_hash_entry *br_entry;
df136d64 11931
f891966f
AM
11932 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11933 stub_entry->root.string + 9,
11934 TRUE, FALSE);
11935 if (br_entry == NULL)
721956f4 11936 {
f891966f
AM
11937 _bfd_error_handler (_("can't build branch stub `%s'"),
11938 stub_entry->root.string);
11939 htab->stub_error = TRUE;
11940 return FALSE;
721956f4
AM
11941 }
11942
f891966f 11943 if (br_entry->iter != htab->stub_iteration)
721956f4 11944 {
f891966f
AM
11945 br_entry->iter = htab->stub_iteration;
11946 br_entry->offset = htab->brlt->size;
11947 htab->brlt->size += 8;
63bc6f6c 11948
f891966f
AM
11949 if (htab->relbrlt != NULL)
11950 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11951 else if (info->emitrelocations)
84f5d08e 11952 {
f891966f
AM
11953 htab->brlt->reloc_count += 1;
11954 htab->brlt->flags |= SEC_RELOC;
05d0e962 11955 }
f891966f 11956 }
ac2df442 11957
f891966f
AM
11958 targ = (br_entry->offset
11959 + htab->brlt->output_offset
11960 + htab->brlt->output_section->vma);
11961 off = (elf_gp (info->output_bfd)
11962 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11963 off = targ - off;
176a0d42 11964
f891966f
AM
11965 if (info->emitrelocations)
11966 {
11967 stub_entry->group->stub_sec->reloc_count
11968 += 1 + (PPC_HA (off) != 0);
11969 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11970 }
05d0e962 11971
f891966f
AM
11972 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11973 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11974 {
11975 size = 12;
11976 if (PPC_HA (off) != 0)
11977 size = 16;
ac2df442 11978 }
f891966f 11979 else
ac2df442 11980 {
f891966f
AM
11981 size = 16;
11982 if (PPC_HA (off) != 0)
11983 size += 4;
11984
11985 if (PPC_HA (r2off) != 0)
11986 size += 4;
11987 if (PPC_LO (r2off) != 0)
11988 size += 4;
ac2df442 11989 }
721956f4 11990 }
f891966f
AM
11991 else if (info->emitrelocations)
11992 {
11993 stub_entry->group->stub_sec->reloc_count += 1;
11994 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11995 }
11996 break;
11997
11998 case ppc_stub_plt_branch_notoc:
11999 case ppc_stub_plt_branch_both:
12000 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12001 /* Fall through. */
12002 case ppc_stub_long_branch_notoc:
12003 case ppc_stub_long_branch_both:
12004 off = (stub_entry->stub_offset
12005 + stub_entry->group->stub_sec->output_offset
12006 + stub_entry->group->stub_sec->output_section->vma);
12007 size = 0;
12008 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12009 size = 4;
12010 off += size;
12011 targ = (stub_entry->target_value
12012 + stub_entry->target_section->output_offset
12013 + stub_entry->target_section->output_section->vma);
04bdff6a 12014 odd = off & 4;
f891966f
AM
12015 off = targ - off;
12016
3d58e1fc
AM
12017 if (info->emitrelocations)
12018 {
04bdff6a 12019 unsigned int num_rel;
d3b10ee7 12020 if (htab->params->power10_stubs > 0)
7c1f4227 12021 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12022 else
12023 num_rel = num_relocs_for_offset (off - 8);
12024 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12025 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12026 }
12027
d3b10ee7 12028 if (htab->params->power10_stubs > 0)
7c1f4227 12029 extra = size_power10_offset (off, odd);
04bdff6a
AM
12030 else
12031 extra = size_offset (off - 8);
f891966f
AM
12032 /* Include branch insn plus those in the offset sequence. */
12033 size += 4 + extra;
12034 /* The branch insn is at the end, or "extra" bytes along. So
12035 its offset will be "extra" bytes less that that already
12036 calculated. */
12037 off -= extra;
12038
d3b10ee7 12039 if (htab->params->power10_stubs <= 0)
04bdff6a
AM
12040 {
12041 /* After the bcl, lr has been modified so we need to emit
12042 .eh_frame info saying the return address is in r12. */
12043 lr_used = stub_entry->stub_offset + 8;
12044 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12045 lr_used += 4;
12046 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12047 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12048 DW_CFA_restore_extended 65. */
12049 delta = lr_used - stub_entry->group->lr_restore;
12050 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12051 stub_entry->group->lr_restore = lr_used + 8;
12052 }
f891966f
AM
12053
12054 /* If the branch can't reach, use a plt_branch. */
12055 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12056 {
12057 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12058 - ppc_stub_long_branch_notoc);
12059 size += 4;
12060 }
3d58e1fc
AM
12061 else if (info->emitrelocations)
12062 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12063 break;
12064
12065 case ppc_stub_plt_call_notoc:
12066 case ppc_stub_plt_call_both:
12067 off = (stub_entry->stub_offset
12068 + stub_entry->group->stub_sec->output_offset
12069 + stub_entry->group->stub_sec->output_section->vma);
12070 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12071 off += 4;
12072 targ = stub_entry->plt_ent->plt.offset & ~1;
12073 if (targ >= (bfd_vma) -2)
12074 abort ();
12075
12076 plt = htab->elf.splt;
12077 if (!htab->elf.dynamic_sections_created
12078 || stub_entry->h == NULL
12079 || stub_entry->h->elf.dynindx == -1)
12080 {
12081 if (stub_entry->symtype == STT_GNU_IFUNC)
12082 plt = htab->elf.iplt;
12083 else
12084 plt = htab->pltlocal;
12085 }
12086 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 12087 odd = off & 4;
f891966f
AM
12088 off = targ - off;
12089
12090 if (htab->params->plt_stub_align != 0)
12091 {
12092 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12093
12094 stub_entry->group->stub_sec->size += pad;
12095 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12096 off -= pad;
12097 }
12098
3d58e1fc
AM
12099 if (info->emitrelocations)
12100 {
04bdff6a 12101 unsigned int num_rel;
d3b10ee7 12102 if (htab->params->power10_stubs > 0)
7c1f4227 12103 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12104 else
12105 num_rel = num_relocs_for_offset (off - 8);
12106 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12107 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12108 }
12109
f891966f
AM
12110 size = plt_stub_size (htab, stub_entry, off);
12111
d3b10ee7 12112 if (htab->params->power10_stubs <= 0)
04bdff6a
AM
12113 {
12114 /* After the bcl, lr has been modified so we need to emit
12115 .eh_frame info saying the return address is in r12. */
12116 lr_used = stub_entry->stub_offset + 8;
12117 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12118 lr_used += 4;
12119 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12120 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12121 DW_CFA_restore_extended 65. */
12122 delta = lr_used - stub_entry->group->lr_restore;
12123 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12124 stub_entry->group->lr_restore = lr_used + 8;
12125 }
f891966f
AM
12126 break;
12127
12128 case ppc_stub_plt_call:
12129 case ppc_stub_plt_call_r2save:
12130 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12131 if (targ >= (bfd_vma) -2)
12132 abort ();
12133 plt = htab->elf.splt;
12134 if (!htab->elf.dynamic_sections_created
12135 || stub_entry->h == NULL
12136 || stub_entry->h->elf.dynindx == -1)
12137 {
12138 if (stub_entry->symtype == STT_GNU_IFUNC)
12139 plt = htab->elf.iplt;
12140 else
12141 plt = htab->pltlocal;
12142 }
12143 targ += plt->output_offset + plt->output_section->vma;
12144
12145 off = (elf_gp (info->output_bfd)
12146 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12147 off = targ - off;
12148
12149 if (htab->params->plt_stub_align != 0)
12150 {
12151 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12152
12153 stub_entry->group->stub_sec->size += pad;
12154 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12155 }
12156
12157 if (info->emitrelocations)
12158 {
12159 stub_entry->group->stub_sec->reloc_count
12160 += ((PPC_HA (off) != 0)
12161 + (htab->opd_abi
12162 ? 2 + (htab->params->plt_static_chain
12163 && PPC_HA (off + 16) == PPC_HA (off))
12164 : 1));
12165 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12166 }
12167
12168 size = plt_stub_size (htab, stub_entry, off);
12169
12170 if (stub_entry->h != NULL
ed7007c1 12171 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12172 && htab->params->tls_get_addr_opt
12173 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12174 {
9e7028aa
AM
12175 if (htab->params->no_tls_get_addr_regsave)
12176 {
12177 lr_used = stub_entry->stub_offset + size - 20;
12178 /* The eh_frame info will consist of a DW_CFA_advance_loc
12179 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12180 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12181 delta = lr_used - stub_entry->group->lr_restore;
12182 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12183 }
12184 else
12185 {
12186 /* Adjustments to r1 need to be described. */
12187 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12188 delta = cfa_updt - stub_entry->group->lr_restore;
12189 stub_entry->group->eh_size += eh_advance_size (delta);
12190 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12191 }
f891966f
AM
12192 stub_entry->group->lr_restore = size - 4;
12193 }
12194 break;
12195
12196 default:
12197 BFD_FAIL ();
12198 return FALSE;
721956f4
AM
12199 }
12200
6f20ed8a 12201 stub_entry->group->stub_sec->size += size;
b34976b6 12202 return TRUE;
721956f4
AM
12203}
12204
12205/* Set up various things so that we can make a list of input sections
12206 for each output section included in the link. Returns -1 on error,
cedb70c5 12207 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12208
12209int
e7d1c40c 12210ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12211{
6f20ed8a 12212 unsigned int id;
986f0783 12213 size_t amt;
721956f4
AM
12214 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12215
4dfe6ac6
NC
12216 if (htab == NULL)
12217 return -1;
4c52953f 12218
7cf7fcc8 12219 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12220 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12221 htab->sec_info = bfd_zmalloc (amt);
12222 if (htab->sec_info == NULL)
721956f4
AM
12223 return -1;
12224
3d6f9012
AM
12225 /* Set toc_off for com, und, abs and ind sections. */
12226 for (id = 0; id < 3; id++)
6f20ed8a 12227 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12228
721956f4
AM
12229 return 1;
12230}
12231
927be08e
AM
12232/* Set up for first pass at multitoc partitioning. */
12233
12234void
12235ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12236{
12237 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12238
1c865ab2 12239 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12240 htab->toc_bfd = NULL;
12241 htab->toc_first_sec = NULL;
12242}
12243
e717da7e
AM
12244/* The linker repeatedly calls this function for each TOC input section
12245 and linker generated GOT section. Group input bfds such that the toc
927be08e 12246 within a group is less than 64k in size. */
ad8e1ba5 12247
927be08e 12248bfd_boolean
4ce794b7 12249ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12250{
12251 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12252 bfd_vma addr, off, limit;
ad8e1ba5 12253
4dfe6ac6
NC
12254 if (htab == NULL)
12255 return FALSE;
12256
927be08e 12257 if (!htab->second_toc_pass)
4c52953f 12258 {
927be08e 12259 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12260 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12261
12262 if (new_bfd)
bf102f86
AM
12263 {
12264 htab->toc_bfd = isec->owner;
12265 htab->toc_first_sec = isec;
12266 }
927be08e 12267
bf102f86
AM
12268 addr = isec->output_offset + isec->output_section->vma;
12269 off = addr - htab->toc_curr;
d77c8a4b
AM
12270 limit = 0x80008000;
12271 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12272 limit = 0x10000;
12273 if (off + isec->size > limit)
bf102f86
AM
12274 {
12275 addr = (htab->toc_first_sec->output_offset
12276 + htab->toc_first_sec->output_section->vma);
12277 htab->toc_curr = addr;
a27e685f 12278 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12279 }
99877b66 12280
927be08e
AM
12281 /* toc_curr is the base address of this toc group. Set elf_gp
12282 for the input section to be the offset relative to the
12283 output toc base plus 0x8000. Making the input elf_gp an
12284 offset allows us to move the toc as a whole without
12285 recalculating input elf_gp. */
06bcf541 12286 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12287 off += TOC_BASE_OFF;
12288
12289 /* Die if someone uses a linker script that doesn't keep input
12290 file .toc and .got together. */
a4fd3de5
AM
12291 if (new_bfd
12292 && elf_gp (isec->owner) != 0
927be08e
AM
12293 && elf_gp (isec->owner) != off)
12294 return FALSE;
12295
12296 elf_gp (isec->owner) = off;
12297 return TRUE;
4c52953f 12298 }
927be08e
AM
12299
12300 /* During the second pass toc_first_sec points to the start of
12301 a toc group, and toc_curr is used to track the old elf_gp.
12302 We use toc_bfd to ensure we only look at each bfd once. */
12303 if (htab->toc_bfd == isec->owner)
12304 return TRUE;
12305 htab->toc_bfd = isec->owner;
12306
12307 if (htab->toc_first_sec == NULL
12308 || htab->toc_curr != elf_gp (isec->owner))
12309 {
12310 htab->toc_curr = elf_gp (isec->owner);
12311 htab->toc_first_sec = isec;
12312 }
12313 addr = (htab->toc_first_sec->output_offset
12314 + htab->toc_first_sec->output_section->vma);
06bcf541 12315 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12316 elf_gp (isec->owner) = off;
12317
12318 return TRUE;
ad8e1ba5
AM
12319}
12320
927be08e
AM
12321/* Called via elf_link_hash_traverse to merge GOT entries for global
12322 symbol H. */
12323
12324static bfd_boolean
12325merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12326{
12327 if (h->root.type == bfd_link_hash_indirect)
12328 return TRUE;
12329
927be08e
AM
12330 merge_got_entries (&h->got.glist);
12331
12332 return TRUE;
12333}
12334
12335/* Called via elf_link_hash_traverse to allocate GOT entries for global
12336 symbol H. */
12337
12338static bfd_boolean
12339reallocate_got (struct elf_link_hash_entry *h, void *inf)
12340{
12341 struct got_entry *gent;
12342
12343 if (h->root.type == bfd_link_hash_indirect)
12344 return TRUE;
12345
927be08e
AM
12346 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12347 if (!gent->is_indirect)
12348 allocate_got (h, (struct bfd_link_info *) inf, gent);
12349 return TRUE;
12350}
12351
12352/* Called on the first multitoc pass after the last call to
12353 ppc64_elf_next_toc_section. This function removes duplicate GOT
12354 entries. */
12355
12356bfd_boolean
12357ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12358{
12359 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12360 struct bfd *ibfd, *ibfd2;
12361 bfd_boolean done_something;
12362
12363 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12364
7865406b
AM
12365 if (!htab->do_multi_toc)
12366 return FALSE;
12367
d0fae19d 12368 /* Merge global sym got entries within a toc group. */
927be08e
AM
12369 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12370
12371 /* And tlsld_got. */
c72f2fb2 12372 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12373 {
12374 struct got_entry *ent, *ent2;
12375
12376 if (!is_ppc64_elf (ibfd))
12377 continue;
12378
12379 ent = ppc64_tlsld_got (ibfd);
12380 if (!ent->is_indirect
12381 && ent->got.offset != (bfd_vma) -1)
12382 {
c72f2fb2 12383 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12384 {
12385 if (!is_ppc64_elf (ibfd2))
12386 continue;
12387
12388 ent2 = ppc64_tlsld_got (ibfd2);
12389 if (!ent2->is_indirect
12390 && ent2->got.offset != (bfd_vma) -1
12391 && elf_gp (ibfd2) == elf_gp (ibfd))
12392 {
12393 ent2->is_indirect = TRUE;
12394 ent2->got.ent = ent;
12395 }
12396 }
12397 }
12398 }
12399
12400 /* Zap sizes of got sections. */
33e44f2e
AM
12401 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12402 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12403 htab->got_reli_size = 0;
12404
c72f2fb2 12405 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12406 {
12407 asection *got, *relgot;
12408
12409 if (!is_ppc64_elf (ibfd))
12410 continue;
12411
12412 got = ppc64_elf_tdata (ibfd)->got;
12413 if (got != NULL)
12414 {
12415 got->rawsize = got->size;
12416 got->size = 0;
12417 relgot = ppc64_elf_tdata (ibfd)->relgot;
12418 relgot->rawsize = relgot->size;
12419 relgot->size = 0;
12420 }
12421 }
12422
12423 /* Now reallocate the got, local syms first. We don't need to
12424 allocate section contents again since we never increase size. */
c72f2fb2 12425 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12426 {
12427 struct got_entry **lgot_ents;
12428 struct got_entry **end_lgot_ents;
12429 struct plt_entry **local_plt;
12430 struct plt_entry **end_local_plt;
f961d9dd 12431 unsigned char *lgot_masks;
927be08e
AM
12432 bfd_size_type locsymcount;
12433 Elf_Internal_Shdr *symtab_hdr;
19e08130 12434 asection *s;
927be08e
AM
12435
12436 if (!is_ppc64_elf (ibfd))
12437 continue;
12438
12439 lgot_ents = elf_local_got_ents (ibfd);
12440 if (!lgot_ents)
12441 continue;
12442
12443 symtab_hdr = &elf_symtab_hdr (ibfd);
12444 locsymcount = symtab_hdr->sh_info;
12445 end_lgot_ents = lgot_ents + locsymcount;
12446 local_plt = (struct plt_entry **) end_lgot_ents;
12447 end_local_plt = local_plt + locsymcount;
f961d9dd 12448 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12449 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12450 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12451 {
12452 struct got_entry *ent;
12453
12454 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12455 {
19e08130
AM
12456 unsigned int ent_size = 8;
12457 unsigned int rel_size = sizeof (Elf64_External_Rela);
12458
d0fae19d
AM
12459 ent->got.offset = s->size;
12460 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12461 {
19e08130
AM
12462 ent_size *= 2;
12463 rel_size *= 2;
12464 }
12465 s->size += ent_size;
37da22e5 12466 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12467 {
33e44f2e 12468 htab->elf.irelplt->size += rel_size;
19e08130
AM
12469 htab->got_reli_size += rel_size;
12470 }
6a3858a6 12471 else if (bfd_link_pic (info)
f749f26e 12472 && !(ent->tls_type != 0
6a3858a6 12473 && bfd_link_executable (info)))
19e08130
AM
12474 {
12475 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12476 srel->size += rel_size;
d0fae19d
AM
12477 }
12478 }
927be08e
AM
12479 }
12480 }
12481
12482 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12483
c72f2fb2 12484 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12485 {
12486 struct got_entry *ent;
12487
12488 if (!is_ppc64_elf (ibfd))
12489 continue;
12490
12491 ent = ppc64_tlsld_got (ibfd);
12492 if (!ent->is_indirect
12493 && ent->got.offset != (bfd_vma) -1)
12494 {
12495 asection *s = ppc64_elf_tdata (ibfd)->got;
12496 ent->got.offset = s->size;
12497 s->size += 16;
f749f26e 12498 if (bfd_link_dll (info))
927be08e
AM
12499 {
12500 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12501 srel->size += sizeof (Elf64_External_Rela);
12502 }
12503 }
12504 }
12505
33e44f2e 12506 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12507 if (!done_something)
c72f2fb2 12508 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12509 {
12510 asection *got;
12511
12512 if (!is_ppc64_elf (ibfd))
12513 continue;
12514
12515 got = ppc64_elf_tdata (ibfd)->got;
12516 if (got != NULL)
12517 {
12518 done_something = got->rawsize != got->size;
12519 if (done_something)
12520 break;
12521 }
12522 }
12523
12524 if (done_something)
e7d1c40c 12525 (*htab->params->layout_sections_again) ();
927be08e
AM
12526
12527 /* Set up for second pass over toc sections to recalculate elf_gp
12528 on input sections. */
12529 htab->toc_bfd = NULL;
12530 htab->toc_first_sec = NULL;
12531 htab->second_toc_pass = TRUE;
12532 return done_something;
12533}
12534
12535/* Called after second pass of multitoc partitioning. */
12536
12537void
12538ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12539{
12540 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12541
12542 /* After the second pass, toc_curr tracks the TOC offset used
12543 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12544 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12545}
12546
9b5ecbd0
AM
12547/* No toc references were found in ISEC. If the code in ISEC makes no
12548 calls, then there's no need to use toc adjusting stubs when branching
12549 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12550 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12551 needed, and 2 if a cyclical call-graph was found but no other reason
12552 for a stub was detected. If called from the top level, a return of
12553 2 means the same as a return of 0. */
9b5ecbd0
AM
12554
12555static int
4ce794b7 12556toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12557{
9b5ecbd0 12558 int ret;
70cc837d
AM
12559
12560 /* Mark this section as checked. */
12561 isec->call_check_done = 1;
9b5ecbd0 12562
772119ce
AM
12563 /* We know none of our code bearing sections will need toc stubs. */
12564 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12565 return 0;
12566
eea6121a 12567 if (isec->size == 0)
082c50f8
AM
12568 return 0;
12569
4c52953f
AM
12570 if (isec->output_section == NULL)
12571 return 0;
12572
4c52953f 12573 ret = 0;
70cc837d 12574 if (isec->reloc_count != 0)
9b5ecbd0 12575 {
70cc837d
AM
12576 Elf_Internal_Rela *relstart, *rel;
12577 Elf_Internal_Sym *local_syms;
12578 struct ppc_link_hash_table *htab;
2917689a 12579
70cc837d
AM
12580 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12581 info->keep_memory);
12582 if (relstart == NULL)
12583 return -1;
90aecf7a 12584
70cc837d
AM
12585 /* Look for branches to outside of this section. */
12586 local_syms = NULL;
12587 htab = ppc_hash_table (info);
12588 if (htab == NULL)
12589 return -1;
4c52953f 12590
70cc837d 12591 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12592 {
70cc837d
AM
12593 enum elf_ppc64_reloc_type r_type;
12594 unsigned long r_symndx;
12595 struct elf_link_hash_entry *h;
12596 struct ppc_link_hash_entry *eh;
12597 Elf_Internal_Sym *sym;
12598 asection *sym_sec;
12599 struct _opd_sec_data *opd;
12600 bfd_vma sym_value;
12601 bfd_vma dest;
12602
12603 r_type = ELF64_R_TYPE (rel->r_info);
12604 if (r_type != R_PPC64_REL24
05d0e962 12605 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12606 && r_type != R_PPC64_REL14
12607 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12608 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12609 && r_type != R_PPC64_PLTCALL
12610 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12611 continue;
4c52953f 12612
70cc837d
AM
12613 r_symndx = ELF64_R_SYM (rel->r_info);
12614 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12615 isec->owner))
4c52953f 12616 {
70cc837d
AM
12617 ret = -1;
12618 break;
12619 }
4c52953f 12620
70cc837d
AM
12621 /* Calls to dynamic lib functions go through a plt call stub
12622 that uses r2. */
ed7007c1 12623 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12624 if (eh != NULL
12625 && (eh->elf.plt.plist != NULL
12626 || (eh->oh != NULL
12627 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12628 {
12629 ret = 1;
12630 break;
4c52953f
AM
12631 }
12632
70cc837d
AM
12633 if (sym_sec == NULL)
12634 /* Ignore other undefined symbols. */
4c52953f 12635 continue;
4c52953f 12636
70cc837d
AM
12637 /* Assume branches to other sections not included in the
12638 link need stubs too, to cover -R and absolute syms. */
12639 if (sym_sec->output_section == NULL)
12640 {
12641 ret = 1;
12642 break;
12643 }
4c52953f 12644
70cc837d
AM
12645 if (h == NULL)
12646 sym_value = sym->st_value;
12647 else
12648 {
12649 if (h->root.type != bfd_link_hash_defined
12650 && h->root.type != bfd_link_hash_defweak)
12651 abort ();
12652 sym_value = h->root.u.def.value;
12653 }
12654 sym_value += rel->r_addend;
4c52953f 12655
70cc837d
AM
12656 /* If this branch reloc uses an opd sym, find the code section. */
12657 opd = get_opd_info (sym_sec);
12658 if (opd != NULL)
12659 {
12660 if (h == NULL && opd->adjust != NULL)
12661 {
12662 long adjust;
4c52953f 12663
92a9c616 12664 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12665 if (adjust == -1)
12666 /* Assume deleted functions won't ever be called. */
12667 continue;
12668 sym_value += adjust;
12669 }
4c52953f 12670
aef36ac1
AM
12671 dest = opd_entry_value (sym_sec, sym_value,
12672 &sym_sec, NULL, FALSE);
70cc837d
AM
12673 if (dest == (bfd_vma) -1)
12674 continue;
12675 }
12676 else
12677 dest = (sym_value
12678 + sym_sec->output_offset
12679 + sym_sec->output_section->vma);
4c52953f 12680
70cc837d
AM
12681 /* Ignore branch to self. */
12682 if (sym_sec == isec)
12683 continue;
4c52953f 12684
70cc837d
AM
12685 /* If the called function uses the toc, we need a stub. */
12686 if (sym_sec->has_toc_reloc
12687 || sym_sec->makes_toc_func_call)
4c52953f 12688 {
70cc837d 12689 ret = 1;
4c52953f
AM
12690 break;
12691 }
70cc837d
AM
12692
12693 /* Assume any branch that needs a long branch stub might in fact
12694 need a plt_branch stub. A plt_branch stub uses r2. */
12695 else if (dest - (isec->output_offset
12696 + isec->output_section->vma
6911b7dc
AM
12697 + rel->r_offset) + (1 << 25)
12698 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12699 ? h->other
12700 : sym->st_other))
4c52953f 12701 {
70cc837d
AM
12702 ret = 1;
12703 break;
12704 }
12705
12706 /* If calling back to a section in the process of being
12707 tested, we can't say for sure that no toc adjusting stubs
12708 are needed, so don't return zero. */
12709 else if (sym_sec->call_check_in_progress)
12710 ret = 2;
12711
12712 /* Branches to another section that itself doesn't have any TOC
12713 references are OK. Recursively call ourselves to check. */
12714 else if (!sym_sec->call_check_done)
12715 {
12716 int recur;
12717
12718 /* Mark current section as indeterminate, so that other
12719 sections that call back to current won't be marked as
12720 known. */
12721 isec->call_check_in_progress = 1;
12722 recur = toc_adjusting_stub_needed (info, sym_sec);
12723 isec->call_check_in_progress = 0;
12724
4c52953f
AM
12725 if (recur != 0)
12726 {
70cc837d
AM
12727 ret = recur;
12728 if (recur != 2)
12729 break;
4c52953f
AM
12730 }
12731 }
4c52953f 12732 }
70cc837d 12733
c9594989
AM
12734 if (elf_symtab_hdr (isec->owner).contents
12735 != (unsigned char *) local_syms)
70cc837d
AM
12736 free (local_syms);
12737 if (elf_section_data (isec)->relocs != relstart)
12738 free (relstart);
9b5ecbd0
AM
12739 }
12740
70cc837d
AM
12741 if ((ret & 1) == 0
12742 && isec->map_head.s != NULL
12743 && (strcmp (isec->output_section->name, ".init") == 0
12744 || strcmp (isec->output_section->name, ".fini") == 0))
12745 {
12746 if (isec->map_head.s->has_toc_reloc
12747 || isec->map_head.s->makes_toc_func_call)
12748 ret = 1;
12749 else if (!isec->map_head.s->call_check_done)
12750 {
12751 int recur;
12752 isec->call_check_in_progress = 1;
12753 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12754 isec->call_check_in_progress = 0;
12755 if (recur != 0)
12756 ret = recur;
12757 }
12758 }
12759
12760 if (ret == 1)
12761 isec->makes_toc_func_call = 1;
4c52953f 12762
9b5ecbd0
AM
12763 return ret;
12764}
12765
721956f4
AM
12766/* The linker repeatedly calls this function for each input section,
12767 in the order that input sections are linked into output sections.
