]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
PR24955, libbfd terminating program on out of memory (part2)
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
82704155 2 Copyright (C) 1999-2019 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
805fc799 38static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
40static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 42static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 44static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 46static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 48static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 50static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 52static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
54static bfd_reloc_status_type ppc64_elf_prefix_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 56static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 57 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 58static bfd_vma opd_entry_value
aef36ac1 59 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 60
6d00b590 61#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 62#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 63#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
64#define TARGET_BIG_NAME "elf64-powerpc"
65#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 66#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
67#define ELF_MACHINE_CODE EM_PPC64
68#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
69#define ELF_COMMONPAGESIZE 0x1000
70#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
71#define elf_info_to_howto ppc64_elf_info_to_howto
72
73#define elf_backend_want_got_sym 0
74#define elf_backend_want_plt_sym 0
75#define elf_backend_plt_alignment 3
76#define elf_backend_plt_not_loaded 1
ad8e1ba5 77#define elf_backend_got_header_size 8
5474d94f 78#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
79#define elf_backend_can_gc_sections 1
80#define elf_backend_can_refcount 1
81#define elf_backend_rela_normal 1
64f52338 82#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 83#define elf_backend_default_execstack 0
ad8e1ba5 84
e717da7e 85#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 86#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 87#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
88#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
89#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
90#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
91#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 92#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 93#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 94#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
95
96#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
97#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
98#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 99#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 100#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 101#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 102#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 103#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 104#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 105#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 106#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 107#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 108#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 109#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 110#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
111#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
112#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 113#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
114#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
115#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 116#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 117#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 118#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
119#define elf_backend_relocate_section ppc64_elf_relocate_section
120#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
121#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
122#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 123#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 124#define elf_backend_special_sections ppc64_elf_special_sections
6911b7dc 125#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 126#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 127#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 128
5bd4f169
AM
129/* The name of the dynamic interpreter. This is put in the .interp
130 section. */
131#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
132
133/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 134#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 135#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
136
137/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 138#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 139
a078d95a
AM
140/* Offsets to some stack save slots. */
141#define STK_LR 16
142#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 143/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
144 CR save slot. Used only by optimised __tls_get_addr call stub,
145 relying on __tls_get_addr_opt not saving CR.. */
146#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
147
5bd4f169 148/* TOC base pointers offset from start of TOC. */
411e1bfb 149#define TOC_BASE_OFF 0x8000
a27e685f
AM
150/* TOC base alignment. */
151#define TOC_BASE_ALIGN 256
411e1bfb
AM
152
153/* Offset of tp and dtp pointers from start of TLS block. */
154#define TP_OFFSET 0x7000
155#define DTP_OFFSET 0x8000
5bd4f169 156
ad8e1ba5
AM
157/* .plt call stub instructions. The normal stub is like this, but
158 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 159 insert an addi to adjust r11. */
a078d95a 160#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
161#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
162#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
163#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
164#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
165#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
166#define BCTR 0x4e800420 /* bctr */
167
07d6d2b8 168#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
169#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
170#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
171#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
172#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
173
174#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
175#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
176#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
177#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
178#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
179#define BNECTR 0x4ca20420 /* bnectr+ */
180#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 181
71a39c98 182#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 183#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 184#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 185
07d6d2b8
AM
186#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
187#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
188#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 189
04bdff6a 190#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 191#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 192#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 193#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
194#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
195#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 196#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 197#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 198#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 199#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 200#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 201#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 202#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
203#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
204#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
205#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
206#define PADDI_R12_PC 0x0610000039800000ULL
207#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 208#define PNOP 0x0700000000000000ULL
a345bc8d 209
9e390558
AM
210/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
211#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 212 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
213 /* 0: */
214 /* .quad plt0-1f */
215 /* __glink: */
216#define MFLR_R12 0x7d8802a6 /* mflr %12 */
217#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
218 /* 1: */
219#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 220 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 221#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
222#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
223 /* ld %12,0(%11) */
224 /* ld %2,8(%11) */
225 /* mtctr %12 */
226 /* ld %11,16(%11) */
ee4bf8d2 227 /* bctr */
b9e5796b
AM
228#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
229#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
230#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
231#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
232#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
233
234/* Pad with this. */
235#define NOP 0x60000000
236
721956f4
AM
237/* Some other nops. */
238#define CROR_151515 0x4def7b82
239#define CROR_313131 0x4ffffb82
240
cedb70c5 241/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
242#define LI_R0_0 0x38000000 /* li %r0,0 */
243#define B_DOT 0x48000000 /* b . */
244
245/* After that, we need two instructions to load the index, followed by
246 a branch. */
247#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 248#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 249
deb0e272
AM
250/* Instructions used by the save and restore reg functions. */
251#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
252#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
253#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
254#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
255#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
256#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
257#define LI_R12_0 0x39800000 /* li %r12,0 */
258#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
259#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
260#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
261#define BLR 0x4e800020 /* blr */
262
41bd81ab
AM
263/* Since .opd is an array of descriptors and each entry will end up
264 with identical R_PPC64_RELATIVE relocs, there is really no need to
265 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 266 relocate .opd without reloc entries. */
41bd81ab
AM
267#ifndef NO_OPD_RELOCS
268#define NO_OPD_RELOCS 0
269#endif
810d4e75 270
a4b6fadd
AM
271#ifndef ARRAY_SIZE
272#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
273#endif
274
810d4e75
AM
275static inline int
276abiversion (bfd *abfd)
277{
278 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
279}
280
281static inline void
282set_abiversion (bfd *abfd, int ver)
283{
284 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
285 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
286}
5bd4f169
AM
287\f
288/* Relocation HOWTO's. */
46807bf4
AM
289/* Like other ELF RELA targets that don't apply multiple
290 field-altering relocations to the same localation, src_mask is
291 always zero and pcrel_offset is the same as pc_relative.
292 PowerPC can always use a zero bitpos, even when the field is not at
293 the LSB. For example, a REL24 could use rightshift=2, bisize=24
294 and bitpos=2 which matches the ABI description, or as we do here,
295 rightshift=0, bitsize=26 and bitpos=0. */
296#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
297 complain, special_func) \
298 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
299 complain_overflow_ ## complain, special_func, \
300 #type, FALSE, 0, mask, pc_relative)
301
04c9666a 302static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 303
f3185997
NC
304static reloc_howto_type ppc64_elf_howto_raw[] =
305{
5bd4f169 306 /* This reloc does nothing. */
46807bf4
AM
307 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
308 bfd_elf_generic_reloc),
5bd4f169
AM
309
310 /* A standard 32 bit relocation. */
46807bf4
AM
311 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* An absolute 26 bit branch; the lower two bits must be zero.
315 FIXME: we don't check that, we just clear them. */
46807bf4
AM
316 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
317 bfd_elf_generic_reloc),
5bd4f169
AM
318
319 /* A standard 16 bit relocation. */
46807bf4
AM
320 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A 16 bit relocation without overflow. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* Bits 16-31 of an address. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
332 bits, treated as a signed number, is negative. */
46807bf4
AM
333 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
334 ppc64_elf_ha_reloc),
5bd4f169
AM
335
336 /* An absolute 16 bit branch; the lower two bits must be zero.
337 FIXME: we don't check that, we just clear them. */
46807bf4
AM
338 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
339 ppc64_elf_branch_reloc),
5bd4f169
AM
340
341 /* An absolute 16 bit branch, for which bit 10 should be set to
342 indicate that the branch is expected to be taken. The lower two
343 bits must be zero. */
46807bf4
AM
344 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
345 ppc64_elf_brtaken_reloc),
5bd4f169
AM
346
347 /* An absolute 16 bit branch, for which bit 10 should be set to
348 indicate that the branch is not expected to be taken. The lower
349 two bits must be zero. */
46807bf4
AM
350 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
351 ppc64_elf_brtaken_reloc),
5bd4f169
AM
352
353 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
355 ppc64_elf_branch_reloc),
5bd4f169 356
05d0e962 357 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
358 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
05d0e962 360
5bd4f169 361 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
362 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
5bd4f169
AM
364
365 /* A relative 16 bit branch. Bit 10 should be set to indicate that
366 the branch is expected to be taken. The lower two bits must be
367 zero. */
46807bf4
AM
368 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
369 ppc64_elf_brtaken_reloc),
5bd4f169
AM
370
371 /* A relative 16 bit branch. Bit 10 should be set to indicate that
372 the branch is not expected to be taken. The lower two bits must
373 be zero. */
46807bf4
AM
374 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
375 ppc64_elf_brtaken_reloc),
5bd4f169
AM
376
377 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
378 symbol. */
46807bf4
AM
379 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
380 ppc64_elf_unhandled_reloc),
5bd4f169
AM
381
382 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
383 the symbol. */
46807bf4
AM
384 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
385 ppc64_elf_unhandled_reloc),
5bd4f169
AM
386
387 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
388 the symbol. */
46807bf4
AM
389 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
390 ppc64_elf_unhandled_reloc),
5bd4f169
AM
391
392 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
393 the symbol. */
46807bf4
AM
394 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
395 ppc64_elf_unhandled_reloc),
5bd4f169
AM
396
397 /* This is used only by the dynamic linker. The symbol should exist
398 both in the object being run and in some shared library. The
399 dynamic linker copies the data addressed by the symbol from the
400 shared library into the object, because the object being
401 run has to have the data at some particular address. */
46807bf4
AM
402 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
403 ppc64_elf_unhandled_reloc),
5bd4f169
AM
404
405 /* Like R_PPC64_ADDR64, but used when setting global offset table
406 entries. */
46807bf4
AM
407 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
408 ppc64_elf_unhandled_reloc),
5bd4f169
AM
409
410 /* Created by the link editor. Marks a procedure linkage table
411 entry for a symbol. */
46807bf4
AM
412 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
413 ppc64_elf_unhandled_reloc),
5bd4f169
AM
414
415 /* Used only by the dynamic linker. When the object is run, this
416 doubleword64 is set to the load address of the object, plus the
417 addend. */
46807bf4
AM
418 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
419 bfd_elf_generic_reloc),
5bd4f169
AM
420
421 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
422 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* 32-bit PC relative. */
46807bf4
AM
430 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
431 bfd_elf_generic_reloc),
5bd4f169 432
10ed1bba 433 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
434 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
435 ppc64_elf_unhandled_reloc),
5bd4f169
AM
436
437 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
438 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
439 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
440 ppc64_elf_unhandled_reloc),
5bd4f169
AM
441
442 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
443 the symbol. */
46807bf4
AM
444 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
445 ppc64_elf_unhandled_reloc),
5bd4f169
AM
446
447 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
448 the symbol. */
46807bf4
AM
449 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
450 ppc64_elf_unhandled_reloc),
5bd4f169
AM
451
452 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
453 the symbol. */
46807bf4
AM
454 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
455 ppc64_elf_unhandled_reloc),
5bd4f169 456
c061c2d8 457 /* 16-bit section relative relocation. */
46807bf4
AM
458 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
459 ppc64_elf_sectoff_reloc),
5bd4f169 460
c061c2d8 461 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
463 ppc64_elf_sectoff_reloc),
5bd4f169
AM
464
465 /* 16-bit upper half section relative relocation. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_ha_reloc),
5bd4f169 472
04c9666a 473 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
474 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
475 bfd_elf_generic_reloc),
5bd4f169
AM
476
477 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
478
479 /* A standard 64-bit relocation. */
46807bf4
AM
480 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
481 bfd_elf_generic_reloc),
5bd4f169
AM
482
483 /* The bits 32-47 of an address. */
46807bf4
AM
484 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address, plus 1 if the contents of the low
488 16 bits, treated as a signed number, is negative. */
46807bf4
AM
489 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
490 ppc64_elf_ha_reloc),
5bd4f169
AM
491
492 /* The bits 48-63 of an address. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
494 bfd_elf_generic_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address, plus 1 if the contents of the low
497 16 bits, treated as a signed number, is negative. */
46807bf4
AM
498 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
499 ppc64_elf_ha_reloc),
5bd4f169
AM
500
501 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
502 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
503 bfd_elf_generic_reloc),
5bd4f169
AM
504
505 /* 64-bit relative relocation. */
46807bf4
AM
506 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
507 bfd_elf_generic_reloc),
5bd4f169 508
cedb70c5 509 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
510 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
511 ppc64_elf_unhandled_reloc),
5bd4f169
AM
512
513 /* 64-bit PC relative relocation to the symbol's procedure linkage
514 table. */
515 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
516 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
517 ppc64_elf_unhandled_reloc),
5bd4f169
AM
518
519 /* 16 bit TOC-relative relocation. */
5bd4f169 520 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
521 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
522 ppc64_elf_toc_reloc),
5bd4f169
AM
523
524 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 525 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
526 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
527 ppc64_elf_toc_reloc),
5bd4f169
AM
528
529 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 530 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
531 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
532 ppc64_elf_toc_reloc),
5bd4f169
AM
533
534 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
535 contents of the low 16 bits, treated as a signed number, is
536 negative. */
5bd4f169 537 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
538 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
539 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
540
541 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 542 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
543 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
544 ppc64_elf_toc64_reloc),
5bd4f169
AM
545
546 /* Like R_PPC64_GOT16, but also informs the link editor that the
547 value to relocate may (!) refer to a PLT entry which the link
548 editor (a) may replace with the symbol value. If the link editor
549 is unable to fully resolve the symbol, it may (b) create a PLT
550 entry and store the address to the new PLT entry in the GOT.
551 This permits lazy resolution of function symbols at run time.
552 The link editor may also skip all of this and just (c) emit a
553 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
554 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
555 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
556 ppc64_elf_unhandled_reloc),
411e1bfb
AM
557
558 /* Like R_PPC64_PLTGOT16, but without overflow. */
559 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
560 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
561 ppc64_elf_unhandled_reloc),
411e1bfb
AM
562
563 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
564 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
565 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
566 ppc64_elf_unhandled_reloc),
411e1bfb
AM
567
568 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
569 1 if the contents of the low 16 bits, treated as a signed number,
570 is negative. */
571 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
572 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
573 ppc64_elf_unhandled_reloc),
411e1bfb
AM
574
575 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
576 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
577 bfd_elf_generic_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
585 ppc64_elf_unhandled_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
597 ppc64_elf_sectoff_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
605 ppc64_elf_toc_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
612 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
613 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
614 ppc64_elf_unhandled_reloc),
411e1bfb
AM
615
616 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
617 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
618 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
619 ppc64_elf_unhandled_reloc),
411e1bfb 620
727fc41e 621 /* Marker relocs for TLS. */
46807bf4
AM
622 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
623 bfd_elf_generic_reloc),
624
625 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
626 bfd_elf_generic_reloc),
627
628 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
629 bfd_elf_generic_reloc),
727fc41e 630
23cedd1d
AM
631 /* Marker reloc for optimizing r2 save in prologue rather than on
632 each plt call stub. */
46807bf4
AM
633 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
634 bfd_elf_generic_reloc),
3b421ab3 635
23cedd1d 636 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
637 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
639
640 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
641 bfd_elf_generic_reloc),
23cedd1d 642
411e1bfb
AM
643 /* Computes the load module index of the load module that contains the
644 definition of its TLS sym. */
46807bf4
AM
645 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
646 ppc64_elf_unhandled_reloc),
411e1bfb
AM
647
648 /* Computes a dtv-relative displacement, the difference between the value
649 of sym+add and the base address of the thread-local storage block that
650 contains the definition of sym, minus 0x8000. */
46807bf4
AM
651 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
652 ppc64_elf_unhandled_reloc),
411e1bfb
AM
653
654 /* A 16 bit dtprel reloc. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* Like DTPREL16, but no overflow. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Computes a tp-relative displacement, the difference between the value of
695 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
696 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
697 ppc64_elf_unhandled_reloc),
411e1bfb
AM
698
699 /* A 16 bit tprel reloc. */
46807bf4
AM
700 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* Like TPREL16, but no overflow. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
740 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
741 to the first entry relative to the TOC base (r2). */
46807bf4
AM
742 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
743 ppc64_elf_unhandled_reloc),
5bd4f169 744
411e1bfb 745 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb
AM
757 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
758 with values (sym+add)@dtpmod and zero, and computes the offset to the
759 first entry relative to the TOC base (r2). */
46807bf4
AM
760 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
761 ppc64_elf_unhandled_reloc),
5bd4f169 762
411e1bfb 763 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb
AM
775 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
776 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
777 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
778 ppc64_elf_unhandled_reloc),
5bd4f169 779
411e1bfb 780 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
411e1bfb
AM
791
792 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
793 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
794 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
795 ppc64_elf_unhandled_reloc),
5bd4f169 796
411e1bfb 797 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
808
809 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
810 ppc64_elf_unhandled_reloc),
811
812 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
813 bfd_elf_generic_reloc),
e054468f 814
25f23106 815 /* A 16 bit relative relocation. */
46807bf4
AM
816 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
817 bfd_elf_generic_reloc),
25f23106
AM
818
819 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
820 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* The high order 16 bits of a relative address. */
46807bf4
AM
824 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address, plus 1 if the contents of
828 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
829 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
830 ppc64_elf_ha_reloc),
25f23106 831
4a969973
AM
832 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
833 bfd_elf_generic_reloc),
834
835 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
836 ppc64_elf_ha_reloc),
837
838 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
839 bfd_elf_generic_reloc),
840
841 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
842 ppc64_elf_ha_reloc),
843
844 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
845 bfd_elf_generic_reloc),
846
847 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
848 ppc64_elf_ha_reloc),
849
a680de9a 850 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
851 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
852 ppc64_elf_ha_reloc),
a680de9a 853
7ba71655 854 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
855 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
856 ppc64_elf_ha_reloc),
7ba71655 857
f9c6b907 858 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
859 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
860 bfd_elf_generic_reloc),
f9c6b907
AM
861
862 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
864 ppc64_elf_ha_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_unhandled_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907 881
006589cf 882 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
883 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
884 bfd_elf_generic_reloc),
006589cf 885
45965137 886 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
887 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
45965137 889
5663e321
AM