12768 Build lists of input sections to determine groupings between which
12769 we may insert linker stubs. */
12770
9b5ecbd0 12771bfd_boolean
4ce794b7 12772ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12773{
12774 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12775
4dfe6ac6
NC
12776 if (htab == NULL)
12777 return FALSE;
12778
734b6cf9 12779 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12780 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12781 {
3d6f9012
AM
12782 /* This happens to make the list in reverse order,
12783 which is what we want. */
6f20ed8a
AM
12784 htab->sec_info[isec->id].u.list
12785 = htab->sec_info[isec->output_section->id].u.list;
12786 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12787 }
ad8e1ba5 12788
4c52953f 12789 if (htab->multi_toc_needed)
9b5ecbd0 12790 {
8b974ba3
AM
12791 /* Analyse sections that aren't already flagged as needing a
12792 valid toc pointer. Exclude .fixup for the linux kernel.
12793 .fixup contains branches, but only back to the function that
12794 hit an exception. */
12795 if (!(isec->has_toc_reloc
12796 || (isec->flags & SEC_CODE) == 0
12797 || strcmp (isec->name, ".fixup") == 0
12798 || isec->call_check_done))
12799 {
12800 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12801 return FALSE;
8b974ba3
AM
12802 }
12803 /* Make all sections use the TOC assigned for this object file.
12804 This will be wrong for pasted sections; We fix that in
12805 check_pasted_section(). */
12806 if (elf_gp (isec->owner) != 0)
12807 htab->toc_curr = elf_gp (isec->owner);
12808 }
12809
6f20ed8a 12810 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12811 return TRUE;
721956f4
AM
12812}
12813
70cc837d
AM
12814/* Check that all .init and .fini sections use the same toc, if they
12815 have toc relocs. */
12816
12817static bfd_boolean
12818check_pasted_section (struct bfd_link_info *info, const char *name)
12819{
12820 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12821
12822 if (o != NULL)
12823 {
12824 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12825 bfd_vma toc_off = 0;
12826 asection *i;
12827
12828 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12829 if (i->has_toc_reloc)
12830 {
12831 if (toc_off == 0)
6f20ed8a
AM
12832 toc_off = htab->sec_info[i->id].toc_off;
12833 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12834 return FALSE;
12835 }
6683a28d
AM
12836
12837 if (toc_off == 0)
12838 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12839 if (i->makes_toc_func_call)
12840 {
6f20ed8a 12841 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12842 break;
12843 }
12844
70cc837d
AM
12845 /* Make sure the whole pasted function uses the same toc offset. */
12846 if (toc_off != 0)
12847 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12848 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12849 }
12850 return TRUE;
12851}
12852
12853bfd_boolean
12854ppc64_elf_check_init_fini (struct bfd_link_info *info)
12855{
12856 return (check_pasted_section (info, ".init")
12857 & check_pasted_section (info, ".fini"));
12858}
12859
721956f4
AM
12860/* See whether we can group stub sections together. Grouping stub
12861 sections may result in fewer stubs. More importantly, we need to
12862 put all .init* and .fini* stubs at the beginning of the .init or
12863 .fini output sections respectively, because glibc splits the
12864 _init and _fini functions into multiple parts. Putting a stub in
12865 the middle of a function is not a good idea. */
12866
6f20ed8a
AM
12867static bfd_boolean
12868group_sections (struct bfd_link_info *info,
4ce794b7
AM
12869 bfd_size_type stub_group_size,
12870 bfd_boolean stubs_always_before_branch)
721956f4 12871{
6f20ed8a
AM
12872 struct ppc_link_hash_table *htab;
12873 asection *osec;
7c8fe5c4
AM
12874 bfd_boolean suppress_size_errors;
12875
6f20ed8a
AM
12876 htab = ppc_hash_table (info);
12877 if (htab == NULL)
12878 return FALSE;
12879
7c8fe5c4 12880 suppress_size_errors = FALSE;
7c8fe5c4
AM
12881 if (stub_group_size == 1)
12882 {
12883 /* Default values. */
12884 if (stubs_always_before_branch)
09f92717 12885 stub_group_size = 0x1e00000;
7c8fe5c4 12886 else
09f92717 12887 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12888 suppress_size_errors = TRUE;
12889 }
12890
6f20ed8a 12891 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12892 {
6f20ed8a
AM
12893 asection *tail;
12894
12895 if (osec->id >= htab->sec_info_arr_size)
12896 continue;
12897
12898 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12899 while (tail != NULL)
721956f4 12900 {
734b6cf9
AM
12901 asection *curr;
12902 asection *prev;
12903 bfd_size_type total;
12904 bfd_boolean big_sec;
12905 bfd_vma curr_toc;
6f20ed8a 12906 struct map_stub *group;
09f92717 12907 bfd_size_type group_size;
734b6cf9
AM
12908
12909 curr = tail;
eea6121a 12910 total = tail->size;
09f92717
AM
12911 group_size = (ppc64_elf_section_data (tail) != NULL
12912 && ppc64_elf_section_data (tail)->has_14bit_branch
12913 ? stub_group_size >> 10 : stub_group_size);
12914
12915 big_sec = total > group_size;
7c8fe5c4 12916 if (big_sec && !suppress_size_errors)
695344c0 12917 /* xgettext:c-format */
871b3ab2 12918 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12919 tail->owner, tail);
6f20ed8a 12920 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12921
6f20ed8a 12922 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12923 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12924 < (ppc64_elf_section_data (prev) != NULL
12925 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12926 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12927 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12928 curr = prev;
12929
12930 /* OK, the size from the start of CURR to the end is less
09f92717 12931 than group_size and thus can be handled by one stub
734b6cf9 12932 section. (or the tail section is itself larger than
09f92717
AM
12933 group_size, in which case we may be toast.) We should
12934 really be keeping track of the total size of stubs added
12935 here, as stubs contribute to the final output section
12936 size. That's a little tricky, and this way will only
12937 break if stubs added make the total size more than 2^25,
12938 ie. for the default stub_group_size, if stubs total more
12939 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12940 group = bfd_alloc (curr->owner, sizeof (*group));
12941 if (group == NULL)
12942 return FALSE;
12943 group->link_sec = curr;
12944 group->stub_sec = NULL;
a4b6fadd 12945 group->needs_save_res = 0;
df136d64
AM
12946 group->lr_restore = 0;
12947 group->eh_size = 0;
12948 group->eh_base = 0;
a4b6fadd
AM
12949 group->next = htab->group;
12950 htab->group = group;
734b6cf9 12951 do
721956f4 12952 {
6f20ed8a 12953 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12954 /* Set up this stub group. */
6f20ed8a 12955 htab->sec_info[tail->id].u.group = group;
721956f4 12956 }
734b6cf9
AM
12957 while (tail != curr && (tail = prev) != NULL);
12958
09f92717 12959 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12960 bytes before the stub section can be handled by it too.
12961 Don't do this if we have a really large section after the
12962 stubs, as adding more stubs increases the chance that
12963 branches may not reach into the stub section. */
12964 if (!stubs_always_before_branch && !big_sec)
12965 {
12966 total = 0;
12967 while (prev != NULL
12968 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12969 < (ppc64_elf_section_data (prev) != NULL
12970 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12971 ? (group_size = stub_group_size >> 10)
12972 : group_size))
6f20ed8a 12973 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12974 {
12975 tail = prev;
6f20ed8a
AM
12976 prev = htab->sec_info[tail->id].u.list;
12977 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12978 }
12979 }
12980 tail = prev;
721956f4
AM
12981 }
12982 }
6f20ed8a 12983 return TRUE;
721956f4
AM
12984}
12985
58d180e8
AM
12986static const unsigned char glink_eh_frame_cie[] =
12987{
12988 0, 0, 0, 16, /* length. */
12989 0, 0, 0, 0, /* id. */
12990 1, /* CIE version. */
12991 'z', 'R', 0, /* Augmentation string. */
12992 4, /* Code alignment. */
12993 0x78, /* Data alignment. */
12994 65, /* RA reg. */
12995 1, /* Augmentation size. */
12996 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12997 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12998};
12999
d969d15f
AM
13000/* Stripping output sections is normally done before dynamic section
13001 symbols have been allocated. This function is called later, and
13002 handles cases like htab->brlt which is mapped to its own output
13003 section. */
13004
13005static void
13006maybe_strip_output (struct bfd_link_info *info, asection *isec)
13007{
13008 if (isec->size == 0
13009 && isec->output_section->size == 0
53d8967a 13010 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13011 && !bfd_section_removed_from_list (info->output_bfd,
13012 isec->output_section)
13013 && elf_section_data (isec->output_section)->dynindx == 0)
13014 {
13015 isec->output_section->flags |= SEC_EXCLUDE;
13016 bfd_section_list_remove (info->output_bfd, isec->output_section);
13017 info->output_bfd->section_count--;
13018 }
13019}
13020
721956f4
AM
13021/* Determine and set the size of the stub section for a final link.
13022
13023 The basic idea here is to examine all the relocations looking for
13024 PC-relative calls to a target that is unreachable with a "bl"
13025 instruction. */
13026
b34976b6 13027bfd_boolean
e7d1c40c 13028ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13029{
13030 bfd_size_type stub_group_size;
b34976b6 13031 bfd_boolean stubs_always_before_branch;
721956f4
AM
13032 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13033
4dfe6ac6
NC
13034 if (htab == NULL)
13035 return FALSE;
13036
0e1862bb 13037 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13038 htab->params->plt_thread_safe = 1;
b9e5796b 13039 if (!htab->opd_abi)
e7d1c40c
AM
13040 htab->params->plt_thread_safe = 0;
13041 else if (htab->params->plt_thread_safe == -1)
794e51c0 13042 {
e2458743 13043 static const char *const thread_starter[] =
794e51c0
AM
13044 {
13045 "pthread_create",
13046 /* libstdc++ */
13047 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13048 /* librt */
13049 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13050 "mq_notify", "create_timer",
13051 /* libanl */
13052 "getaddrinfo_a",
13053 /* libgomp */
2300b5a1 13054 "GOMP_parallel",
794e51c0 13055 "GOMP_parallel_start",
2300b5a1 13056 "GOMP_parallel_loop_static",
794e51c0 13057 "GOMP_parallel_loop_static_start",
2300b5a1 13058 "GOMP_parallel_loop_dynamic",
794e51c0 13059 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13060 "GOMP_parallel_loop_guided",
794e51c0 13061 "GOMP_parallel_loop_guided_start",
2300b5a1 13062 "GOMP_parallel_loop_runtime",
794e51c0 13063 "GOMP_parallel_loop_runtime_start",
2300b5a1 13064 "GOMP_parallel_sections",
68ffbac6 13065 "GOMP_parallel_sections_start",
f9dffbf0
AM
13066 /* libgo */
13067 "__go_go",
794e51c0
AM
13068 };
13069 unsigned i;
13070
a4b6fadd 13071 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13072 {
13073 struct elf_link_hash_entry *h;
13074 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13075 FALSE, FALSE, TRUE);
e7d1c40c
AM
13076 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13077 if (htab->params->plt_thread_safe)
794e51c0
AM
13078 break;
13079 }
13080 }
e7d1c40c
AM
13081 stubs_always_before_branch = htab->params->group_size < 0;
13082 if (htab->params->group_size < 0)
13083 stub_group_size = -htab->params->group_size;
721956f4 13084 else
e7d1c40c 13085 stub_group_size = htab->params->group_size;
721956f4 13086
6f20ed8a
AM
13087 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13088 return FALSE;
721956f4 13089
a804e476
AM
13090 htab->tga_group = NULL;
13091 if (!htab->params->no_tls_get_addr_regsave
13092 && htab->tga_desc_fd != NULL
13093 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13094 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13095 && htab->tls_get_addr_fd != NULL
13096 && is_static_defined (&htab->tls_get_addr_fd->elf))
13097 {
13098 asection *sym_sec, *code_sec, *stub_sec;
13099 bfd_vma sym_value;
13100 struct _opd_sec_data *opd;
13101
13102 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13103 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13104 code_sec = sym_sec;
13105 opd = get_opd_info (sym_sec);
13106 if (opd != NULL)
13107 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13108 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13109 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13110 htab->tga_group->link_sec);
13111 if (stub_sec == NULL)
13112 return FALSE;
13113 htab->tga_group->stub_sec = stub_sec;
13114
13115 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13116 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13117 htab->tga_desc_fd->elf.root.u.def.value = 0;
13118 htab->tga_desc_fd->elf.type = STT_FUNC;
13119 htab->tga_desc_fd->elf.def_regular = 1;
13120 htab->tga_desc_fd->elf.non_elf = 0;
13121 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13122 }
13123
c9301e31
AM
13124#define STUB_SHRINK_ITER 20
13125 /* Loop until no stubs added. After iteration 20 of this loop we may
13126 exit on a stub section shrinking. This is to break out of a
13127 pathological case where adding stubs on one iteration decreases
13128 section gaps (perhaps due to alignment), which then requires
13129 fewer or smaller stubs on the next iteration. */
13130
721956f4
AM
13131 while (1)
13132 {
13133 bfd *input_bfd;
13134 unsigned int bfd_indx;
a4b6fadd 13135 struct map_stub *group;
721956f4
AM
13136
13137 htab->stub_iteration += 1;
721956f4
AM
13138
13139 for (input_bfd = info->input_bfds, bfd_indx = 0;
13140 input_bfd != NULL;
c72f2fb2 13141 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13142 {
13143 Elf_Internal_Shdr *symtab_hdr;
13144 asection *section;
6cdc0ccc 13145 Elf_Internal_Sym *local_syms = NULL;
721956f4 13146
0c8d6e5c 13147 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13148 continue;
13149
721956f4 13150 /* We'll need the symbol table in a second. */
0ffa91dd 13151 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13152 if (symtab_hdr->sh_info == 0)
13153 continue;
13154
721956f4
AM
13155 /* Walk over each section attached to the input bfd. */
13156 for (section = input_bfd->sections;
13157 section != NULL;
13158 section = section->next)
13159 {
721956f4 13160 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13161
13162 /* If there aren't any relocs, then there's nothing more
13163 to do. */
13164 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13165 || (section->flags & SEC_ALLOC) == 0
13166 || (section->flags & SEC_LOAD) == 0
13167 || (section->flags & SEC_CODE) == 0
721956f4
AM
13168 || section->reloc_count == 0)
13169 continue;
13170
13171 /* If this section is a link-once section that will be
13172 discarded, then don't create any stubs. */
13173 if (section->output_section == NULL
927be08e 13174 || section->output_section->owner != info->output_bfd)
721956f4
AM
13175 continue;
13176
1e2f5b6e
AM
13177 /* Get the relocs. */
13178 internal_relocs
4ce794b7 13179 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13180 info->keep_memory);
721956f4 13181 if (internal_relocs == NULL)
1e2f5b6e 13182 goto error_ret_free_local;
721956f4
AM
13183
13184 /* Now examine each relocation. */
13185 irela = internal_relocs;
13186 irelaend = irela + section->reloc_count;
13187 for (; irela < irelaend; irela++)
13188 {
4ce794b7
AM
13189 enum elf_ppc64_reloc_type r_type;
13190 unsigned int r_indx;
721956f4
AM
13191 enum ppc_stub_type stub_type;
13192 struct ppc_stub_hash_entry *stub_entry;
8387904d 13193 asection *sym_sec, *code_sec;
e054468f 13194 bfd_vma sym_value, code_value;
721956f4 13195 bfd_vma destination;
6911b7dc 13196 unsigned long local_off;
8843416a 13197 bfd_boolean ok_dest;
721956f4 13198 struct ppc_link_hash_entry *hash;
8387904d 13199 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13200 struct elf_link_hash_entry *h;
13201 Elf_Internal_Sym *sym;
721956f4
AM
13202 char *stub_name;
13203 const asection *id_sec;
74f0fb50 13204 struct _opd_sec_data *opd;
e054468f 13205 struct plt_entry *plt_ent;
721956f4
AM
13206
13207 r_type = ELF64_R_TYPE (irela->r_info);
13208 r_indx = ELF64_R_SYM (irela->r_info);
13209
4ce794b7 13210 if (r_type >= R_PPC64_max)
721956f4
AM
13211 {
13212 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13213 goto error_ret_free_internal;
721956f4
AM
13214 }
13215
13216 /* Only look for stubs on branch instructions. */
4ce794b7 13217 if (r_type != R_PPC64_REL24
05d0e962 13218 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13219 && r_type != R_PPC64_REL14
13220 && r_type != R_PPC64_REL14_BRTAKEN
13221 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13222 continue;
13223
13224 /* Now determine the call target, its name, value,
13225 section. */
411e1bfb
AM
13226 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13227 r_indx, input_bfd))
13228 goto error_ret_free_internal;
ed7007c1 13229 hash = ppc_elf_hash_entry (h);
411e1bfb 13230
8843416a 13231 ok_dest = FALSE;
8387904d 13232 fdh = NULL;
7fe2b9a6 13233 sym_value = 0;
411e1bfb 13234 if (hash == NULL)
721956f4 13235 {
411e1bfb 13236 sym_value = sym->st_value;
c27b8c2a
AM
13237 if (sym_sec != NULL
13238 && sym_sec->output_section != NULL)
13239 ok_dest = TRUE;
721956f4 13240 }
7fe2b9a6
AM
13241 else if (hash->elf.root.type == bfd_link_hash_defined
13242 || hash->elf.root.type == bfd_link_hash_defweak)
13243 {
13244 sym_value = hash->elf.root.u.def.value;
13245 if (sym_sec->output_section != NULL)
13246 ok_dest = TRUE;
13247 }
13248 else if (hash->elf.root.type == bfd_link_hash_undefweak
13249 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13250 {
99877b66 13251 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13252 use the func descriptor sym instead if it is
13253 defined. */
ceb1f1ef 13254 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13255 && hash->oh != NULL)
8387904d 13256 {
8c5b4e52 13257 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13258 if (fdh->elf.root.type == bfd_link_hash_defined
13259 || fdh->elf.root.type == bfd_link_hash_defweak)
13260 {
13261 sym_sec = fdh->elf.root.u.def.section;
13262 sym_value = fdh->elf.root.u.def.value;
13263 if (sym_sec->output_section != NULL)
13264 ok_dest = TRUE;
13265 }
99877b66
AM
13266 else
13267 fdh = NULL;
8387904d 13268 }
7fe2b9a6
AM
13269 }
13270 else
13271 {
13272 bfd_set_error (bfd_error_bad_value);
13273 goto error_ret_free_internal;
721956f4
AM
13274 }
13275
8843416a 13276 destination = 0;
6911b7dc 13277 local_off = 0;
8843416a
AM
13278 if (ok_dest)
13279 {
13280 sym_value += irela->r_addend;
13281 destination = (sym_value
13282 + sym_sec->output_offset
13283 + sym_sec->output_section->vma);
6911b7dc
AM
13284 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13285 ? hash->elf.other
13286 : sym->st_other);
8843416a
AM
13287 }
13288
8387904d 13289 code_sec = sym_sec;
e054468f 13290 code_value = sym_value;
74f0fb50
AM
13291 opd = get_opd_info (sym_sec);
13292 if (opd != NULL)
8387904d
AM
13293 {
13294 bfd_vma dest;
13295
74f0fb50 13296 if (hash == NULL && opd->adjust != NULL)
8387904d 13297 {
51aecdc5 13298 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13299 if (adjust == -1)
13300 continue;
e054468f 13301 code_value += adjust;
8387904d
AM
13302 sym_value += adjust;
13303 }
13304 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13305 &code_sec, &code_value, FALSE);
8387904d
AM
13306 if (dest != (bfd_vma) -1)
13307 {
13308 destination = dest;
13309 if (fdh != NULL)
13310 {
13311 /* Fixup old ABI sym to point at code
13312 entry. */
99877b66 13313 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13314 hash->elf.root.u.def.section = code_sec;
e054468f 13315 hash->elf.root.u.def.value = code_value;
8387904d
AM
13316 }
13317 }
13318 }
13319
721956f4 13320 /* Determine what (if any) linker stub is needed. */
e054468f 13321 plt_ent = NULL;
721956f4 13322 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13323 &plt_ent, destination,
13324 local_off);
ad8e1ba5 13325
05d0e962
AM
13326 if (r_type == R_PPC64_REL24_NOTOC)
13327 {
13328 if (stub_type == ppc_stub_plt_call)
13329 stub_type = ppc_stub_plt_call_notoc;
13330 else if (stub_type == ppc_stub_long_branch
13331 || (code_sec != NULL
13332 && code_sec->output_section != NULL
13333 && (((hash ? hash->elf.other : sym->st_other)
13334 & STO_PPC64_LOCAL_MASK)
4a4e7361 13335 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13336 stub_type = ppc_stub_long_branch_notoc;
13337 }
13338 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13339 {
13340 /* Check whether we need a TOC adjusting stub.