890 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
891 bfd_elf_generic_reloc),
892
893 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
894 bfd_elf_generic_reloc),
895
896 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
897 bfd_elf_generic_reloc),
898
899 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
900 ppc64_elf_prefix_reloc),
901
902 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
903 ppc64_elf_prefix_reloc),
904
905 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
906 ppc64_elf_prefix_reloc),
907
908 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
909 ppc64_elf_prefix_reloc),
910
911 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
912 ppc64_elf_prefix_reloc),
913
914 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
915 ppc64_elf_unhandled_reloc),
916
917 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
918 ppc64_elf_unhandled_reloc),
919
920 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
921 ppc64_elf_unhandled_reloc),
922
c213164a
AM
923 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
924 ppc64_elf_unhandled_reloc),
925
926 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
927 ppc64_elf_unhandled_reloc),
928
929 HOW (R_PPC64_GOT_TLSGD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
930 ppc64_elf_unhandled_reloc),
931
932 HOW (R_PPC64_GOT_TLSLD34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
933 ppc64_elf_unhandled_reloc),
934
935 HOW (R_PPC64_GOT_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
936 ppc64_elf_unhandled_reloc),
937
938 HOW (R_PPC64_GOT_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
939 ppc64_elf_unhandled_reloc),
940
5663e321
AM
941 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
942 bfd_elf_generic_reloc),
943
944 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
945 ppc64_elf_ha_reloc),
946
947 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
948 bfd_elf_generic_reloc),
949
950 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
951 ppc64_elf_ha_reloc),
952
953 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
954 bfd_elf_generic_reloc),
955
956 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
957 ppc64_elf_ha_reloc),
958
959 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
960 bfd_elf_generic_reloc),
961
962 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
963 ppc64_elf_ha_reloc),
964
965 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
966 ppc64_elf_prefix_reloc),
967
968 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
969 ppc64_elf_prefix_reloc),
970
5bd4f169 971 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
972 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
973 NULL),
5bd4f169
AM
974
975 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978};
979
980\f
981/* Initialize the ppc64_elf_howto_table, so that linear accesses can
982 be done. */
983
984static void
4ce794b7 985ppc_howto_init (void)
5bd4f169
AM
986{
987 unsigned int i, type;
988
a4b6fadd 989 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
990 {
991 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 992 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
993 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
994 }
995}
996
997static reloc_howto_type *
f3185997 998ppc64_elf_reloc_type_lookup (bfd *abfd,
4ce794b7 999 bfd_reloc_code_real_type code)
5bd4f169 1000{
411e1bfb 1001 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1002
1003 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1004 /* Initialize howto table if needed. */
1005 ppc_howto_init ();
1006
4ce794b7 1007 switch (code)
5bd4f169
AM
1008 {
1009 default:
f3185997 1010 /* xgettext:c-format */
2cdcc330
AM
1011 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1012 (int) code);
f3185997 1013 bfd_set_error (bfd_error_bad_value);
4ce794b7 1014 return NULL;
5bd4f169 1015
411e1bfb
AM
1016 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1017 break;
1018 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1019 break;
1020 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1021 break;
1022 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1023 break;
1024 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1025 break;
1026 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1027 break;
f9c6b907
AM
1028 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1029 break;
411e1bfb 1030 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1031 break;
f9c6b907
AM
1032 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1033 break;
411e1bfb 1034 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1035 break;
411e1bfb 1036 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1037 break;
411e1bfb 1038 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1039 break;
411e1bfb 1040 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1041 break;
05d0e962
AM
1042 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1043 break;
411e1bfb 1044 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1045 break;
411e1bfb 1046 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1047 break;
411e1bfb 1048 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1049 break;
411e1bfb 1050 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1051 break;
411e1bfb 1052 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1053 break;
411e1bfb 1054 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1055 break;
411e1bfb 1056 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1057 break;
411e1bfb 1058 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1059 break;
411e1bfb 1060 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1061 break;
411e1bfb 1062 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1063 break;
411e1bfb 1064 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1065 break;
411e1bfb 1066 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1067 break;
411e1bfb 1068 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1069 break;
411e1bfb 1070 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1071 break;
411e1bfb 1072 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1073 break;
411e1bfb 1074 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1075 break;
411e1bfb 1076 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1077 break;
411e1bfb 1078 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1079 break;
411e1bfb 1080 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1081 break;
411e1bfb 1082 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1083 break;
411e1bfb 1084 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1085 break;
411e1bfb 1086 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1087 break;
411e1bfb 1088 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1089 break;
411e1bfb 1090 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1091 break;
411e1bfb 1092 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1093 break;
411e1bfb 1094 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1095 break;
411e1bfb 1096 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1097 break;
411e1bfb 1098 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1099 break;
411e1bfb 1100 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1101 break;
411e1bfb 1102 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1103 break;
411e1bfb 1104 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1105 break;
411e1bfb 1106 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1107 break;
411e1bfb 1108 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1109 break;
411e1bfb 1110 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1111 break;
411e1bfb 1112 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1113 break;
411e1bfb 1114 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1115 break;
411e1bfb 1116 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1117 break;
411e1bfb 1118 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1119 break;
411e1bfb 1120 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1121 break;
411e1bfb 1122 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1123 break;
411e1bfb 1124 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1125 break;
411e1bfb 1126 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1127 break;
411e1bfb 1128 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1129 break;
411e1bfb 1130 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1131 break;
411e1bfb 1132 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1133 break;
411e1bfb 1134 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1135 break;
411e1bfb 1136 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1137 break;
411e1bfb 1138 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1139 break;
c213164a 1140 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1141 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1142 break;
727fc41e
AM
1143 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1144 break;
1145 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1146 break;
411e1bfb 1147 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1148 break;
411e1bfb 1149 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1150 break;
411e1bfb 1151 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1152 break;
411e1bfb 1153 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1154 break;
f9c6b907
AM
1155 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1156 break;
411e1bfb 1157 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1158 break;
f9c6b907
AM
1159 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1160 break;
411e1bfb 1161 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1162 break;
411e1bfb
AM
1163 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1164 break;
1165 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1166 break;
1167 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1168 break;
f9c6b907
AM
1169 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1170 break;
411e1bfb
AM
1171 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1172 break;
f9c6b907
AM
1173 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1174 break;
411e1bfb
AM
1175 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1176 break;
1177 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1178 break;
1179 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1180 break;
1181 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1182 break;
1183 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1184 break;
1185 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1186 break;
1187 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1188 break;
1189 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1190 break;
1191 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1192 break;
1193 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1194 break;
1195 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1196 break;
1197 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1198 break;
1199 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1200 break;
1201 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1202 break;
1203 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1204 break;
1205 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1206 break;
1207 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1208 break;
1209 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1210 break;
1211 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1212 break;
1213 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1214 break;
1215 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1216 break;
1217 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1218 break;
1219 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1220 break;
1221 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1222 break;
1223 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1224 break;
1225 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1226 break;
1227 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1228 break;
1229 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1230 break;
1231 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1232 break;
25f23106
AM
1233 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1234 break;
1235 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1236 break;
1237 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1238 break;
1239 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1240 break;
4a969973
AM
1241 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1242 break;
1243 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1244 break;
1245 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1246 break;
1247 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1248 break;
1249 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1250 break;
1251 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1252 break;
7ba71655
AM
1253 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1254 break;
a680de9a
PB
1255 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1256 break;
006589cf
AM
1257 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1258 break;
45965137
AM
1259 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1260 break;
5663e321
AM
1261 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1262 break;
1263 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1264 break;
1265 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1266 break;
1267 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1268 break;
1269 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1270 break;
1271 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1272 break;
1273 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1274 break;
c213164a
AM
1275 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1276 break;
1277 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1278 break;
1279 case BFD_RELOC_PPC64_GOT_TLSGD34: r = R_PPC64_GOT_TLSGD34;
1280 break;
1281 case BFD_RELOC_PPC64_GOT_TLSLD34: r = R_PPC64_GOT_TLSLD34;
1282 break;
1283 case BFD_RELOC_PPC64_GOT_TPREL34: r = R_PPC64_GOT_TPREL34;
1284 break;
1285 case BFD_RELOC_PPC64_GOT_DTPREL34: r = R_PPC64_GOT_DTPREL34;
1286 break;
5663e321
AM
1287 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1288 break;
1289 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1290 break;
1291 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1292 break;
1293 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1294 break;
1295 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1296 break;
1297 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1298 break;
1299 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1300 break;
1301 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1302 break;
1303 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1304 break;
1305 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1306 break;
411e1bfb
AM
1307 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1308 break;
1309 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1310 break;
1311 }
1312
4ce794b7 1313 return ppc64_elf_howto_table[r];
5bd4f169
AM
1314};
1315
157090f7
AM
1316static reloc_howto_type *
1317ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1318 const char *r_name)
1319{
1320 unsigned int i;
1321
a4b6fadd 1322 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1323 if (ppc64_elf_howto_raw[i].name != NULL
1324 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1325 return &ppc64_elf_howto_raw[i];
1326
1327 return NULL;
1328}
1329
5bd4f169
AM
1330/* Set the howto pointer for a PowerPC ELF reloc. */
1331
f3185997 1332static bfd_boolean
4aef7643 1333ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1334 Elf_Internal_Rela *dst)
5bd4f169 1335{
65f38f15
AM
1336 unsigned int type;
1337
ef60b7ff 1338 /* Initialize howto table if needed. */
5bd4f169 1339 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1340 ppc_howto_init ();
1341
65f38f15 1342 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1343 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1344 {
695344c0 1345 /* xgettext:c-format */
0aa13fee 1346 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1347 abfd, type);
f3185997
NC
1348 bfd_set_error (bfd_error_bad_value);
1349 return FALSE;
d0fb9a8d 1350 }
65f38f15 1351 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1352 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1353 {
1354 /* xgettext:c-format */
1355 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1356 abfd, type);
1357 bfd_set_error (bfd_error_bad_value);
1358 return FALSE;
1359 }
2cdcc330 1360
f3185997 1361 return TRUE;
5bd4f169
AM
1362}
1363
04c9666a 1364/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1365
1366static bfd_reloc_status_type
4ce794b7
AM
1367ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1368 void *data, asection *input_section,
1369 bfd *output_bfd, char **error_message)
5bd4f169 1370{
a680de9a
PB
1371 enum elf_ppc64_reloc_type r_type;
1372 long insn;
1373 bfd_size_type octets;
3de43e7b 1374 bfd_vma value;
a680de9a 1375
805fc799
AM
1376 /* If this is a relocatable link (output_bfd test tells us), just
1377 call the generic function. Any adjustment will be done at final
1378 link time. */
1379 if (output_bfd != NULL)
cedb70c5 1380 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1381 input_section, output_bfd, error_message);
1382
5663e321
AM
1383 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1384 We won't actually be using the low bits, so trashing them
805fc799 1385 doesn't matter. */
a680de9a 1386 r_type = reloc_entry->howto->type;
5663e321
AM
1387 if (r_type == R_PPC64_ADDR16_HIGHERA34
1388 || r_type == R_PPC64_ADDR16_HIGHESTA34
1389 || r_type == R_PPC64_REL16_HIGHERA34
1390 || r_type == R_PPC64_REL16_HIGHESTA34)
1391 reloc_entry->addend += 1ULL << 33;
1392 else
1393 reloc_entry->addend += 1U << 15;
a680de9a
PB
1394 if (r_type != R_PPC64_REL16DX_HA)
1395 return bfd_reloc_continue;
1396
1397 value = 0;
1398 if (!bfd_is_com_section (symbol->section))
1399 value = symbol->value;
1400 value += (reloc_entry->addend
1401 + symbol->section->output_offset
1402 + symbol->section->output_section->vma);
1403 value -= (reloc_entry->address
1404 + input_section->output_offset
1405 + input_section->output_section->vma);
3de43e7b 1406 value = (bfd_signed_vma) value >> 16;
a680de9a
PB
1407
1408 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1409 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1410 insn &= ~0x1fffc1;
3de43e7b 1411 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1412 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1413 if (value + 0x8000 > 0xffff)
a680de9a
PB
1414 return bfd_reloc_overflow;
1415 return bfd_reloc_ok;
805fc799 1416}
5bd4f169 1417
2441e016
AM
1418static bfd_reloc_status_type
1419ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1420 void *data, asection *input_section,
1421 bfd *output_bfd, char **error_message)
1422{
1423 if (output_bfd != NULL)
1424 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1425 input_section, output_bfd, error_message);
1426
699733f6
AM
1427 if (strcmp (symbol->section->name, ".opd") == 0
1428 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1429 {
1430 bfd_vma dest = opd_entry_value (symbol->section,
1431 symbol->value + reloc_entry->addend,
aef36ac1 1432 NULL, NULL, FALSE);
2441e016
AM
1433 if (dest != (bfd_vma) -1)
1434 reloc_entry->addend = dest - (symbol->value
1435 + symbol->section->output_section->vma
1436 + symbol->section->output_offset);
1437 }
810d4e75
AM
1438 else
1439 {
1440 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1441
1442 if (symbol->section->owner != abfd
9f284bf9 1443 && symbol->section->owner != NULL
810d4e75
AM
1444 && abiversion (symbol->section->owner) >= 2)
1445 {
1446 unsigned int i;
1447
1448 for (i = 0; i < symbol->section->owner->symcount; ++i)
1449 {
1450 asymbol *symdef = symbol->section->owner->outsymbols[i];
1451
1452 if (strcmp (symdef->name, symbol->name) == 0)
1453 {
1454 elfsym = (elf_symbol_type *) symdef;
1455 break;
1456 }
1457 }
1458 }
1459 reloc_entry->addend
1460 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1461 }
2441e016
AM
1462 return bfd_reloc_continue;
1463}
1464
805fc799 1465static bfd_reloc_status_type
4ce794b7
AM
1466ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1467 void *data, asection *input_section,
1468 bfd *output_bfd, char **error_message)
805fc799
AM
1469{
1470 long insn;
04c9666a 1471 enum elf_ppc64_reloc_type r_type;
805fc799 1472 bfd_size_type octets;
794e51c0
AM
1473 /* Assume 'at' branch hints. */
1474 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1475
1476 /* If this is a relocatable link (output_bfd test tells us), just
1477 call the generic function. Any adjustment will be done at final
1478 link time. */
5bd4f169 1479 if (output_bfd != NULL)
cedb70c5 1480 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1481 input_section, output_bfd, error_message);
1482
1483 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1484 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1485 insn &= ~(0x01 << 21);
4ce794b7 1486 r_type = reloc_entry->howto->type;
805fc799
AM
1487 if (r_type == R_PPC64_ADDR14_BRTAKEN
1488 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1489 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1490
794e51c0 1491 if (is_isa_v2)
5bd4f169 1492 {
805fc799
AM
1493 /* Set 'a' bit. This is 0b00010 in BO field for branch
1494 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1495 for branch on CTR insns (BO == 1a00t or 1a01t). */
1496 if ((insn & (0x14 << 21)) == (0x04 << 21))
1497 insn |= 0x02 << 21;
1498 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1499 insn |= 0x08 << 21;
1500 else
2441e016 1501 goto out;
5bd4f169 1502 }
805fc799
AM
1503 else
1504 {
1505 bfd_vma target = 0;
1506 bfd_vma from;
5bd4f169 1507
805fc799
AM
1508 if (!bfd_is_com_section (symbol->section))
1509 target = symbol->value;
1510 target += symbol->section->output_section->vma;
1511 target += symbol->section->output_offset;
1512 target += reloc_entry->addend;
5bd4f169 1513
805fc799
AM
1514 from = (reloc_entry->address
1515 + input_section->output_offset
1516 + input_section->output_section->vma);
5bd4f169 1517
805fc799
AM
1518 /* Invert 'y' bit if not the default. */
1519 if ((bfd_signed_vma) (target - from) < 0)
1520 insn ^= 0x01 << 21;
1521 }
4ce794b7 1522 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1523 out:
1524 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1525 input_section, output_bfd, error_message);
805fc799 1526}
5bd4f169 1527
805fc799 1528static bfd_reloc_status_type
4ce794b7
AM
1529ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1530 void *data, asection *input_section,
1531 bfd *output_bfd, char **error_message)
805fc799
AM
1532{
1533 /* If this is a relocatable link (output_bfd test tells us), just
1534 call the generic function. Any adjustment will be done at final
1535 link time. */
1536 if (output_bfd != NULL)
cedb70c5 1537 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1538 input_section, output_bfd, error_message);
5bd4f169 1539
805fc799
AM
1540 /* Subtract the symbol section base address. */
1541 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1542 return bfd_reloc_continue;
1543}
1544
805fc799 1545static bfd_reloc_status_type
4ce794b7
AM
1546ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1547 void *data, asection *input_section,
1548 bfd *output_bfd, char **error_message)
805fc799
AM
1549{
1550 /* If this is a relocatable link (output_bfd test tells us), just
1551 call the generic function. Any adjustment will be done at final
1552 link time. */
1553 if (output_bfd != NULL)
cedb70c5 1554 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1555 input_section, output_bfd, error_message);
1556
1557 /* Subtract the symbol section base address. */
1558 reloc_entry->addend -= symbol->section->output_section->vma;
1559
1560 /* Adjust the addend for sign extension of the low 16 bits. */
1561 reloc_entry->addend += 0x8000;
1562 return bfd_reloc_continue;
1563}
1564
1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 bfd_vma TOCstart;
1571
1572 /* If this is a relocatable link (output_bfd test tells us), just
1573 call the generic function. Any adjustment will be done at final
1574 link time. */
1575 if (output_bfd != NULL)
cedb70c5 1576 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1577 input_section, output_bfd, error_message);
1578
1579 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1580 if (TOCstart == 0)
1c865ab2 1581 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1582
1583 /* Subtract the TOC base address. */
1584 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1585 return bfd_reloc_continue;
1586}
1587
1588static bfd_reloc_status_type
4ce794b7
AM
1589ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1590 void *data, asection *input_section,
1591 bfd *output_bfd, char **error_message)
805fc799
AM
1592{
1593 bfd_vma TOCstart;
1594
1595 /* If this is a relocatable link (output_bfd test tells us), just
1596 call the generic function. Any adjustment will be done at final
1597 link time. */
1598 if (output_bfd != NULL)
cedb70c5 1599 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1600 input_section, output_bfd, error_message);
1601
1602 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1603 if (TOCstart == 0)
1c865ab2 1604 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1605
1606 /* Subtract the TOC base address. */
1607 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1608
1609 /* Adjust the addend for sign extension of the low 16 bits. */
1610 reloc_entry->addend += 0x8000;
1611 return bfd_reloc_continue;
1612}
1613
1614static bfd_reloc_status_type
4ce794b7
AM
1615ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1616 void *data, asection *input_section,
1617 bfd *output_bfd, char **error_message)
805fc799
AM
1618{
1619 bfd_vma TOCstart;
1620 bfd_size_type octets;
1621
1622 /* If this is a relocatable link (output_bfd test tells us), just
1623 call the generic function. Any adjustment will be done at final
1624 link time. */
1625 if (output_bfd != NULL)
cedb70c5 1626 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1627 input_section, output_bfd, error_message);
1628
1629 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1630 if (TOCstart == 0)
1c865ab2 1631 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1632
1633 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
1634 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1635 return bfd_reloc_ok;
1636}
1637
5663e321
AM
1638static bfd_reloc_status_type
1639ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1640 void *data, asection *input_section,
1641 bfd *output_bfd, char **error_message)
1642{
1643 uint64_t insn;
1644 bfd_vma targ;
1645
1646 if (output_bfd != NULL)
1647 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1648 input_section, output_bfd, error_message);
1649
1650 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1651 insn <<= 32;
1652 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1653
1654 targ = (symbol->section->output_section->vma
1655 + symbol->section->output_offset
1656 + reloc_entry->addend);
1657 if (!bfd_is_com_section (symbol->section))
1658 targ += symbol->value;
1659 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1660 targ += 1ULL << 33;
1661 if (reloc_entry->howto->pc_relative)
1662 {
1663 bfd_vma from = (reloc_entry->address
1664 + input_section->output_offset
1665 + input_section->output_section->vma);
1666 targ -=from;
1667 }
1668 targ >>= reloc_entry->howto->rightshift;
1669 insn &= ~reloc_entry->howto->dst_mask;
1670 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1671 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1672 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1673 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1674 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1675 >= 1ULL << reloc_entry->howto->bitsize))
1676 return bfd_reloc_overflow;
1677 return bfd_reloc_ok;
1678}
1679
805fc799 1680static bfd_reloc_status_type
4ce794b7
AM
1681ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1682 void *data, asection *input_section,
1683 bfd *output_bfd, char **error_message)
805fc799
AM
1684{
1685 /* If this is a relocatable link (output_bfd test tells us), just
1686 call the generic function. Any adjustment will be done at final
1687 link time. */
1688 if (output_bfd != NULL)
cedb70c5 1689 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1690 input_section, output_bfd, error_message);
1691
1692 if (error_message != NULL)
1693 {
1694 static char buf[60];
1695 sprintf (buf, "generic linker can't handle %s",
1696 reloc_entry->howto->name);
1697 *error_message = buf;
1698 }
1699 return bfd_reloc_dangerous;
1700}
1701
927be08e
AM
1702/* Track GOT entries needed for a given symbol. We might need more
1703 than one got entry per symbol. */
1704struct got_entry
1705{
1706 struct got_entry *next;
1707
1708 /* The symbol addend that we'll be placing in the GOT. */
1709 bfd_vma addend;
1710
1711 /* Unlike other ELF targets, we use separate GOT entries for the same
1712 symbol referenced from different input files. This is to support
1713 automatic multiple TOC/GOT sections, where the TOC base can vary
1714 from one input file to another. After partitioning into TOC groups
1715 we merge entries within the group.
1716
1717 Point to the BFD owning this GOT entry. */
1718 bfd *owner;
1719
1720 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1721 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1722 unsigned char tls_type;
927be08e
AM
1723
1724 /* Non-zero if got.ent points to real entry. */
f961d9dd 1725 unsigned char is_indirect;
927be08e
AM
1726
1727 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1728 union
2cdcc330
AM
1729 {
1730 bfd_signed_vma refcount;
1731 bfd_vma offset;
1732 struct got_entry *ent;
1733 } got;
927be08e
AM
1734};
1735
1736/* The same for PLT. */
1737struct plt_entry
1738{
1739 struct plt_entry *next;
1740
1741 bfd_vma addend;
1742
1743 union
2cdcc330
AM
1744 {
1745 bfd_signed_vma refcount;
1746 bfd_vma offset;
1747 } plt;
927be08e
AM
1748};
1749
e717da7e
AM
1750struct ppc64_elf_obj_tdata
1751{
1752 struct elf_obj_tdata elf;
1753
1754 /* Shortcuts to dynamic linker sections. */
1755 asection *got;
1756 asection *relgot;
1757
b3fac117
AM
1758 /* Used during garbage collection. We attach global symbols defined
1759 on removed .opd entries to this section so that the sym is removed. */
1760 asection *deleted_section;
81688140 1761
927be08e 1762 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1763 sections means we potentially need one of these for each input bfd. */
927be08e 1764 struct got_entry tlsld_got;
8860955f 1765
2cdcc330
AM
1766 union
1767 {
729eabd5
AM
1768 /* A copy of relocs before they are modified for --emit-relocs. */
1769 Elf_Internal_Rela *relocs;
1770
1771 /* Section contents. */
1772 bfd_byte *contents;
1773 } opd;
d77c8a4b
AM
1774
1775 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1776 the reloc to be in the range -32768 to 32767. */
98528052
AM
1777 unsigned int has_small_toc_reloc : 1;
1778
560c8763
AM
1779 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1780 instruction not one we handle. */
1781 unsigned int unexpected_toc_insn : 1;
066f4018 1782
903b777d
AM
1783 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1784 this file. */
1785 unsigned int has_optrel : 1;
e717da7e
AM
1786};
1787
1788#define ppc64_elf_tdata(bfd) \
1789 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1790
1791#define ppc64_tlsld_got(bfd) \
1792 (&ppc64_elf_tdata (bfd)->tlsld_got)
1793
0c8d6e5c
AM
1794#define is_ppc64_elf(bfd) \
1795 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1796 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1797
e717da7e
AM
1798/* Override the generic function because we store some extras. */
1799
1800static bfd_boolean
1801ppc64_elf_mkobject (bfd *abfd)
1802{
0ffa91dd 1803 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1804 PPC64_ELF_DATA);
e717da7e
AM
1805}
1806
feee612b 1807/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1808 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1809
b34976b6 1810static bfd_boolean
4ce794b7 1811ppc64_elf_object_p (bfd *abfd)
feee612b 1812{
14b57c7c
AM
1813 if (!abfd->arch_info->the_default)
1814 return TRUE;
1815
1816 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1817 {
1818 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1819
1820 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1821 {
1822 /* Relies on arch after 32 bit default being 64 bit default. */
1823 abfd->arch_info = abfd->arch_info->next;
1824 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1825 }
1826 }
14b57c7c 1827 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1828}
1829
d37c89e5
AM
1830/* Support for core dump NOTE sections. */
1831
1832static bfd_boolean
1833ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1834{
eea6121a 1835 size_t offset, size;
d37c89e5
AM
1836
1837 if (note->descsz != 504)
1838 return FALSE;
1839
1840 /* pr_cursig */
228e534f 1841 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1842
1843 /* pr_pid */
228e534f 1844 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1845
1846 /* pr_reg */
1847 offset = 112;
eea6121a 1848 size = 384;
d37c89e5
AM
1849
1850 /* Make a ".reg/999" section. */
1851 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1852 size, note->descpos + offset);
d37c89e5
AM
1853}
1854
1855static bfd_boolean
1856ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1857{
1858 if (note->descsz != 136)
1859 return FALSE;
1860
228e534f 1861 elf_tdata (abfd)->core->pid
bc989cdc 1862 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1863 elf_tdata (abfd)->core->program
d37c89e5 1864 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1865 elf_tdata (abfd)->core->command
d37c89e5
AM
1866 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1867
1868 return TRUE;
1869}
1870
183e98be
AM
1871static char *
1872ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1873 ...)
1874{
1875 switch (note_type)
1876 {
1877 default:
1878 return NULL;
1879
1880 case NT_PRPSINFO:
1881 {
9ef6d1e3 1882 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1883 va_list ap;
1884
1885 va_start (ap, note_type);
75cd47ed 1886 memset (data, 0, sizeof (data));
183e98be 1887 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1888#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1889 DIAGNOSTIC_PUSH;
be3e27bb 1890 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1891 -Wstringop-truncation:
1892 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1893 */
95da9854
L
1894 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1895#endif
183e98be 1896 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1897#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1898 DIAGNOSTIC_POP;
fe75810f 1899#endif
183e98be
AM
1900 va_end (ap);
1901 return elfcore_write_note (abfd, buf, bufsiz,
1902 "CORE", note_type, data, sizeof (data));
1903 }
1904
1905 case NT_PRSTATUS:
1906 {
1907 char data[504];
1908 va_list ap;
1909 long pid;
1910 int cursig;
1911 const void *greg;
1912
1913 va_start (ap, note_type);
1914 memset (data, 0, 112);
1915 pid = va_arg (ap, long);
1916 bfd_put_32 (abfd, pid, data + 32);
1917 cursig = va_arg (ap, int);
1918 bfd_put_16 (abfd, cursig, data + 12);
1919 greg = va_arg (ap, const void *);
1920 memcpy (data + 112, greg, 384);
1921 memset (data + 496, 0, 8);
1922 va_end (ap);
1923 return elfcore_write_note (abfd, buf, bufsiz,
1924 "CORE", note_type, data, sizeof (data));
1925 }
1926 }
1927}
1928
5d35169e
AM
1929/* Add extra PPC sections. */
1930
2cdcc330 1931static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1932{
07d6d2b8
AM
1933 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1934 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1935 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1936 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1937 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1938 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1939 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1940};
1941
7c8fe5c4
AM
1942enum _ppc64_sec_type {
1943 sec_normal = 0,
1944 sec_opd = 1,
1945 sec_toc = 2
1946};
1947
f0abc2a1
AM
1948struct _ppc64_elf_section_data
1949{
1950 struct bfd_elf_section_data elf;
411e1bfb 1951
f0abc2a1
AM
1952 union
1953 {
51aecdc5
AM
1954 /* An array with one entry for each opd function descriptor,
1955 and some spares since opd entries may be either 16 or 24 bytes. */
1956#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1957 struct _opd_sec_data
1958 {
1959 /* Points to the function code section for local opd entries. */
1960 asection **func_sec;
1961
1962 /* After editing .opd, adjust references to opd local syms. */
1963 long *adjust;
1964 } opd;
7c8fe5c4 1965
3a71aa26
AM
1966 /* An array for toc sections, indexed by offset/8. */
1967 struct _toc_sec_data
1968 {
1969 /* Specifies the relocation symbol index used at a given toc offset. */
1970 unsigned *symndx;
1971
1972 /* And the relocation addend. */
1973 bfd_vma *add;
1974 } toc;
7c8fe5c4
AM
1975 } u;
1976
1977 enum _ppc64_sec_type sec_type:2;
411e1bfb 1978
7c8fe5c4
AM
1979 /* Flag set when small branches are detected. Used to
1980 select suitable defaults for the stub group size. */
1981 unsigned int has_14bit_branch:1;
3e04d765
AM
1982
1983 /* Flag set when PLTCALL relocs are detected. */
1984 unsigned int has_pltcall:1;
066f4018 1985
903b777d
AM
1986 /* Flag set when section has PLT/GOT/TOC relocations that can be
1987 optimised. */
1988 unsigned int has_optrel:1;
f0abc2a1
AM
1989};
1990
1991#define ppc64_elf_section_data(sec) \
411e1bfb 1992 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
1993
1994static bfd_boolean
4ce794b7 1995ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 1996{
f592407e
AM
1997 if (!sec->used_by_bfd)
1998 {
1999 struct _ppc64_elf_section_data *sdata;
2000 bfd_size_type amt = sizeof (*sdata);
f0abc2a1 2001
f592407e
AM
2002 sdata = bfd_zalloc (abfd, amt);
2003 if (sdata == NULL)
2004 return FALSE;
2005 sec->used_by_bfd = sdata;
2006 }
f0abc2a1
AM
2007
2008 return _bfd_elf_new_section_hook (abfd, sec);
2009}
4025353c 2010
74f0fb50 2011static struct _opd_sec_data *
4025353c
AM
2012get_opd_info (asection * sec)
2013{
2014 if (sec != NULL
2015 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2016 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2017 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2018 return NULL;
2019}
90e3cdf2
JJ
2020\f
2021/* Parameters for the qsort hook. */
90e3cdf2 2022static bfd_boolean synthetic_relocatable;
cd285db5 2023static asection *synthetic_opd;
90e3cdf2 2024
699733f6 2025/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2026
2027static int
2028compare_symbols (const void *ap, const void *bp)
2029{
2cdcc330
AM
2030 const asymbol *a = *(const asymbol **) ap;
2031 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2032
699733f6
AM
2033 /* Section symbols first. */
2034 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2035 return -1;
699733f6 2036 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2037 return 1;
2038
699733f6 2039 /* then .opd symbols. */
cd285db5
AM
2040 if (synthetic_opd != NULL)
2041 {
2042 if (strcmp (a->section->name, ".opd") == 0
2043 && strcmp (b->section->name, ".opd") != 0)
2044 return -1;
2045 if (strcmp (a->section->name, ".opd") != 0
2046 && strcmp (b->section->name, ".opd") == 0)
2047 return 1;
2048 }
90e3cdf2 2049
699733f6 2050 /* then other code symbols. */
2cdcc330
AM
2051 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2052 == (SEC_CODE | SEC_ALLOC))
2053 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2054 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2055 return -1;
2056
2cdcc330
AM
2057 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2058 != (SEC_CODE | SEC_ALLOC))
2059 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2060 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2061 return 1;
2062
2063 if (synthetic_relocatable)
2064 {
2065 if (a->section->id < b->section->id)
2066 return -1;
2067
2068 if (a->section->id > b->section->id)
2069 return 1;
2070 }
2071
2072 if (a->value + a->section->vma < b->value + b->section->vma)
2073 return -1;
2074
2075 if (a->value + a->section->vma > b->value + b->section->vma)
2076 return 1;
2077
4d35a0aa
AM
2078 /* For syms with the same value, prefer strong dynamic global function
2079 syms over other syms. */
2080 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2081 return -1;
2082
2083 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2084 return 1;
2085
2086 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2087 return -1;
2088
2089 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2090 return 1;
2091
2092 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2093 return -1;
2094
2095 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2096 return 1;
2097
2098 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2099 return -1;
2100
2101 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2102 return 1;
2103
aaed6f5b 2104 return a > b;
90e3cdf2
JJ
2105}
2106
699733f6 2107/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2108
699733f6 2109static asymbol *
7292b3ac 2110sym_exists_at (asymbol **syms, long lo, long hi, unsigned int id, bfd_vma value)
90e3cdf2 2111{
699733f6 2112 long mid;
90e3cdf2 2113
7292b3ac 2114 if (id == (unsigned) -1)
699733f6
AM
2115 {
2116 while (lo < hi)
2117 {
2118 mid = (lo + hi) >> 1;
2119 if (syms[mid]->value + syms[mid]->section->vma < value)
2120 lo = mid + 1;
2121 else if (syms[mid]->value + syms[mid]->section->vma > value)
2122 hi = mid;
2123 else
2124 return syms[mid];
2125 }
2126 }
2127 else
2128 {
2129 while (lo < hi)
2130 {
2131 mid = (lo + hi) >> 1;
2132 if (syms[mid]->section->id < id)
2133 lo = mid + 1;
2134 else if (syms[mid]->section->id > id)
2135 hi = mid;
2136 else if (syms[mid]->value < value)
2137 lo = mid + 1;
2138 else if (syms[mid]->value > value)
2139 hi = mid;
2140 else
2141 return syms[mid];
2142 }
2143 }
2144 return NULL;
90e3cdf2
JJ
2145}
2146
468392fb
AM
2147static bfd_boolean
2148section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2149{
2150 bfd_vma vma = *(bfd_vma *) ptr;
2151 return ((section->flags & SEC_ALLOC) != 0
2152 && section->vma <= vma
2153 && vma < section->vma + section->size);
2154}
2155
699733f6 2156/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2157 entry syms. Also generate @plt symbols for the glink branch table.
2158 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2159
2160static long
a7535cf3
AM
2161ppc64_elf_get_synthetic_symtab (bfd *abfd,
2162 long static_count, asymbol **static_syms,
2163 long dyn_count, asymbol **dyn_syms,
c9727e01 2164 asymbol **ret)
90e3cdf2
JJ
2165{
2166 asymbol *s;
0ccf57bd 2167 size_t i, j, count;
90e3cdf2 2168 char *names;
0ccf57bd 2169 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2170 asection *opd = NULL;
90e3cdf2 2171 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2172 asymbol **syms;
ee67d69a 2173 int abi = abiversion (abfd);
90e3cdf2
JJ
2174
2175 *ret = NULL;
2176
ee67d69a
AM
2177 if (abi < 2)
2178 {
2179 opd = bfd_get_section_by_name (abfd, ".opd");
2180 if (opd == NULL && abi == 1)
2181 return 0;
2182 }
90e3cdf2 2183
a5259595
AM
2184 syms = NULL;
2185 codesecsym = 0;
2186 codesecsymend = 0;
2187 secsymend = 0;
2188 opdsymend = 0;
2189 symcount = 0;
2190 if (opd != NULL)
c9727e01 2191 {
a5259595
AM
2192 symcount = static_count;
2193 if (!relocatable)
2194 symcount += dyn_count;
2195 if (symcount == 0)
2196 return 0;
c9727e01 2197
a5259595
AM
2198 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2199 if (syms == NULL)
2200 return -1;
90e3cdf2 2201
a5259595
AM
2202 if (!relocatable && static_count != 0 && dyn_count != 0)
2203 {
2204 /* Use both symbol tables. */
2205 memcpy (syms, static_syms, static_count * sizeof (*syms));
2206 memcpy (syms + static_count, dyn_syms,
2207 (dyn_count + 1) * sizeof (*syms));
2208 }
2209 else if (!relocatable && static_count == 0)
2210 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2211 else
2212 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2213
0ccf57bd
AM
2214 /* Trim uninteresting symbols. Interesting symbols are section,
2215 function, and notype symbols. */
2216 for (i = 0, j = 0; i < symcount; ++i)
2217 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2218 | BSF_RELC | BSF_SRELC)) == 0)
2219 syms[j++] = syms[i];
2220 symcount = j;
2221
a5259595
AM
2222 synthetic_relocatable = relocatable;
2223 synthetic_opd = opd;
2224 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2225
a5259595
AM
2226 if (!relocatable && symcount > 1)
2227 {
bfa5bd2a
PA
2228 /* Trim duplicate syms, since we may have merged the normal
2229 and dynamic symbols. Actually, we only care about syms
2230 that have different values, so trim any with the same
2231 value. Don't consider ifunc and ifunc resolver symbols
2232 duplicates however, because GDB wants to know whether a
2233 text symbol is an ifunc resolver. */
a5259595 2234 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2235 {
2236 const asymbol *s0 = syms[i - 1];
2237 const asymbol *s1 = syms[i];
2238
2239 if ((s0->value + s0->section->vma
2240 != s1->value + s1->section->vma)
2241 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2242 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2243 syms[j++] = syms[i];
2244 }
a5259595
AM
2245 symcount = j;
2246 }
699733f6 2247
a5259595
AM
2248 i = 0;
2249 /* Note that here and in compare_symbols we can't compare opd and
2250 sym->section directly. With separate debug info files, the
2251 symbols will be extracted from the debug file while abfd passed
2252 to this function is the real binary. */
0ccf57bd 2253 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2254 ++i;
2255 codesecsym = i;
2256
2257 for (; i < symcount; ++i)
2258 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2259 | SEC_THREAD_LOCAL))
2260 != (SEC_CODE | SEC_ALLOC))
2261 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2262 break;
2263 codesecsymend = i;
2264
2265 for (; i < symcount; ++i)
2266 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2267 break;
2268 secsymend = i;
2269
2270 for (; i < symcount; ++i)
2271 if (strcmp (syms[i]->section->name, ".opd") != 0)
2272 break;
2273 opdsymend = i;
2274
2275 for (; i < symcount; ++i)
2cdcc330
AM
2276 if (((syms[i]->section->flags
2277 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2278 != (SEC_CODE | SEC_ALLOC))
2279 break;
2280 symcount = i;
2281 }
c9727e01 2282 count = 0;
90e3cdf2 2283
699733f6 2284 if (relocatable)
90e3cdf2 2285 {
699733f6
AM
2286 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2287 arelent *r;
2288 size_t size;
0ccf57bd 2289 size_t relcount;
90e3cdf2 2290
468392fb
AM
2291 if (opdsymend == secsymend)
2292 goto done;
2293
699733f6 2294 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2295 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2296 if (relcount == 0)
c9727e01 2297 goto done;
90e3cdf2 2298
7356fed5
AM
2299 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2300 {
2301 count = -1;
2302 goto done;
2303 }
2304
699733f6 2305 size = 0;
595da8c5 2306 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2307 {
2308 asymbol *sym;
90e3cdf2 2309
595da8c5 2310 while (r < opd->relocation + relcount
699733f6
AM
2311 && r->address < syms[i]->value + opd->vma)
2312 ++r;
90e3cdf2 2313
595da8c5 2314 if (r == opd->relocation + relcount)
699733f6 2315 break;
90e3cdf2 2316
699733f6
AM
2317 if (r->address != syms[i]->value + opd->vma)
2318 continue;
90e3cdf2 2319
699733f6
AM
2320 if (r->howto->type != R_PPC64_ADDR64)
2321 continue;
90e3cdf2 2322
699733f6
AM
2323 sym = *r->sym_ptr_ptr;
2324 if (!sym_exists_at (syms, opdsymend, symcount,
2325 sym->section->id, sym->value + r->addend))
2326 {
2327 ++count;
2328 size += sizeof (asymbol);
2329 size += strlen (syms[i]->name) + 2;
2330 }
2331 }
90e3cdf2 2332
c4b0b099
AM
2333 if (size == 0)
2334 goto done;
699733f6
AM
2335 s = *ret = bfd_malloc (size);
2336 if (s == NULL)
2337 {
7356fed5 2338 count = -1;
c9727e01 2339 goto done;
699733f6 2340 }
90e3cdf2 2341
699733f6 2342 names = (char *) (s + count);
90e3cdf2 2343
595da8c5 2344 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2345 {
699733f6 2346 asymbol *sym;
90e3cdf2 2347
595da8c5 2348 while (r < opd->relocation + relcount
699733f6
AM
2349 && r->address < syms[i]->value + opd->vma)
2350 ++r;
90e3cdf2 2351
595da8c5 2352 if (r == opd->relocation + relcount)
699733f6
AM
2353 break;
2354
2355 if (r->address != syms[i]->value + opd->vma)
2356 continue;
2357
2358 if (r->howto->type != R_PPC64_ADDR64)
2359 continue;
90e3cdf2 2360
699733f6
AM
2361 sym = *r->sym_ptr_ptr;
2362 if (!sym_exists_at (syms, opdsymend, symcount,
2363 sym->section->id, sym->value + r->addend))
2364 {
2365 size_t len;
2366
2367 *s = *syms[i];
6ba2a415 2368 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2369 s->section = sym->section;
2370 s->value = sym->value + r->addend;
2371 s->name = names;
2372 *names++ = '.';
2373 len = strlen (syms[i]->name);
2374 memcpy (names, syms[i]->name, len + 1);
2375 names += len + 1;
6f610d07
UW
2376 /* Have udata.p point back to the original symbol this
2377 synthetic symbol was derived from. */
2378 s->udata.p = syms[i];
699733f6
AM
2379 s++;
2380 }
2381 }
2382 }
2383 else
90e3cdf2 2384 {
468392fb 2385 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2386 bfd_byte *contents = NULL;
699733f6 2387 size_t size;
0ccf57bd 2388 size_t plt_count = 0;
468392fb
AM
2389 bfd_vma glink_vma = 0, resolv_vma = 0;
2390 asection *dynamic, *glink = NULL, *relplt = NULL;
2391 arelent *p;
90e3cdf2 2392
ee67d69a 2393 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2394 {
c4b0b099
AM
2395 free_contents_and_exit_err:
2396 count = -1;
ee67d69a 2397 free_contents_and_exit:
699733f6 2398 if (contents)
ee67d69a 2399 free (contents);
c9727e01 2400 goto done;
699733f6 2401 }
90e3cdf2 2402
699733f6
AM
2403 size = 0;
2404 for (i = secsymend; i < opdsymend; ++i)
2405 {
2406 bfd_vma ent;
90e3cdf2 2407
5ef11c02
AM
2408 /* Ignore bogus symbols. */
2409 if (syms[i]->value > opd->size - 8)
2410 continue;
2411
699733f6
AM
2412 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2413 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2414 {
2415 ++count;
2416 size += sizeof (asymbol);
2417 size += strlen (syms[i]->name) + 2;
2418 }
2419 }
90e3cdf2 2420
468392fb 2421 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2422 if (dyn_count != 0
2423 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2424 {
2425 bfd_byte *dynbuf, *extdyn, *extdynend;
2426 size_t extdynsize;
2427 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2428
2429 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2430 goto free_contents_and_exit_err;
468392fb
AM
2431
2432 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2433 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2434
2435 extdyn = dynbuf;
2436 extdynend = extdyn + dynamic->size;
2437 for (; extdyn < extdynend; extdyn += extdynsize)
2438 {
2439 Elf_Internal_Dyn dyn;
2440 (*swap_dyn_in) (abfd, extdyn, &dyn);
2441
2442 if (dyn.d_tag == DT_NULL)
2443 break;
2444
2445 if (dyn.d_tag == DT_PPC64_GLINK)
2446 {
9e390558
AM
2447 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2448 See comment in ppc64_elf_finish_dynamic_sections. */
2449 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2450 /* The .glink section usually does not survive the final
2451 link; search for the section (usually .text) where the
2452 glink stubs now reside. */
2453 glink = bfd_sections_find_if (abfd, section_covers_vma,
2454 &glink_vma);
2455 break;
2456 }
2457 }
2458
2459 free (dynbuf);
2460 }
2461
2462 if (glink != NULL)
2463 {
2464 /* Determine __glink trampoline by reading the relative branch
2465 from the first glink stub. */
2466 bfd_byte buf[4];
b9e5796b
AM
2467 unsigned int off = 0;
2468
2469 while (bfd_get_section_contents (abfd, glink, buf,
2470 glink_vma + off - glink->vma, 4))
468392fb
AM
2471 {
2472 unsigned int insn = bfd_get_32 (abfd, buf);
2473 insn ^= B_DOT;
2474 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2475 {
2cdcc330
AM
2476 resolv_vma
2477 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2478 break;
2479 }
2480 off += 4;
2481 if (off > 4)
2482 break;
468392fb
AM
2483 }
2484
2485 if (resolv_vma)
2486 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2487
066ee829
AM
2488 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2489 if (relplt != NULL)
2490 {
2491 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2492 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2493 goto free_contents_and_exit_err;
68ffbac6 2494
066ee829
AM
2495 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2496 size += plt_count * sizeof (asymbol);
468392fb 2497
066ee829
AM
2498 p = relplt->relocation;
2499 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2500 {
2501 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2502 if (p->addend != 0)
2503 size += sizeof ("+0x") - 1 + 16;
2504 }
066ee829 2505 }
468392fb
AM
2506 }
2507
c4b0b099
AM
2508 if (size == 0)
2509 goto free_contents_and_exit;
699733f6
AM
2510 s = *ret = bfd_malloc (size);
2511 if (s == NULL)
c4b0b099 2512 goto free_contents_and_exit_err;
90e3cdf2 2513
468392fb 2514 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2515
699733f6 2516 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2517 {
699733f6 2518 bfd_vma ent;
90e3cdf2 2519
5ef11c02
AM
2520 if (syms[i]->value > opd->size - 8)
2521 continue;
2522
699733f6
AM
2523 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2524 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2525 {
0ccf57bd 2526 size_t lo, hi;
699733f6 2527 size_t len;
c9727e01 2528 asection *sec = abfd->sections;
90e3cdf2 2529
699733f6
AM
2530 *s = *syms[i];
2531 lo = codesecsym;
2532 hi = codesecsymend;
2533 while (lo < hi)
2534 {
0ccf57bd 2535 size_t mid = (lo + hi) >> 1;
699733f6
AM
2536 if (syms[mid]->section->vma < ent)
2537 lo = mid + 1;
2538 else if (syms[mid]->section->vma > ent)
2539 hi = mid;
2540 else
c9727e01
AM
2541 {
2542 sec = syms[mid]->section;
2543 break;
2544 }
699733f6
AM
2545 }
2546
c9727e01 2547 if (lo >= hi && lo > codesecsym)
699733f6 2548 sec = syms[lo - 1]->section;
699733f6
AM
2549
2550 for (; sec != NULL; sec = sec->next)
2551 {
2552 if (sec->vma > ent)
2553 break;
63524580
JK
2554 /* SEC_LOAD may not be set if SEC is from a separate debug
2555 info file. */
2556 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2557 break;
2558 if ((sec->flags & SEC_CODE) != 0)
2559 s->section = sec;
2560 }
6ba2a415 2561 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2562 s->value = ent - s->section->vma;
2563 s->name = names;
2564 *names++ = '.';
2565 len = strlen (syms[i]->name);
2566 memcpy (names, syms[i]->name, len + 1);
2567 names += len + 1;
6f610d07
UW
2568 /* Have udata.p point back to the original symbol this
2569 synthetic symbol was derived from. */
2570 s->udata.p = syms[i];
699733f6 2571 s++;
90e3cdf2 2572 }
90e3cdf2 2573 }
699733f6 2574 free (contents);
468392fb
AM
2575
2576 if (glink != NULL && relplt != NULL)
2577 {
2578 if (resolv_vma)
2579 {
2580 /* Add a symbol for the main glink trampoline. */
86a4952b 2581 memset (s, 0, sizeof *s);
468392fb 2582 s->the_bfd = abfd;
6ba2a415 2583 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2584 s->section = glink;
2585 s->value = resolv_vma - glink->vma;
2586 s->name = names;
2cdcc330
AM
2587 memcpy (names, "__glink_PLTresolve",
2588 sizeof ("__glink_PLTresolve"));
468392fb
AM
2589 names += sizeof ("__glink_PLTresolve");
2590 s++;
2591 count++;
2592 }
2593
2594 /* FIXME: It would be very much nicer to put sym@plt on the
2595 stub rather than on the glink branch table entry. The
2596 objdump disassembler would then use a sensible symbol
2597 name on plt calls. The difficulty in doing so is
2598 a) finding the stubs, and,
2599 b) matching stubs against plt entries, and,
2600 c) there can be multiple stubs for a given plt entry.