13341 Since the linker pastes together pieces from
13342 different object files when creating the
13343 _init and _fini functions, it may be that a
13344 call to what looks like a local sym is in
13345 fact a call needing a TOC adjustment. */
33cb30a1
AM
13346 if ((code_sec != NULL
13347 && code_sec->output_section != NULL
13348 && (htab->sec_info[code_sec->id].toc_off
13349 != htab->sec_info[section->id].toc_off)
13350 && (code_sec->has_toc_reloc
13351 || code_sec->makes_toc_func_call))
13352 || (((hash ? hash->elf.other : sym->st_other)
13353 & STO_PPC64_LOCAL_MASK)
13354 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13355 stub_type = ppc_stub_long_branch_r2off;
13356 }
13357
721956f4
AM
13358 if (stub_type == ppc_stub_none)
13359 continue;
13360
411e1bfb
AM
13361 /* __tls_get_addr calls might be eliminated. */
13362 if (stub_type != ppc_stub_plt_call
05d0e962 13363 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13364 && hash != NULL
ed7007c1 13365 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13366 && section->has_tls_reloc
13367 && irela != internal_relocs)
13368 {
13369 /* Get tls info. */
f961d9dd 13370 unsigned char *tls_mask;
411e1bfb 13371
3a71aa26 13372 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13373 irela - 1, input_bfd))
13374 goto error_ret_free_internal;
abc489c6
AM
13375 if ((*tls_mask & TLS_TLS) != 0
13376 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13377 continue;
13378 }
13379
f378ab09 13380 if (stub_type == ppc_stub_plt_call)
794e51c0 13381 {
6e1816be
AM
13382 if (!htab->opd_abi
13383 && htab->params->plt_localentry0 != 0
13384 && is_elfv2_localentry0 (&hash->elf))
13385 htab->has_plt_localentry0 = 1;
13386 else if (irela + 1 < irelaend
13387 && irela[1].r_offset == irela->r_offset + 4
13388 && (ELF64_R_TYPE (irela[1].r_info)
13389 == R_PPC64_TOCSAVE))
f378ab09
AM
13390 {
13391 if (!tocsave_find (htab, INSERT,
13392 &local_syms, irela + 1, input_bfd))
13393 goto error_ret_free_internal;
13394 }
f378ab09
AM
13395 else
13396 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13397 }
3b421ab3 13398
721956f4 13399 /* Support for grouping stub sections. */
6f20ed8a 13400 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13401
13402 /* Get the name of this stub. */
13403 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13404 if (!stub_name)
13405 goto error_ret_free_internal;
13406
13407 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13408 stub_name, FALSE, FALSE);
721956f4
AM
13409 if (stub_entry != NULL)
13410 {
05d0e962
AM
13411 enum ppc_stub_type old_type;
13412 /* A stub has already been created, but it may
13413 not be the required type. We shouldn't be
13414 transitioning from plt_call to long_branch
13415 stubs or vice versa, but we might be
13416 upgrading from plt_call to plt_call_r2save or
13417 from long_branch to long_branch_r2off. */
721956f4 13418 free (stub_name);
05d0e962
AM
13419 old_type = stub_entry->stub_type;
13420 switch (old_type)
13421 {
13422 default:
13423 abort ();
13424
13425 case ppc_stub_save_res:
13426 continue;
13427
13428 case ppc_stub_plt_call:
13429 case ppc_stub_plt_call_r2save:
13430 case ppc_stub_plt_call_notoc:
13431 case ppc_stub_plt_call_both:
13432 if (stub_type == ppc_stub_plt_call)
13433 continue;
13434 else if (stub_type == ppc_stub_plt_call_r2save)
13435 {
13436 if (old_type == ppc_stub_plt_call_notoc)
13437 stub_type = ppc_stub_plt_call_both;
13438 }
13439 else if (stub_type == ppc_stub_plt_call_notoc)
13440 {
13441 if (old_type == ppc_stub_plt_call_r2save)
13442 stub_type = ppc_stub_plt_call_both;
13443 }
13444 else
13445 abort ();
13446 break;
13447
13448 case ppc_stub_plt_branch:
13449 case ppc_stub_plt_branch_r2off:
13450 case ppc_stub_plt_branch_notoc:
13451 case ppc_stub_plt_branch_both:
13452 old_type += (ppc_stub_long_branch
13453 - ppc_stub_plt_branch);
13454 /* Fall through. */
13455 case ppc_stub_long_branch:
13456 case ppc_stub_long_branch_r2off:
13457 case ppc_stub_long_branch_notoc:
13458 case ppc_stub_long_branch_both:
13459 if (stub_type == ppc_stub_long_branch)
13460 continue;
13461 else if (stub_type == ppc_stub_long_branch_r2off)
13462 {
13463 if (old_type == ppc_stub_long_branch_notoc)
13464 stub_type = ppc_stub_long_branch_both;
13465 }
13466 else if (stub_type == ppc_stub_long_branch_notoc)
13467 {
13468 if (old_type == ppc_stub_long_branch_r2off)
13469 stub_type = ppc_stub_long_branch_both;
13470 }
13471 else
13472 abort ();
13473 break;
13474 }
13475 if (old_type < stub_type)
794e51c0 13476 stub_entry->stub_type = stub_type;
721956f4
AM
13477 continue;
13478 }
13479
25f53a85 13480 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13481 if (stub_entry == NULL)
13482 {
13483 free (stub_name);
6cdc0ccc
AM
13484 error_ret_free_internal:
13485 if (elf_section_data (section)->relocs == NULL)
13486 free (internal_relocs);
13487 error_ret_free_local:
c9594989
AM
13488 if (symtab_hdr->contents
13489 != (unsigned char *) local_syms)
6cdc0ccc 13490 free (local_syms);
b34976b6 13491 return FALSE;
721956f4
AM
13492 }
13493
ad8e1ba5 13494 stub_entry->stub_type = stub_type;
05d0e962
AM
13495 if (stub_type >= ppc_stub_plt_call
13496 && stub_type <= ppc_stub_plt_call_both)
e054468f 13497 {
05d0e962
AM
13498 stub_entry->target_value = sym_value;
13499 stub_entry->target_section = sym_sec;
e054468f
AM
13500 }
13501 else
13502 {
05d0e962
AM
13503 stub_entry->target_value = code_value;
13504 stub_entry->target_section = code_sec;
e054468f 13505 }
721956f4 13506 stub_entry->h = hash;
e054468f 13507 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13508 stub_entry->symtype
13509 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13510 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13511
3d58e1fc
AM
13512 if (hash != NULL
13513 && (hash->elf.root.type == bfd_link_hash_defined
13514 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13515 htab->stub_globals += 1;
721956f4
AM
13516 }
13517
13518 /* We're done with the internal relocs, free them. */
6cdc0ccc 13519 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13520 free (internal_relocs);
721956f4 13521 }
6cdc0ccc
AM
13522
13523 if (local_syms != NULL
13524 && symtab_hdr->contents != (unsigned char *) local_syms)
13525 {
13526 if (!info->keep_memory)
13527 free (local_syms);
13528 else
13529 symtab_hdr->contents = (unsigned char *) local_syms;
13530 }
721956f4
AM
13531 }
13532
5c3dead3 13533 /* We may have added some stubs. Find out the new size of the
721956f4 13534 stub sections. */
d4aaa2a0 13535 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13536 {
13537 group->lr_restore = 0;
13538 group->eh_size = 0;
13539 if (group->stub_sec != NULL)
13540 {
13541 asection *stub_sec = group->stub_sec;
13542
13543 if (htab->stub_iteration <= STUB_SHRINK_ITER
13544 || stub_sec->rawsize < stub_sec->size)
13545 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13546 stub_sec->rawsize = stub_sec->size;
13547 stub_sec->size = 0;
13548 stub_sec->reloc_count = 0;
13549 stub_sec->flags &= ~SEC_RELOC;
13550 }
13551 }
a804e476
AM
13552 if (htab->tga_group != NULL)
13553 {
13554 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13555 htab->tga_group->eh_size
13556 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13557 htab->tga_group->lr_restore = 23 * 4;
13558 htab->tga_group->stub_sec->size = 24 * 4;
13559 }
eea6121a 13560
ba21f564
AM
13561 if (htab->stub_iteration <= STUB_SHRINK_ITER
13562 || htab->brlt->rawsize < htab->brlt->size)
13563 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13564 htab->brlt->size = 0;
84f5d08e
AM
13565 htab->brlt->reloc_count = 0;
13566 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13567 if (htab->relbrlt != NULL)
eea6121a 13568 htab->relbrlt->size = 0;
721956f4 13569
63bc6f6c 13570 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13571
a4b6fadd
AM
13572 for (group = htab->group; group != NULL; group = group->next)
13573 if (group->needs_save_res)
13574 group->stub_sec->size += htab->sfpr->size;
13575
176a0d42
AM
13576 if (info->emitrelocations
13577 && htab->glink != NULL && htab->glink->size != 0)
13578 {
13579 htab->glink->reloc_count = 1;
13580 htab->glink->flags |= SEC_RELOC;
13581 }
13582
58d180e8
AM
13583 if (htab->glink_eh_frame != NULL
13584 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13585 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13586 {
2e0ce1c8 13587 size_t size = 0, align = 4;
58d180e8 13588
d4aaa2a0 13589 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13590 if (group->eh_size != 0)
13591 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13592 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13593 size += (24 + align - 1) & -align;
58d180e8 13594 if (size != 0)
2e0ce1c8
AM
13595 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13596 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13597 size = (size + align - 1) & -align;
58d180e8
AM
13598 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13599 htab->glink_eh_frame->size = size;
13600 }
13601
e7d1c40c 13602 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13603 for (group = htab->group; group != NULL; group = group->next)
13604 if (group->stub_sec != NULL)
691d2e9a
AM
13605 {
13606 int align = abs (htab->params->plt_stub_align);
13607 group->stub_sec->size
13608 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13609 }
d4aaa2a0
AM
13610
13611 for (group = htab->group; group != NULL; group = group->next)
13612 if (group->stub_sec != NULL
13613 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13614 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13615 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13616 break;
13617
d4aaa2a0 13618 if (group == NULL
ba21f564
AM
13619 && (htab->brlt->rawsize == htab->brlt->size
13620 || (htab->stub_iteration > STUB_SHRINK_ITER
13621 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13622 && (htab->glink_eh_frame == NULL
a804e476
AM
13623 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13624 && (htab->tga_group == NULL
13625 || htab->stub_iteration > 1))
5c3dead3
AM
13626 break;
13627
721956f4 13628 /* Ask the linker to do its stuff. */
e7d1c40c 13629 (*htab->params->layout_sections_again) ();
721956f4
AM
13630 }
13631
da44f4e5
AM
13632 if (htab->glink_eh_frame != NULL
13633 && htab->glink_eh_frame->size != 0)
13634 {
13635 bfd_vma val;
13636 bfd_byte *p, *last_fde;
13637 size_t last_fde_len, size, align, pad;
d4aaa2a0 13638 struct map_stub *group;
da44f4e5 13639
df136d64
AM
13640 /* It is necessary to at least have a rough outline of the
13641 linker generated CIEs and FDEs written before
13642 bfd_elf_discard_info is run, in order for these FDEs to be
13643 indexed in .eh_frame_hdr. */
da44f4e5
AM
13644 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13645 if (p == NULL)
13646 return FALSE;
13647 htab->glink_eh_frame->contents = p;
13648 last_fde = p;
2e0ce1c8 13649 align = 4;
da44f4e5
AM
13650
13651 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13652 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13653 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13654 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13655 p += last_fde_len + 4;
da44f4e5 13656
d4aaa2a0 13657 for (group = htab->group; group != NULL; group = group->next)
df136d64 13658 if (group->eh_size != 0)
da44f4e5 13659 {
df136d64 13660 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13661 last_fde = p;
df136d64 13662 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13663 /* FDE length. */
2e0ce1c8 13664 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13665 p += 4;
13666 /* CIE pointer. */
13667 val = p - htab->glink_eh_frame->contents;
13668 bfd_put_32 (htab->elf.dynobj, val, p);
13669 p += 4;
13670 /* Offset to stub section, written later. */
13671 p += 4;
13672 /* stub section size. */
d4aaa2a0 13673 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13674 p += 4;
13675 /* Augmentation. */
13676 p += 1;
df136d64
AM
13677 /* Make sure we don't have all nops. This is enough for
13678 elf-eh-frame.c to detect the last non-nop opcode. */
13679 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13680 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13681 }
13682 if (htab->glink != NULL && htab->glink->size != 0)
13683 {
13684 last_fde = p;
2e0ce1c8 13685 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13686 /* FDE length. */
2e0ce1c8 13687 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13688 p += 4;
13689 /* CIE pointer. */
13690 val = p - htab->glink_eh_frame->contents;
13691 bfd_put_32 (htab->elf.dynobj, val, p);
13692 p += 4;
13693 /* Offset to .glink, written later. */
13694 p += 4;
13695 /* .glink size. */
13696 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13697 p += 4;
13698 /* Augmentation. */
13699 p += 1;
13700
13701 *p++ = DW_CFA_advance_loc + 1;
13702 *p++ = DW_CFA_register;
13703 *p++ = 65;
9f08fa5c 13704 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13705 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13706 *p++ = DW_CFA_restore_extended;
13707 *p++ = 65;
2e0ce1c8 13708 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13709 }
13710 /* Subsume any padding into the last FDE if user .eh_frame
13711 sections are aligned more than glink_eh_frame. Otherwise any
13712 zero padding will be seen as a terminator. */
2e0ce1c8 13713 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13714 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13715 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13716 htab->glink_eh_frame->size = size + pad;
13717 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13718 }
13719
d969d15f 13720 maybe_strip_output (info, htab->brlt);
2efec98b
AM
13721 if (htab->relbrlt != NULL)
13722 maybe_strip_output (info, htab->relbrlt);
d969d15f
AM
13723 if (htab->glink_eh_frame != NULL)
13724 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13725
b34976b6 13726 return TRUE;
721956f4
AM
13727}
13728
13729/* Called after we have determined section placement. If sections
805fc799 13730 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13731
805fc799 13732bfd_vma
1c865ab2 13733ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13734{
805fc799 13735 asection *s;
a27e685f 13736 bfd_vma TOCstart, adjust;
721956f4 13737
43417696
AM
13738 if (info != NULL)
13739 {
13740 struct elf_link_hash_entry *h;
13741 struct elf_link_hash_table *htab = elf_hash_table (info);
13742
13743 if (is_elf_hash_table (htab)
13744 && htab->hgot != NULL)
13745 h = htab->hgot;
13746 else
13747 {
13748 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13749 if (is_elf_hash_table (htab))
13750 htab->hgot = h;
13751 }
13752 if (h != NULL
13753 && h->root.type == bfd_link_hash_defined
13754 && !h->root.linker_def
13755 && (!is_elf_hash_table (htab)
13756 || h->def_regular))
13757 {
ed7007c1 13758 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13759 _bfd_set_gp_value (obfd, TOCstart);
13760 return TOCstart;
13761 }
13762 }
13763
805fc799
AM
13764 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13765 order. The TOC starts where the first of these sections starts. */
13766 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13767 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13768 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13769 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13770 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13771 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13772 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13773 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13774 {
13775 /* This may happen for
13776 o references to TOC base (SYM@toc / TOC[tc0]) without a
13777 .toc directive
13778 o bad linker script
13779 o --gc-sections and empty TOC sections
13780
13781 FIXME: Warn user? */
13782
13783 /* Look for a likely section. We probably won't even be
13784 using TOCstart. */
13785 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13786 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13787 | SEC_EXCLUDE))
805fc799
AM
13788 == (SEC_ALLOC | SEC_SMALL_DATA))
13789 break;
721956f4 13790 if (s == NULL)
805fc799 13791 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13792 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13793 == (SEC_ALLOC | SEC_SMALL_DATA))
13794 break;
721956f4 13795 if (s == NULL)
805fc799 13796 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13797 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13798 == SEC_ALLOC)
805fc799 13799 break;
721956f4 13800 if (s == NULL)
805fc799 13801 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13802 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13803 break;
13804 }
721956f4 13805
805fc799
AM
13806 TOCstart = 0;
13807 if (s != NULL)
13808 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13809
a27e685f
AM
13810 /* Force alignment. */
13811 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13812 TOCstart -= adjust;
1c865ab2
AM
13813 _bfd_set_gp_value (obfd, TOCstart);
13814
810d4e75 13815 if (info != NULL && s != NULL)
1c865ab2
AM
13816 {
13817 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13818
810d4e75
AM
13819 if (htab != NULL)
13820 {
13821 if (htab->elf.hgot != NULL)
13822 {
a27e685f 13823 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13824 htab->elf.hgot->root.u.def.section = s;
13825 }
13826 }
13827 else
1c865ab2 13828 {
810d4e75
AM
13829 struct bfd_link_hash_entry *bh = NULL;
13830 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13831 s, TOC_BASE_OFF - adjust,
13832 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13833 }
13834 }
805fc799 13835 return TOCstart;
721956f4
AM
13836}
13837
a345bc8d 13838/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13839 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13840
13841static bfd_boolean
49c09209 13842build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13843{
13844 struct bfd_link_info *info;
13845 struct ppc_link_hash_table *htab;
49c09209 13846 struct plt_entry *ent;
a345bc8d
AM
13847 asection *s;
13848
13849 if (h->root.type == bfd_link_hash_indirect)
13850 return TRUE;
13851
49c09209
AM
13852 info = inf;
13853 htab = ppc_hash_table (info);
13854 if (htab == NULL)
13855 return FALSE;
13856
13857 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13858 if (ent->plt.offset != (bfd_vma) -1)
13859 {
13860 /* This symbol has an entry in the procedure linkage
13861 table. Set it up. */
13862 Elf_Internal_Rela rela;
2d7ad24e 13863 asection *plt, *relplt;
49c09209
AM
13864 bfd_byte *loc;
13865
13866 if (!htab->elf.dynamic_sections_created
13867 || h->dynindx == -1)
13868 {
13869 if (!(h->def_regular
13870 && (h->root.type == bfd_link_hash_defined
13871 || h->root.type == bfd_link_hash_defweak)))
13872 continue;
2d7ad24e
AM
13873 if (h->type == STT_GNU_IFUNC)
13874 {
13875 plt = htab->elf.iplt;
13876 relplt = htab->elf.irelplt;
cebd6b8a 13877 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
13878 if (htab->opd_abi)
13879 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13880 else
13881 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13882 }
49c09209 13883 else
2d7ad24e
AM
13884 {
13885 plt = htab->pltlocal;
13886 if (bfd_link_pic (info))
13887 {
13888 relplt = htab->relpltlocal;
13889 if (htab->opd_abi)
13890 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13891 else
13892 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13893 }
13894 else
13895 relplt = NULL;
13896 }
ed7007c1 13897 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
13898
13899 if (relplt == NULL)
13900 {
13901 loc = plt->contents + ent->plt.offset;
13902 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13903 if (htab->opd_abi)
13904 {
13905 bfd_vma toc = elf_gp (info->output_bfd);
13906 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13907 bfd_put_64 (info->output_bfd, toc, loc + 8);
13908 }
13909 }
13910 else
13911 {
13912 rela.r_offset = (plt->output_section->vma
13913 + plt->output_offset
13914 + ent->plt.offset);
13915 loc = relplt->contents + (relplt->reloc_count++
13916 * sizeof (Elf64_External_Rela));
13917 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13918 }
49c09209
AM
13919 }
13920 else
13921 {
13922 rela.r_offset = (htab->elf.splt->output_section->vma
13923 + htab->elf.splt->output_offset
13924 + ent->plt.offset);
13925 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13926 rela.r_addend = ent->addend;
13927 loc = (htab->elf.srelplt->contents
13928 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13929 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13930 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
cebd6b8a 13931 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e 13932 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13933 }
49c09209
AM
13934 }
13935
a345bc8d
AM
13936 if (!h->pointer_equality_needed)
13937 return TRUE;
13938
13939 if (h->def_regular)
13940 return TRUE;
13941
9e390558 13942 s = htab->global_entry;
49c09209
AM
13943 if (s == NULL || s->size == 0)
13944 return TRUE;
13945
13946 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13947 if (ent->plt.offset != (bfd_vma) -1
13948 && ent->addend == 0)
a345bc8d
AM
13949 {
13950 bfd_byte *p;
13951 asection *plt;
13952 bfd_vma off;
13953
a345bc8d 13954 p = s->contents + h->root.u.def.value;
33e44f2e 13955 plt = htab->elf.splt;
a345bc8d
AM
13956 if (!htab->elf.dynamic_sections_created
13957 || h->dynindx == -1)
2d7ad24e
AM
13958 {
13959 if (h->type == STT_GNU_IFUNC)
13960 plt = htab->elf.iplt;
13961 else
13962 plt = htab->pltlocal;
13963 }
49c09209 13964 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13965 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13966
13967 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13968 {
13969 info->callbacks->einfo
c1c8c1ef 13970 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13971 h->root.root.string);
13972 bfd_set_error (bfd_error_bad_value);
13973 htab->stub_error = TRUE;
13974 }
13975
7341d5e2
AM
13976 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13977 if (htab->params->emit_stub_syms)
13978 {
13979 size_t len = strlen (h->root.root.string);
13980 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13981
13982 if (name == NULL)
13983 return FALSE;
13984
13985 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13986 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13987 if (h == NULL)
13988 return FALSE;
13989 if (h->root.type == bfd_link_hash_new)
13990 {
13991 h->root.type = bfd_link_hash_defined;
13992 h->root.u.def.section = s;
13993 h->root.u.def.value = p - s->contents;
13994 h->ref_regular = 1;
13995 h->def_regular = 1;
13996 h->ref_regular_nonweak = 1;
13997 h->forced_local = 1;
13998 h->non_elf = 0;
2ec55de3 13999 h->root.linker_def = 1;
7341d5e2
AM
14000 }
14001 }
14002
a345bc8d
AM
14003 if (PPC_HA (off) != 0)
14004 {
14005 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14006 p += 4;
14007 }
14008 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14009 p += 4;
14010 bfd_put_32 (s->owner, MTCTR_R12, p);
14011 p += 4;
407aa07c 14012 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14013 break;
14014 }
14015 return TRUE;
14016}
14017
49c09209
AM
14018/* Write PLT relocs for locals. */
14019
14020static bfd_boolean
14021write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14022{
14023 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14024 bfd *ibfd;
14025
14026 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14027 {
14028 struct got_entry **lgot_ents, **end_lgot_ents;
14029 struct plt_entry **local_plt, **lplt, **end_local_plt;
14030 Elf_Internal_Shdr *symtab_hdr;
14031 bfd_size_type locsymcount;
14032 Elf_Internal_Sym *local_syms = NULL;
14033 struct plt_entry *ent;
14034
14035 if (!is_ppc64_elf (ibfd))
14036 continue;
14037
14038 lgot_ents = elf_local_got_ents (ibfd);
14039 if (!lgot_ents)
14040 continue;
14041
14042 symtab_hdr = &elf_symtab_hdr (ibfd);
14043 locsymcount = symtab_hdr->sh_info;
14044 end_lgot_ents = lgot_ents + locsymcount;
14045 local_plt = (struct plt_entry **) end_lgot_ents;
14046 end_local_plt = local_plt + locsymcount;
14047 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14048 for (ent = *lplt; ent != NULL; ent = ent->next)
14049 if (ent->plt.offset != (bfd_vma) -1)
14050 {
14051 Elf_Internal_Sym *sym;
14052 asection *sym_sec;
14053 asection *plt, *relplt;
14054 bfd_byte *loc;
14055 bfd_vma val;
49c09209
AM
14056
14057 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14058 lplt - local_plt, ibfd))
14059 {
c9594989 14060 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
14061 free (local_syms);
14062 return FALSE;
14063 }
14064
14065 val = sym->st_value + ent->addend;
ba85c15d
AM
14066 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14067 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14068 if (sym_sec != NULL && sym_sec->output_section != NULL)
14069 val += sym_sec->output_offset + sym_sec->output_section->vma;
14070
2d7ad24e
AM
14071 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14072 {
cebd6b8a 14073 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
14074 plt = htab->elf.iplt;
14075 relplt = htab->elf.irelplt;
14076 }
14077 else
14078 {
14079 plt = htab->pltlocal;
14080 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14081 }
49c09209 14082
2d7ad24e
AM
14083 if (relplt == NULL)
14084 {
14085 loc = plt->contents + ent->plt.offset;
14086 bfd_put_64 (info->output_bfd, val, loc);
14087 if (htab->opd_abi)
14088 {
14089 bfd_vma toc = elf_gp (ibfd);
14090 bfd_put_64 (info->output_bfd, toc, loc + 8);
14091 }
14092 }
49c09209 14093 else
2d7ad24e
AM
14094 {
14095 Elf_Internal_Rela rela;
14096 rela.r_offset = (ent->plt.offset
14097 + plt->output_offset
14098 + plt->output_section->vma);
14099 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14100 {
14101 if (htab->opd_abi)
14102 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14103 else
14104 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14105 }
14106 else
14107 {
14108 if (htab->opd_abi)
14109 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14110 else
14111 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14112 }
14113 rela.r_addend = val;
14114 loc = relplt->contents + (relplt->reloc_count++
14115 * sizeof (Elf64_External_Rela));
14116 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14117 }
49c09209
AM
14118 }
14119
14120 if (local_syms != NULL
14121 && symtab_hdr->contents != (unsigned char *) local_syms)
14122 {
14123 if (!info->keep_memory)
14124 free (local_syms);
14125 else
14126 symtab_hdr->contents = (unsigned char *) local_syms;
14127 }
14128 }
14129 return TRUE;
14130}
14131
a804e476
AM
14132/* Emit the static wrapper function preserving registers around a
14133 __tls_get_addr_opt call. */
14134
14135static bfd_boolean
14136emit_tga_desc (struct ppc_link_hash_table *htab)
14137{
14138 asection *stub_sec = htab->tga_group->stub_sec;
14139 unsigned int cfa_updt = 11 * 4;
14140 bfd_byte *p;
14141 bfd_vma to, from, delta;
14142
14143 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14144 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14145 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14146 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14147 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14148 delta = to - from;
14149 if (delta + (1 << 25) >= 1 << 26)
14150 {
14151 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14152 htab->stub_error = TRUE;
14153 return FALSE;
14154 }
14155
14156 p = stub_sec->contents;
14157 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14158 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14159 p += 4;
14160 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14161 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14162}
14163
14164/* Emit eh_frame describing the static wrapper function. */
14165
14166static bfd_byte *
14167emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14168{
14169 unsigned int cfa_updt = 11 * 4;
14170 unsigned int i;
14171
14172 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14173 *p++ = DW_CFA_def_cfa_offset;
14174 if (htab->opd_abi)
14175 {
14176 *p++ = 128;
14177 *p++ = 1;
14178 }
14179 else
14180 *p++ = 96;
14181 *p++ = DW_CFA_offset_extended_sf;
14182 *p++ = 65;
14183 *p++ = (-16 / 8) & 0x7f;
14184 for (i = 4; i < 12; i++)
14185 {
14186 *p++ = DW_CFA_offset + i;
14187 *p++ = (htab->opd_abi ? 13 : 12) - i;
14188 }
14189 *p++ = DW_CFA_advance_loc + 10;
14190 *p++ = DW_CFA_def_cfa_offset;
14191 *p++ = 0;
14192 for (i = 4; i < 12; i++)
14193 *p++ = DW_CFA_restore + i;
14194 *p++ = DW_CFA_advance_loc + 2;
14195 *p++ = DW_CFA_restore_extended;
14196 *p++ = 65;
14197 return p;
14198}
14199
721956f4
AM
14200/* Build all the stubs associated with the current output file.