2601
2602 Solving (a) could be done by code scanning, but older
2603 ppc64 binaries used different stubs to current code.
2604 (b) is the tricky one since you need to known the toc
2605 pointer for at least one function that uses a pic stub to
2606 be able to calculate the plt address referenced.
2607 (c) means gdb would need to set multiple breakpoints (or
2608 find the glink branch itself) when setting breakpoints
2609 for pending shared library loads. */
2610 p = relplt->relocation;
2611 for (i = 0; i < plt_count; i++, p++)
2612 {
2613 size_t len;
2614
2615 *s = **p->sym_ptr_ptr;
2616 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2617 we are defining a symbol, ensure one of them is set. */
2618 if ((s->flags & BSF_LOCAL) == 0)
2619 s->flags |= BSF_GLOBAL;
6ba2a415 2620 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2621 s->section = glink;
2622 s->value = glink_vma - glink->vma;
2623 s->name = names;
2624 s->udata.p = NULL;
2625 len = strlen ((*p->sym_ptr_ptr)->name);
2626 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2627 names += len;
e054468f
AM
2628 if (p->addend != 0)
2629 {
2630 memcpy (names, "+0x", sizeof ("+0x") - 1);
2631 names += sizeof ("+0x") - 1;
2632 bfd_sprintf_vma (abfd, names, p->addend);
2633 names += strlen (names);
2634 }
468392fb
AM
2635 memcpy (names, "@plt", sizeof ("@plt"));
2636 names += sizeof ("@plt");
2637 s++;
b9e5796b
AM
2638 if (abi < 2)
2639 {
2640 glink_vma += 8;
2641 if (i >= 0x8000)
2642 glink_vma += 4;
2643 }
2644 else
468392fb
AM
2645 glink_vma += 4;
2646 }
2647 count += plt_count;
2648 }
90e3cdf2
JJ
2649 }
2650
c9727e01 2651 done:
a7535cf3 2652 free (syms);
90e3cdf2
JJ
2653 return count;
2654}
5bd4f169 2655\f
65f38f15
AM
2656/* The following functions are specific to the ELF linker, while
2657 functions above are used generally. Those named ppc64_elf_* are
2658 called by the main ELF linker code. They appear in this file more
2659 or less in the order in which they are called. eg.
2660 ppc64_elf_check_relocs is called early in the link process,
2661 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2662 called.
2663
2664 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2665 functions have both a function code symbol and a function descriptor
2666 symbol. A call to foo in a relocatable object file looks like:
2667
2668 . .text
2669 . x:
2670 . bl .foo
2671 . nop
2672
2673 The function definition in another object file might be:
2674
2675 . .section .opd
2676 . foo: .quad .foo
2677 . .quad .TOC.@tocbase
2678 . .quad 0
2679 .
2680 . .text
2681 . .foo: blr
2682
2683 When the linker resolves the call during a static link, the branch
2684 unsurprisingly just goes to .foo and the .opd information is unused.
2685 If the function definition is in a shared library, things are a little
2686 different: The call goes via a plt call stub, the opd information gets
2687 copied to the plt, and the linker patches the nop.
2688
2689 . x:
2690 . bl .foo_stub
2691 . ld 2,40(1)
2692 .
2693 .
2694 . .foo_stub:
71a39c98
AM
2695 . std 2,40(1) # in practice, the call stub
2696 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2697 . addi 11,11,Lfoo@toc@l # this is the general idea
2698 . ld 12,0(11)
2699 . ld 2,8(11)
2700 . mtctr 12
2701 . ld 11,16(11)
e86ce104
AM
2702 . bctr
2703 .
2704 . .section .plt
2705 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2706
2707 The "reloc ()" notation is supposed to indicate that the linker emits
2708 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2709 copying.
2710
2711 What are the difficulties here? Well, firstly, the relocations
2712 examined by the linker in check_relocs are against the function code
2713 sym .foo, while the dynamic relocation in the plt is emitted against
2714 the function descriptor symbol, foo. Somewhere along the line, we need
2715 to carefully copy dynamic link information from one symbol to the other.
2716 Secondly, the generic part of the elf linker will make .foo a dynamic
2717 symbol as is normal for most other backends. We need foo dynamic
2718 instead, at least for an application final link. However, when
2719 creating a shared library containing foo, we need to have both symbols
2720 dynamic so that references to .foo are satisfied during the early
2721 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2722 definition from some other object, eg. a static library.
2723
2724 Update: As of August 2004, we support a new convention. Function
2725 calls may use the function descriptor symbol, ie. "bl foo". This
2726 behaves exactly as "bl .foo". */
65f38f15 2727
7c8bbca5
AM
2728/* Of those relocs that might be copied as dynamic relocs, this
2729 function selects those that must be copied when linking a shared
2730 library or PIE, even when the symbol is local. */
65f38f15 2731
1d483afe
AM
2732static int
2733must_be_dyn_reloc (struct bfd_link_info *info,
2734 enum elf_ppc64_reloc_type r_type)
2735{
2736 switch (r_type)
2737 {
2738 default:
7c8bbca5
AM
2739 /* Only relative relocs can be resolved when the object load
2740 address isn't fixed. DTPREL64 is excluded because the
2741 dynamic linker needs to differentiate global dynamic from
2742 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2743 return 1;
2744
2745 case R_PPC64_REL32:
2746 case R_PPC64_REL64:
2747 case R_PPC64_REL30:
1bdd8fac
AM
2748 case R_PPC64_TOC16:
2749 case R_PPC64_TOC16_DS:
2750 case R_PPC64_TOC16_LO:
2751 case R_PPC64_TOC16_HI:
2752 case R_PPC64_TOC16_HA:
2753 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2754 return 0;
2755
2756 case R_PPC64_TPREL16:
2757 case R_PPC64_TPREL16_LO:
2758 case R_PPC64_TPREL16_HI:
2759 case R_PPC64_TPREL16_HA:
2760 case R_PPC64_TPREL16_DS:
2761 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2762 case R_PPC64_TPREL16_HIGH:
2763 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2764 case R_PPC64_TPREL16_HIGHER:
2765 case R_PPC64_TPREL16_HIGHERA:
2766 case R_PPC64_TPREL16_HIGHEST:
2767 case R_PPC64_TPREL16_HIGHESTA:
2768 case R_PPC64_TPREL64:
c213164a 2769 case R_PPC64_TPREL34:
7c8bbca5
AM
2770 /* These relocations are relative but in a shared library the
2771 linker doesn't know the thread pointer base. */
2772 return bfd_link_dll (info);
1d483afe
AM
2773 }
2774}
65f38f15 2775
f4656909
AM
2776/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2777 copying dynamic variables from a shared lib into an app's dynbss
2778 section, and instead use a dynamic relocation to point into the
5d35169e
AM
2779 shared lib. With code that gcc generates, it's vital that this be
2780 enabled; In the PowerPC64 ABI, the address of a function is actually
2781 the address of a function descriptor, which resides in the .opd
2782 section. gcc uses the descriptor directly rather than going via the
2783 GOT as some other ABI's do, which means that initialized function
2784 pointers must reference the descriptor. Thus, a function pointer
2785 initialized to the address of a function in a shared library will
2786 either require a copy reloc, or a dynamic reloc. Using a copy reloc
4cc11e76 2787 redefines the function descriptor symbol to point to the copy. This
5d35169e
AM
2788 presents a problem as a plt entry for that function is also
2789 initialized from the function descriptor symbol and the copy reloc
2790 may not be initialized first. */
a23b6845 2791#define ELIMINATE_COPY_RELOCS 1
f4656909 2792
721956f4 2793/* Section name for stubs is the associated section name plus this
29942be8
NC
2794 string. */
2795#define STUB_SUFFIX ".stub"
721956f4
AM
2796
2797/* Linker stubs.
2798 ppc_stub_long_branch:
2799 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2800 destination, but a 24 bit branch in a stub section will reach.
2801 . b dest
2802
2803 ppc_stub_plt_branch:
2804 Similar to the above, but a 24 bit branch in the stub section won't
2805 reach its destination.
71a39c98
AM
2806 . addis %r11,%r2,xxx@toc@ha
2807 . ld %r12,xxx@toc@l(%r11)
2808 . mtctr %r12
721956f4
AM
2809 . bctr
2810
2811 ppc_stub_plt_call:
2c66dc6c
AM
2812 Used to call a function in a shared library. If it so happens that
2813 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2814 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2815 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2816 . addis %r11,%r2,xxx@toc@ha
2817 . ld %r12,xxx+0@toc@l(%r11)
2818 . mtctr %r12
2819 . ld %r2,xxx+8@toc@l(%r11)
2820 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2821 . bctr
ad8e1ba5
AM
2822
2823 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2824 code to adjust the value and save r2 to support multiple toc sections.
2825 A ppc_stub_long_branch with an r2 offset looks like:
2826 . std %r2,40(%r1)
2827 . addis %r2,%r2,off@ha
2828 . addi %r2,%r2,off@l
2829 . b dest
2830
2831 A ppc_stub_plt_branch with an r2 offset looks like:
2832 . std %r2,40(%r1)
71a39c98
AM
2833 . addis %r11,%r2,xxx@toc@ha
2834 . ld %r12,xxx@toc@l(%r11)
ad8e1ba5
AM
2835 . addis %r2,%r2,off@ha
2836 . addi %r2,%r2,off@l
71a39c98 2837 . mtctr %r12
ad8e1ba5 2838 . bctr
ac2df442 2839
05d0e962
AM
2840 All of the above stubs are shown as their ELFv1 variants. ELFv2
2841 variants exist too, simpler for plt calls since a new toc pointer
2842 and static chain are not loaded by the stub. In addition, ELFv2
2843 has some more complex stubs to handle calls marked with NOTOC
2844 relocs from functions where r2 is not a valid toc pointer. These
2845 come in two flavours, the ones shown below, and _both variants that
2846 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2847 one call is from a function where r2 is used as the toc pointer but
2848 needs a toc adjusting stub for small-model multi-toc, and another
2849 call is from a function where r2 is not valid.
2850 ppc_stub_long_branch_notoc:
2851 . mflr %r12
2852 . bcl 20,31,1f
2853 . 1:
2854 . mflr %r11
2855 . mtlr %r12
2cdcc330
AM
2856 . addis %r12,%r11,dest-1b@ha
2857 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2858 . b dest
2859
2860 ppc_stub_plt_branch_notoc:
2861 . mflr %r12
2862 . bcl 20,31,1f
2863 . 1:
2864 . mflr %r11
2865 . mtlr %r12
2866 . lis %r12,xxx-1b@highest
f891966f 2867 . ori %r12,%r12,xxx-1b@higher
05d0e962 2868 . sldi %r12,%r12,32
f891966f 2869 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2870 . ori %r12,%r12,xxx-1b@l
2871 . add %r12,%r11,%r12
2872 . mtctr %r12
2873 . bctr
2874
2875 ppc_stub_plt_call_notoc:
2876 . mflr %r12
2877 . bcl 20,31,1f
2878 . 1:
2879 . mflr %r11
2880 . mtlr %r12
2881 . lis %r12,xxx-1b@highest
f891966f 2882 . ori %r12,%r12,xxx-1b@higher
05d0e962 2883 . sldi %r12,%r12,32
f891966f 2884 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2885 . ori %r12,%r12,xxx-1b@l
2886 . ldx %r12,%r11,%r12
2887 . mtctr %r12
2888 . bctr
2889
04bdff6a
AM
2890 There are also ELFv1 powerxx variants of these stubs.
2891 ppc_stub_long_branch_notoc:
d4b87b1e 2892 . pla %r12,dest@pcrel
04bdff6a
AM
2893 . b dest
2894 ppc_stub_plt_branch_notoc:
2895 . lis %r11,(dest-1f)@highesta34
2896 . ori %r11,%r11,(dest-1f)@highera34
2897 . sldi %r11,%r11,34
d4b87b1e 2898 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2899 . add %r12,%r11,%r12
2900 . mtctr %r12
2901 . bctr
2902 ppc_stub_plt_call_notoc:
2903 . lis %r11,(xxx-1f)@highesta34
2904 . ori %r11,%r11,(xxx-1f)@highera34
2905 . sldi %r11,%r11,34
d4b87b1e 2906 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2907 . ldx %r12,%r11,%r12
2908 . mtctr %r12
2909 . bctr
2910
05d0e962
AM
2911 In cases where the high instructions would add zero, they are
2912 omitted and following instructions modified in some cases.
04bdff6a
AM
2913 For example, a powerxx ppc_stub_plt_call_notoc might simplify down
2914 to
2915 . pld %r12,xxx@pcrel
2916 . mtctr %r12
2917 . bctr
05d0e962
AM
2918
2919 For a given stub group (a set of sections all using the same toc
2920 pointer value) there will be just one stub type used for any
2921 particular function symbol. For example, if printf is called from
2922 code with the tocsave optimization (ie. r2 saved in function
2923 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2924 and from other code without the tocsave optimization requiring a
2925 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2926 type will be created. Calls with the tocsave optimization will
2927 enter this stub after the instruction saving r2. A similar
2928 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2929 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2930 to call an external function like printf. If other calls to printf
2931 require a ppc_stub_plt_call linkage stub then a single
2932 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2933 call. If other calls to printf require a ppc_stub_plt_call_r2save
2934 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2935 be created and calls not requiring r2 to be saved will enter the
2936 stub after the r2 save instruction. There is an analogous
2937 hierarchy of long branch and plt branch stubs for local call
2938 linkage. */
721956f4 2939
2cdcc330
AM
2940enum ppc_stub_type
2941{
721956f4
AM
2942 ppc_stub_none,
2943 ppc_stub_long_branch,
ad8e1ba5 2944 ppc_stub_long_branch_r2off,
05d0e962
AM
2945 ppc_stub_long_branch_notoc,
2946 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2947 ppc_stub_plt_branch,
ad8e1ba5 2948 ppc_stub_plt_branch_r2off,
05d0e962
AM
2949 ppc_stub_plt_branch_notoc,
2950 ppc_stub_plt_branch_both,
794e51c0 2951 ppc_stub_plt_call,
7341d5e2 2952 ppc_stub_plt_call_r2save,
05d0e962
AM
2953 ppc_stub_plt_call_notoc,
2954 ppc_stub_plt_call_both,
a4b6fadd
AM
2955 ppc_stub_global_entry,
2956 ppc_stub_save_res
721956f4
AM
2957};
2958
6f20ed8a
AM
2959/* Information on stub grouping. */
2960struct map_stub
2961{
2962 /* The stub section. */
2963 asection *stub_sec;
2964 /* This is the section to which stubs in the group will be attached. */
2965 asection *link_sec;
a4b6fadd
AM
2966 /* Next group. */
2967 struct map_stub *next;
2968 /* Whether to emit a copy of register save/restore functions in this
2969 group. */
2970 int needs_save_res;
df136d64
AM
2971 /* Current offset within stubs after the insn restoring lr in a
2972 _notoc or _both stub using bcl for pc-relative addressing, or
2973 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
2974 unsigned int lr_restore;
2975 /* Accumulated size of EH info emitted to describe return address
2976 if stubs modify lr. Does not include 17 byte FDE header. */
2977 unsigned int eh_size;
2978 /* Offset in glink_eh_frame to the start of EH info for this group. */
2979 unsigned int eh_base;
6f20ed8a
AM
2980};
2981
2cdcc330
AM
2982struct ppc_stub_hash_entry
2983{
721956f4
AM
2984 /* Base hash table entry structure. */
2985 struct bfd_hash_entry root;
2986
ad8e1ba5
AM
2987 enum ppc_stub_type stub_type;
2988
6f20ed8a
AM
2989 /* Group information. */
2990 struct map_stub *group;
721956f4
AM
2991
2992 /* Offset within stub_sec of the beginning of this stub. */
2993 bfd_vma stub_offset;
2994
2995 /* Given the symbol's value and its section we can determine its final
2996 value when building the stubs (so the stub knows where to jump. */
2997 bfd_vma target_value;
2998 asection *target_section;
2999
721956f4
AM
3000 /* The symbol table entry, if any, that this was derived from. */
3001 struct ppc_link_hash_entry *h;
e054468f 3002 struct plt_entry *plt_ent;
721956f4 3003
2d7ad24e
AM
3004 /* Symbol type. */
3005 unsigned char symtype;
3006
6911b7dc
AM
3007 /* Symbol st_other. */
3008 unsigned char other;
721956f4
AM
3009};
3010
2cdcc330
AM
3011struct ppc_branch_hash_entry
3012{
721956f4
AM
3013 /* Base hash table entry structure. */
3014 struct bfd_hash_entry root;
3015
c456f082 3016 /* Offset within branch lookup table. */
721956f4
AM
3017 unsigned int offset;
3018
3019 /* Generation marker. */
3020 unsigned int iter;
3021};
65f38f15 3022
19e08130
AM
3023/* Used to track dynamic relocations for local symbols. */
3024struct ppc_dyn_relocs
3025{
3026 struct ppc_dyn_relocs *next;
3027
3028 /* The input section of the reloc. */
3029 asection *sec;
3030
3031 /* Total number of relocs copied for the input section. */
3032 unsigned int count : 31;
3033
3034 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3035 unsigned int ifunc : 1;
3036};
3037
65f38f15
AM
3038struct ppc_link_hash_entry
3039{
3040 struct elf_link_hash_entry elf;
3041
2cdcc330
AM
3042 union
3043 {
b3fac117
AM
3044 /* A pointer to the most recently used stub hash entry against this
3045 symbol. */
3046 struct ppc_stub_hash_entry *stub_cache;
3047
3048 /* A pointer to the next symbol starting with a '.' */
3049 struct ppc_link_hash_entry *next_dot_sym;
3050 } u;
721956f4 3051
65f38f15 3052 /* Track dynamic relocs copied for this symbol. */
6061a67d 3053 struct elf_dyn_relocs *dyn_relocs;
e86ce104 3054
721956f4 3055 /* Link between function code and descriptor symbols. */
34814b9f 3056 struct ppc_link_hash_entry *oh;
721956f4 3057
e86ce104
AM
3058 /* Flag function code and descriptor symbols. */
3059 unsigned int is_func:1;
3060 unsigned int is_func_descriptor:1;
908b32fc 3061 unsigned int fake:1;
411e1bfb 3062
c5614fa4
AM
3063 /* Whether global opd/toc sym has been adjusted or not.
3064 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3065 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3066 unsigned int adjust_done:1;
3067
a4b6fadd
AM
3068 /* Set if this is an out-of-line register save/restore function,
3069 with non-standard calling convention. */
3070 unsigned int save_res:1;
3071
8b5f1ed8
AM
3072 /* Set if a duplicate symbol with non-zero localentry is detected,
3073 even when the duplicate symbol does not provide a definition. */
3074 unsigned int non_zero_localentry:1;
3075
411e1bfb 3076 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3077 Bits are or'd into the mask as the corresponding relocs are
3078 encountered during check_relocs, with TLS_TLS being set when any
3079 of the other TLS bits are set. tls_optimize clears bits when
3080 optimizing to indicate the corresponding GOT entry type is not
3081 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3082 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3083 These flags are also kept for local symbols. */
3084#define TLS_TLS 1 /* Any TLS reloc. */
3085#define TLS_GD 2 /* GD reloc. */
3086#define TLS_LD 4 /* LD reloc. */
3087#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3088#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3089#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3090#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3091#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3092 unsigned char tls_mask;
37da22e5
AM
3093
3094 /* The above field is also used to mark function symbols. In which
3095 case TLS_TLS will be 0. */
3096#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3097#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3098#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3099};
3100
3101/* ppc64 ELF linker hash table. */
3102
3103struct ppc_link_hash_table
3104{
3105 struct elf_link_hash_table elf;
3106
721956f4
AM
3107 /* The stub hash table. */
3108 struct bfd_hash_table stub_hash_table;
3109
3110 /* Another hash table for plt_branch stubs. */
3111 struct bfd_hash_table branch_hash_table;
3112
3b421ab3
AM
3113 /* Hash table for function prologue tocsave. */
3114 htab_t tocsave_htab;
3115
e7d1c40c
AM
3116 /* Various options and other info passed from the linker. */
3117 struct ppc64_elf_params *params;
721956f4 3118
6f20ed8a
AM
3119 /* The size of sec_info below. */
3120 unsigned int sec_info_arr_size;
3121
3122 /* Per-section array of extra section info. Done this way rather
3123 than as part of ppc64_elf_section_data so we have the info for
3124 non-ppc64 sections. */
3125 struct
3126 {
3127 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3128 bfd_vma toc_off;
6f20ed8a
AM
3129
3130 union
3131 {
3132 /* The section group that this section belongs to. */
3133 struct map_stub *group;
3134 /* A temp section list pointer. */
3135 asection *list;
3136 } u;
3137 } *sec_info;
721956f4 3138
a4b6fadd
AM
3139 /* Linked list of groups. */
3140 struct map_stub *group;
3141
ad8e1ba5
AM
3142 /* Temp used when calculating TOC pointers. */
3143 bfd_vma toc_curr;
bf102f86
AM
3144 bfd *toc_bfd;
3145 asection *toc_first_sec;
ad8e1ba5 3146
b3fac117
AM
3147 /* Used when adding symbols. */
3148 struct ppc_link_hash_entry *dot_syms;
3149
33e44f2e 3150 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3151 asection *glink;
9e390558 3152 asection *global_entry;
82bd7b59 3153 asection *sfpr;
2d7ad24e
AM
3154 asection *pltlocal;
3155 asection *relpltlocal;
4ce794b7
AM
3156 asection *brlt;
3157 asection *relbrlt;
58d180e8 3158 asection *glink_eh_frame;
ec338859 3159
8387904d
AM
3160 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3161 struct ppc_link_hash_entry *tls_get_addr;
3162 struct ppc_link_hash_entry *tls_get_addr_fd;
411e1bfb 3163
927be08e
AM
3164 /* The size of reliplt used by got entry relocs. */
3165 bfd_size_type got_reli_size;
3166
9b5ecbd0 3167 /* Statistics. */
7341d5e2 3168 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3169
ee75fd95
AM
3170 /* Number of stubs against global syms. */
3171 unsigned long stub_globals;
3172
ee67d69a
AM
3173 /* Set if we're linking code with function descriptors. */
3174 unsigned int opd_abi:1;
3175
4c52953f 3176 /* Support for multiple toc sections. */
33c0ec9d 3177 unsigned int do_multi_toc:1;
4c52953f 3178 unsigned int multi_toc_needed:1;
927be08e 3179 unsigned int second_toc_pass:1;
67f0cbdb 3180 unsigned int do_toc_opt:1;
4c52953f 3181
9a23f96e
AM
3182 /* Set if tls optimization is enabled. */
3183 unsigned int do_tls_opt:1;
3184
3e04d765
AM
3185 /* Set if inline plt calls should be converted to direct calls. */
3186 unsigned int can_convert_all_inline_plt:1;
3187
5d1634d7 3188 /* Set on error. */
99877b66 3189 unsigned int stub_error:1;
721956f4 3190
8c5b4e52
AM
3191 /* Whether func_desc_adjust needs to be run over symbols. */
3192 unsigned int need_func_desc_adj:1;
721956f4 3193
82e66161
AM
3194 /* Whether there exist local gnu indirect function resolvers,
3195 referenced by dynamic relocations. */
3196 unsigned int local_ifunc_resolver:1;
3197 unsigned int maybe_local_ifunc_resolver:1;
3198
f378ab09
AM
3199 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3200 unsigned int has_plt_localentry0:1;
3201
5663e321
AM
3202 /* Whether calls are made via the PLT from NOTOC functions. */
3203 unsigned int notoc_plt:1;
3204
04bdff6a
AM
3205 /* Whether to use powerxx instructions in linkage stubs. */
3206 unsigned int powerxx_stubs:1;
3207
721956f4
AM
3208 /* Incremented every time we size stubs. */
3209 unsigned int stub_iteration;
5d1634d7 3210
87d72d41
AM
3211 /* Small local sym cache. */
3212 struct sym_cache sym_cache;
65f38f15
AM
3213};
3214
4c52953f
AM
3215/* Rename some of the generic section flags to better document how they
3216 are used here. */
b0dddeec
AM
3217
3218/* Nonzero if this section has TLS related relocations. */
3219#define has_tls_reloc sec_flg0
3220
9737e8af
AM
3221/* Nonzero if this section has a call to __tls_get_addr lacking marker
3222 relocations. */
3223#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3224
3225/* Nonzero if this section has any toc or got relocs. */
3226#define has_toc_reloc sec_flg2
3227
3228/* Nonzero if this section has a call to another section that uses
3229 the toc or got. */
d77c8a4b 3230#define makes_toc_func_call sec_flg3
b0dddeec
AM
3231
3232/* Recursion protection when determining above flag. */
d77c8a4b 3233#define call_check_in_progress sec_flg4
70cc837d 3234#define call_check_done sec_flg5
4c52953f 3235
65f38f15
AM
3236/* Get the ppc64 ELF linker hash table from a link_info structure. */
3237
3238#define ppc_hash_table(p) \
4dfe6ac6
NC
3239 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3240 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3241
721956f4
AM
3242#define ppc_stub_hash_lookup(table, string, create, copy) \
3243 ((struct ppc_stub_hash_entry *) \
3244 bfd_hash_lookup ((table), (string), (create), (copy)))
3245
3246#define ppc_branch_hash_lookup(table, string, create, copy) \
3247 ((struct ppc_branch_hash_entry *) \
3248 bfd_hash_lookup ((table), (string), (create), (copy)))
3249
3250/* Create an entry in the stub hash table. */
3251
3252static struct bfd_hash_entry *
4ce794b7
AM
3253stub_hash_newfunc (struct bfd_hash_entry *entry,
3254 struct bfd_hash_table *table,
3255 const char *string)
721956f4
AM
3256{
3257 /* Allocate the structure if it has not already been allocated by a
3258 subclass. */
3259 if (entry == NULL)
3260 {
3261 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3262 if (entry == NULL)
3263 return entry;
3264 }
3265
3266 /* Call the allocation method of the superclass. */
3267 entry = bfd_hash_newfunc (entry, table, string);
3268 if (entry != NULL)
3269 {
3270 struct ppc_stub_hash_entry *eh;
3271
3272 /* Initialize the local fields. */
3273 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3274 eh->stub_type = ppc_stub_none;
6f20ed8a 3275 eh->group = NULL;
721956f4
AM
3276 eh->stub_offset = 0;
3277 eh->target_value = 0;
3278 eh->target_section = NULL;
721956f4 3279 eh->h = NULL;
6911b7dc 3280 eh->plt_ent = NULL;
6911b7dc 3281 eh->other = 0;
721956f4
AM
3282 }
3283
3284 return entry;
3285}
3286
3287/* Create an entry in the branch hash table. */
3288
3289static struct bfd_hash_entry *
4ce794b7
AM
3290branch_hash_newfunc (struct bfd_hash_entry *entry,
3291 struct bfd_hash_table *table,
3292 const char *string)
721956f4
AM
3293{
3294 /* Allocate the structure if it has not already been allocated by a
3295 subclass. */
3296 if (entry == NULL)
3297 {
3298 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3299 if (entry == NULL)
3300 return entry;
3301 }
3302
3303 /* Call the allocation method of the superclass. */
3304 entry = bfd_hash_newfunc (entry, table, string);
3305 if (entry != NULL)
3306 {
3307 struct ppc_branch_hash_entry *eh;
3308
3309 /* Initialize the local fields. */
3310 eh = (struct ppc_branch_hash_entry *) entry;
3311 eh->offset = 0;
3312 eh->iter = 0;
3313 }
3314
3315 return entry;
3316}
3317
65f38f15
AM
3318/* Create an entry in a ppc64 ELF linker hash table. */
3319
3320static struct bfd_hash_entry *
4ce794b7
AM
3321link_hash_newfunc (struct bfd_hash_entry *entry,
3322 struct bfd_hash_table *table,
3323 const char *string)
65f38f15
AM
3324{
3325 /* Allocate the structure if it has not already been allocated by a
3326 subclass. */
3327 if (entry == NULL)
3328 {
3329 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3330 if (entry == NULL)
3331 return entry;
3332 }
3333
3334 /* Call the allocation method of the superclass. */
3335 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3336 if (entry != NULL)
3337 {
3338 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3339
b3fac117 3340 memset (&eh->u.stub_cache, 0,
908b32fc 3341 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3342 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3343
3344 /* When making function calls, old ABI code references function entry
3345 points (dot symbols), while new ABI code references the function
3346 descriptor symbol. We need to make any combination of reference and
3347 definition work together, without breaking archive linking.
3348
3349 For a defined function "foo" and an undefined call to "bar":
3350 An old object defines "foo" and ".foo", references ".bar" (possibly
3351 "bar" too).
3352 A new object defines "foo" and references "bar".
3353
3354 A new object thus has no problem with its undefined symbols being
3355 satisfied by definitions in an old object. On the other hand, the
3356 old object won't have ".bar" satisfied by a new object.
3357
3358 Keep a list of newly added dot-symbols. */
3359
3360 if (string[0] == '.')
3361 {
3362 struct ppc_link_hash_table *htab;
3363
3364 htab = (struct ppc_link_hash_table *) table;
3365 eh->u.next_dot_sym = htab->dot_syms;
3366 htab->dot_syms = eh;
3367 }
65f38f15
AM
3368 }
3369
3370 return entry;
3371}
3372
2cdcc330
AM
3373struct tocsave_entry
3374{
3b421ab3
AM
3375 asection *sec;
3376 bfd_vma offset;
3377};
3378
3379static hashval_t
3380tocsave_htab_hash (const void *p)
3381{
3382 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3383 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3384}
3385
3386static int
3387tocsave_htab_eq (const void *p1, const void *p2)
3388{
3389 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3390 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3391 return e1->sec == e2->sec && e1->offset == e2->offset;
3392}
3393
68faa637
AM
3394/* Destroy a ppc64 ELF linker hash table. */
3395
3396static void
d495ab0d 3397ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3398{
d495ab0d 3399 struct ppc_link_hash_table *htab;
68faa637 3400
d495ab0d 3401 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3402 if (htab->tocsave_htab)
3403 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3404 bfd_hash_table_free (&htab->branch_hash_table);
3405 bfd_hash_table_free (&htab->stub_hash_table);
3406 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3407}
3408
65f38f15
AM
3409/* Create a ppc64 ELF linker hash table. */
3410
3411static struct bfd_link_hash_table *
4ce794b7 3412ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3413{
3414 struct ppc_link_hash_table *htab;
3415 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3416
4ce794b7 3417 htab = bfd_zmalloc (amt);
65f38f15
AM
3418 if (htab == NULL)
3419 return NULL;
3420
66eb6687 3421 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3422 sizeof (struct ppc_link_hash_entry),
3423 PPC64_ELF_DATA))
65f38f15 3424 {
e2d34d7d 3425 free (htab);
65f38f15
AM
3426 return NULL;
3427 }
3428
721956f4 3429 /* Init the stub hash table too. */
66eb6687
AM
3430 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3431 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3432 {
d495ab0d 3433 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3434 return NULL;
3435 }
721956f4
AM
3436
3437 /* And the branch hash table. */
66eb6687
AM
3438 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3439 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3440 {
3441 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3442 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3443 return NULL;
3444 }
721956f4 3445
3b421ab3
AM
3446 htab->tocsave_htab = htab_try_create (1024,
3447 tocsave_htab_hash,
3448 tocsave_htab_eq,
3449 NULL);
3450 if (htab->tocsave_htab == NULL)
2915c55b 3451 {
d495ab0d 3452 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3453 return NULL;
3454 }
d495ab0d 3455 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3456
3254fd24
AM
3457 /* Initializing two fields of the union is just cosmetic. We really
3458 only care about glist, but when compiled on a 32-bit host the
3459 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3460 debugger inspection of these fields look nicer. */
a6aa5195
AM
3461 htab->elf.init_got_refcount.refcount = 0;
3462 htab->elf.init_got_refcount.glist = NULL;
3463 htab->elf.init_plt_refcount.refcount = 0;
3464 htab->elf.init_plt_refcount.glist = NULL;
3465 htab->elf.init_got_offset.offset = 0;
3466 htab->elf.init_got_offset.glist = NULL;
3467 htab->elf.init_plt_offset.offset = 0;
3468 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3469
65f38f15
AM
3470 return &htab->elf.root;
3471}
3472
bfeb4a28
AM
3473/* Create sections for linker generated code. */
3474
3475static bfd_boolean
3476create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3477{
3478 struct ppc_link_hash_table *htab;
3479 flagword flags;
3480
3481 htab = ppc_hash_table (info);
3482
bfeb4a28
AM
3483 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3484 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3485 if (htab->params->save_restore_funcs)
3486 {
3487 /* Create .sfpr for code to save and restore fp regs. */
3488 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3489 flags);
3490 if (htab->sfpr == NULL
fd361982 3491 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3492 return FALSE;
3493 }
3494
3495 if (bfd_link_relocatable (info))
3496 return TRUE;
bfeb4a28
AM
3497
3498 /* Create .glink for lazy dynamic linking support. */
3499 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3500 flags);
3501 if (htab->glink == NULL
fd361982 3502 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3503 return FALSE;
3504
9e390558
AM
3505 /* The part of .glink used by global entry stubs, separate so that
3506 it can be aligned appropriately without affecting htab->glink. */
3507 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3508 flags);
3509 if (htab->global_entry == NULL
fd361982 3510 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3511 return FALSE;
3512
bfeb4a28
AM
3513 if (!info->no_ld_generated_unwind_info)
3514 {
3515 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3516 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3517 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3518 ".eh_frame",
3519 flags);
3520 if (htab->glink_eh_frame == NULL
fd361982 3521 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3522 return FALSE;
3523 }
3524
3525 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3526 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3527 if (htab->elf.iplt == NULL
fd361982 3528 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3529 return FALSE;
3530
3531 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3532 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3533 htab->elf.irelplt
3534 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3535 if (htab->elf.irelplt == NULL
fd361982 3536 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3537 return FALSE;
3538
3539 /* Create branch lookup table for plt_branch stubs. */
3540 flags = (SEC_ALLOC | SEC_LOAD
3541 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3542 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3543 flags);
3544 if (htab->brlt == NULL
fd361982 3545 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3546 return FALSE;
3547
2d7ad24e
AM
3548 /* Local plt entries, put in .branch_lt but a separate section for
3549 convenience. */
3550 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3551 flags);
3552 if (htab->pltlocal == NULL
fd361982 3553 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3554 return FALSE;
3555
0e1862bb 3556 if (!bfd_link_pic (info))
bfeb4a28
AM
3557 return TRUE;
3558
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3560 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3561 htab->relbrlt
3562 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3563 if (htab->relbrlt == NULL
fd361982 3564 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3565 return FALSE;
3566
2d7ad24e
AM
3567 htab->relpltlocal
3568 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3569 if (htab->relpltlocal == NULL
fd361982 3570 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3571 return FALSE;
3572
bfeb4a28
AM
3573 return TRUE;
3574}
3575
e717da7e
AM
3576/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3577
bfeb4a28 3578bfd_boolean
e7d1c40c
AM
3579ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3580 struct ppc64_elf_params *params)
e717da7e
AM
3581{
3582 struct ppc_link_hash_table *htab;
3583
e7d1c40c 3584 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3585
3586/* Always hook our dynamic sections into the first bfd, which is the
3587 linker created stub bfd. This ensures that the GOT header is at
3588 the start of the output TOC section. */
3589 htab = ppc_hash_table (info);
e7d1c40c
AM
3590 htab->elf.dynobj = params->stub_bfd;
3591 htab->params = params;
bfeb4a28 3592
bfeb4a28 3593 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3594}
3595
721956f4
AM
3596/* Build a name for an entry in the stub hash table. */
3597
3598static char *
4ce794b7
AM
3599ppc_stub_name (const asection *input_section,
3600 const asection *sym_sec,
3601 const struct ppc_link_hash_entry *h,
3602 const Elf_Internal_Rela *rel)
721956f4
AM
3603{
3604 char *stub_name;
bcaa2f82 3605 ssize_t len;
721956f4
AM
3606
3607 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3608 offsets from a sym as a branch target? In fact, we could
3609 probably assume the addend is always zero. */
3610 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3611
3612 if (h)
3613 {
3614 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3615 stub_name = bfd_malloc (len);
46de2a7c
AM
3616 if (stub_name == NULL)
3617 return stub_name;
3618
bcaa2f82
AM
3619 len = sprintf (stub_name, "%08x.%s+%x",
3620 input_section->id & 0xffffffff,
3621 h->elf.root.root.string,
3622 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3623 }
3624 else
3625 {
ad8e1ba5 3626 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3627 stub_name = bfd_malloc (len);
46de2a7c
AM
3628 if (stub_name == NULL)
3629 return stub_name;
3630
bcaa2f82
AM
3631 len = sprintf (stub_name, "%08x.%x:%x+%x",
3632 input_section->id & 0xffffffff,
3633 sym_sec->id & 0xffffffff,
3634 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3635 (int) rel->r_addend & 0xffffffff);
721956f4 3636 }
bcaa2f82 3637 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3638 stub_name[len - 2] = 0;
721956f4
AM
3639 return stub_name;
3640}
3641
3642/* Look up an entry in the stub hash. Stub entries are cached because
3643 creating the stub name takes a bit of time. */
3644
3645static struct ppc_stub_hash_entry *
4ce794b7
AM
3646ppc_get_stub_entry (const asection *input_section,
3647 const asection *sym_sec,
039b3fef 3648 struct ppc_link_hash_entry *h,
4ce794b7
AM
3649 const Elf_Internal_Rela *rel,
3650 struct ppc_link_hash_table *htab)
721956f4
AM
3651{
3652 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3653 struct map_stub *group;
721956f4
AM
3654
3655 /* If this input section is part of a group of sections sharing one
3656 stub section, then use the id of the first section in the group.