14201 The stubs are kept in a hash table attached to the main linker
14202 hash table. This function is called via gldelf64ppc_finish. */
14203
b34976b6 14204bfd_boolean
e7d1c40c 14205ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14206 char **stats)
5d1634d7
AM
14207{
14208 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14209 struct map_stub *group;
721956f4 14210 asection *stub_sec;
5d1634d7 14211 bfd_byte *p;
e717da7e 14212 int stub_sec_count = 0;
5d1634d7 14213
4dfe6ac6
NC
14214 if (htab == NULL)
14215 return FALSE;
14216
eea6121a 14217 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14218 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14219 {
14220 group->eh_size = 0;
14221 group->lr_restore = 0;
14222 if ((stub_sec = group->stub_sec) != NULL
14223 && stub_sec->size != 0)
14224 {
14225 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14226 stub_sec->size);
14227 if (stub_sec->contents == NULL)
14228 return FALSE;
14229 stub_sec->size = 0;
14230 }
14231 }
5d1634d7 14232
23eb7e01 14233 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14234 {
9f951329 14235 unsigned int indx;
ad8e1ba5 14236 bfd_vma plt0;
9f951329 14237
721956f4 14238 /* Build the .glink plt call stub. */
e7d1c40c 14239 if (htab->params->emit_stub_syms)
97b639ba
AM
14240 {
14241 struct elf_link_hash_entry *h;
468392fb
AM
14242 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14243 TRUE, FALSE, FALSE);
97b639ba
AM
14244 if (h == NULL)
14245 return FALSE;
14246 if (h->root.type == bfd_link_hash_new)
14247 {
14248 h->root.type = bfd_link_hash_defined;
14249 h->root.u.def.section = htab->glink;
ee4bf8d2 14250 h->root.u.def.value = 8;
f5385ebf
AM
14251 h->ref_regular = 1;
14252 h->def_regular = 1;
14253 h->ref_regular_nonweak = 1;
14254 h->forced_local = 1;
14255 h->non_elf = 0;
2ec55de3 14256 h->root.linker_def = 1;
97b639ba
AM
14257 }
14258 }
33e44f2e
AM
14259 plt0 = (htab->elf.splt->output_section->vma
14260 + htab->elf.splt->output_offset
14261 - 16);
176a0d42
AM
14262 if (info->emitrelocations)
14263 {
14264 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14265 if (r == NULL)
14266 return FALSE;
14267 r->r_offset = (htab->glink->output_offset
14268 + htab->glink->output_section->vma);
14269 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14270 r->r_addend = plt0;
14271 }
4ce794b7 14272 p = htab->glink->contents;
176a0d42 14273 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14274 bfd_put_64 (htab->glink->owner, plt0, p);
14275 p += 8;
b9e5796b
AM
14276 if (htab->opd_abi)
14277 {
14278 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14279 p += 4;
14280 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14281 p += 4;
14282 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14283 p += 4;
14284 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14285 p += 4;
14286 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14287 p += 4;
14288 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14289 p += 4;
14290 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14291 p += 4;
14292 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14293 p += 4;
14294 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14295 p += 4;
14296 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14297 p += 4;
14298 }
14299 else
14300 {
14301 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14302 p += 4;
14303 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14304 p += 4;
14305 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14306 p += 4;
f378ab09
AM
14307 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14308 p += 4;
b9e5796b
AM
14309 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14310 p += 4;
14311 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14312 p += 4;
14313 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14314 p += 4;
14315 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14316 p += 4;
14317 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14318 p += 4;
14319 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14320 p += 4;
14321 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14322 p += 4;
14323 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14324 p += 4;
14325 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14326 p += 4;
14327 }
407aa07c
AM
14328 bfd_put_32 (htab->glink->owner, BCTR, p);
14329 p += 4;
c75bc4f7 14330 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14331
9f951329
AM
14332 /* Build the .glink lazy link call stubs. */
14333 indx = 0;
9e390558 14334 while (p < htab->glink->contents + htab->glink->size)
9f951329 14335 {
b9e5796b 14336 if (htab->opd_abi)
9f951329 14337 {
b9e5796b
AM
14338 if (indx < 0x8000)
14339 {
14340 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14341 p += 4;
14342 }
14343 else
14344 {
14345 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14346 p += 4;
14347 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14348 p);
14349 p += 4;
14350 }
9f951329 14351 }
4ce794b7 14352 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14353 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14354 indx++;
9f951329
AM
14355 p += 4;
14356 }
5d1634d7 14357 }
5d1634d7 14358
a804e476
AM
14359 if (htab->tga_group != NULL)
14360 {
14361 htab->tga_group->lr_restore = 23 * 4;
14362 htab->tga_group->stub_sec->size = 24 * 4;
14363 if (!emit_tga_desc (htab))
14364 return FALSE;
14365 if (htab->glink_eh_frame != NULL
14366 && htab->glink_eh_frame->size != 0)
14367 {
14368 size_t align = 4;
14369
14370 p = htab->glink_eh_frame->contents;
14371 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14372 p += 17;
14373 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14374 }
14375 }
14376
49c09209
AM
14377 /* Build .glink global entry stubs, and PLT relocs for globals. */
14378 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14379
14380 if (!write_plt_relocs_for_local_syms (info))
14381 return FALSE;
9e390558 14382
7341d5e2 14383 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14384 {
4ce794b7 14385 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14386 htab->brlt->size);
4ce794b7 14387 if (htab->brlt->contents == NULL)
b34976b6 14388 return FALSE;
721956f4 14389 }
ee75fd95 14390 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14391 {
14392 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14393 htab->relbrlt->size);
63bc6f6c
AM
14394 if (htab->relbrlt->contents == NULL)
14395 return FALSE;
14396 }
5d1634d7 14397
721956f4
AM
14398 /* Build the stubs as directed by the stub hash table. */
14399 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14400
a4b6fadd
AM
14401 for (group = htab->group; group != NULL; group = group->next)
14402 if (group->needs_save_res)
7dda8d3c 14403 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14404
aa8a7074
AM
14405 if (htab->relbrlt != NULL)
14406 htab->relbrlt->reloc_count = 0;
14407
e7d1c40c 14408 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14409 for (group = htab->group; group != NULL; group = group->next)
14410 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14411 {
14412 int align = abs (htab->params->plt_stub_align);
14413 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14414 }
794e51c0 14415
7dda8d3c
AM
14416 for (group = htab->group; group != NULL; group = group->next)
14417 if (group->needs_save_res)
14418 {
14419 stub_sec = group->stub_sec;
14420 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14421 htab->sfpr->contents, htab->sfpr->size);
14422 if (htab->params->emit_stub_syms)
14423 {
14424 unsigned int i;
14425
14426 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14427 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14428 return FALSE;
14429 }
14430 }
14431
df136d64
AM
14432 if (htab->glink_eh_frame != NULL
14433 && htab->glink_eh_frame->size != 0)
14434 {
14435 bfd_vma val;
14436 size_t align = 4;
14437
14438 p = htab->glink_eh_frame->contents;
14439 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14440
14441 for (group = htab->group; group != NULL; group = group->next)
14442 if (group->eh_size != 0)
14443 {
14444 /* Offset to stub section. */
14445 val = (group->stub_sec->output_section->vma
14446 + group->stub_sec->output_offset);
14447 val -= (htab->glink_eh_frame->output_section->vma
14448 + htab->glink_eh_frame->output_offset
14449 + (p + 8 - htab->glink_eh_frame->contents));
14450 if (val + 0x80000000 > 0xffffffff)
14451 {
14452 _bfd_error_handler
14453 (_("%s offset too large for .eh_frame sdata4 encoding"),
14454 group->stub_sec->name);
14455 return FALSE;
14456 }
14457 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14458 p += (group->eh_size + 17 + 3) & -4;
14459 }
14460 if (htab->glink != NULL && htab->glink->size != 0)
14461 {
14462 /* Offset to .glink. */
14463 val = (htab->glink->output_section->vma
14464 + htab->glink->output_offset
14465 + 8);
14466 val -= (htab->glink_eh_frame->output_section->vma
14467 + htab->glink_eh_frame->output_offset
14468 + (p + 8 - htab->glink_eh_frame->contents));
14469 if (val + 0x80000000 > 0xffffffff)
14470 {
14471 _bfd_error_handler
14472 (_("%s offset too large for .eh_frame sdata4 encoding"),
14473 htab->glink->name);
14474 return FALSE;
14475 }
14476 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14477 p += (24 + align - 1) & -align;
14478 }
14479 }
14480
d4aaa2a0
AM
14481 for (group = htab->group; group != NULL; group = group->next)
14482 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14483 {
14484 stub_sec_count += 1;
c9301e31
AM
14485 if (stub_sec->rawsize != stub_sec->size
14486 && (htab->stub_iteration <= STUB_SHRINK_ITER
14487 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14488 break;
14489 }
5d1634d7 14490
25516cc5 14491 if (group != NULL)
5d1634d7 14492 {
b34976b6 14493 htab->stub_error = TRUE;
cf97bcb0 14494 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14495 }
721956f4 14496
d2a300cf
AM
14497 if (htab->stub_error)
14498 return FALSE;
14499
14500 if (stats != NULL)
14501 {
988b7300
AM
14502 char *groupmsg;
14503 if (asprintf (&groupmsg,
14504 ngettext ("linker stubs in %u group\n",
14505 "linker stubs in %u groups\n",
14506 stub_sec_count),
14507 stub_sec_count) < 0)
14508 *stats = NULL;
14509 else
14510 {
14511 if (asprintf (stats, _("%s"
14512 " branch %lu\n"
14513 " branch toc adj %lu\n"
14514 " branch notoc %lu\n"
14515 " branch both %lu\n"
14516 " long branch %lu\n"
14517 " long toc adj %lu\n"
14518 " long notoc %lu\n"
14519 " long both %lu\n"
14520 " plt call %lu\n"
14521 " plt call save %lu\n"
14522 " plt call notoc %lu\n"
14523 " plt call both %lu\n"
14524 " global entry %lu"),
14525 groupmsg,
14526 htab->stub_count[ppc_stub_long_branch - 1],
14527 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14528 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14529 htab->stub_count[ppc_stub_long_branch_both - 1],
14530 htab->stub_count[ppc_stub_plt_branch - 1],
14531 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14532 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14533 htab->stub_count[ppc_stub_plt_branch_both - 1],
14534 htab->stub_count[ppc_stub_plt_call - 1],
14535 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14536 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14537 htab->stub_count[ppc_stub_plt_call_both - 1],
14538 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14539 *stats = NULL;
14540 free (groupmsg);
14541 }
d2a300cf
AM
14542 }
14543 return TRUE;
5bd4f169
AM
14544}
14545
60124e18
AM
14546/* What to do when ld finds relocations against symbols defined in
14547 discarded sections. */
14548
14549static unsigned int
14550ppc64_elf_action_discarded (asection *sec)
14551{
14552 if (strcmp (".opd", sec->name) == 0)
14553 return 0;
14554
14555 if (strcmp (".toc", sec->name) == 0)
14556 return 0;
14557
bce50a28
JJ
14558 if (strcmp (".toc1", sec->name) == 0)
14559 return 0;
14560
60124e18
AM
14561 return _bfd_elf_default_action_discarded (sec);
14562}
14563
e59a1001
AM
14564/* These are the dynamic relocations supported by glibc. */
14565
14566static bfd_boolean
14567ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14568{
14569 switch (r_type)
14570 {
14571 case R_PPC64_RELATIVE:
14572 case R_PPC64_NONE:
14573 case R_PPC64_ADDR64:
14574 case R_PPC64_GLOB_DAT:
14575 case R_PPC64_IRELATIVE:
14576 case R_PPC64_JMP_IREL:
14577 case R_PPC64_JMP_SLOT:
14578 case R_PPC64_DTPMOD64:
14579 case R_PPC64_DTPREL64:
14580 case R_PPC64_TPREL64:
14581 case R_PPC64_TPREL16_LO_DS:
14582 case R_PPC64_TPREL16_DS:
14583 case R_PPC64_TPREL16:
14584 case R_PPC64_TPREL16_LO:
14585 case R_PPC64_TPREL16_HI:
14586 case R_PPC64_TPREL16_HIGH:
14587 case R_PPC64_TPREL16_HA:
14588 case R_PPC64_TPREL16_HIGHA:
14589 case R_PPC64_TPREL16_HIGHER:
14590 case R_PPC64_TPREL16_HIGHEST:
14591 case R_PPC64_TPREL16_HIGHERA:
14592 case R_PPC64_TPREL16_HIGHESTA:
14593 case R_PPC64_ADDR16_LO_DS:
14594 case R_PPC64_ADDR16_LO:
14595 case R_PPC64_ADDR16_HI:
14596 case R_PPC64_ADDR16_HIGH:
14597 case R_PPC64_ADDR16_HA:
14598 case R_PPC64_ADDR16_HIGHA:
14599 case R_PPC64_REL30:
14600 case R_PPC64_COPY:
14601 case R_PPC64_UADDR64:
14602 case R_PPC64_UADDR32:
14603 case R_PPC64_ADDR32:
14604 case R_PPC64_ADDR24:
14605 case R_PPC64_ADDR16:
14606 case R_PPC64_UADDR16:
14607 case R_PPC64_ADDR16_DS:
14608 case R_PPC64_ADDR16_HIGHER:
14609 case R_PPC64_ADDR16_HIGHEST:
14610 case R_PPC64_ADDR16_HIGHERA:
14611 case R_PPC64_ADDR16_HIGHESTA:
14612 case R_PPC64_ADDR14:
14613 case R_PPC64_ADDR14_BRTAKEN:
14614 case R_PPC64_ADDR14_BRNTAKEN:
14615 case R_PPC64_REL32:
14616 case R_PPC64_REL64:
14617 return TRUE;
14618
14619 default:
14620 return FALSE;
14621 }
14622}
14623
5bd4f169
AM
14624/* The RELOCATE_SECTION function is called by the ELF backend linker
14625 to handle the relocations for a section.
14626
14627 The relocs are always passed as Rela structures; if the section
14628 actually uses Rel structures, the r_addend field will always be
14629 zero.
14630
14631 This function is responsible for adjust the section contents as
14632 necessary, and (if using Rela relocs and generating a
1049f94e 14633 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14634 necessary.
14635
14636 This function does not have to worry about setting the reloc
14637 address or the reloc symbol index.
14638
14639 LOCAL_SYMS is a pointer to the swapped in local symbols.
14640
14641 LOCAL_SECTIONS is an array giving the section in the input file
14642 corresponding to the st_shndx field of each local symbol.
14643
14644 The global hash table entry for the global symbols can be found
14645 via elf_sym_hashes (input_bfd).
14646
1049f94e 14647 When generating relocatable output, this function must handle
5bd4f169
AM
14648 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14649 going to be the section symbol corresponding to the output
14650 section, which means that the addend must be adjusted
14651 accordingly. */
14652
b34976b6 14653static bfd_boolean
4ce794b7
AM
14654ppc64_elf_relocate_section (bfd *output_bfd,
14655 struct bfd_link_info *info,
14656 bfd *input_bfd,
14657 asection *input_section,
14658 bfd_byte *contents,
14659 Elf_Internal_Rela *relocs,
14660 Elf_Internal_Sym *local_syms,
14661 asection **local_sections)
5bd4f169 14662{
65f38f15 14663 struct ppc_link_hash_table *htab;
5bd4f169
AM
14664 Elf_Internal_Shdr *symtab_hdr;
14665 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14666 Elf_Internal_Rela *rel;
c316a17c 14667 Elf_Internal_Rela *wrel;
5bd4f169 14668 Elf_Internal_Rela *relend;
411e1bfb
AM
14669 Elf_Internal_Rela outrel;
14670 bfd_byte *loc;
411e1bfb 14671 struct got_entry **local_got_ents;
5bd4f169 14672 bfd_vma TOCstart;
b34976b6
AM
14673 bfd_boolean ret = TRUE;
14674 bfd_boolean is_opd;
794e51c0
AM
14675 /* Assume 'at' branch hints. */
14676 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14677 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14678 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14679
65f38f15 14680 /* Initialize howto table if needed. */
5bd4f169 14681 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14682 ppc_howto_init ();
14683
65f38f15 14684 htab = ppc_hash_table (info);
4dfe6ac6
NC
14685 if (htab == NULL)
14686 return FALSE;
ee75fd95
AM
14687
14688 /* Don't relocate stub sections. */
e7d1c40c 14689 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14690 return TRUE;
14691
7af5d5c4
AM
14692 if (!is_ppc64_elf (input_bfd))
14693 {
14694 bfd_set_error (bfd_error_wrong_format);
14695 return FALSE;
14696 }
0ffa91dd 14697
411e1bfb 14698 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14699 TOCstart = elf_gp (output_bfd);
0ffa91dd 14700 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14701 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14702 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14703
c316a17c 14704 rel = wrel = relocs;
5bd4f169 14705 relend = relocs + input_section->reloc_count;
c316a17c 14706 for (; rel < relend; wrel++, rel++)
5bd4f169 14707 {
04c9666a 14708 enum elf_ppc64_reloc_type r_type;
31c76678 14709 bfd_vma addend;
5bd4f169
AM
14710 bfd_reloc_status_type r;
14711 Elf_Internal_Sym *sym;
14712 asection *sec;
039b3fef
AM
14713 struct elf_link_hash_entry *h_elf;
14714 struct ppc_link_hash_entry *h;
14715 struct ppc_link_hash_entry *fdh;
5bd4f169 14716 const char *sym_name;
0d4792f7 14717 unsigned long r_symndx, toc_symndx;
3a71aa26 14718 bfd_vma toc_addend;
f961d9dd
AM
14719 unsigned char tls_mask, tls_gd, tls_type;
14720 unsigned char sym_type;
5bd4f169 14721 bfd_vma relocation;
23cedd1d 14722 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14723 bfd_boolean warned;
bc30df16 14724 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14725 unsigned int insn;
e11840f9 14726 unsigned int mask;
721956f4
AM
14727 struct ppc_stub_hash_entry *stub_entry;
14728 bfd_vma max_br_offset;
14729 bfd_vma from;
c316a17c 14730 Elf_Internal_Rela orig_rel;
b80eed39
AM
14731 reloc_howto_type *howto;
14732 struct reloc_howto_struct alt_howto;
4a421c53
AM
14733 uint64_t pinsn;
14734 bfd_vma offset;
5bd4f169 14735
c316a17c
AM
14736 again:
14737 orig_rel = *rel;
14738
4ce794b7 14739 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14740 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14741
14742 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14743 symbol of the previous ADDR64 reloc. The symbol gives us the
14744 proper TOC base to use. */
14745 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14746 && wrel != relocs
14747 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14748 && is_opd)
c316a17c 14749 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14750
4ce794b7
AM
14751 sym = NULL;
14752 sec = NULL;
039b3fef 14753 h_elf = NULL;
4ce794b7 14754 sym_name = NULL;
b34976b6
AM
14755 unresolved_reloc = FALSE;
14756 warned = FALSE;
65f38f15 14757
0b13192e 14758 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14759 {
14760 /* It's a local symbol. */
74f0fb50 14761 struct _opd_sec_data *opd;
4025353c 14762
5bd4f169
AM
14763 sym = local_syms + r_symndx;
14764 sec = local_sections[r_symndx];
26c61ae5 14765 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14766 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14767 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14768 opd = get_opd_info (sec);
14769 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14770 {
51aecdc5
AM
14771 long adjust = opd->adjust[OPD_NDX (sym->st_value
14772 + rel->r_addend)];
4025353c
AM
14773 if (adjust == -1)
14774 relocation = 0;
14775 else
4cc603a5
AM
14776 {
14777 /* If this is a relocation against the opd section sym
14778 and we have edited .opd, adjust the reloc addend so
14779 that ld -r and ld --emit-relocs output is correct.