3657 Stub names need to include a section id, as there may well be
3658 more than one stub used to reach say, printf, and we need to
3659 distinguish between them. */
6f20ed8a 3660 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3661 if (group == NULL)
3662 return NULL;
721956f4 3663
b3fac117
AM
3664 if (h != NULL && h->u.stub_cache != NULL
3665 && h->u.stub_cache->h == h
6f20ed8a 3666 && h->u.stub_cache->group == group)
721956f4 3667 {
b3fac117 3668 stub_entry = h->u.stub_cache;
721956f4
AM
3669 }
3670 else
3671 {
3672 char *stub_name;
3673
6f20ed8a 3674 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3675 if (stub_name == NULL)
3676 return NULL;
3677
3678 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3679 stub_name, FALSE, FALSE);
721956f4 3680 if (h != NULL)
b3fac117 3681 h->u.stub_cache = stub_entry;
721956f4
AM
3682
3683 free (stub_name);
3684 }
3685
3686 return stub_entry;
3687}
3688
3689/* Add a new stub entry to the stub hash. Not all fields of the new
3690 stub entry are initialised. */
3691
3692static struct ppc_stub_hash_entry *
4ce794b7
AM
3693ppc_add_stub (const char *stub_name,
3694 asection *section,
25f53a85 3695 struct bfd_link_info *info)
721956f4 3696{
25f53a85 3697 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3698 struct map_stub *group;
721956f4
AM
3699 asection *link_sec;
3700 asection *stub_sec;
3701 struct ppc_stub_hash_entry *stub_entry;
3702
6f20ed8a
AM
3703 group = htab->sec_info[section->id].u.group;
3704 link_sec = group->link_sec;
3705 stub_sec = group->stub_sec;
721956f4
AM
3706 if (stub_sec == NULL)
3707 {
6f20ed8a
AM
3708 size_t namelen;
3709 bfd_size_type len;
3710 char *s_name;
721956f4 3711
6f20ed8a
AM
3712 namelen = strlen (link_sec->name);
3713 len = namelen + sizeof (STUB_SUFFIX);
3714 s_name = bfd_alloc (htab->params->stub_bfd, len);
3715 if (s_name == NULL)
3716 return NULL;
721956f4 3717
6f20ed8a
AM
3718 memcpy (s_name, link_sec->name, namelen);
3719 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3720 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3721 if (stub_sec == NULL)
3722 return NULL;
3723 group->stub_sec = stub_sec;
721956f4
AM
3724 }
3725
3726 /* Enter this entry into the linker stub hash table. */
3727 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3728 TRUE, FALSE);
721956f4
AM
3729 if (stub_entry == NULL)
3730 {
695344c0 3731 /* xgettext:c-format */
cf97bcb0
AM
3732 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3733 section->owner, stub_name);
721956f4
AM
3734 return NULL;
3735 }
3736
6f20ed8a 3737 stub_entry->group = group;
721956f4 3738 stub_entry->stub_offset = 0;
721956f4
AM
3739 return stub_entry;
3740}
3741
e717da7e
AM
3742/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3743 not already done. */
65f38f15 3744
b34976b6 3745static bfd_boolean
e717da7e 3746create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3747{
e717da7e
AM
3748 asection *got, *relgot;
3749 flagword flags;
3750 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3751
0c8d6e5c 3752 if (!is_ppc64_elf (abfd))
0ffa91dd 3753 return FALSE;
4dfe6ac6
NC
3754 if (htab == NULL)
3755 return FALSE;
0ffa91dd 3756
33e44f2e
AM
3757 if (!htab->elf.sgot
3758 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3759 return FALSE;
e717da7e
AM
3760
3761 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3762 | SEC_LINKER_CREATED);
3763
c456f082 3764 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3765 if (!got
fd361982 3766 || !bfd_set_section_alignment (got, 3))
e717da7e 3767 return FALSE;
65f38f15 3768
c456f082
AM
3769 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3770 flags | SEC_READONLY);
e717da7e 3771 if (!relgot
fd361982 3772 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3773 return FALSE;
e717da7e
AM
3774
3775 ppc64_elf_tdata (abfd)->got = got;
3776 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3777 return TRUE;
65f38f15 3778}
5bd4f169 3779
b31867b6
AM
3780/* Follow indirect and warning symbol links. */
3781
3782static inline struct bfd_link_hash_entry *
3783follow_link (struct bfd_link_hash_entry *h)
3784{
3785 while (h->type == bfd_link_hash_indirect
3786 || h->type == bfd_link_hash_warning)
3787 h = h->u.i.link;
3788 return h;
3789}
3790
3791static inline struct elf_link_hash_entry *
3792elf_follow_link (struct elf_link_hash_entry *h)
3793{
3794 return (struct elf_link_hash_entry *) follow_link (&h->root);
3795}
3796
3797static inline struct ppc_link_hash_entry *
3798ppc_follow_link (struct ppc_link_hash_entry *h)
3799{
3800 return (struct ppc_link_hash_entry *) follow_link (&h->elf.root);
3801}
3802
40d16e0b
AM
3803/* Merge PLT info on FROM with that on TO. */
3804
3805static void
3806move_plt_plist (struct ppc_link_hash_entry *from,
3807 struct ppc_link_hash_entry *to)
3808{
3809 if (from->elf.plt.plist != NULL)
3810 {
3811 if (to->elf.plt.plist != NULL)
3812 {
3813 struct plt_entry **entp;
3814 struct plt_entry *ent;
3815
3816 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3817 {
3818 struct plt_entry *dent;
3819
3820 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3821 if (dent->addend == ent->addend)
3822 {
3823 dent->plt.refcount += ent->plt.refcount;
3824 *entp = ent->next;
3825 break;
3826 }
3827 if (dent == NULL)
3828 entp = &ent->next;
3829 }
3830 *entp = to->elf.plt.plist;
3831 }
3832
3833 to->elf.plt.plist = from->elf.plt.plist;
3834 from->elf.plt.plist = NULL;
3835 }
3836}
3837
65f38f15
AM
3838/* Copy the extra info we tack onto an elf_link_hash_entry. */
3839
3840static void
fcfa13d2
AM
3841ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3842 struct elf_link_hash_entry *dir,
3843 struct elf_link_hash_entry *ind)
65f38f15
AM
3844{
3845 struct ppc_link_hash_entry *edir, *eind;
3846
3847 edir = (struct ppc_link_hash_entry *) dir;
3848 eind = (struct ppc_link_hash_entry *) ind;
3849
c79d6685
AM
3850 edir->is_func |= eind->is_func;
3851 edir->is_func_descriptor |= eind->is_func_descriptor;
3852 edir->tls_mask |= eind->tls_mask;
3853 if (eind->oh != NULL)
3854 edir->oh = ppc_follow_link (eind->oh);
3855
474436e6 3856 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3857 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3858 edir->elf.ref_regular |= eind->elf.ref_regular;
3859 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3860 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3861 edir->elf.needs_plt |= eind->elf.needs_plt;
3862 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3863
d311bc8b
AM
3864 /* If we were called to copy over info for a weak sym, don't copy
3865 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3866 in order to simplify readonly_dynrelocs and save a field in the
3867 symbol hash entry, but that means dyn_relocs can't be used in any
3868 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3869 are then tested. */
d311bc8b 3870 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3871 return;
d311bc8b 3872
411e1bfb 3873 /* Copy over any dynamic relocs we may have on the indirect sym. */
bbd7ec4a 3874 if (eind->dyn_relocs != NULL)
65f38f15 3875 {
bbd7ec4a
AM
3876 if (edir->dyn_relocs != NULL)
3877 {
6061a67d
AM
3878 struct elf_dyn_relocs **pp;
3879 struct elf_dyn_relocs *p;
bbd7ec4a 3880
fcfa13d2 3881 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a
AM
3882 list. Merge any entries against the same section. */
3883 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3884 {
6061a67d 3885 struct elf_dyn_relocs *q;
bbd7ec4a
AM
3886
3887 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3888 if (q->sec == p->sec)
3889 {
3890 q->pc_count += p->pc_count;
3891 q->count += p->count;
3892 *pp = p->next;
3893 break;
3894 }
3895 if (q == NULL)
3896 pp = &p->next;
3897 }
3898 *pp = edir->dyn_relocs;
3899 }
3900
65f38f15
AM
3901 edir->dyn_relocs = eind->dyn_relocs;
3902 eind->dyn_relocs = NULL;
3903 }
65f38f15 3904
81848ca0
AM
3905 /* Copy over got entries that we may have already seen to the
3906 symbol which just became indirect. */
411e1bfb
AM
3907 if (eind->elf.got.glist != NULL)
3908 {
3909 if (edir->elf.got.glist != NULL)
3910 {
3911 struct got_entry **entp;
3912 struct got_entry *ent;
3913
3914 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3915 {
3916 struct got_entry *dent;
3917
3918 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3919 if (dent->addend == ent->addend
e717da7e 3920 && dent->owner == ent->owner
411e1bfb
AM
3921 && dent->tls_type == ent->tls_type)
3922 {
3923 dent->got.refcount += ent->got.refcount;
3924 *entp = ent->next;
3925 break;
3926 }
3927 if (dent == NULL)
3928 entp = &ent->next;
3929 }
3930 *entp = edir->elf.got.glist;
3931 }
3932
3933 edir->elf.got.glist = eind->elf.got.glist;
3934 eind->elf.got.glist = NULL;
3935 }
3936
3937 /* And plt entries. */
40d16e0b 3938 move_plt_plist (eind, edir);
411e1bfb 3939
fcfa13d2 3940 if (eind->elf.dynindx != -1)
411e1bfb 3941 {
fcfa13d2
AM
3942 if (edir->elf.dynindx != -1)
3943 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3944 edir->elf.dynstr_index);
411e1bfb
AM
3945 edir->elf.dynindx = eind->elf.dynindx;
3946 edir->elf.dynstr_index = eind->elf.dynstr_index;
3947 eind->elf.dynindx = -1;
3948 eind->elf.dynstr_index = 0;
3949 }
411e1bfb
AM
3950}
3951
8387904d
AM
3952/* Find the function descriptor hash entry from the given function code
3953 hash entry FH. Link the entries via their OH fields. */
3954
3955static struct ppc_link_hash_entry *
b31867b6 3956lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
3957{
3958 struct ppc_link_hash_entry *fdh = fh->oh;
3959
3960 if (fdh == NULL)
3961 {
3962 const char *fd_name = fh->elf.root.root.string + 1;
3963
3964 fdh = (struct ppc_link_hash_entry *)
3965 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
b31867b6
AM
3966 if (fdh == NULL)
3967 return fdh;
3968
3969 fdh->is_func_descriptor = 1;
3970 fdh->oh = fh;
3971 fh->is_func = 1;
3972 fh->oh = fdh;
8387904d
AM
3973 }
3974
8c5b4e52
AM
3975 fdh = ppc_follow_link (fdh);
3976 fdh->is_func_descriptor = 1;
3977 fdh->oh = fh;
3978 return fdh;
8387904d
AM
3979}
3980
8c5b4e52 3981/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
3982
3983static struct ppc_link_hash_entry *
3984make_fdh (struct bfd_link_info *info,
908b32fc 3985 struct ppc_link_hash_entry *fh)
bb700d78 3986{
8c5b4e52
AM
3987 bfd *abfd = fh->elf.root.u.undef.abfd;
3988 struct bfd_link_hash_entry *bh = NULL;
bb700d78 3989 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
3990 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
3991 ? BSF_WEAK
3992 : BSF_GLOBAL);
3993
3994 if (!_bfd_generic_link_add_one_symbol (info, abfd,
3995 fh->elf.root.root.string + 1,
3996 flags, bfd_und_section_ptr, 0,
3997 NULL, FALSE, FALSE, &bh))
bb700d78
AM
3998 return NULL;
3999
4000 fdh = (struct ppc_link_hash_entry *) bh;
4001 fdh->elf.non_elf = 0;
908b32fc
AM
4002 fdh->fake = 1;
4003 fdh->is_func_descriptor = 1;
4004 fdh->oh = fh;
4005 fh->is_func = 1;
4006 fh->oh = fdh;
bb700d78
AM
4007 return fdh;
4008}
4009
8387904d
AM
4010/* Fix function descriptor symbols defined in .opd sections to be
4011 function type. */
555cd476
AM
4012
4013static bfd_boolean
c16153ae 4014ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4015 struct bfd_link_info *info,
555cd476 4016 Elf_Internal_Sym *isym,
6911b7dc 4017 const char **name,
555cd476
AM
4018 flagword *flags ATTRIBUTE_UNUSED,
4019 asection **sec,
b53dfeb2 4020 bfd_vma *value)
555cd476 4021{
b53dfeb2 4022 if (*sec != NULL
f1885d1e 4023 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4024 {
4025 asection *code_sec;
4026
4027 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4028 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4029 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4030
4031 /* If the symbol is a function defined in .opd, and the function
4032 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4033 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4034 && (*sec)->reloc_count != 0
4035 && opd_entry_value (*sec, *value, &code_sec, NULL,
4036 FALSE) != (bfd_vma) -1
4037 && discarded_section (code_sec))
4038 {
4039 *sec = bfd_und_section_ptr;
4040 isym->st_shndx = SHN_UNDEF;
4041 }
4042 }
dbd1e97e
AM
4043 else if (*sec != NULL
4044 && strcmp ((*sec)->name, ".toc") == 0
4045 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4046 {
4047 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4048 if (htab != NULL)
4049 htab->params->object_in_toc = 1;
4050 }
433817dd 4051
6911b7dc
AM
4052 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4053 {
4054 if (abiversion (ibfd) == 0)
4055 set_abiversion (ibfd, 2);
4056 else if (abiversion (ibfd) == 1)
4057 {
cf97bcb0
AM
4058 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4059 " for ABI version 1"), *name);
6911b7dc
AM
4060 bfd_set_error (bfd_error_bad_value);
4061 return FALSE;
4062 }
4063 }
4064
555cd476
AM
4065 return TRUE;
4066}
4067
6911b7dc
AM
4068/* Merge non-visibility st_other attributes: local entry point. */
4069
4070static void
4071ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4072 const Elf_Internal_Sym *isym,
4073 bfd_boolean definition,
4074 bfd_boolean dynamic)
4075{
f378ab09 4076 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4077 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4078 | ELF_ST_VISIBILITY (h->other));
4079}
4080
8c5b4e52
AM
4081/* Hook called on merging a symbol. We use this to clear "fake" since
4082 we now have a real symbol. */
4083
4084static bfd_boolean
4085ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4086 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4087 asection **psec ATTRIBUTE_UNUSED,
4088 bfd_boolean newdef ATTRIBUTE_UNUSED,
4089 bfd_boolean olddef ATTRIBUTE_UNUSED,
4090 bfd *oldbfd ATTRIBUTE_UNUSED,
4091 const asection *oldsec ATTRIBUTE_UNUSED)
4092{
4093 ((struct ppc_link_hash_entry *) h)->fake = 0;
8b5f1ed8
AM
4094 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4095 ((struct ppc_link_hash_entry *) h)->non_zero_localentry = 1;
8c5b4e52
AM
4096 return TRUE;
4097}
4098
8387904d 4099/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4100 inclusion of a new ABI object archive that defines "bar".
4101 NAME is a symbol defined in an archive. Return a symbol in the hash
4102 table that might be satisfied by the archive symbols. */
8387904d
AM
4103
4104static struct elf_link_hash_entry *
4105ppc64_elf_archive_symbol_lookup (bfd *abfd,
4106 struct bfd_link_info *info,
4107 const char *name)
4108{
4109 struct elf_link_hash_entry *h;
4110 char *dot_name;
4111 size_t len;
4112
4113 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4114 if (h != NULL
4115 /* Don't return this sym if it is a fake function descriptor
4116 created by add_symbol_adjust. */
8c5b4e52 4117 && !((struct ppc_link_hash_entry *) h)->fake)
8387904d
AM
4118 return h;
4119
4120 if (name[0] == '.')
4121 return h;
4122
4123 len = strlen (name);
4124 dot_name = bfd_alloc (abfd, len + 2);
4125 if (dot_name == NULL)
e99955cd 4126 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4127 dot_name[0] = '.';
4128 memcpy (dot_name + 1, name, len + 1);
4129 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4130 bfd_release (abfd, dot_name);
4131 return h;
4132}
4133
4134/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4135 new ABI object defines "bar". Well, at least, undefined dot symbols
4136 are made weak. This stops later archive searches from including an
4137 object if we already have a function descriptor definition. It also
35b0ce59
AM
4138 prevents the linker complaining about undefined symbols.
4139 We also check and correct mismatched symbol visibility here. The
4140 most restrictive visibility of the function descriptor and the
4141 function entry symbol is used. */
8387904d
AM
4142
4143static bfd_boolean
b3fac117 4144add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4145{
8387904d
AM
4146 struct ppc_link_hash_table *htab;
4147 struct ppc_link_hash_entry *fdh;
4148
b3fac117
AM
4149 if (eh->elf.root.type == bfd_link_hash_warning)
4150 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4151
8400d40d
AM
4152 if (eh->elf.root.type == bfd_link_hash_indirect)
4153 return TRUE;
4154
b3fac117
AM
4155 if (eh->elf.root.root.string[0] != '.')