14780 If it is a reloc against some other .opd symbol,
14781 then the symbol value will be adjusted later. */
14782 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14783 rel->r_addend += adjust;
14784 else
14785 relocation += adjust;
14786 }
1e2f5b6e 14787 }
5bd4f169
AM
14788 }
14789 else
14790 {
62d887d4
L
14791 bfd_boolean ignored;
14792
b2a8e766
AM
14793 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14794 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14795 h_elf, sec, relocation,
62d887d4 14796 unresolved_reloc, warned, ignored);
039b3fef
AM
14797 sym_name = h_elf->root.root.string;
14798 sym_type = h_elf->type;
b69fdb4e
AM
14799 if (sec != NULL
14800 && sec->owner == output_bfd
14801 && strcmp (sec->name, ".opd") == 0)
14802 {
14803 /* This is a symbol defined in a linker script. All
14804 such are defined in output sections, even those
14805 defined by simple assignment from a symbol defined in
14806 an input section. Transfer the symbol to an
14807 appropriate input .opd section, so that a branch to
14808 this symbol will be mapped to the location specified
14809 by the opd entry. */
14810 struct bfd_link_order *lo;
14811 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14812 if (lo->type == bfd_indirect_link_order)
14813 {
14814 asection *isec = lo->u.indirect.section;
14815 if (h_elf->root.u.def.value >= isec->output_offset
14816 && h_elf->root.u.def.value < (isec->output_offset
14817 + isec->size))
14818 {
14819 h_elf->root.u.def.value -= isec->output_offset;
14820 h_elf->root.u.def.section = isec;
14821 sec = isec;
14822 break;
14823 }
14824 }
14825 }
5bd4f169 14826 }
ed7007c1 14827 h = ppc_elf_hash_entry (h_elf);
5bd4f169 14828
dbaa2011 14829 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14830 {
14831 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14832 input_bfd, input_section,
0930cb30 14833 contents, rel->r_offset);
c316a17c
AM
14834 wrel->r_offset = rel->r_offset;
14835 wrel->r_info = 0;
14836 wrel->r_addend = 0;
14837
14838 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14839 symbols defined in discarded sections. Not done for
c316a17c
AM
14840 non-debug to preserve relocs in .eh_frame which the
14841 eh_frame editing code expects to be present. */
14842 if (bfd_link_relocatable (info)
14843 && (input_section->flags & SEC_DEBUGGING))
14844 wrel--;
14845
14846 continue;
14847 }
ab96bf03 14848
0e1862bb 14849 if (bfd_link_relocatable (info))
c316a17c 14850 goto copy_reloc;
ab96bf03 14851
f40da81b
AM
14852 if (h != NULL && &h->elf == htab->elf.hgot)
14853 {
6f20ed8a 14854 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14855 sec = bfd_abs_section_ptr;
14856 unresolved_reloc = FALSE;
14857 }
14858
951fd09b
AM
14859 /* TLS optimizations. Replace instruction sequences and relocs
14860 based on information we collected in tls_optimize. We edit
14861 RELOCS so that --emit-relocs will output something sensible
14862 for the final instruction stream. */
14863 tls_mask = 0;
14864 tls_gd = 0;
0d4792f7 14865 toc_symndx = 0;
727fc41e
AM
14866 if (h != NULL)
14867 tls_mask = h->tls_mask;
14868 else if (local_got_ents != NULL)
411e1bfb 14869 {
e054468f
AM
14870 struct plt_entry **local_plt = (struct plt_entry **)
14871 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14872 unsigned char *lgot_masks = (unsigned char *)
e054468f 14873 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14874 tls_mask = lgot_masks[r_symndx];
14875 }
37da22e5 14876 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14877 && (r_type == R_PPC64_TLS
14878 || r_type == R_PPC64_TLSGD
14879 || r_type == R_PPC64_TLSLD))
14880 {
14881 /* Check for toc tls entries. */
f961d9dd 14882 unsigned char *toc_tls;
0d4792f7 14883
727fc41e
AM
14884 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14885 &local_syms, rel, input_bfd))
14886 return FALSE;
0d4792f7 14887
727fc41e
AM
14888 if (toc_tls)
14889 tls_mask = *toc_tls;
0d4792f7
AM
14890 }
14891
14892 /* Check that tls relocs are used with tls syms, and non-tls
14893 relocs are used with non-tls syms. */
cf35638d 14894 if (r_symndx != STN_UNDEF
0d4792f7
AM
14895 && r_type != R_PPC64_NONE
14896 && (h == NULL
039b3fef
AM
14897 || h->elf.root.type == bfd_link_hash_defined
14898 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14899 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14900 {
37da22e5 14901 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14902 && (r_type == R_PPC64_TLS
14903 || r_type == R_PPC64_TLSGD
14904 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14905 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14906 ;
14907 else
25f53a85 14908 info->callbacks->einfo
1d483afe 14909 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14910 /* xgettext:c-format */
c1c8c1ef 14911 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14912 /* xgettext:c-format */
c1c8c1ef 14913 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14914 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14915 ppc64_elf_howto_table[r_type]->name,
14916 sym_name);
411e1bfb
AM
14917 }
14918
14919 /* Ensure reloc mapping code below stays sane. */
14920 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14921 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14922 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14923 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14924 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14925 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14926 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14927 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14928 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14929 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14930 abort ();
0d4792f7 14931
411e1bfb
AM
14932 switch (r_type)
14933 {
14934 default:
411e1bfb
AM
14935 break;
14936
ba761f19 14937 case R_PPC64_LO_DS_OPT:
95f0d0d2 14938 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 14939 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
14940 abort ();
14941 insn += (14u << 26) - (58u << 26);
95f0d0d2 14942 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14943 r_type = R_PPC64_TOC16_LO;
14944 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14945 break;
14946
411e1bfb
AM
14947 case R_PPC64_TOC16:
14948 case R_PPC64_TOC16_LO:
14949 case R_PPC64_TOC16_DS:
14950 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14951 {
14952 /* Check for toc tls entries. */
f961d9dd 14953 unsigned char *toc_tls;
951fd09b 14954 int retval;
411e1bfb 14955
3a71aa26
AM
14956 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14957 &local_syms, rel, input_bfd);
951fd09b 14958 if (retval == 0)
411e1bfb
AM
14959 return FALSE;
14960
14961 if (toc_tls)
14962 {
951fd09b 14963 tls_mask = *toc_tls;
411e1bfb
AM
14964 if (r_type == R_PPC64_TOC16_DS
14965 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14966 {
37da22e5 14967 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14968 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14969 goto toctprel;
14970 }
411e1bfb 14971 else
951fd09b
AM
14972 {
14973 /* If we found a GD reloc pair, then we might be
14974 doing a GD->IE transition. */
14975 if (retval == 2)
14976 {
b00a0a86 14977 tls_gd = TLS_GDIE;
37da22e5
AM
14978 if ((tls_mask & TLS_TLS) != 0
14979 && (tls_mask & TLS_GD) == 0)
102890f0 14980 goto tls_ldgd_opt;
951fd09b
AM
14981 }
14982 else if (retval == 3)
14983 {
37da22e5
AM
14984 if ((tls_mask & TLS_TLS) != 0
14985 && (tls_mask & TLS_LD) == 0)
102890f0 14986 goto tls_ldgd_opt;
951fd09b
AM
14987 }
14988 }
411e1bfb
AM
14989 }
14990 }
14991 break;
14992
9d6ded02
AM
14993 case R_PPC64_GOT_TPREL16_HI:
14994 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14995 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14996 && (tls_mask & TLS_TPREL) == 0)
14997 {
14998 rel->r_offset -= d_offset;
95f0d0d2 14999 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15000 r_type = R_PPC64_NONE;
15001 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15002 }
15003 break;
15004
411e1bfb
AM
15005 case R_PPC64_GOT_TPREL16_DS:
15006 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15007 if ((tls_mask & TLS_TLS) != 0
951fd09b 15008 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15009 {
81407a69 15010 toctprel:
95f0d0d2 15011 insn = bfd_get_32 (input_bfd,
c316a17c 15012 contents + rel->r_offset - d_offset);
411e1bfb
AM
15013 insn &= 31 << 21;
15014 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15015 bfd_put_32 (input_bfd, insn,
c316a17c 15016 contents + rel->r_offset - d_offset);
411e1bfb 15017 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15018 if (toc_symndx != 0)
15019 {
15020 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15021 rel->r_addend = toc_addend;
0d4792f7
AM
15022 /* We changed the symbol. Start over in order to
15023 get h, sym, sec etc. right. */
c316a17c 15024 goto again;
0d4792f7
AM
15025 }
15026 else
15027 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15028 }
15029 break;
15030
87c69f97 15031 case R_PPC64_GOT_TPREL_PCREL34:
c213164a
AM
15032 if ((tls_mask & TLS_TLS) != 0
15033 && (tls_mask & TLS_TPREL) == 0)
15034 {
15035 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15036 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15037 pinsn <<= 32;
15038 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15039 pinsn += ((2ULL << 56) + (-1ULL << 52)
15040 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15041 bfd_put_32 (input_bfd, pinsn >> 32,
15042 contents + rel->r_offset);
15043 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15044 contents + rel->r_offset + 4);
15045 r_type = R_PPC64_TPREL34;
15046 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15047 }
15048 break;
15049
411e1bfb 15050 case R_PPC64_TLS:
37da22e5 15051 if ((tls_mask & TLS_TLS) != 0
951fd09b 15052 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15053 {
c213164a 15054 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15055 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15056 if (insn == 0)
c213164a
AM
15057 break;
15058 if ((rel->r_offset & 3) == 0)
0d4792f7 15059 {
c213164a
AM
15060 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15061 /* Was PPC64_TLS which sits on insn boundary, now
15062 PPC64_TPREL16_LO which is at low-order half-word. */
15063 rel->r_offset += d_offset;
15064 r_type = R_PPC64_TPREL16_LO;
15065 if (toc_symndx != 0)
15066 {
15067 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15068 rel->r_addend = toc_addend;
15069 /* We changed the symbol. Start over in order to
15070 get h, sym, sec etc. right. */
15071 goto again;
15072 }
15073 else
15074 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15075 }
15076 else if ((rel->r_offset & 3) == 1)
15077 {
15078 /* For pcrel IE to LE we already have the full
15079 offset and thus don't need an addi here. A nop
15080 or mr will do. */
2365f8d7 15081 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15082 {
15083 /* Extract regs from addi rt,ra,si. */
15084 unsigned int rt = (insn >> 21) & 0x1f;
15085 unsigned int ra = (insn >> 16) & 0x1f;
15086 if (rt == ra)
15087 insn = NOP;
15088 else
15089 {
15090 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15091 insn = (rt << 16) | (ra << 21) | (ra << 11);
15092 insn |= (31u << 26) | (444u << 1);
15093 }
15094 }
15095 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15096 }
411e1bfb
AM
15097 }
15098 break;
15099
411e1bfb
AM
15100 case R_PPC64_GOT_TLSGD16_HI:
15101 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15102 tls_gd = TLS_GDIE;
37da22e5 15103 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15104 goto tls_gdld_hi;
15105 break;
15106
411e1bfb
AM
15107 case R_PPC64_GOT_TLSLD16_HI:
15108 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15109 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15110 {
951fd09b
AM
15111 tls_gdld_hi:
15112 if ((tls_mask & tls_gd) != 0)
15113 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15114 + R_PPC64_GOT_TPREL16_DS);
15115 else
411e1bfb 15116 {
4fe5ca5b 15117 rel->r_offset -= d_offset;
95f0d0d2 15118 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15119 r_type = R_PPC64_NONE;
411e1bfb 15120 }
951fd09b 15121 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15122 }
15123 break;
15124
951fd09b
AM
15125 case R_PPC64_GOT_TLSGD16:
15126 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15127 tls_gd = TLS_GDIE;
37da22e5 15128 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15129 goto tls_ldgd_opt;
951fd09b 15130 break;
411e1bfb 15131
951fd09b
AM
15132 case R_PPC64_GOT_TLSLD16:
15133 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15134 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15135 {
b9f04fe0 15136 unsigned int insn1, insn2;
102890f0
AM
15137
15138 tls_ldgd_opt:
727fc41e
AM
15139 offset = (bfd_vma) -1;
15140 /* If not using the newer R_PPC64_TLSGD/LD to mark
15141 __tls_get_addr calls, we must trust that the call
15142 stays with its arg setup insns, ie. that the next
15143 reloc is the __tls_get_addr call associated with
15144 the current reloc. Edit both insns. */
9737e8af 15145 if (input_section->nomark_tls_get_addr
727fc41e
AM
15146 && rel + 1 < relend
15147 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15148 htab->tls_get_addr_fd,
15149 htab->tga_desc_fd,
727fc41e 15150 htab->tls_get_addr,
9e7028aa 15151 htab->tga_desc))
727fc41e 15152 offset = rel[1].r_offset;
b86ac8e3
AM
15153 /* We read the low GOT_TLS (or TOC16) insn because we
15154 need to keep the destination reg. It may be
15155 something other than the usual r3, and moved to r3
15156 before the call by intervening code. */
95f0d0d2 15157 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15158 contents + rel->r_offset - d_offset);
102890f0 15159 if ((tls_mask & tls_gd) != 0)
411e1bfb 15160 {
102890f0 15161 /* IE */
b86ac8e3 15162 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15163 insn1 |= 58u << 26; /* ld */
102890f0 15164 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15165 if (offset != (bfd_vma) -1)
f58d5a2d 15166 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15167 if (r_type == R_PPC64_TOC16
15168 || r_type == R_PPC64_TOC16_LO)
102890f0 15169 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15170 else
15171 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15172 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15173 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15174 }
15175 else
15176 {
15177 /* LE */
b86ac8e3
AM
15178 insn1 &= 0x1f << 21;
15179 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15180 insn2 = 0x38630000; /* addi 3,3,0 */
15181 if (tls_gd == 0)
951fd09b 15182 {
102890f0 15183 /* Was an LD reloc. */
71c4e95a 15184 r_symndx = STN_UNDEF;
102890f0 15185 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15186 }
102890f0 15187 else if (toc_symndx != 0)
3a71aa26
AM
15188 {
15189 r_symndx = toc_symndx;
15190 rel->r_addend = toc_addend;
15191 }
102890f0
AM
15192 r_type = R_PPC64_TPREL16_HA;
15193 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15194 if (offset != (bfd_vma) -1)
15195 {
15196 rel[1].r_info = ELF64_R_INFO (r_symndx,
15197 R_PPC64_TPREL16_LO);
15198 rel[1].r_offset = offset + d_offset;
15199 rel[1].r_addend = rel->r_addend;
15200 }
102890f0 15201 }
95f0d0d2 15202 bfd_put_32 (input_bfd, insn1,
3a71aa26 15203 contents + rel->r_offset - d_offset);
727fc41e 15204 if (offset != (bfd_vma) -1)
c96e0573
AM
15205 {
15206 bfd_put_32 (input_bfd, insn2, contents + offset);
15207 if (offset + 8 <= input_section->size)
15208 {
15209 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15210 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15211 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15212 }
15213 }
727fc41e
AM
15214 if ((tls_mask & tls_gd) == 0
15215 && (tls_gd == 0 || toc_symndx != 0))
15216 {
15217 /* We changed the symbol. Start over in order
15218 to get h, sym, sec etc. right. */
c316a17c 15219 goto again;
727fc41e
AM
15220 }
15221 }
15222 break;
15223
87c69f97 15224 case R_PPC64_GOT_TLSGD_PCREL34:
c213164a
AM
15225 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15226 {
15227 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15228 pinsn <<= 32;
15229 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15230 if ((tls_mask & TLS_GDIE) != 0)
15231 {
15232 /* IE, pla -> pld */
15233 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
87c69f97 15234 r_type = R_PPC64_GOT_TPREL_PCREL34;
c213164a
AM
15235 }
15236 else
15237 {
15238 /* LE, pla pcrel -> paddi r13 */
15239 pinsn += (-1ULL << 52) + (13ULL << 16);
15240 r_type = R_PPC64_TPREL34;
15241 }
15242 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15243 bfd_put_32 (input_bfd, pinsn >> 32,
15244 contents + rel->r_offset);
15245 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15246 contents + rel->r_offset + 4);
15247 }
15248 break;
15249
87c69f97 15250 case R_PPC64_GOT_TLSLD_PCREL34:
c213164a
AM
15251 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15252 {
15253 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15254 pinsn <<= 32;
15255 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15256 pinsn += (-1ULL << 52) + (13ULL << 16);
15257 bfd_put_32 (input_bfd, pinsn >> 32,
15258 contents + rel->r_offset);
15259 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15260 contents + rel->r_offset + 4);
15261 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15262 r_symndx = STN_UNDEF;
15263 r_type = R_PPC64_TPREL34;
15264 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15265 goto again;
15266 }
15267 break;
15268
727fc41e 15269 case R_PPC64_TLSGD:
37da22e5 15270 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15271 && rel + 1 < relend)
727fc41e 15272 {
b9f04fe0 15273 unsigned int insn2;
5663e321 15274 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15275
4a421c53 15276 offset = rel->r_offset;
5663e321 15277 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15278 {
15279 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15280 if (r_type1 == R_PPC64_PLT_PCREL34
15281 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15282 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15283 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15284 break;
15285 }
15286
15287 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15288 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15289
b00a0a86 15290 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15291 {
15292 /* IE */
15293 r_type = R_PPC64_NONE;
15294 insn2 = 0x7c636a14; /* add 3,3,13 */
15295 }
15296 else
15297 {
15298 /* LE */
15299 if (toc_symndx != 0)
15300 {
15301 r_symndx = toc_symndx;
15302 rel->r_addend = toc_addend;
15303 }
c213164a
AM
15304 if (r_type1 == R_PPC64_REL24_NOTOC
15305 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15306 {
15307 r_type = R_PPC64_NONE;
15308 insn2 = NOP;
15309 }
15310 else
15311 {
15312 rel->r_offset = offset + d_offset;
15313 r_type = R_PPC64_TPREL16_LO;
15314 insn2 = 0x38630000; /* addi 3,3,0 */
15315 }
727fc41e
AM
15316 }
15317 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15318 /* Zap the reloc on the _tls_get_addr call too. */
15319 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15320 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15321 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15322 if ((tls_mask & TLS_GDIE) == 0
15323 && toc_symndx != 0
15324 && r_type != R_PPC64_NONE)
c316a17c 15325 goto again;
411e1bfb 15326 }
411e1bfb
AM
15327 break;
15328
727fc41e 15329 case R_PPC64_TLSLD:
37da22e5 15330 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15331 && rel + 1 < relend)
727fc41e 15332 {
b9f04fe0 15333 unsigned int insn2;
5663e321 15334 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15335
4a421c53 15336 offset = rel->r_offset;
5663e321 15337 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15338 {
15339 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15340 if (r_type1 == R_PPC64_PLT_PCREL34
15341 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15342 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15343 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15344 break;
15345 }
15346
15347 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15348 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15349
c213164a
AM
15350 if (r_type1 == R_PPC64_REL24_NOTOC
15351 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15352 {
15353 r_type = R_PPC64_NONE;
15354 insn2 = NOP;
15355 }
15356 else
15357 {
15358 rel->r_offset = offset + d_offset;
15359 r_symndx = STN_UNDEF;
15360 r_type = R_PPC64_TPREL16_LO;
15361 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15362 insn2 = 0x38630000; /* addi 3,3,0 */
15363 }
727fc41e 15364 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15365 /* Zap the reloc on the _tls_get_addr call too. */
15366 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15367 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15368 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15369 if (r_type != R_PPC64_NONE)
15370 goto again;
727fc41e
AM
15371 }
15372 break;
15373
411e1bfb 15374 case R_PPC64_DTPMOD64:
951fd09b
AM
15375 if (rel + 1 < relend
15376 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15377 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15378 {
951fd09b
AM
15379 if ((tls_mask & TLS_GD) == 0)
15380 {
15381 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15382 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15383 r_type = R_PPC64_TPREL64;
15384 else
15385 {
4ce794b7 15386 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15387 r_type = R_PPC64_NONE;
15388 }
15389 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15390 }
15391 }
15392 else
15393 {
15394 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15395 {
4ce794b7 15396 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15397 r_type = R_PPC64_NONE;
951fd09b 15398 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15399 }
411e1bfb
AM
15400 }
15401 break;
15402
15403 case R_PPC64_TPREL64:
951fd09b 15404 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15405 {
15406 r_type = R_PPC64_NONE;
15407 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15408 }
15409 break;
52a82034 15410
006589cf
AM
15411 case R_PPC64_ENTRY:
15412 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15413 if (!bfd_link_pic (info)
15414 && !info->traditional_format
15415 && relocation + 0x80008000 <= 0xffffffff)
15416 {
15417 unsigned int insn1, insn2;
15418
15419 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15420 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15421 if ((insn1 & ~0xfffc) == LD_R2_0R12
15422 && insn2 == ADD_R2_R2_R12)
15423 {
95f0d0d2 15424 bfd_put_32 (input_bfd,
006589cf
AM
15425 LIS_R2 + PPC_HA (relocation),
15426 contents + rel->r_offset);
95f0d0d2 15427 bfd_put_32 (input_bfd,
006589cf
AM
15428 ADDI_R2_R2 + PPC_LO (relocation),
15429 contents + rel->r_offset + 4);
15430 }
15431 }
15432 else
15433 {
15434 relocation -= (rel->r_offset
15435 + input_section->output_offset
15436 + input_section->output_section->vma);
15437 if (relocation + 0x80008000 <= 0xffffffff)
15438 {
15439 unsigned int insn1, insn2;
15440
15441 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15442 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15443 if ((insn1 & ~0xfffc) == LD_R2_0R12
15444 && insn2 == ADD_R2_R2_R12)
15445 {
95f0d0d2 15446 bfd_put_32 (input_bfd,
006589cf
AM
15447 ADDIS_R2_R12 + PPC_HA (relocation),
15448 contents + rel->r_offset);
95f0d0d2 15449 bfd_put_32 (input_bfd,
006589cf
AM
15450 ADDI_R2_R2 + PPC_LO (relocation),
15451 contents + rel->r_offset + 4);
15452 }
15453 }
15454 }
15455 break;
15456
52a82034
AM
15457 case R_PPC64_REL16_HA:
15458 /* If we are generating a non-PIC executable, edit
15459 . 0: addis 2,12,.TOC.-0b@ha
15460 . addi 2,2,.TOC.-0b@l
15461 used by ELFv2 global entry points to set up r2, to
15462 . lis 2,.TOC.@ha
15463 . addi 2,2,.TOC.@l
15464 if .TOC. is in range. */
0e1862bb 15465 if (!bfd_link_pic (info)
810d4e75 15466 && !info->traditional_format
006589cf 15467 && !htab->opd_abi
4f038ee5 15468 && rel->r_addend == d_offset
52a82034
AM
15469 && h != NULL && &h->elf == htab->elf.hgot
15470 && rel + 1 < relend
15471 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15472 && rel[1].r_offset == rel->r_offset + 4
15473 && rel[1].r_addend == rel->r_addend + 4
15474 && relocation + 0x80008000 <= 0xffffffff)
15475 {
15476 unsigned int insn1, insn2;
4a421c53 15477 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15478 insn1 = bfd_get_32 (input_bfd, contents + offset);
15479 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15480 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15481 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15482 {
15483 r_type = R_PPC64_ADDR16_HA;
15484 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15485 rel->r_addend -= d_offset;
15486 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15487 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15488 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15489 }
15490 }
15491 break;
411e1bfb
AM
15492 }
15493
15494 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15495 insn = 0;
b25116a9
AM
15496 max_br_offset = 1 << 25;
15497 addend = rel->r_addend;
bc30df16 15498 reloc_dest = DEST_NORMAL;
65f38f15 15499 switch (r_type)
5bd4f169
AM
15500 {
15501 default:
65f38f15 15502 break;
5bd4f169 15503
3b421ab3
AM
15504 case R_PPC64_TOCSAVE:
15505 if (relocation + addend == (rel->r_offset
15506 + input_section->output_offset
15507 + input_section->output_section->vma)
15508 && tocsave_find (htab, NO_INSERT,
15509 &local_syms, rel, input_bfd))
15510 {
15511 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15512 if (insn == NOP
15513 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15514 bfd_put_32 (input_bfd,
15515 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15516 contents + rel->r_offset);
15517 }
15518 break;
15519
65f38f15
AM
15520 /* Branch taken prediction relocations. */
15521 case R_PPC64_ADDR14_BRTAKEN:
15522 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15523 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15524 /* Fall through. */
65f38f15 15525
86c76c7b 15526 /* Branch not taken prediction relocations. */
65f38f15
AM
15527 case R_PPC64_ADDR14_BRNTAKEN:
15528 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15529 insn |= bfd_get_32 (input_bfd,
411e1bfb 15530 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15531 /* Fall through. */
86c76c7b 15532
b25116a9
AM
15533 case R_PPC64_REL14:
15534 max_br_offset = 1 << 15;
1a0670f3 15535 /* Fall through. */
5bd4f169 15536
65f38f15 15537 case R_PPC64_REL24:
05d0e962 15538 case R_PPC64_REL24_NOTOC:
23cedd1d 15539 case R_PPC64_PLTCALL:
5663e321 15540 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15541 /* Calls to functions with a different TOC, such as calls to
15542 shared objects, need to alter the TOC pointer. This is
15543 done using a linkage stub. A REL24 branching to these
15544 linkage stubs needs to be followed by a nop, as the nop
15545 will be replaced with an instruction to restore the TOC
15546 base pointer. */
8387904d 15547 fdh = h;
b31867b6
AM
15548 if (h != NULL
15549 && h->oh != NULL
15550 && h->oh->is_func_descriptor)
15551 fdh = ppc_follow_link (h->oh);
31c76678
DK
15552 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15553 htab);
5663e321
AM
15554 if ((r_type == R_PPC64_PLTCALL
15555 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15556 && stub_entry != NULL
05d0e962
AM
15557 && stub_entry->stub_type >= ppc_stub_plt_call
15558 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15559 stub_entry = NULL;
15560
6abec6bc 15561 if (stub_entry != NULL
d0abeec8
AM
15562 && ((stub_entry->stub_type >= ppc_stub_plt_call
15563 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15564 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15565 || stub_entry->stub_type == ppc_stub_plt_branch_both
15566 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15567 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15568 {
b25116a9 15569 bfd_boolean can_plt_call = FALSE;
721956f4 15570
6e1816be
AM
15571 if (stub_entry->stub_type == ppc_stub_plt_call
15572 && !htab->opd_abi
15573 && htab->params->plt_localentry0 != 0
15574 && is_elfv2_localentry0 (&h->elf))
15575 {
15576 /* The function doesn't use or change r2. */
15577 can_plt_call = TRUE;
15578 }
05d0e962
AM
15579 else if (r_type == R_PPC64_REL24_NOTOC)
15580 {
15581 /* NOTOC calls don't need to restore r2. */
15582 can_plt_call = TRUE;
15583 }
6e1816be 15584
f378ab09 15585 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15586 branch and link followed by a nop. The nop is
15587 replaced by an insn to restore r2. */
6e1816be 15588 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15589 {
ba8ca3e7
AM
15590 unsigned long br;
15591
15592 br = bfd_get_32 (input_bfd,
15593 contents + rel->r_offset);
15594 if ((br & 1) != 0)
41bd81ab 15595 {
ba8ca3e7
AM
15596 unsigned long nop;
15597
15598 nop = bfd_get_32 (input_bfd,
15599 contents + rel->r_offset + 4);
23cedd1d
AM
15600 if (nop == LD_R2_0R1 + STK_TOC (htab))
15601 can_plt_call = TRUE;
15602 else if (nop == NOP
15603 || nop == CROR_151515
15604 || nop == CROR_313131)
a7f2871e 15605 {
ba8ca3e7 15606 if (h != NULL
ed7007c1 15607 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15608 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15609 {
15610 /* Special stub used, leave nop alone. */
15611 }
15612 else
a078d95a
AM
15613 bfd_put_32 (input_bfd,
15614 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15615 contents + rel->r_offset + 4);
15616 can_plt_call = TRUE;
a7f2871e 15617 }
41bd81ab 15618 }
5bd4f169 15619 }
721956f4 15620
ba8ca3e7 15621 if (!can_plt_call && h != NULL)
721956f4 15622 {
ba8ca3e7
AM
15623 const char *name = h->elf.root.root.string;
15624
15625 if (*name == '.')