4156 abort ();
8387904d 4157
b3fac117 4158 htab = ppc_hash_table (info);
4dfe6ac6
NC
4159 if (htab == NULL)
4160 return FALSE;
4161
b31867b6 4162 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4163 if (fdh == NULL
4164 && !bfd_link_relocatable (info)
4165 && (eh->elf.root.type == bfd_link_hash_undefined
4166 || eh->elf.root.type == bfd_link_hash_undefweak)
4167 && eh->elf.ref_regular)
4168 {
4169 /* Make an undefined function descriptor sym, in order to
4170 pull in an --as-needed shared lib. Archives are handled
4171 elsewhere. */
4172 fdh = make_fdh (info, eh);
4173 if (fdh == NULL)
4174 return FALSE;
bb700d78 4175 }
8c5b4e52
AM
4176
4177 if (fdh != NULL)
8387904d 4178 {
35b0ce59
AM
4179 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4180 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4181
4182 /* Make both descriptor and entry symbol have the most
4183 constraining visibility of either symbol. */
35b0ce59
AM
4184 if (entry_vis < descr_vis)
4185 fdh->elf.other += entry_vis - descr_vis;
4186 else if (entry_vis > descr_vis)
4187 eh->elf.other += descr_vis - entry_vis;
4188
8c5b4e52
AM
4189 /* Propagate reference flags from entry symbol to function
4190 descriptor symbol. */
bc4e12de 4191 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4192 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4193 fdh->elf.ref_regular |= eh->elf.ref_regular;
4194 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4195
4196 if (!fdh->elf.forced_local
4197 && fdh->elf.dynindx == -1
4198 && fdh->elf.versioned != versioned_hidden
4199 && (bfd_link_dll (info)
4200 || fdh->elf.def_dynamic
4201 || fdh->elf.ref_dynamic)
4202 && (eh->elf.ref_regular
4203 || eh->elf.def_regular))
4204 {
2cdcc330 4205 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4206 return FALSE;
35b0ce59 4207 }
8387904d 4208 }
99877b66 4209
8387904d
AM
4210 return TRUE;
4211}
4212
f6c7c3e8
AM
4213/* Set up opd section info and abiversion for IBFD, and process list
4214 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4215
8387904d 4216static bfd_boolean
f6c7c3e8 4217ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4218{
99877b66 4219 struct ppc_link_hash_table *htab;
b3fac117 4220 struct ppc_link_hash_entry **p, *eh;
459609d6 4221 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4222
459609d6 4223 if (opd != NULL && opd->size != 0)
b3fac117 4224 {
b9399fcf
AM
4225 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4226 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4227
459609d6
AM
4228 if (abiversion (ibfd) == 0)
4229 set_abiversion (ibfd, 1);
8a2058b5 4230 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4231 {
695344c0 4232 /* xgettext:c-format */
cf97bcb0
AM
4233 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4234 ibfd, abiversion (ibfd));
459609d6
AM
4235 bfd_set_error (bfd_error_bad_value);
4236 return FALSE;
f6c7c3e8 4237 }
b9399fcf 4238 }
f6c7c3e8 4239
b9399fcf
AM
4240 if (is_ppc64_elf (info->output_bfd))
4241 {
4242 /* For input files without an explicit abiversion in e_flags
4243 we should have flagged any with symbol st_other bits set
4244 as ELFv1 and above flagged those with .opd as ELFv2.
4245 Set the output abiversion if not yet set, and for any input
4246 still ambiguous, take its abiversion from the output.
4247 Differences in ABI are reported later. */
4248 if (abiversion (info->output_bfd) == 0)
4249 set_abiversion (info->output_bfd, abiversion (ibfd));
4250 else if (abiversion (ibfd) == 0)
4251 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4252 }
4253
459609d6
AM
4254 htab = ppc_hash_table (info);
4255 if (htab == NULL)
b9399fcf 4256 return TRUE;
459609d6 4257
b9399fcf
AM
4258 if (opd != NULL && opd->size != 0
4259 && (ibfd->flags & DYNAMIC) == 0
4260 && (opd->flags & SEC_RELOC) != 0
4261 && opd->reloc_count != 0
4262 && !bfd_is_abs_section (opd->output_section)
4263 && info->gc_sections)
4264 {
4265 /* Garbage collection needs some extra help with .opd sections.
4266 We don't want to necessarily keep everything referenced by
4267 relocs in .opd, as that would keep all functions. Instead,
4268 if we reference an .opd symbol (a function descriptor), we
4269 want to keep the function code symbol's section. This is
4270 easy for global symbols, but for local syms we need to keep
4271 information about the associated function section. */
4272 bfd_size_type amt;
4273 asection **opd_sym_map;
4274 Elf_Internal_Shdr *symtab_hdr;
4275 Elf_Internal_Rela *relocs, *rel_end, *rel;
4276
4277 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4278 opd_sym_map = bfd_zalloc (ibfd, amt);
4279 if (opd_sym_map == NULL)
4280 return FALSE;
4281 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4282 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4283 info->keep_memory);
4284 if (relocs == NULL)
4285 return FALSE;
4286 symtab_hdr = &elf_symtab_hdr (ibfd);
4287 rel_end = relocs + opd->reloc_count - 1;
4288 for (rel = relocs; rel < rel_end; rel++)
4289 {
4290 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4291 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4292
4293 if (r_type == R_PPC64_ADDR64
4294 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4295 && r_symndx < symtab_hdr->sh_info)
4296 {
4297 Elf_Internal_Sym *isym;
4298 asection *s;
4299
4300 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4301 if (isym == NULL)
4302 {
4303 if (elf_section_data (opd)->relocs != relocs)
4304 free (relocs);
4305 return FALSE;
4306 }
4307
4308 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4309 if (s != NULL && s != opd)
4310 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4311 }
4312 }
4313 if (elf_section_data (opd)->relocs != relocs)
4314 free (relocs);
4315 }
459609d6
AM
4316
4317 p = &htab->dot_syms;
4318 while ((eh = *p) != NULL)
4319 {
4320 *p = NULL;
4321 if (&eh->elf == htab->elf.hgot)
4322 ;
4323 else if (htab->elf.hgot == NULL
4324 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4325 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4326 else if (abiversion (ibfd) <= 1)
4327 {
4328 htab->need_func_desc_adj = 1;
4329 if (!add_symbol_adjust (eh, info))
4330 return FALSE;
4331 }
459609d6
AM
4332 p = &eh->u.next_dot_sym;
4333 }
b3fac117 4334 return TRUE;
8387904d
AM
4335}
4336
97fed1c9
JJ
4337/* Undo hash table changes when an --as-needed input file is determined
4338 not to be needed. */
4339
4340static bfd_boolean
e5034e59
AM
4341ppc64_elf_notice_as_needed (bfd *ibfd,
4342 struct bfd_link_info *info,
4343 enum notice_asneeded_action act)
97fed1c9 4344{
e5034e59
AM
4345 if (act == notice_not_needed)
4346 {
4347 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4348
e5034e59
AM
4349 if (htab == NULL)
4350 return FALSE;
4dfe6ac6 4351
e5034e59
AM
4352 htab->dot_syms = NULL;
4353 }
4354 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4355}
4356
aa374f67
AM
4357/* If --just-symbols against a final linked binary, then assume we need
4358 toc adjusting stubs when calling functions defined there. */
4359
4360static void
4361ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4362{
4363 if ((sec->flags & SEC_CODE) != 0
4364 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4365 && is_ppc64_elf (sec->owner))
4366 {
2c3f079f
AM
4367 if (abiversion (sec->owner) >= 2
4368 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4369 sec->has_toc_reloc = 1;
4370 }
4371 _bfd_elf_link_just_syms (sec, info);
4372}
4373
e054468f 4374static struct plt_entry **
4ce794b7
AM
4375update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4376 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4377{
4378 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4379 struct plt_entry **local_plt;
f961d9dd 4380 unsigned char *local_got_tls_masks;
411e1bfb
AM
4381
4382 if (local_got_ents == NULL)
4383 {
4384 bfd_size_type size = symtab_hdr->sh_info;
4385
e054468f
AM
4386 size *= (sizeof (*local_got_ents)
4387 + sizeof (*local_plt)
4388 + sizeof (*local_got_tls_masks));
4ce794b7 4389 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4390 if (local_got_ents == NULL)
e054468f 4391 return NULL;
411e1bfb
AM
4392 elf_local_got_ents (abfd) = local_got_ents;
4393 }
4394
37da22e5 4395 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4396 {
4397 struct got_entry *ent;
4398
4399 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4400 if (ent->addend == r_addend
4401 && ent->owner == abfd
4402 && ent->tls_type == tls_type)
411e1bfb
AM
4403 break;
4404 if (ent == NULL)
4405 {
4406 bfd_size_type amt = sizeof (*ent);
4ce794b7 4407 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4408 if (ent == NULL)
4409 return FALSE;
4410 ent->next = local_got_ents[r_symndx];
4411 ent->addend = r_addend;
e717da7e 4412 ent->owner = abfd;
411e1bfb 4413 ent->tls_type = tls_type;
927be08e 4414 ent->is_indirect = FALSE;
411e1bfb
AM
4415 ent->got.refcount = 0;
4416 local_got_ents[r_symndx] = ent;
4417 }
4418 ent->got.refcount += 1;
4419 }
4420
e054468f 4421 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4422 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4423 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4424
4425 return local_plt + r_symndx;
65f38f15
AM
4426}
4427
411e1bfb 4428static bfd_boolean
e054468f 4429update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4430{
411e1bfb 4431 struct plt_entry *ent;
1e2f5b6e 4432
e054468f 4433 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4434 if (ent->addend == addend)
4435 break;
4436 if (ent == NULL)
1e2f5b6e 4437 {
411e1bfb 4438 bfd_size_type amt = sizeof (*ent);
4ce794b7 4439 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4440 if (ent == NULL)
4441 return FALSE;
e054468f 4442 ent->next = *plist;
411e1bfb
AM
4443 ent->addend = addend;
4444 ent->plt.refcount = 0;
e054468f 4445 *plist = ent;
1e2f5b6e 4446 }
411e1bfb 4447 ent->plt.refcount += 1;
b34976b6 4448 return TRUE;
1e2f5b6e
AM
4449}
4450
e054468f
AM
4451static bfd_boolean
4452is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4453{
4454 return (r_type == R_PPC64_REL24
05d0e962 4455 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4456 || r_type == R_PPC64_REL14
4457 || r_type == R_PPC64_REL14_BRTAKEN
4458 || r_type == R_PPC64_REL14_BRNTAKEN
4459 || r_type == R_PPC64_ADDR24
4460 || r_type == R_PPC64_ADDR14
4461 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4462 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4463 || r_type == R_PPC64_PLTCALL
4464 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4465}
4466
4467/* Relocs on inline plt call sequence insns prior to the call. */
4468
4469static bfd_boolean
4470is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4471{
4472 return (r_type == R_PPC64_PLT16_HA
4473 || r_type == R_PPC64_PLT16_HI
4474 || r_type == R_PPC64_PLT16_LO
4475 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4476 || r_type == R_PPC64_PLT_PCREL34
4477 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4478 || r_type == R_PPC64_PLTSEQ
4479 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4480}
4481
5bd4f169 4482/* Look through the relocs for a section during the first phase, and
65f38f15 4483 calculate needed space in the global offset table, procedure
5d1634d7 4484 linkage table, and dynamic reloc sections. */
5bd4f169 4485
b34976b6 4486static bfd_boolean
4ce794b7
AM
4487ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4488 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4489{
65f38f15 4490 struct ppc_link_hash_table *htab;
5bd4f169 4491 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4492 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4493 const Elf_Internal_Rela *rel;
4494 const Elf_Internal_Rela *rel_end;
5bd4f169 4495 asection *sreloc;
3a71aa26 4496 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4497 bfd_boolean is_opd;
5bd4f169 4498
0e1862bb 4499 if (bfd_link_relocatable (info))
b34976b6 4500 return TRUE;
5bd4f169 4501
680a3378
AM
4502 /* Don't do anything special with non-loaded, non-alloced sections.
4503 In particular, any relocs in such sections should not affect GOT
4504 and PLT reference counting (ie. we don't allow them to create GOT
4505 or PLT entries), there's no possibility or desire to optimize TLS
4506 relocs, and there's not much point in propagating relocs to shared
4507 libs that the dynamic linker won't relocate. */
4508 if ((sec->flags & SEC_ALLOC) == 0)
4509 return TRUE;
4510
0c8d6e5c 4511 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4512
65f38f15 4513 htab = ppc_hash_table (info);
4dfe6ac6
NC
4514 if (htab == NULL)
4515 return FALSE;
4516
3a71aa26
AM
4517 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4518 FALSE, FALSE, TRUE);
4519 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4520 FALSE, FALSE, TRUE);
0ffa91dd 4521 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4522 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4523 sreloc = NULL;
b9399fcf 4524 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4525 rel_end = relocs + sec->reloc_count;
4526 for (rel = relocs; rel < rel_end; rel++)
4527 {
4528 unsigned long r_symndx;
4529 struct elf_link_hash_entry *h;
04c9666a 4530 enum elf_ppc64_reloc_type r_type;
727fc41e 4531 int tls_type;
7c8fe5c4 4532 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4533 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4534
4535 r_symndx = ELF64_R_SYM (rel->r_info);
4536 if (r_symndx < symtab_hdr->sh_info)
4537 h = NULL;
4538 else
973a3492
L
4539 {
4540 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4541 h = elf_follow_link (h);
1c865ab2
AM
4542
4543 if (h == htab->elf.hgot)
4544 sec->has_toc_reloc = 1;
973a3492 4545 }
5bd4f169 4546
5663e321
AM
4547 r_type = ELF64_R_TYPE (rel->r_info);
4548 switch (r_type)
4549 {
04bdff6a
AM
4550 case R_PPC64_D34:
4551 case R_PPC64_D34_LO:
4552 case R_PPC64_D34_HI30:
4553 case R_PPC64_D34_HA30:
4554 case R_PPC64_D28:
c213164a
AM
4555 case R_PPC64_TPREL34:
4556 case R_PPC64_DTPREL34:
04bdff6a 4557 case R_PPC64_PCREL34:
5663e321 4558 case R_PPC64_GOT_PCREL34:
c213164a
AM
4559 case R_PPC64_GOT_TLSGD34:
4560 case R_PPC64_GOT_TLSLD34:
4561 case R_PPC64_GOT_TPREL34:
4562 case R_PPC64_GOT_DTPREL34:
5663e321
AM
4563 case R_PPC64_PLT_PCREL34:
4564 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a
AM
4565 case R_PPC64_PCREL28:
4566 htab->powerxx_stubs = 1;
133a1f60
AM
4567 break;
4568 default:
5663e321
AM
4569 break;
4570 }
903b777d
AM
4571
4572 switch (r_type)
4573 {
4574 case R_PPC64_PLT16_HA:
4575 case R_PPC64_GOT_TLSLD16_HA:
4576 case R_PPC64_GOT_TLSGD16_HA:
4577 case R_PPC64_GOT_TPREL16_HA:
4578 case R_PPC64_GOT_DTPREL16_HA:
4579 case R_PPC64_GOT16_HA:
4580 case R_PPC64_TOC16_HA:
4581 case R_PPC64_PLT16_LO:
4582 case R_PPC64_PLT16_LO_DS:
4583 case R_PPC64_GOT_TLSLD16_LO:
4584 case R_PPC64_GOT_TLSGD16_LO:
4585 case R_PPC64_GOT_TPREL16_LO_DS:
4586 case R_PPC64_GOT_DTPREL16_LO_DS:
4587 case R_PPC64_GOT16_LO:
4588 case R_PPC64_GOT16_LO_DS:
4589 case R_PPC64_TOC16_LO:
4590 case R_PPC64_TOC16_LO_DS:
4591 case R_PPC64_GOT_PCREL34:
4592 ppc64_elf_tdata (abfd)->has_optrel = 1;
4593 ppc64_elf_section_data (sec)->has_optrel = 1;
4594 break;
4595 default:
4596 break;
4597 }
4598
f749f26e 4599 ifunc = NULL;
25f23106
AM
4600 if (h != NULL)
4601 {
4602 if (h->type == STT_GNU_IFUNC)
4603 {
4604 h->needs_plt = 1;
4605 ifunc = &h->plt.plist;
4606 }
4607 }
4608 else
4609 {
4610 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4611 abfd, r_symndx);
4612 if (isym == NULL)
4613 return FALSE;
4614
4615 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4616 {
4617 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4618 rel->r_addend,
37da22e5 4619 NON_GOT | PLT_IFUNC);
25f23106
AM
4620 if (ifunc == NULL)
4621 return FALSE;
4622 }
4623 }
727fc41e 4624
f749f26e 4625 tls_type = 0;
a33d1f77 4626 switch (r_type)
5bd4f169 4627 {
727fc41e
AM
4628 case R_PPC64_TLSGD:
4629 case R_PPC64_TLSLD:
4630 /* These special tls relocs tie a call to __tls_get_addr with
4631 its parameter symbol. */
37da22e5
AM
4632 if (h != NULL)
4633 ((struct ppc_link_hash_entry *) h)->tls_mask |= TLS_TLS | TLS_MARK;
4634 else
4635 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4636 rel->r_addend,
37da22e5
AM
4637 NON_GOT | TLS_TLS | TLS_MARK))
4638 return FALSE;
4639 sec->has_tls_reloc = 1;
727fc41e
AM
4640 break;
4641
411e1bfb
AM
4642 case R_PPC64_GOT_TLSLD16:
4643 case R_PPC64_GOT_TLSLD16_LO:
4644 case R_PPC64_GOT_TLSLD16_HI:
4645 case R_PPC64_GOT_TLSLD16_HA:
c213164a 4646 case R_PPC64_GOT_TLSLD34:
951fd09b 4647 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4648 goto dogottls;
4649
4650 case R_PPC64_GOT_TLSGD16:
4651 case R_PPC64_GOT_TLSGD16_LO:
4652 case R_PPC64_GOT_TLSGD16_HI:
4653 case R_PPC64_GOT_TLSGD16_HA:
c213164a 4654 case R_PPC64_GOT_TLSGD34:
951fd09b 4655 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4656 goto dogottls;
4657
4658 case R_PPC64_GOT_TPREL16_DS:
4659 case R_PPC64_GOT_TPREL16_LO_DS:
4660 case R_PPC64_GOT_TPREL16_HI:
4661 case R_PPC64_GOT_TPREL16_HA:
c213164a 4662 case R_PPC64_GOT_TPREL34:
7c8bbca5 4663 if (bfd_link_dll (info))
411e1bfb
AM
4664 info->flags |= DF_STATIC_TLS;
4665 tls_type = TLS_TLS | TLS_TPREL;
4666 goto dogottls;
4667
4668 case R_PPC64_GOT_DTPREL16_DS:
4669 case R_PPC64_GOT_DTPREL16_LO_DS:
4670 case R_PPC64_GOT_DTPREL16_HI:
4671 case R_PPC64_GOT_DTPREL16_HA:
c213164a 4672 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
4673 tls_type = TLS_TLS | TLS_DTPREL;
4674 dogottls:
4675 sec->has_tls_reloc = 1;
066f4018 4676 goto dogot;
411e1bfb 4677
903b777d
AM
4678 case R_PPC64_GOT16:
4679 case R_PPC64_GOT16_LO:
4680 case R_PPC64_GOT16_HI:
65f38f15 4681 case R_PPC64_GOT16_HA:
903b777d 4682 case R_PPC64_GOT16_DS:
066f4018 4683 case R_PPC64_GOT16_LO_DS:
4a421c53 4684 case R_PPC64_GOT_PCREL34:
066f4018 4685 dogot:
65f38f15 4686 /* This symbol requires a global offset table entry. */
4c52953f 4687 sec->has_toc_reloc = 1;
33c0ec9d
AM
4688 if (r_type == R_PPC64_GOT_TLSLD16
4689 || r_type == R_PPC64_GOT_TLSGD16
4690 || r_type == R_PPC64_GOT_TPREL16_DS
4691 || r_type == R_PPC64_GOT_DTPREL16_DS
4692 || r_type == R_PPC64_GOT16
4693 || r_type == R_PPC64_GOT16_DS)
4694 {
4695 htab->do_multi_toc = 1;
d77c8a4b 4696 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4697 }
4698
e717da7e
AM
4699 if (ppc64_elf_tdata (abfd)->got == NULL
4700 && !create_got_section (abfd, info))
b34976b6 4701 return FALSE;
5bd4f169
AM
4702
4703 if (h != NULL)
4704 {
411e1bfb
AM
4705 struct ppc_link_hash_entry *eh;
4706 struct got_entry *ent;
65f38f15 4707
411e1bfb
AM
4708 eh = (struct ppc_link_hash_entry *) h;
4709 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4710 if (ent->addend == rel->r_addend
e717da7e 4711 && ent->owner == abfd
411e1bfb
AM
4712 && ent->tls_type == tls_type)
4713 break;
4714 if (ent == NULL)
5bd4f169 4715 {
411e1bfb 4716 bfd_size_type amt = sizeof (*ent);
4ce794b7 4717 ent = bfd_alloc (abfd, amt);
411e1bfb 4718 if (ent == NULL)
b34976b6 4719 return FALSE;
411e1bfb 4720 ent->next = eh->elf.got.glist;
133a1f60 4721 ent->addend = rel->r_addend;
e717da7e 4722 ent->owner = abfd;
411e1bfb 4723 ent->tls_type = tls_type;
927be08e 4724 ent->is_indirect = FALSE;
411e1bfb
AM
4725 ent->got.refcount = 0;
4726 eh->elf.got.glist = ent;
5bd4f169 4727 }
411e1bfb 4728 ent->got.refcount += 1;
e7b938ca 4729 eh->tls_mask |= tls_type;
5bd4f169 4730 }
411e1bfb
AM
4731 else
4732 /* This is a global offset table entry for a local symbol. */
4733 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4734 rel->r_addend, tls_type))
411e1bfb 4735 return FALSE;
a345bc8d
AM
4736
4737 /* We may also need a plt entry if the symbol turns out to be
4738 an ifunc. */
0e1862bb 4739 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1)
a345bc8d 4740 {
133a1f60 4741 if (!update_plt_info (abfd, &h->plt.plist, rel->r_addend))
a345bc8d
AM
4742 return FALSE;
4743 }
5bd4f169
AM
4744 break;
4745
5bd4f169 4746 case R_PPC64_PLT16_HA:
65f38f15
AM
4747 case R_PPC64_PLT16_HI:
4748 case R_PPC64_PLT16_LO:
08be3224 4749 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4750 case R_PPC64_PLT_PCREL34:
4751 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4752 case R_PPC64_PLT32:
4753 case R_PPC64_PLT64:
cbf95972
AM
4754 /* This symbol requires a procedure linkage table entry. */
4755 plt_list = ifunc;
4756 if (h != NULL)
e054468f 4757 {
e054468f
AM
4758 h->needs_plt = 1;
4759 if (h->root.root.string[0] == '.'