15626 ++name;
15627
15628 if (strncmp (name, "__libc_start_main", 17) == 0
15629 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15630 {
ba8ca3e7
AM
15631 /* Allow crt1 branch to go via a toc adjusting
15632 stub. Other calls that never return could do
15633 the same, if we could detect such. */
b25116a9 15634 can_plt_call = TRUE;
6ab189d5 15635 }
ba8ca3e7
AM
15636 }
15637
15638 if (!can_plt_call)
15639 {
15640 /* g++ as of 20130507 emits self-calls without a
15641 following nop. This is arguably wrong since we
15642 have conflicting information. On the one hand a
15643 global symbol and on the other a local call
15644 sequence, but don't error for this special case.
15645 It isn't possible to cheaply verify we have
15646 exactly such a call. Allow all calls to the same
15647 section. */
15648 asection *code_sec = sec;
15649
15650 if (get_opd_info (sec) != NULL)
ad8e1ba5 15651 {
ba8ca3e7
AM
15652 bfd_vma off = (relocation + addend
15653 - sec->output_section->vma
15654 - sec->output_offset);
bc30df16 15655
ba8ca3e7 15656 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15657 }
ba8ca3e7
AM
15658 if (code_sec == input_section)
15659 can_plt_call = TRUE;
15660 }
15661
15662 if (!can_plt_call)
15663 {
05d0e962
AM
15664 if (stub_entry->stub_type >= ppc_stub_plt_call
15665 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15666 info->callbacks->einfo
695344c0 15667 /* xgettext:c-format */
c1c8c1ef 15668 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15669 "(plt call stub)\n"),
4805fc55
AM
15670 input_bfd, input_section, rel->r_offset, sym_name);
15671 else
15672 info->callbacks->einfo
695344c0 15673 /* xgettext:c-format */
c1c8c1ef 15674 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15675 "(toc save/adjust stub)\n"),
4805fc55 15676 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15677
15678 bfd_set_error (bfd_error_bad_value);
15679 ret = FALSE;
721956f4
AM
15680 }
15681
b25116a9 15682 if (can_plt_call
05d0e962
AM
15683 && stub_entry->stub_type >= ppc_stub_plt_call
15684 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15685 unresolved_reloc = FALSE;
15686 }
15687
6abec6bc
AM
15688 if ((stub_entry == NULL
15689 || stub_entry->stub_type == ppc_stub_long_branch
15690 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15691 && get_opd_info (sec) != NULL)
15692 {
15693 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15694 bfd_vma off = (relocation + addend
15695 - sec->output_section->vma
15696 - sec->output_offset);
aef36ac1 15697 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15698 if (dest != (bfd_vma) -1)
15699 {
15700 relocation = dest;
15701 addend = 0;
bc30df16 15702 reloc_dest = DEST_OPD;
8387904d
AM
15703 }
15704 }
15705
b25116a9
AM
15706 /* If the branch is out of reach we ought to have a long
15707 branch stub. */
15708 from = (rel->r_offset
15709 + input_section->output_offset
15710 + input_section->output_section->vma);
15711
6911b7dc
AM
15712 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15713 ? fdh->elf.other
15714 : sym->st_other);
15715
6abec6bc
AM
15716 if (stub_entry != NULL
15717 && (stub_entry->stub_type == ppc_stub_long_branch
15718 || stub_entry->stub_type == ppc_stub_plt_branch)
15719 && (r_type == R_PPC64_ADDR14_BRTAKEN
15720 || r_type == R_PPC64_ADDR14_BRNTAKEN
15721 || (relocation + addend - from + max_br_offset
15722 < 2 * max_br_offset)))
15723 /* Don't use the stub if this branch is in range. */
15724 stub_entry = NULL;
b25116a9 15725
05d0e962
AM
15726 if (stub_entry != NULL
15727 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15728 || stub_entry->stub_type == ppc_stub_long_branch_both
15729 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15730 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15731 && (r_type != R_PPC64_REL24_NOTOC
15732 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15733 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15734 && (relocation + addend - from + max_br_offset
15735 < 2 * max_br_offset))
15736 stub_entry = NULL;
15737
15738 if (stub_entry != NULL
15739 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15740 || stub_entry->stub_type == ppc_stub_long_branch_both
15741 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15742 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15743 && r_type == R_PPC64_REL24_NOTOC
15744 && (relocation + addend - from + max_br_offset
15745 < 2 * max_br_offset))
15746 stub_entry = NULL;
15747
b25116a9
AM
15748 if (stub_entry != NULL)
15749 {
15750 /* Munge up the value and addend so that we call the stub
15751 rather than the procedure directly. */
a4b6fadd
AM
15752 asection *stub_sec = stub_entry->group->stub_sec;
15753
15754 if (stub_entry->stub_type == ppc_stub_save_res)
15755 relocation += (stub_sec->output_offset
15756 + stub_sec->output_section->vma
15757 + stub_sec->size - htab->sfpr->size
15758 - htab->sfpr->output_offset
15759 - htab->sfpr->output_section->vma);
15760 else
15761 relocation = (stub_entry->stub_offset
15762 + stub_sec->output_offset
15763 + stub_sec->output_section->vma);
b25116a9 15764 addend = 0;
bc30df16 15765 reloc_dest = DEST_STUB;
3b421ab3 15766
05d0e962
AM
15767 if (((stub_entry->stub_type == ppc_stub_plt_call
15768 && ALWAYS_EMIT_R2SAVE)
15769 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15770 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93 15771 && !(h != NULL
ed7007c1 15772 && is_tls_get_addr (&h->elf, htab)
e81b4c93 15773 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15774 && rel + 1 < relend
15775 && rel[1].r_offset == rel->r_offset + 4
15776 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15777 relocation += 4;
05d0e962
AM
15778 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15779 || stub_entry->stub_type == ppc_stub_plt_branch_both
15780 || stub_entry->stub_type == ppc_stub_plt_call_both)
15781 && r_type == R_PPC64_REL24_NOTOC)
15782 relocation += 4;
5663e321
AM
15783
15784 if (r_type == R_PPC64_REL24_NOTOC
15785 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15786 || stub_entry->stub_type == ppc_stub_plt_call_both))
15787 htab->notoc_plt = 1;
b25116a9
AM
15788 }
15789
15790 if (insn != 0)
15791 {
794e51c0 15792 if (is_isa_v2)
721956f4 15793 {
b25116a9
AM
15794 /* Set 'a' bit. This is 0b00010 in BO field for branch
15795 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15796 for branch on CTR insns (BO == 1a00t or 1a01t). */
15797 if ((insn & (0x14 << 21)) == (0x04 << 21))
15798 insn |= 0x02 << 21;
15799 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15800 insn |= 0x08 << 21;
15801 else
15802 break;
15803 }
15804 else
15805 {
15806 /* Invert 'y' bit if not the default. */
4cc603a5 15807 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15808 insn ^= 0x01 << 21;
721956f4 15809 }
b25116a9 15810
95f0d0d2 15811 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15812 }
e86ce104 15813
06da1e8e
AM
15814 /* NOP out calls to undefined weak functions.
15815 We can thus call a weak function without first
15816 checking whether the function is defined. */
b25116a9 15817 else if (h != NULL
039b3fef 15818 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15819 && h->elf.dynindx == -1
05d0e962
AM
15820 && (r_type == R_PPC64_REL24
15821 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15822 && relocation == 0
4cc603a5 15823 && addend == 0)
e86ce104 15824 {
95f0d0d2 15825 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15826 goto copy_reloc;
e86ce104 15827 }
65f38f15 15828 break;
066f4018
AM
15829
15830 case R_PPC64_GOT16_DS:
06507dab
AM
15831 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15832 break;
066f4018
AM
15833 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15834 if (relocation + addend - from + 0x8000 < 0x10000
15835 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15836 {
15837 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15838 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15839 {
15840 insn += (14u << 26) - (58u << 26);
15841 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15842 r_type = R_PPC64_TOC16;
15843 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15844 }
15845 }
15846 break;
15847
15848 case R_PPC64_GOT16_LO_DS:
15849 case R_PPC64_GOT16_HA:
06507dab
AM
15850 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15851 break;
066f4018
AM
15852 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15853 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15854 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15855 {
15856 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15857 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15858 {
15859 insn += (14u << 26) - (58u << 26);
15860 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15861 r_type = R_PPC64_TOC16_LO;
15862 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15863 }
2365f8d7 15864 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15865 {
15866 r_type = R_PPC64_TOC16_HA;
15867 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15868 }
15869 }
15870 break;
4a421c53
AM
15871
15872 case R_PPC64_GOT_PCREL34:
06507dab
AM
15873 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15874 break;
4a421c53
AM
15875 from = (rel->r_offset
15876 + input_section->output_section->vma
15877 + input_section->output_offset);
15878 if (relocation - from + (1ULL << 33) < 1ULL << 34
15879 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15880 {
15881 offset = rel->r_offset;
15882 pinsn = bfd_get_32 (input_bfd, contents + offset);
15883 pinsn <<= 32;
15884 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15885 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15886 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15887 {
15888 /* Replace with paddi. */
15889 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15890 r_type = R_PPC64_PCREL34;
15891 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15892 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15893 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15894 goto pcrelopt;
15895 }
15896 }
15897 break;
15898
15899 case R_PPC64_PCREL34:
15900 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15901 {
15902 offset = rel->r_offset;
15903 pinsn = bfd_get_32 (input_bfd, contents + offset);
15904 pinsn <<= 32;
15905 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15906 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15907 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15908 | (14ULL << 26) /* paddi */))
15909 {
15910 pcrelopt:
15911 if (rel + 1 < relend
15912 && rel[1].r_offset == offset
15913 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15914 {
15915 bfd_vma off2 = rel[1].r_addend;
15916 if (off2 == 0)
15917 /* zero means next insn. */
15918 off2 = 8;
15919 off2 += offset;
15920 if (off2 + 4 <= input_section->size)
15921 {
15922 uint64_t pinsn2;
dd9b12c2 15923 bfd_signed_vma addend_off;
4a421c53
AM
15924 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15925 pinsn2 <<= 32;
15926 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15927 {
15928 if (off2 + 8 > input_section->size)
15929 break;
15930 pinsn2 |= bfd_get_32 (input_bfd,
15931 contents + off2 + 4);
15932 }
dd9b12c2 15933 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15934 {
dd9b12c2
AM
15935 addend += addend_off;
15936 rel->r_addend = addend;
4a421c53
AM
15937 bfd_put_32 (input_bfd, pinsn >> 32,
15938 contents + offset);
15939 bfd_put_32 (input_bfd, pinsn,
15940 contents + offset + 4);
15941 bfd_put_32 (input_bfd, pinsn2 >> 32,
15942 contents + off2);
77486630
AM
15943 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15944 bfd_put_32 (input_bfd, pinsn2,
15945 contents + off2 + 4);
4a421c53
AM
15946 }
15947 }
15948 }
15949 }
15950 }
15951 break;
65f38f15 15952 }
5bd4f169 15953
411e1bfb 15954 tls_type = 0;
23cedd1d 15955 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15956 switch (r_type)
15957 {
15958 default:
cf97bcb0
AM
15959 /* xgettext:c-format */
15960 _bfd_error_handler (_("%pB: %s unsupported"),
15961 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15962
65f38f15 15963 bfd_set_error (bfd_error_bad_value);
b34976b6 15964 ret = FALSE;
c316a17c 15965 goto copy_reloc;
5bd4f169 15966
65f38f15 15967 case R_PPC64_NONE:
411e1bfb 15968 case R_PPC64_TLS:
727fc41e
AM
15969 case R_PPC64_TLSGD:
15970 case R_PPC64_TLSLD:
3b421ab3 15971 case R_PPC64_TOCSAVE:
04c9666a
AM
15972 case R_PPC64_GNU_VTINHERIT:
15973 case R_PPC64_GNU_VTENTRY:
006589cf 15974 case R_PPC64_ENTRY:
4a421c53 15975 case R_PPC64_PCREL_OPT:
c316a17c 15976 goto copy_reloc;
5bd4f169
AM
15977
15978 /* GOT16 relocations. Like an ADDR16 using the symbol's
15979 address in the GOT as relocation value instead of the
411e1bfb 15980 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15981 symbol and put the symbol value there. */
411e1bfb
AM
15982 case R_PPC64_GOT_TLSGD16:
15983 case R_PPC64_GOT_TLSGD16_LO:
15984 case R_PPC64_GOT_TLSGD16_HI:
15985 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 15986 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 15987 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15988 goto dogot;
15989
15990 case R_PPC64_GOT_TLSLD16:
15991 case R_PPC64_GOT_TLSLD16_LO:
15992 case R_PPC64_GOT_TLSLD16_HI:
15993 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 15994 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 15995 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15996 goto dogot;
15997
15998 case R_PPC64_GOT_TPREL16_DS:
15999 case R_PPC64_GOT_TPREL16_LO_DS:
16000 case R_PPC64_GOT_TPREL16_HI:
16001 case R_PPC64_GOT_TPREL16_HA:
87c69f97 16002 case R_PPC64_GOT_TPREL_PCREL34:
411e1bfb
AM
16003 tls_type = TLS_TLS | TLS_TPREL;
16004 goto dogot;
16005
16006 case R_PPC64_GOT_DTPREL16_DS:
16007 case R_PPC64_GOT_DTPREL16_LO_DS:
16008 case R_PPC64_GOT_DTPREL16_HI:
16009 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 16010 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
16011 tls_type = TLS_TLS | TLS_DTPREL;
16012 goto dogot;
16013
65f38f15
AM
16014 case R_PPC64_GOT16:
16015 case R_PPC64_GOT16_LO:
16016 case R_PPC64_GOT16_HI:
16017 case R_PPC64_GOT16_HA:
16018 case R_PPC64_GOT16_DS:
16019 case R_PPC64_GOT16_LO_DS:
5663e321 16020 case R_PPC64_GOT_PCREL34:
411e1bfb 16021 dogot:
5bd4f169
AM
16022 {
16023 /* Relocation is to the entry for this symbol in the global
16024 offset table. */
e717da7e 16025 asection *got;
d881513a 16026 bfd_vma *offp;
5bd4f169 16027 bfd_vma off;
d881513a 16028 unsigned long indx = 0;
927be08e 16029 struct got_entry *ent;
65f38f15 16030
d881513a 16031 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 16032 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 16033 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16034 else
5bd4f169 16035 {
d881513a
AM
16036 if (h != NULL)
16037 {
f0158f44
AM
16038 if (!htab->elf.dynamic_sections_created
16039 || h->elf.dynindx == -1
16040 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16041 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16042 /* This is actually a static link, or it is a
16043 -Bsymbolic link and the symbol is defined
16044 locally, or the symbol was forced to be local
16045 because of a version file. */
16046 ;
16047 else
16048 {
039b3fef 16049 indx = h->elf.dynindx;
d881513a
AM
16050 unresolved_reloc = FALSE;
16051 }
039b3fef 16052 ent = h->elf.got.glist;
d881513a 16053 }
411e1bfb 16054 else
5bd4f169 16055 {
d881513a
AM
16056 if (local_got_ents == NULL)
16057 abort ();
16058 ent = local_got_ents[r_symndx];
5bd4f169 16059 }
d881513a
AM
16060
16061 for (; ent != NULL; ent = ent->next)
133a1f60 16062 if (ent->addend == orig_rel.r_addend
e717da7e 16063 && ent->owner == input_bfd
d881513a
AM
16064 && ent->tls_type == tls_type)
16065 break;
5bd4f169 16066 }
411e1bfb 16067
927be08e
AM
16068 if (ent == NULL)
16069 abort ();
16070 if (ent->is_indirect)
16071 ent = ent->got.ent;
16072 offp = &ent->got.offset;
16073 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16074 if (got == NULL)
16075 abort ();
16076
411e1bfb
AM
16077 /* The offset must always be a multiple of 8. We use the
16078 least significant bit to record whether we have already
16079 processed this entry. */
d881513a 16080 off = *offp;
411e1bfb
AM
16081 if ((off & 1) != 0)
16082 off &= ~1;
5bd4f169
AM
16083 else
16084 {
411e1bfb
AM
16085 /* Generate relocs for the dynamic linker, except in
16086 the case of TLSLD where we'll use one entry per
16087 module. */
25f23106
AM
16088 asection *relgot;
16089 bfd_boolean ifunc;
e717da7e 16090
d881513a 16091 *offp = off | 1;
25f23106
AM
16092 relgot = NULL;
16093 ifunc = (h != NULL
16094 ? h->elf.type == STT_GNU_IFUNC
16095 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16096 if (ifunc)
82e66161
AM
16097 {
16098 relgot = htab->elf.irelplt;
efb2a7b4 16099 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16100 htab->elf.ifunc_resolvers = TRUE;
82e66161 16101 }
f0158f44
AM
16102 else if (indx != 0
16103 || (bfd_link_pic (info)
16104 && (h == NULL
f749f26e
AM
16105 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16106 && !(tls_type != 0
f15d0b54
AM
16107 && bfd_link_executable (info)
16108 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 16109 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16110 if (relgot != NULL)
5bd4f169 16111 {
e717da7e
AM
16112 outrel.r_offset = (got->output_section->vma
16113 + got->output_offset
411e1bfb 16114 + off);
133a1f60 16115 outrel.r_addend = orig_rel.r_addend;
d881513a 16116 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16117 {
411e1bfb 16118 outrel.r_addend = 0;
e515b051 16119 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16120 if (tls_type == (TLS_TLS | TLS_GD))
16121 {
e717da7e
AM
16122 loc = relgot->contents;
16123 loc += (relgot->reloc_count++
d881513a
AM
16124 * sizeof (Elf64_External_Rela));
16125 bfd_elf64_swap_reloca_out (output_bfd,
16126 &outrel, loc);
e515b051 16127 outrel.r_offset += 8;
133a1f60 16128 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16129 outrel.r_info
16130 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16131 }
411e1bfb 16132 }
951fd09b 16133 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16134 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16135 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16136 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16137 else if (indx != 0)
16138 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16139 else
81407a69 16140 {
25f23106
AM
16141 if (ifunc)
16142 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16143 else
16144 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16145
16146 /* Write the .got section contents for the sake
16147 of prelink. */
e717da7e 16148 loc = got->contents + off;
23fbd6fa
JJ
16149 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16150 loc);
81407a69 16151 }
81407a69
AM
16152
16153 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16154 {
16155 outrel.r_addend += relocation;
16156 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16157 {
16158 if (htab->elf.tls_sec == NULL)
16159 outrel.r_addend = 0;
16160 else
16161 outrel.r_addend -= htab->elf.tls_sec->vma;
16162 }
e515b051 16163 }
e717da7e
AM
16164 loc = relgot->contents;
16165 loc += (relgot->reloc_count++
411e1bfb
AM
16166 * sizeof (Elf64_External_Rela));
16167 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16168 }
16169
ad8e1ba5 16170 /* Init the .got section contents here if we're not
81407a69 16171 emitting a reloc. */
d881513a 16172 else
411e1bfb 16173 {
133a1f60 16174 relocation += orig_rel.r_addend;
f0158f44 16175 if (tls_type != 0)
411e1bfb 16176 {
989f9879
AM
16177 if (htab->elf.tls_sec == NULL)
16178 relocation = 0;
16179 else
16180 {
f0158f44
AM
16181 if (tls_type & TLS_LD)
16182 relocation = 0;
16183 else
16184 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16185 if (tls_type & TLS_TPREL)
989f9879
AM
16186 relocation += DTP_OFFSET - TP_OFFSET;
16187 }
5bd4f169 16188
f0158f44 16189 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16190 {
16191 bfd_put_64 (output_bfd, relocation,
e717da7e 16192 got->contents + off + 8);
676ee2b5 16193 relocation = 1;
7b609f53 16194 }
411e1bfb
AM
16195 }
16196 bfd_put_64 (output_bfd, relocation,
e717da7e 16197 got->contents + off);
5bd4f169
AM
16198 }
16199 }
16200
65f38f15
AM
16201 if (off >= (bfd_vma) -2)
16202 abort ();
16203
bf102f86 16204 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16205 addend = 0;
c213164a 16206 if (!(r_type == R_PPC64_GOT_PCREL34
87c69f97
AM
16207 || r_type == R_PPC64_GOT_TLSGD_PCREL34
16208 || r_type == R_PPC64_GOT_TLSLD_PCREL34
16209 || r_type == R_PPC64_GOT_TPREL_PCREL34
16210 || r_type == R_PPC64_GOT_DTPREL_PCREL34))
5663e321 16211 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16212 }
65f38f15
AM
16213 break;
16214
16215 case R_PPC64_PLT16_HA:
16216 case R_PPC64_PLT16_HI:
16217 case R_PPC64_PLT16_LO:
08be3224 16218 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16219 case R_PPC64_PLT_PCREL34:
16220 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16221 case R_PPC64_PLT32:
16222 case R_PPC64_PLT64:
23cedd1d 16223 case R_PPC64_PLTSEQ:
5663e321 16224 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16225 case R_PPC64_PLTCALL:
5663e321 16226 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16227 /* Relocation is to the entry for this symbol in the
16228 procedure linkage table. */
23cedd1d 16229 unresolved_reloc = TRUE;
cbf95972
AM
16230 {
16231 struct plt_entry **plt_list = NULL;
16232 if (h != NULL)
16233 plt_list = &h->elf.plt.plist;
16234 else if (local_got_ents != NULL)
16235 {
16236 struct plt_entry **local_plt = (struct plt_entry **)
16237 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16238 plt_list = local_plt + r_symndx;
cbf95972
AM
16239 }
16240 if (plt_list)
16241 {
16242 struct plt_entry *ent;
65f38f15 16243
cbf95972
AM
16244 for (ent = *plt_list; ent != NULL; ent = ent->next)
16245 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16246 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16247 {
16248 asection *plt;
08be3224 16249 bfd_vma got;
cbf95972
AM
16250
16251 plt = htab->elf.splt;
16252 if (!htab->elf.dynamic_sections_created
16253 || h == NULL
16254 || h->elf.dynindx == -1)
2d7ad24e
AM
16255 {
16256 if (h != NULL
16257 ? h->elf.type == STT_GNU_IFUNC
16258 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16259 plt = htab->elf.iplt;
16260 else
16261 plt = htab->pltlocal;
16262 }
16263 relocation = (plt->output_section->vma
16264 + plt->output_offset
16265 + ent->plt.offset);
08be3224 16266 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16267 || r_type == R_PPC64_PLT16_HI
16268 || r_type == R_PPC64_PLT16_LO
16269 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16270 {
16271 got = (elf_gp (output_bfd)
16272 + htab->sec_info[input_section->id].toc_off);
16273 relocation -= got;
16274 }
133a1f60 16275 addend = 0;
cbf95972
AM
16276 unresolved_reloc = FALSE;
16277 break;
16278 }
16279 }
16280 }
65f38f15 16281 break;
5bd4f169 16282
0b13192e
AM
16283 case R_PPC64_TOC:
16284 /* Relocation value is TOC base. */
16285 relocation = TOCstart;
cf35638d 16286 if (r_symndx == STN_UNDEF)
6f20ed8a 16287 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16288 else if (unresolved_reloc)
16289 ;
6f20ed8a
AM
16290 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16291 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16292 else
16293 unresolved_reloc = TRUE;
ab96bf03 16294 goto dodyn;
0b13192e 16295
5bd4f169
AM
16296 /* TOC16 relocs. We want the offset relative to the TOC base,
16297 which is the address of the start of the TOC plus 0x8000.
16298 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16299 in this order. */
65f38f15
AM
16300 case R_PPC64_TOC16:
16301 case R_PPC64_TOC16_LO:
16302 case R_PPC64_TOC16_HI:
16303 case R_PPC64_TOC16_DS:
16304 case R_PPC64_TOC16_LO_DS:
16305 case R_PPC64_TOC16_HA:
6f20ed8a 16306 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16307 if (h != NULL)
16308 goto dodyn;
5bd4f169
AM
16309 break;
16310
16311 /* Relocate against the beginning of the section. */
65f38f15
AM
16312 case R_PPC64_SECTOFF:
16313 case R_PPC64_SECTOFF_LO:
16314 case R_PPC64_SECTOFF_HI:
16315 case R_PPC64_SECTOFF_DS:
16316 case R_PPC64_SECTOFF_LO_DS:
16317 case R_PPC64_SECTOFF_HA:
4ce794b7 16318 if (sec != NULL)
65f38f15 16319 addend -= sec->output_section->vma;
5bd4f169
AM
16320 break;
16321
25f23106
AM
16322 case R_PPC64_REL16:
16323 case R_PPC64_REL16_LO:
16324 case R_PPC64_REL16_HI:
16325 case R_PPC64_REL16_HA:
4a969973
AM
16326 case R_PPC64_REL16_HIGH:
16327 case R_PPC64_REL16_HIGHA:
16328 case R_PPC64_REL16_HIGHER:
16329 case R_PPC64_REL16_HIGHERA:
16330 case R_PPC64_REL16_HIGHEST:
16331 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16332 case R_PPC64_REL16_HIGHER34:
16333 case R_PPC64_REL16_HIGHERA34:
16334 case R_PPC64_REL16_HIGHEST34:
16335 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16336 case R_PPC64_REL16DX_HA:
721956f4
AM
16337 case R_PPC64_REL14:
16338 case R_PPC64_REL14_BRNTAKEN:
16339 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16340 case R_PPC64_REL24:
05d0e962 16341 case R_PPC64_REL24_NOTOC:
5663e321
AM
16342 case R_PPC64_PCREL34:
16343 case R_PPC64_PCREL28:
5d1634d7
AM
16344 break;
16345
411e1bfb
AM
16346 case R_PPC64_TPREL16:
16347 case R_PPC64_TPREL16_LO:
16348 case R_PPC64_TPREL16_HI:
16349 case R_PPC64_TPREL16_HA:
16350 case R_PPC64_TPREL16_DS:
16351 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16352 case R_PPC64_TPREL16_HIGH:
16353 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16354 case R_PPC64_TPREL16_HIGHER:
16355 case R_PPC64_TPREL16_HIGHERA:
16356 case R_PPC64_TPREL16_HIGHEST:
16357 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16358 case R_PPC64_TPREL34:
766bc656
AM
16359 if (h != NULL
16360 && h->elf.root.type == bfd_link_hash_undefweak
16361 && h->elf.dynindx == -1)
16362 {
16363 /* Make this relocation against an undefined weak symbol
16364 resolve to zero. This is really just a tweak, since
16365 code using weak externs ought to check that they are
16366 defined before using them. */
16367 bfd_byte *p = contents + rel->r_offset - d_offset;
16368
95f0d0d2 16369 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16370 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16371 if (insn != 0)
95f0d0d2 16372 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16373 break;
16374 }
989f9879
AM
16375 if (htab->elf.tls_sec != NULL)
16376 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16377 /* The TPREL16 relocs shouldn't really be used in shared
16378 libs or with non-local symbols as that will result in
16379 DT_TEXTREL being set, but support them anyway. */
16380 goto dodyn;
411e1bfb
AM
16381
16382 case R_PPC64_DTPREL16:
16383 case R_PPC64_DTPREL16_LO:
16384 case R_PPC64_DTPREL16_HI:
16385 case R_PPC64_DTPREL16_HA:
16386 case R_PPC64_DTPREL16_DS:
16387 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16388 case R_PPC64_DTPREL16_HIGH:
16389 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16390 case R_PPC64_DTPREL16_HIGHER:
16391 case R_PPC64_DTPREL16_HIGHERA:
16392 case R_PPC64_DTPREL16_HIGHEST:
16393 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16394 case R_PPC64_DTPREL34:
989f9879
AM
16395 if (htab->elf.tls_sec != NULL)
16396 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16397 break;
16398
45965137
AM
16399 case R_PPC64_ADDR64_LOCAL:
16400 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16401 ? h->elf.other
16402 : sym->st_other);
16403 break;
16404
e515b051
AM
16405 case R_PPC64_DTPMOD64:
16406 relocation = 1;
16407 addend = 0;
16408 goto dodyn;
16409
411e1bfb 16410 case R_PPC64_TPREL64:
989f9879
AM
16411 if (htab->elf.tls_sec != NULL)
16412 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16413 goto dodyn;
16414
16415 case R_PPC64_DTPREL64:
989f9879
AM
16416 if (htab->elf.tls_sec != NULL)
16417 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16418 /* Fall through. */
411e1bfb 16419
65f38f15
AM
16420 /* Relocations that may need to be propagated if this is a
16421 dynamic object. */
04c9666a 16422 case R_PPC64_REL30:
65f38f15
AM
16423 case R_PPC64_REL32:
16424 case R_PPC64_REL64:
16425 case R_PPC64_ADDR14:
16426 case R_PPC64_ADDR14_BRNTAKEN:
16427 case R_PPC64_ADDR14_BRTAKEN:
16428 case R_PPC64_ADDR16:
16429 case R_PPC64_ADDR16_DS:
16430 case R_PPC64_ADDR16_HA:
16431 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16432 case R_PPC64_ADDR16_HIGH:
16433 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16434 case R_PPC64_ADDR16_HIGHER:
16435 case R_PPC64_ADDR16_HIGHERA:
16436 case R_PPC64_ADDR16_HIGHEST:
16437 case R_PPC64_ADDR16_HIGHESTA:
16438 case R_PPC64_ADDR16_LO:
16439 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16440 case R_PPC64_ADDR16_HIGHER34:
16441 case R_PPC64_ADDR16_HIGHERA34:
16442 case R_PPC64_ADDR16_HIGHEST34:
16443 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16444 case R_PPC64_ADDR24:
65f38f15
AM
16445 case R_PPC64_ADDR32:
16446 case R_PPC64_ADDR64:
16447 case R_PPC64_UADDR16:
16448 case R_PPC64_UADDR32:
16449 case R_PPC64_UADDR64:
5663e321
AM
16450 case R_PPC64_D34:
16451 case R_PPC64_D34_LO:
16452 case R_PPC64_D34_HI30:
16453 case R_PPC64_D34_HA30:
16454 case R_PPC64_D28:
411e1bfb 16455 dodyn:
5d1634d7 16456 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16457 break;
16458
41bd81ab
AM
16459 if (NO_OPD_RELOCS && is_opd)
16460 break;
16461
8a9e8e72 16462 if (bfd_link_pic (info)
b1b07054 16463 ? ((h == NULL
190eb1dd 16464 || h->elf.dyn_relocs != NULL)
b1b07054
AM
16465 && ((h != NULL && pc_dynrelocs (h))
16466 || must_be_dyn_reloc (info, r_type)))
8a9e8e72 16467 : (h != NULL
190eb1dd 16468 ? h->elf.dyn_relocs != NULL
d311bc8b 16469 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16470 {
b34976b6 16471 bfd_boolean skip, relocate;
65f38f15 16472 asection *sreloc;
1cf1f670 16473 bfd_vma out_off;
82e66161 16474 long indx = 0;
65f38f15
AM
16475
16476 /* When generating a dynamic object, these relocations
16477 are copied into the output file to be resolved at run
16478 time. */
16479
b34976b6
AM
16480 skip = FALSE;
16481 relocate = FALSE;
65f38f15 16482
1cf1f670
AM
16483 out_off = _bfd_elf_section_offset (output_bfd, info,
16484 input_section, rel->r_offset);
16485 if (out_off == (bfd_vma) -1)
b34976b6 16486 skip = TRUE;
1cf1f670 16487 else if (out_off == (bfd_vma) -2)
b34976b6 16488 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16489 out_off += (input_section->output_section->vma
16490 + input_section->output_offset);
16491 outrel.r_offset = out_off;
411e1bfb 16492 outrel.r_addend = rel->r_addend;
65f38f15 16493
1cf1f670
AM
16494 /* Optimize unaligned reloc use. */
16495 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16496 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16497 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16498 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16499 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16500 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16501 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16502 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16503 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16504
65f38f15 16505 if (skip)
0bb2d96a 16506 memset (&outrel, 0, sizeof outrel);
afe397ea 16507 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16508 && !is_opd
16509 && r_type != R_PPC64_TOC)
14acf4dc 16510 {
82e66161
AM
16511 indx = h->elf.dynindx;
16512 BFD_ASSERT (indx != -1);
16513 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16514 }
65f38f15
AM
16515 else
16516 {
41bd81ab
AM
16517 /* This symbol is local, or marked to become local,
16518 or this is an opd section reloc which must point
16519 at a local function. */
65f38f15 16520 outrel.r_addend += relocation;
e86ce104 16521 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16522 {
3fad3c7c 16523 if (is_opd && h != NULL)
afbe61cf
AM
16524 {
16525 /* Lie about opd entries. This case occurs
16526 when building shared libraries and we
16527 reference a function in another shared
3fad3c7c
AM
16528 lib. The same thing happens for a weak
16529 definition in an application that's
16530 overridden by a strong definition in a
16531 shared lib. (I believe this is a generic
16532 bug in binutils handling of weak syms.)
16533 In these cases we won't use the opd
1e2f5b6e 16534 entry in this lib. */
b34976b6 16535 unresolved_reloc = FALSE;
afbe61cf 16536 }
25f23106
AM
16537 if (!is_opd
16538 && r_type == R_PPC64_ADDR64
16539 && (h != NULL
16540 ? h->elf.type == STT_GNU_IFUNC
16541 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16542 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16543 else
16544 {
16545 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16546
25f23106
AM
16547 /* We need to relocate .opd contents for ld.so.
16548 Prelink also wants simple and consistent rules
16549 for relocs. This make all RELATIVE relocs have
16550 *r_offset equal to r_addend. */
16551 relocate = TRUE;
16552 }
65f38f15
AM
16553 }
16554 else
16555 {
25f23106
AM
16556 if (h != NULL
16557 ? h->elf.type == STT_GNU_IFUNC
16558 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16559 {
25f53a85 16560 info->callbacks->einfo
695344c0 16561 /* xgettext:c-format */
174d0a74 16562 (_("%H: %s for indirect "
c1c8c1ef 16563 "function `%pT' unsupported\n"),
25f53a85 16564 input_bfd, input_section, rel->r_offset,
25f23106
AM
16565 ppc64_elf_howto_table[r_type]->name,
16566 sym_name);
16567 ret = FALSE;
16568 }
cf35638d 16569 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16570 ;
16571 else if (sec == NULL || sec->owner == NULL)
16572 {
16573 bfd_set_error (bfd_error_bad_value);
b34976b6 16574 return FALSE;
65f38f15
AM
16575 }
16576 else
16577 {
f26a3287 16578 asection *osec = sec->output_section;
65f38f15 16579
f26a3287
AM
16580 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16581 {
16582 /* TLS symbol values are relative to the
16583 TLS segment. Dynamic relocations for
16584 local TLS symbols therefore can't be
16585 reduced to a relocation against their
16586 section symbol because it holds the
16587 address of the section, not a value
16588 relative to the TLS segment. We could
16589 change the .tdata dynamic section symbol
16590 to be zero value but STN_UNDEF works
16591 and is used elsewhere, eg. for TPREL64
16592 GOT relocs against local TLS symbols. */
16593 osec = htab->elf.tls_sec;
16594 indx = 0;
16595 }
16596 else
74541ad4 16597 {
74541ad4 16598 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16599 if (indx == 0)
16600 {
16601 if ((osec->flags & SEC_READONLY) == 0
16602 && htab->elf.data_index_section != NULL)
16603 osec = htab->elf.data_index_section;
16604 else
16605 osec = htab->elf.text_index_section;
16606 indx = elf_section_data (osec)->dynindx;
16607 }
16608 BFD_ASSERT (indx != 0);
74541ad4 16609 }
74541ad4 16610
65f38f15
AM
16611 /* We are turning this relocation into one
16612 against a section symbol, so subtract out
16613 the output section's address but not the
16614 offset of the input section in the output
16615 section. */
16616 outrel.r_addend -= osec->vma;
16617 }
16618
16619 outrel.r_info = ELF64_R_INFO (indx, r_type);
16620 }
16621 }
16622
16623 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16624 if (h != NULL
16625 ? h->elf.type == STT_GNU_IFUNC
16626 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16627 {
16628 sreloc = htab->elf.irelplt;
efb2a7b4 16629 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16630 htab->elf.ifunc_resolvers = TRUE;
82e66161 16631 }
65f38f15
AM
16632 if (sreloc == NULL)
16633 abort ();
16634
dfbb6ac9
AM
16635 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16636 >= sreloc->size)
16637 abort ();
947216bf
AM
16638 loc = sreloc->contents;
16639 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16640 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16641
e59a1001
AM
16642 if (!warned_dynamic
16643 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16644 {
16645 info->callbacks->einfo
16646 /* xgettext:c-format */
16647 (_("%X%P: %pB: %s against %pT "
16648 "is not supported by glibc as a dynamic relocation\n"),
16649 input_bfd,
16650 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16651 sym_name);
16652 warned_dynamic = TRUE;
16653 }
16654
65f38f15
AM
16655 /* If this reloc is against an external symbol, it will
16656 be computed at runtime, so there's no need to do
81407a69
AM
16657 anything now. However, for the sake of prelink ensure
16658 that the section contents are a known value. */
2cdcc330 16659 if (!relocate)
81407a69
AM
16660 {
16661 unresolved_reloc = FALSE;
16662 /* The value chosen here is quite arbitrary as ld.so
16663 ignores section contents except for the special
16664 case of .opd where the contents might be accessed
16665 before relocation. Choose zero, as that won't
16666 cause reloc overflow. */
16667 relocation = 0;
16668 addend = 0;
16669 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16670 to improve backward compatibility with older
16671 versions of ld. */
16672 if (r_type == R_PPC64_ADDR64)
16673 addend = outrel.r_addend;
16674 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16675 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16676 addend = outrel.r_offset;
81407a69 16677 }
65f38f15 16678 }
5bd4f169
AM
16679 break;
16680
65f38f15
AM
16681 case R_PPC64_COPY:
16682 case R_PPC64_GLOB_DAT:
16683 case R_PPC64_JMP_SLOT:
25f23106 16684 case R_PPC64_JMP_IREL:
65f38f15
AM
16685 case R_PPC64_RELATIVE:
16686 /* We shouldn't ever see these dynamic relocs in relocatable
16687 files. */
ae9a127f 16688 /* Fall through. */
65f38f15
AM
16689
16690 case R_PPC64_PLTGOT16:
16691 case R_PPC64_PLTGOT16_DS:
16692 case R_PPC64_PLTGOT16_HA:
16693 case R_PPC64_PLTGOT16_HI:
16694 case R_PPC64_PLTGOT16_LO:
16695 case R_PPC64_PLTGOT16_LO_DS:
16696 case R_PPC64_PLTREL32:
16697 case R_PPC64_PLTREL64:
16698 /* These ones haven't been implemented yet. */
16699
25f53a85 16700 info->callbacks->einfo
695344c0 16701 /* xgettext:c-format */
c1c8c1ef 16702 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16703 input_bfd,
4ce794b7 16704 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16705
16706 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16707 ret = FALSE;
c316a17c 16708 goto copy_reloc;
65f38f15 16709 }
5bd4f169 16710
67f0cbdb
AM
16711 /* Multi-instruction sequences that access the TOC can be
16712 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16713 to nop; addi rb,r2,x; */
67f0cbdb
AM
16714 switch (r_type)
16715 {
16716 default:
16717 break;
16718
16719 case R_PPC64_GOT_TLSLD16_HI:
16720 case R_PPC64_GOT_TLSGD16_HI:
16721 case R_PPC64_GOT_TPREL16_HI:
16722 case R_PPC64_GOT_DTPREL16_HI:
16723 case R_PPC64_GOT16_HI:
16724 case R_PPC64_TOC16_HI:
16725 /* These relocs would only be useful if building up an
16726 offset to later add to r2, perhaps in an indexed
16727 addressing mode instruction. Don't try to optimize.
16728 Unfortunately, the possibility of someone building up an
16729 offset like this or even with the HA relocs, means that
16730 we need to check the high insn when optimizing the low
16731 insn. */
16732 break;
16733
5663e321
AM
16734 case R_PPC64_PLTCALL_NOTOC:
16735 if (!unresolved_reloc)
16736 htab->notoc_plt = 1;
16737 /* Fall through. */
23cedd1d
AM
16738 case R_PPC64_PLTCALL:
16739 if (unresolved_reloc)
16740 {
16741 /* No plt entry. Make this into a direct call. */
16742 bfd_byte *p = contents + rel->r_offset;
16743 insn = bfd_get_32 (input_bfd, p);
16744 insn &= 1;
16745 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16746 if (r_type == R_PPC64_PLTCALL)
16747 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16748 unresolved_reloc = save_unresolved_reloc;
16749 r_type = R_PPC64_REL24;
16750 }
16751 break;
16752
5663e321 16753 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16754 case R_PPC64_PLTSEQ:
16755 if (unresolved_reloc)
16756 {
16757 unresolved_reloc = FALSE;
16758 goto nop_it;
16759 }
16760 break;
16761
5663e321
AM
16762 case R_PPC64_PLT_PCREL34_NOTOC:
16763 if (!unresolved_reloc)
16764 htab->notoc_plt = 1;
16765 /* Fall through. */
16766 case R_PPC64_PLT_PCREL34:
16767 if (unresolved_reloc)
16768 {
16769 bfd_byte *p = contents + rel->r_offset;
16770 bfd_put_32 (input_bfd, PNOP >> 32, p);
16771 bfd_put_32 (input_bfd, PNOP, p + 4);
16772 unresolved_reloc = FALSE;
16773 goto copy_reloc;
16774 }
16775 break;
16776
23cedd1d
AM
16777 case R_PPC64_PLT16_HA:
16778 if (unresolved_reloc)
16779 {
16780 unresolved_reloc = FALSE;
16781 goto nop_it;
16782 }
16783 /* Fall through. */
67f0cbdb
AM
16784 case R_PPC64_GOT_TLSLD16_HA:
16785 case R_PPC64_GOT_TLSGD16_HA:
16786 case R_PPC64_GOT_TPREL16_HA:
16787 case R_PPC64_GOT_DTPREL16_HA:
16788 case R_PPC64_GOT16_HA:
16789 case R_PPC64_TOC16_HA:
98528052 16790 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16791 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16792 {
23cedd1d
AM
16793 bfd_byte *p;
16794 nop_it:
16795 p = contents + (rel->r_offset & ~3);
98528052 16796 bfd_put_32 (input_bfd, NOP, p);
d830549d 16797 goto copy_reloc;
98528052 16798 }
67f0cbdb
AM
16799 break;
16800
23cedd1d
AM
16801 case R_PPC64_PLT16_LO:
16802 case R_PPC64_PLT16_LO_DS:
16803 if (unresolved_reloc)
16804 {
16805 unresolved_reloc = FALSE;
16806 goto nop_it;
16807 }
16808 /* Fall through. */
67f0cbdb
AM
16809 case R_PPC64_GOT_TLSLD16_LO:
16810 case R_PPC64_GOT_TLSGD16_LO:
16811 case R_PPC64_GOT_TPREL16_LO_DS:
16812 case R_PPC64_GOT_DTPREL16_LO_DS:
16813 case R_PPC64_GOT16_LO:
16814 case R_PPC64_GOT16_LO_DS:
16815 case R_PPC64_TOC16_LO:
16816 case R_PPC64_TOC16_LO_DS:
98528052 16817 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16818 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16819 {
16820 bfd_byte *p = contents + (rel->r_offset & ~3);
16821 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16822 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16823 {
16824 /* Transform addic to addi when we change reg. */
2365f8d7 16825 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16826 insn |= (14u << 26) | (2 << 16);
16827 }
16828 else
67f0cbdb 16829 {
98528052
AM
16830 insn &= ~(0x1f << 16);
16831 insn |= 2 << 16;
67f0cbdb 16832 }
560c8763 16833 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16834 }
16835 break;
9a23f96e
AM
16836
16837 case R_PPC64_TPREL16_HA:
16838 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16839 {
16840 bfd_byte *p = contents + (rel->r_offset & ~3);
16841 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16842 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16843 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16844 /* xgettext:c-format */
16845 info->callbacks->minfo
16846 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16847 input_bfd, input_section, rel->r_offset,
16848 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16849 else
d830549d
AM
16850 {
16851 bfd_put_32 (input_bfd, NOP, p);
16852 goto copy_reloc;
16853 }
9a23f96e
AM
16854 }
16855 break;
16856
16857 case R_PPC64_TPREL16_LO:
16858 case R_PPC64_TPREL16_LO_DS:
16859 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16860 {
16861 bfd_byte *p = contents + (rel->r_offset & ~3);
16862 insn = bfd_get_32 (input_bfd, p);
16863 insn &= ~(0x1f << 16);
16864 insn |= 13 << 16;
16865 bfd_put_32 (input_bfd, insn, p);
16866 }
16867 break;
67f0cbdb
AM
16868 }
16869
65f38f15
AM
16870 /* Do any further special processing. */
16871 switch (r_type)
16872 {
16873 default:
16874 break;
16875
25f23106 16876 case R_PPC64_REL16_HA:
4a969973
AM
16877 case R_PPC64_REL16_HIGHA:
16878 case R_PPC64_REL16_HIGHERA:
16879 case R_PPC64_REL16_HIGHESTA:
a680de9a 16880 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16881 case R_PPC64_ADDR16_HA:
16882 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16883 case R_PPC64_ADDR16_HIGHERA:
16884 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16885 case R_PPC64_TOC16_HA:
16886 case R_PPC64_SECTOFF_HA:
411e1bfb 16887 case R_PPC64_TPREL16_HA:
f9c6b907 16888 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16889 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16890 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16891 case R_PPC64_DTPREL16_HA:
16892 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16893 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16894 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16895 /* It's just possible that this symbol is a weak symbol
16896 that's not actually defined anywhere. In that case,
16897 'sec' would be NULL, and we should leave the symbol
16898 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16899 if (sec == NULL)
16900 break;
1a0670f3 16901 /* Fall through. */
5c5f6e17
AM
16902
16903 case R_PPC64_GOT16_HA:
16904 case R_PPC64_PLTGOT16_HA:
16905 case R_PPC64_PLT16_HA:
16906 case R_PPC64_GOT_TLSGD16_HA:
16907 case R_PPC64_GOT_TLSLD16_HA:
16908 case R_PPC64_GOT_TPREL16_HA:
16909 case R_PPC64_GOT_DTPREL16_HA:
16910 /* Add 0x10000 if sign bit in 0:15 is set.
16911 Bits 0:15 are not used. */
16912 addend += 0x8000;
65f38f15
AM
16913 break;
16914
5663e321
AM
16915 case R_PPC64_D34_HA30:
16916 case R_PPC64_ADDR16_HIGHERA34:
16917 case R_PPC64_ADDR16_HIGHESTA34:
16918 case R_PPC64_REL16_HIGHERA34:
16919 case R_PPC64_REL16_HIGHESTA34:
16920 if (sec != NULL)
16921 addend += 1ULL << 33;
16922 break;
16923
65f38f15
AM
16924 case R_PPC64_ADDR16_DS:
16925 case R_PPC64_ADDR16_LO_DS:
16926 case R_PPC64_GOT16_DS:
16927 case R_PPC64_GOT16_LO_DS:
16928 case R_PPC64_PLT16_LO_DS:
16929 case R_PPC64_SECTOFF_DS:
16930 case R_PPC64_SECTOFF_LO_DS:
16931 case R_PPC64_TOC16_DS:
16932 case R_PPC64_TOC16_LO_DS:
16933 case R_PPC64_PLTGOT16_DS:
16934 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16935 case R_PPC64_GOT_TPREL16_DS:
16936 case R_PPC64_GOT_TPREL16_LO_DS:
16937 case R_PPC64_GOT_DTPREL16_DS:
16938 case R_PPC64_GOT_DTPREL16_LO_DS:
16939 case R_PPC64_TPREL16_DS:
16940 case R_PPC64_TPREL16_LO_DS:
16941 case R_PPC64_DTPREL16_DS:
16942 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16943 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16944 mask = 3;
a680de9a
PB
16945 /* If this reloc is against an lq, lxv, or stxv insn, then
16946 the value must be a multiple of 16. This is somewhat of
16947 a hack, but the "correct" way to do this by defining _DQ
16948 forms of all the _DS relocs bloats all reloc switches in
16949 this file. It doesn't make much sense to use these
16950 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
16951 if ((insn & (0x3fu << 26)) == (56u << 26)
16952 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16953 mask = 15;
a680de9a
PB
16954 relocation += addend;
16955 addend = insn & (mask ^ 3);
16956 if ((relocation & mask) != 0)
65f38f15 16957 {
a680de9a 16958 relocation ^= relocation & mask;
25f53a85 16959 info->callbacks->einfo
695344c0 16960 /* xgettext:c-format */
174d0a74 16961 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16962 input_bfd, input_section, rel->r_offset,
d830549d 16963 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16964 mask + 1);
65f38f15 16965 bfd_set_error (bfd_error_bad_value);
b34976b6 16966 ret = FALSE;
c316a17c 16967 goto copy_reloc;
65f38f15
AM
16968 }
16969 break;
5bd4f169
AM
16970 }
16971
239e1f3a
AM
16972 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16973 because such sections are not SEC_ALLOC and thus ld.so will
16974 not process them. */
d830549d 16975 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16976 if (unresolved_reloc
239e1f3a 16977 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16978 && h->elf.def_dynamic)
16979 && _bfd_elf_section_offset (output_bfd, info, input_section,
16980 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16981 {
25f53a85 16982 info->callbacks->einfo
695344c0 16983 /* xgettext:c-format */
c1c8c1ef 16984 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16985 input_bfd, input_section, rel->r_offset,
b80eed39 16986 howto->name,
039b3fef 16987 h->elf.root.root.string);
b34976b6 16988 ret = FALSE;
9c07fe7c 16989 }
5bd4f169 16990
b80eed39
AM
16991 /* 16-bit fields in insns mostly have signed values, but a
16992 few insns have 16-bit unsigned values. Really, we should
16993 have different reloc types. */
16994 if (howto->complain_on_overflow != complain_overflow_dont
16995 && howto->dst_mask == 0xffff
16996 && (input_section->flags & SEC_CODE) != 0)
16997 {
16998 enum complain_overflow complain = complain_overflow_signed;
16999
17000 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17001 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17002 complain = complain_overflow_bitfield;
17003 else if (howto->rightshift == 0
2365f8d7
AM
17004 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17005 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17006 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17007 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17008 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17009 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17010 complain = complain_overflow_unsigned;
17011 if (howto->complain_on_overflow != complain)
17012 {
17013 alt_howto = *howto;
17014 alt_howto.complain_on_overflow = complain;
17015 howto = &alt_howto;
17016 }
17017 }
17018
5663e321 17019 switch (r_type)
a680de9a 17020 {
5663e321
AM
17021 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17022 case R_PPC64_D34:
17023 case R_PPC64_D34_LO:
17024 case R_PPC64_D34_HI30:
17025 case R_PPC64_D34_HA30:
17026 case R_PPC64_PCREL34:
17027 case R_PPC64_GOT_PCREL34:
c213164a
AM
17028 case R_PPC64_TPREL34:
17029 case R_PPC64_DTPREL34:
87c69f97
AM
17030 case R_PPC64_GOT_TLSGD_PCREL34:
17031 case R_PPC64_GOT_TLSLD_PCREL34:
17032 case R_PPC64_GOT_TPREL_PCREL34:
17033 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
17034 case R_PPC64_PLT_PCREL34:
17035 case R_PPC64_PLT_PCREL34_NOTOC:
17036 case R_PPC64_D28:
17037 case R_PPC64_PCREL28:
17038 if (rel->r_offset + 8 > input_section->size)
17039 r = bfd_reloc_outofrange;
17040 else
17041 {
5663e321
AM
17042 relocation += addend;
17043 if (howto->pc_relative)
17044 relocation -= (rel->r_offset
17045 + input_section->output_offset
17046 + input_section->output_section->vma);
17047 relocation >>= howto->rightshift;
17048
17049 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17050 pinsn <<= 32;
17051 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17052
17053 pinsn &= ~howto->dst_mask;
17054 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17055 & howto->dst_mask);
17056 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17057 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17058 r = bfd_reloc_ok;
17059 if (howto->complain_on_overflow == complain_overflow_signed
17060 && (relocation + (1ULL << (howto->bitsize - 1))
17061 >= 1ULL << howto->bitsize))
17062 r = bfd_reloc_overflow;
17063 }
17064 break;
17065
17066 case R_PPC64_REL16DX_HA:
a680de9a
PB
17067 if (rel->r_offset + 4 > input_section->size)
17068 r = bfd_reloc_outofrange;
17069 else
17070 {
17071 relocation += addend;
17072 relocation -= (rel->r_offset
17073 + input_section->output_offset
17074 + input_section->output_section->vma);
3de43e7b 17075 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17076 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17077 insn &= ~0x1fffc1;
3de43e7b 17078 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17079 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17080 r = bfd_reloc_ok;
3de43e7b 17081 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17082 r = bfd_reloc_overflow;
17083 }
5663e321
AM
17084 break;
17085
17086 default:
17087 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17088 contents, rel->r_offset,
17089 relocation, addend);
a680de9a 17090 }
5bd4f169 17091
ef60b7ff 17092 if (r != bfd_reloc_ok)
5bd4f169 17093 {
bc30df16 17094 char *more_info = NULL;
b80eed39 17095 const char *reloc_name = howto->name;
bc30df16
AM
17096
17097 if (reloc_dest != DEST_NORMAL)
17098 {
17099 more_info = bfd_malloc (strlen (reloc_name) + 8);
17100 if (more_info != NULL)
17101 {
17102 strcpy (more_info, reloc_name);
17103 strcat (more_info, (reloc_dest == DEST_OPD
17104 ? " (OPD)" : " (stub)"));
17105 reloc_name = more_info;
17106 }
17107 }
17108
cd27b276 17109 if (r == bfd_reloc_overflow)
5bd4f169 17110 {
8131c122
AM
17111 /* On code like "if (foo) foo();" don't report overflow
17112 on a branch to zero when foo is undefined. */
17113 if (!warned
17114 && (reloc_dest == DEST_STUB
17115 || !(h != NULL
17116 && (h->elf.root.type == bfd_link_hash_undefweak
17117 || h->elf.root.type == bfd_link_hash_undefined)
17118 && is_branch_reloc (r_type))))
1a72702b
AM
17119 info->callbacks->reloc_overflow (info, &h->elf.root,
17120 sym_name, reloc_name,
17121 orig_rel.r_addend,
17122 input_bfd, input_section,
17123 rel->r_offset);
ef60b7ff
AM
17124 }
17125 else
17126 {
25f53a85 17127 info->callbacks->einfo
695344c0 17128 /* xgettext:c-format */
c1c8c1ef 17129 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17130 input_bfd, input_section, rel->r_offset,
bc30df16 17131 reloc_name, sym_name, (int) r);
b34976b6 17132 ret = FALSE;
ef60b7ff 17133 }
c9594989 17134 free (more_info);
5bd4f169 17135 }
c316a17c
AM
17136 copy_reloc:
17137 if (wrel != rel)
17138 *wrel = *rel;
17139 }
17140
17141 if (wrel != rel)
17142 {
17143 Elf_Internal_Shdr *rel_hdr;
17144 size_t deleted = rel - wrel;
17145
17146 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17147 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17148 if (rel_hdr->sh_size == 0)
17149 {
17150 /* It is too late to remove an empty reloc section. Leave
17151 one NONE reloc.
17152 ??? What is wrong with an empty section??? */
17153 rel_hdr->sh_size = rel_hdr->sh_entsize;
17154 deleted -= 1;
17155 }
17156 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17157 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17158 input_section->reloc_count -= deleted;
5bd4f169
AM
17159 }
17160
645ea6a9
AM
17161 /* If we're emitting relocations, then shortly after this function
17162 returns, reloc offsets and addends for this section will be
17163 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17164 file rather than the input. Save a copy of the relocs for
17165 opd_entry_value. */
0e1862bb 17166 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17167 {
17168 bfd_size_type amt;
17169 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17170 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17171 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17172 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17173 if (rel == NULL)
17174 return FALSE;
17175 memcpy (rel, relocs, amt);
17176 }
5bd4f169
AM
17177 return ret;
17178}
17179
754021d0
AM
17180/* Adjust the value of any local symbols in opd sections. */
17181
6e0b88f1 17182static int
754021d0
AM
17183ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17184 const char *name ATTRIBUTE_UNUSED,
17185 Elf_Internal_Sym *elfsym,
17186 asection *input_sec,
17187 struct elf_link_hash_entry *h)
17188{
74f0fb50
AM
17189 struct _opd_sec_data *opd;
17190 long adjust;
754021d0
AM
17191 bfd_vma value;
17192
4025353c 17193 if (h != NULL)
6e0b88f1 17194 return 1;
4025353c 17195
74f0fb50
AM
17196 opd = get_opd_info (input_sec);
17197 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17198 return 1;
754021d0
AM
17199
17200 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17201 if (!bfd_link_relocatable (info))
754021d0
AM
17202 value -= input_sec->output_section->vma;
17203
51aecdc5 17204 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17205 if (adjust == -1)
6e0b88f1
AM
17206 return 2;
17207
17208 elfsym->st_value += adjust;
17209 return 1;
754021d0
AM
17210}
17211
5bd4f169
AM
17212/* Finish up dynamic symbol handling. We set the contents of various
17213 dynamic sections here. */
17214
b34976b6 17215static bfd_boolean
4ce794b7
AM
17216ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17217 struct bfd_link_info *info,
17218 struct elf_link_hash_entry *h,
4aef7643 17219 Elf_Internal_Sym *sym)
5bd4f169 17220{
65f38f15 17221 struct ppc_link_hash_table *htab;
8387904d 17222 struct plt_entry *ent;
5bd4f169 17223
65f38f15 17224 htab = ppc_hash_table (info);
4dfe6ac6
NC
17225 if (htab == NULL)
17226 return FALSE;
5bd4f169 17227
49c09209
AM
17228 if (!htab->opd_abi && !h->def_regular)
17229 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17230 if (ent->plt.offset != (bfd_vma) -1)
17231 {
17232 /* Mark the symbol as undefined, rather than as
17233 defined in glink. Leave the value if there were
17234 any relocations where pointer equality matters
17235 (this is a clue for the dynamic linker, to make
17236 function pointer comparisons work between an
17237 application and shared library), otherwise set it
17238 to zero. */
17239 sym->st_shndx = SHN_UNDEF;
17240 if (!h->pointer_equality_needed)
17241 sym->st_value = 0;
17242 else if (!h->ref_regular_nonweak)
17243 {
17244 /* This breaks function pointer comparisons, but
17245 that is better than breaking tests for a NULL
17246 function pointer. */
17247 sym->st_value = 0;
17248 }
17249 break;
17250 }
5bd4f169 17251
1bdd8fac
AM
17252 if (h->needs_copy
17253 && (h->root.type == bfd_link_hash_defined
17254 || h->root.type == bfd_link_hash_defweak)
17255 && (h->root.u.def.section == htab->elf.sdynbss
17256 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17257 {
65f38f15 17258 /* This symbol needs a copy reloc. Set it up. */
49c09209 17259 Elf_Internal_Rela rela;
5474d94f 17260 asection *srel;
49c09209 17261 bfd_byte *loc;
5bd4f169 17262
1bdd8fac 17263 if (h->dynindx == -1)
65f38f15 17264 abort ();
5bd4f169 17265
ed7007c1 17266 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17267 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17268 rela.r_addend = 0;
afbf7e8e 17269 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17270 srel = htab->elf.sreldynrelro;
17271 else
17272 srel = htab->elf.srelbss;
17273 loc = srel->contents;
17274 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17275 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17276 }
17277
b34976b6 17278 return TRUE;
5bd4f169
AM
17279}
17280
65f38f15
AM
17281/* Used to decide how to sort relocs in an optimal manner for the
17282 dynamic linker, before writing them out. */
17283
17284static enum elf_reloc_type_class
7e612e98
AM
17285ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17286 const asection *rel_sec,
17287 const Elf_Internal_Rela *rela)
65f38f15 17288{
04c9666a 17289 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17290 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17291
33e44f2e 17292 if (rel_sec == htab->elf.irelplt)
7e612e98 17293 return reloc_class_ifunc;
a33d1f77 17294
4ce794b7 17295 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17296 switch (r_type)
65f38f15
AM
17297 {
17298 case R_PPC64_RELATIVE:
17299 return reloc_class_relative;
17300 case R_PPC64_JMP_SLOT:
17301 return reloc_class_plt;
17302 case R_PPC64_COPY:
17303 return reloc_class_copy;
17304 default:
17305 return reloc_class_normal;
17306 }
17307}
17308
5bd4f169
AM
17309/* Finish up the dynamic sections. */
17310
b34976b6 17311static bfd_boolean
4ce794b7
AM
17312ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17313 struct bfd_link_info *info)
5bd4f169 17314{
65f38f15
AM
17315 struct ppc_link_hash_table *htab;
17316 bfd *dynobj;
5bd4f169 17317 asection *sdyn;
5bd4f169 17318
65f38f15 17319 htab = ppc_hash_table (info);
4dfe6ac6
NC
17320 if (htab == NULL)
17321 return FALSE;
17322
65f38f15 17323 dynobj = htab->elf.dynobj;
3d4d4302 17324 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17325
65f38f15 17326 if (htab->elf.dynamic_sections_created)
5bd4f169 17327 {
5bd4f169
AM
17328 Elf64_External_Dyn *dyncon, *dynconend;
17329
33e44f2e 17330 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17331 abort ();
5bd4f169
AM
17332
17333 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17334 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17335 for (; dyncon < dynconend; dyncon++)
17336 {
17337 Elf_Internal_Dyn dyn;
19397422 17338 asection *s;
5bd4f169
AM
17339
17340 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17341
17342 switch (dyn.d_tag)
17343 {
65f38f15
AM
17344 default:
17345 continue;
5bd4f169 17346
5d1634d7 17347 case DT_PPC64_GLINK:
4ce794b7 17348 s = htab->glink;
6348e046 17349 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17350 /* We stupidly defined DT_PPC64_GLINK to be the start
17351 of glink rather than the first entry point, which is
17352 what ld.so needs, and now have a bigger stub to
17353 support automatic multiple TOCs. */
9e390558 17354 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17355 break;
17356
19397422
AM
17357 case DT_PPC64_OPD:
17358 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17359 if (s == NULL)
17360 continue;
17361 dyn.d_un.d_ptr = s->vma;
19397422
AM
17362 break;
17363
e8910a83 17364 case DT_PPC64_OPT:
5663e321
AM
17365 if ((htab->do_multi_toc && htab->multi_toc_needed)
17366 || htab->notoc_plt)
e8910a83 17367 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17368 if (htab->has_plt_localentry0)
17369 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17370 break;
17371
19397422
AM
17372 case DT_PPC64_OPDSZ:
17373 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17374 if (s == NULL)
17375 continue;
eea6121a 17376 dyn.d_un.d_val = s->size;
19397422
AM
17377 break;
17378
65f38f15 17379 case DT_PLTGOT:
33e44f2e 17380 s = htab->elf.splt;
6348e046 17381 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17382 break;
17383
17384 case DT_JMPREL:
33e44f2e 17385 s = htab->elf.srelplt;
6348e046 17386 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17387 break;
5bd4f169 17388
65f38f15 17389 case DT_PLTRELSZ:
33e44f2e 17390 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17391 break;
82e66161
AM
17392
17393 case DT_TEXTREL:
cebd6b8a 17394 if (htab->elf.ifunc_resolvers)
82e66161
AM
17395 info->callbacks->einfo
17396 (_("%P: warning: text relocations and GNU indirect "
17397 "functions may result in a segfault at runtime\n"));
17398 continue;
5bd4f169 17399 }
5bd4f169 17400
65f38f15 17401 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17402 }
5bd4f169
AM
17403 }
17404
6528b6eb
AM
17405 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17406 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17407 {
17408 /* Fill in the first entry in the global offset table.
17409 We use it to hold the link-time TOCbase. */
17410 bfd_put_64 (output_bfd,
60ee0d4a 17411 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17412 htab->elf.sgot->contents);
5d1634d7
AM
17413
17414 /* Set .got entry size. */
2cdcc330
AM
17415 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17416 = 8;
5d1634d7
AM
17417 }
17418
6528b6eb
AM
17419 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17420 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17421 {
17422 /* Set .plt entry size. */
33e44f2e 17423 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17424 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17425 }
17426
84f5d08e
AM
17427 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17428 brlt ourselves if emitrelocations. */
17429 if (htab->brlt != NULL
17430 && htab->brlt->reloc_count != 0
17431 && !_bfd_elf_link_output_relocs (output_bfd,
17432 htab->brlt,
d4730f92 17433 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17434 elf_section_data (htab->brlt)->relocs,
17435 NULL))
17436 return FALSE;
17437
176a0d42
AM
17438 if (htab->glink != NULL
17439 && htab->glink->reloc_count != 0
17440 && !_bfd_elf_link_output_relocs (output_bfd,
17441 htab->glink,
d4730f92 17442 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17443 elf_section_data (htab->glink)->relocs,
17444 NULL))
17445 return FALSE;
17446
da44f4e5 17447
df136d64
AM
17448 if (htab->glink_eh_frame != NULL
17449 && htab->glink_eh_frame->size != 0
17450 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17451 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17452 htab->glink_eh_frame,
17453 htab->glink_eh_frame->contents))
17454 return FALSE;
58d180e8 17455
e717da7e 17456 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17457 since we didn't add them to DYNOBJ. We know dynobj is the first
17458 bfd. */
c72f2fb2 17459 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17460 {
17461 asection *s;
7b53ace3 17462
0c8d6e5c 17463 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17464 continue;
17465
e717da7e
AM
17466 s = ppc64_elf_tdata (dynobj)->got;
17467 if (s != NULL
eea6121a 17468 && s->size != 0
e717da7e
AM
17469 && s->output_section != bfd_abs_section_ptr
17470 && !bfd_set_section_contents (output_bfd, s->output_section,
17471 s->contents, s->output_offset,
eea6121a 17472 s->size))
e717da7e
AM
17473 return FALSE;
17474 s = ppc64_elf_tdata (dynobj)->relgot;
17475 if (s != NULL
eea6121a 17476 && s->size != 0
e717da7e
AM
17477 && s->output_section != bfd_abs_section_ptr
17478 && !bfd_set_section_contents (output_bfd, s->output_section,
17479 s->contents, s->output_offset,
eea6121a 17480 s->size))
e717da7e
AM
17481 return FALSE;
17482 }
f6c52c13 17483
b34976b6 17484 return TRUE;
5bd4f169
AM
17485}
17486
5bd4f169 17487#include "elf64-target.h"
7b8e7dad
AM
17488
17489/* FreeBSD support */
17490
17491#undef TARGET_LITTLE_SYM
17492#undef TARGET_LITTLE_NAME
17493
17494#undef TARGET_BIG_SYM
6d00b590 17495#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17496#undef TARGET_BIG_NAME
17497#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17498
17499#undef ELF_OSABI
17500#define ELF_OSABI ELFOSABI_FREEBSD
17501
17502#undef elf64_bed
17503#define elf64_bed elf64_powerpc_fbsd_bed
17504
17505#include "elf64-target.h"
This page took 2.890962 seconds and 4 git commands to generate.