4760 && h->root.root.string[1] != '\0')
4761 ((struct ppc_link_hash_entry *) h)->is_func = 1;
2d7ad24e 4762 ((struct ppc_link_hash_entry *) h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4763 plt_list = &h->plt.plist;
4764 }
4765 if (plt_list == NULL)
2d7ad24e 4766 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4767 rel->r_addend,
2d7ad24e 4768 NON_GOT | PLT_KEEP);
133a1f60 4769 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4770 return FALSE;
5bd4f169
AM
4771 break;
4772
4773 /* The following relocations don't need to propagate the
4774 relocation if linking a shared object since they are
4775 section relative. */
4776 case R_PPC64_SECTOFF:
4777 case R_PPC64_SECTOFF_LO:
4778 case R_PPC64_SECTOFF_HI:
4779 case R_PPC64_SECTOFF_HA:
4780 case R_PPC64_SECTOFF_DS:
4781 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4782 case R_PPC64_DTPREL16:
4783 case R_PPC64_DTPREL16_LO:
4784 case R_PPC64_DTPREL16_HI:
4785 case R_PPC64_DTPREL16_HA:
4786 case R_PPC64_DTPREL16_DS:
4787 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4788 case R_PPC64_DTPREL16_HIGH:
4789 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4790 case R_PPC64_DTPREL16_HIGHER:
4791 case R_PPC64_DTPREL16_HIGHERA:
4792 case R_PPC64_DTPREL16_HIGHEST:
4793 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4794 break;
4795
ad8e1ba5 4796 /* Nor do these. */
25f23106
AM
4797 case R_PPC64_REL16:
4798 case R_PPC64_REL16_LO:
4799 case R_PPC64_REL16_HI:
4800 case R_PPC64_REL16_HA:
4a969973
AM
4801 case R_PPC64_REL16_HIGH:
4802 case R_PPC64_REL16_HIGHA:
4803 case R_PPC64_REL16_HIGHER:
4804 case R_PPC64_REL16_HIGHERA:
4805 case R_PPC64_REL16_HIGHEST:
4806 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4807 case R_PPC64_REL16_HIGHER34:
4808 case R_PPC64_REL16_HIGHERA34:
4809 case R_PPC64_REL16_HIGHEST34:
4810 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4811 case R_PPC64_REL16DX_HA:
25f23106
AM
4812 break;
4813
45965137
AM
4814 /* Not supported as a dynamic relocation. */
4815 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4816 if (bfd_link_pic (info))
45965137
AM
4817 {
4818 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4819 ppc_howto_init ();
695344c0 4820 /* xgettext:c-format */
174d0a74 4821 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4822 "in shared libraries and PIEs\n"),
45965137
AM
4823 abfd, sec, rel->r_offset,
4824 ppc64_elf_howto_table[r_type]->name);
4825 bfd_set_error (bfd_error_bad_value);
4826 return FALSE;
4827 }
4828 break;
4829
ad8e1ba5 4830 case R_PPC64_TOC16:
33c0ec9d
AM
4831 case R_PPC64_TOC16_DS:
4832 htab->do_multi_toc = 1;
d77c8a4b 4833 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4834 /* Fall through. */
ad8e1ba5
AM
4835 case R_PPC64_TOC16_LO:
4836 case R_PPC64_TOC16_HI:
4837 case R_PPC64_TOC16_HA:
ad8e1ba5 4838 case R_PPC64_TOC16_LO_DS:
4c52953f 4839 sec->has_toc_reloc = 1;
ec73ddcd 4840 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4841 {
4842 /* We may need a copy reloc. */
4843 h->non_got_ref = 1;
4844 /* Strongly prefer a copy reloc over a dynamic reloc.
4845 glibc ld.so as of 2019-08 will error out if one of
4846 these relocations is emitted. */
4847 h->needs_copy = 1;
4848 goto dodyn;
4849 }
ad8e1ba5
AM
4850 break;
4851
006589cf
AM
4852 /* Marker reloc. */
4853 case R_PPC64_ENTRY:
4854 break;
4855
5bd4f169
AM
4856 /* This relocation describes the C++ object vtable hierarchy.
4857 Reconstruct it for later use during GC. */
4858 case R_PPC64_GNU_VTINHERIT:
c152c796 4859 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4860 return FALSE;
5bd4f169
AM
4861 break;
4862
4863 /* This relocation describes which C++ vtable entries are actually
4864 used. Record for later use during GC. */
4865 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4866 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4867 return FALSE;
5bd4f169
AM
4868 break;
4869
721956f4
AM
4870 case R_PPC64_REL14:
4871 case R_PPC64_REL14_BRTAKEN:
4872 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4873 {
4874 asection *dest = NULL;
4875
4876 /* Heuristic: If jumping outside our section, chances are
4877 we are going to need a stub. */
4878 if (h != NULL)
4879 {
4880 /* If the sym is weak it may be overridden later, so
4881 don't assume we know where a weak sym lives. */
4882 if (h->root.type == bfd_link_hash_defined)
4883 dest = h->root.u.def.section;
4884 }
4885 else
87d72d41
AM
4886 {
4887 Elf_Internal_Sym *isym;
4888
4889 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4890 abfd, r_symndx);
4891 if (isym == NULL)
4892 return FALSE;
4893
4894 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4895 }
4896
220c76dd 4897 if (dest != sec)
7c8fe5c4 4898 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4899 }
3e04d765
AM
4900 goto rel24;
4901
4902 case R_PPC64_PLTCALL:
5663e321 4903 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4904 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4905 /* Fall through. */
4906
5d1634d7 4907 case R_PPC64_REL24:
05d0e962 4908 case R_PPC64_REL24_NOTOC:
3e04d765 4909 rel24:
cbf95972
AM
4910 plt_list = ifunc;
4911 if (h != NULL)
5d1634d7 4912 {
e054468f
AM
4913 h->needs_plt = 1;
4914 if (h->root.root.string[0] == '.'
4915 && h->root.root.string[1] != '\0')
4916 ((struct ppc_link_hash_entry *) h)->is_func = 1;
cbf95972 4917
3a71aa26 4918 if (h == tga || h == dottga)
cbf95972
AM
4919 {
4920 sec->has_tls_reloc = 1;
4921 if (rel != relocs
4922 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4923 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4924 /* We have a new-style __tls_get_addr call with
4925 a marker reloc. */
4926 ;
4927 else
4928 /* Mark this section as having an old-style call. */
9737e8af 4929 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4930 }
4931 plt_list = &h->plt.plist;
411e1bfb 4932 }
cbf95972
AM
4933
4934 /* We may need a .plt entry if the function this reloc
4935 refers to is in a shared lib. */
4936 if (plt_list
133a1f60 4937 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4938 return FALSE;
411e1bfb
AM
4939 break;
4940
cbf95972
AM
4941 case R_PPC64_ADDR14:
4942 case R_PPC64_ADDR14_BRNTAKEN:
4943 case R_PPC64_ADDR14_BRTAKEN:
4944 case R_PPC64_ADDR24:
4945 goto dodyn;
4946
411e1bfb
AM
4947 case R_PPC64_TPREL64:
4948 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 4949 if (bfd_link_dll (info))
411e1bfb
AM
4950 info->flags |= DF_STATIC_TLS;
4951 goto dotlstoc;
4952
4953 case R_PPC64_DTPMOD64:
4954 if (rel + 1 < rel_end
4955 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4956 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 4957 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 4958 else
951fd09b 4959 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
4960 goto dotlstoc;
4961
4962 case R_PPC64_DTPREL64:
4963 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4964 if (rel != relocs
4965 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4966 && rel[-1].r_offset == rel->r_offset - 8)
4967 /* This is the second reloc of a dtpmod, dtprel pair.
4968 Don't mark with TLS_DTPREL. */
4969 goto dodyn;
4970
4971 dotlstoc:
4972 sec->has_tls_reloc = 1;
4973 if (h != NULL)
4974 {
4975 struct ppc_link_hash_entry *eh;
4976 eh = (struct ppc_link_hash_entry *) h;
46e9995a 4977 eh->tls_mask |= tls_type & 0xff;
411e1bfb
AM
4978 }
4979 else
4980 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4981 rel->r_addend, tls_type))
411e1bfb
AM
4982 return FALSE;
4983
7c8fe5c4
AM
4984 ppc64_sec = ppc64_elf_section_data (sec);
4985 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 4986 {
3a71aa26
AM
4987 bfd_size_type amt;
4988
e7b938ca 4989 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
4990 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
4991 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
4992 if (ppc64_sec->u.toc.symndx == NULL)
4993 return FALSE;
4994 amt = sec->size * sizeof (bfd_vma) / 8;
4995 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
4996 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 4997 return FALSE;
7c8fe5c4
AM
4998 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4999 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5000 }
5001 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5002 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5003 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5004
5005 /* Mark the second slot of a GD or LD entry.
5006 -1 to indicate GD and -2 to indicate LD. */
5007 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5008 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5009 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5010 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5011 goto dodyn;
5012
5013 case R_PPC64_TPREL16:
5014 case R_PPC64_TPREL16_LO:
5015 case R_PPC64_TPREL16_HI:
5016 case R_PPC64_TPREL16_HA:
5017 case R_PPC64_TPREL16_DS:
5018 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5019 case R_PPC64_TPREL16_HIGH:
5020 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5021 case R_PPC64_TPREL16_HIGHER:
5022 case R_PPC64_TPREL16_HIGHERA:
5023 case R_PPC64_TPREL16_HIGHEST:
5024 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5025 case R_PPC64_TPREL34:
7c8bbca5
AM
5026 if (bfd_link_dll (info))
5027 info->flags |= DF_STATIC_TLS;
5028 goto dodyn;
5d1634d7 5029
e86ce104 5030 case R_PPC64_ADDR64:
b9399fcf 5031 if (is_opd
1e2f5b6e 5032 && rel + 1 < rel_end
4ce794b7 5033 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5034 {
8387904d 5035 if (h != NULL)
8c5b4e52 5036 ((struct ppc_link_hash_entry *) h)->is_func = 1;
1e2f5b6e 5037 }
e86ce104
AM
5038 /* Fall through. */
5039
65f38f15
AM
5040 case R_PPC64_ADDR16:
5041 case R_PPC64_ADDR16_DS:
5042 case R_PPC64_ADDR16_HA:
5043 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5044 case R_PPC64_ADDR16_HIGH:
5045 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5046 case R_PPC64_ADDR16_HIGHER:
5047 case R_PPC64_ADDR16_HIGHERA:
5048 case R_PPC64_ADDR16_HIGHEST:
5049 case R_PPC64_ADDR16_HIGHESTA:
5050 case R_PPC64_ADDR16_LO:
5051 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5052 case R_PPC64_D34:
5053 case R_PPC64_D34_LO:
5054 case R_PPC64_D34_HI30:
5055 case R_PPC64_D34_HA30:
5056 case R_PPC64_ADDR16_HIGHER34:
5057 case R_PPC64_ADDR16_HIGHERA34:
5058 case R_PPC64_ADDR16_HIGHEST34:
5059 case R_PPC64_ADDR16_HIGHESTA34:
5060 case R_PPC64_D28:
0e1862bb 5061 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5062 && rel->r_addend == 0)
5063 {
5064 /* We may need a .plt entry if this reloc refers to a
5065 function in a shared lib. */
5663e321 5066 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5067 return FALSE;
5068 h->pointer_equality_needed = 1;
5069 }
5070 /* Fall through. */
5071
5072 case R_PPC64_REL30:
5073 case R_PPC64_REL32:
5074 case R_PPC64_REL64:
65f38f15 5075 case R_PPC64_ADDR32:
65f38f15
AM
5076 case R_PPC64_UADDR16:
5077 case R_PPC64_UADDR32:
5078 case R_PPC64_UADDR64:
5bd4f169 5079 case R_PPC64_TOC:
ec73ddcd 5080 if (h != NULL && bfd_link_executable (info))
81848ca0 5081 /* We may need a copy reloc. */
f5385ebf 5082 h->non_got_ref = 1;
81848ca0 5083
41bd81ab 5084 /* Don't propagate .opd relocs. */
b9399fcf 5085 if (NO_OPD_RELOCS && is_opd)
e86ce104 5086 break;
e86ce104 5087
65f38f15
AM
5088 /* If we are creating a shared library, and this is a reloc
5089 against a global symbol, or a non PC relative reloc
5090 against a local symbol, then we need to copy the reloc
5091 into the shared library. However, if we are linking with
5092 -Bsymbolic, we do not need to copy a reloc against a
5093 global symbol which is defined in an object we are
5094 including in the link (i.e., DEF_REGULAR is set). At
5095 this point we have not seen all the input files, so it is
5096 possible that DEF_REGULAR is not set now but will be set
5097 later (it is never cleared). In case of a weak definition,
5098 DEF_REGULAR may be cleared later by a strong definition in
5099 a shared library. We account for that possibility below by
f4656909 5100 storing information in the dyn_relocs field of the hash
65f38f15
AM
5101 table entry. A similar situation occurs when creating
5102 shared libraries and symbol visibility changes render the
5103 symbol local.
5104
5105 If on the other hand, we are creating an executable, we
5106 may need to keep relocations for symbols satisfied by a
5107 dynamic library if we manage to avoid copy relocs for the
5108 symbol. */
411e1bfb 5109 dodyn:
ec73ddcd
AM
5110 if ((h != NULL
5111 && (h->root.type == bfd_link_hash_defweak
5112 || !h->def_regular))
5113 || (h != NULL
5114 && !bfd_link_executable (info)
5115 && !SYMBOLIC_BIND (info, h))
5116 || (bfd_link_pic (info)
5117 && must_be_dyn_reloc (info, r_type))
0e1862bb 5118 || (!bfd_link_pic (info)
25f23106 5119 && ifunc != NULL))
5bd4f169 5120 {
65f38f15
AM
5121 /* We must copy these reloc types into the output file.
5122 Create a reloc section in dynobj and make room for
5123 this reloc. */
5bd4f169
AM
5124 if (sreloc == NULL)
5125 {
83bac4b0
NC
5126 sreloc = _bfd_elf_make_dynamic_reloc_section
5127 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5128
5bd4f169 5129 if (sreloc == NULL)
83bac4b0 5130 return FALSE;
5bd4f169
AM
5131 }
5132
65f38f15
AM
5133 /* If this is a global symbol, we count the number of
5134 relocations we need for this symbol. */
5135 if (h != NULL)
5136 {
19e08130
AM
5137 struct elf_dyn_relocs *p;
5138 struct elf_dyn_relocs **head;
5139
ec338859 5140 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
19e08130
AM
5141 p = *head;
5142 if (p == NULL || p->sec != sec)
5143 {
5144 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5145 if (p == NULL)
5146 return FALSE;
5147 p->next = *head;
5148 *head = p;
5149 p->sec = sec;
5150 p->count = 0;
5151 p->pc_count = 0;
5152 }
5153 p->count += 1;
5154 if (!must_be_dyn_reloc (info, r_type))
5155 p->pc_count += 1;
65f38f15
AM
5156 }
5157 else
5158 {
ec338859
AM
5159 /* Track dynamic relocs needed for local syms too.
5160 We really need local syms available to do this
5161 easily. Oh well. */
19e08130
AM
5162 struct ppc_dyn_relocs *p;
5163 struct ppc_dyn_relocs **head;
5164 bfd_boolean is_ifunc;
ec338859 5165 asection *s;
6edfbbad 5166 void *vpp;
87d72d41 5167 Elf_Internal_Sym *isym;
6edfbbad 5168
87d72d41
AM
5169 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5170 abfd, r_symndx);
5171 if (isym == NULL)
b34976b6 5172 return FALSE;
ec338859 5173
87d72d41
AM
5174 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5175 if (s == NULL)
5176 s = sec;
5177
6edfbbad 5178 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5179 head = (struct ppc_dyn_relocs **) vpp;
5180 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5181 p = *head;
5182 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5183 p = p->next;
5184 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5185 {
5186 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5187 if (p == NULL)
5188 return FALSE;
5189 p->next = *head;
5190 *head = p;
5191 p->sec = sec;
5192 p->ifunc = is_ifunc;
5193 p->count = 0;
5194 }
5195 p->count += 1;
ec338859 5196 }
65f38f15 5197 }
5bd4f169 5198 break;
65f38f15
AM
5199
5200 default:
96e0dda4 5201 break;
5bd4f169
AM
5202 }
5203 }
5204
b34976b6 5205 return TRUE;
5bd4f169
AM
5206}
5207
ee67d69a
AM
5208/* Merge backend specific data from an object file to the output
5209 object file when linking. */
5210
5211static bfd_boolean
50e03d47 5212ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5213{
50e03d47 5214 bfd *obfd = info->output_bfd;
ee67d69a
AM
5215 unsigned long iflags, oflags;
5216
5217 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5218 return TRUE;
5219
5220 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5221 return TRUE;
5222
50e03d47 5223 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5224 return FALSE;
5225
5226 iflags = elf_elfheader (ibfd)->e_flags;
5227 oflags = elf_elfheader (obfd)->e_flags;
5228
f6c7c3e8 5229 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5230 {
4eca0228 5231 _bfd_error_handler
695344c0 5232 /* xgettext:c-format */
871b3ab2 5233 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5234 bfd_set_error (bfd_error_bad_value);
5235 return FALSE;
5236 }
f6c7c3e8 5237 else if (iflags != oflags && iflags != 0)
ee67d69a 5238 {
4eca0228 5239 _bfd_error_handler
695344c0 5240 /* xgettext:c-format */
871b3ab2 5241 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5242 ibfd, iflags, oflags);
5243 bfd_set_error (bfd_error_bad_value);
5244 return FALSE;
5245 }
5246
4a91d0ba
AM
5247 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5248 return FALSE;
005d79fd 5249
ee67d69a 5250 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5251 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5252}
5253
5254static bfd_boolean
5255ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5256{
5257 /* Print normal ELF private data. */
5258 _bfd_elf_print_private_bfd_data (abfd, ptr);
5259
5260 if (elf_elfheader (abfd)->e_flags != 0)
5261 {
5262 FILE *file = ptr;
5263
ee67d69a
AM
5264 fprintf (file, _("private flags = 0x%lx:"),
5265 elf_elfheader (abfd)->e_flags);
5266
5267 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5268 fprintf (file, _(" [abiv%ld]"),
5269 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5270 fputc ('\n', file);
5271 }
5272
5273 return TRUE;
5274}
5275
8387904d 5276/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5277 of the code entry point, and its section, which must be in the same
5278 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5279
5280static bfd_vma
5281opd_entry_value (asection *opd_sec,
5282 bfd_vma offset,
5283 asection **code_sec,
aef36ac1
AM
5284 bfd_vma *code_off,
5285 bfd_boolean in_code_sec)
8387904d
AM
5286{
5287 bfd *opd_bfd = opd_sec->owner;
8860955f 5288 Elf_Internal_Rela *relocs;
8387904d 5289 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5290 bfd_vma val;
8387904d 5291
9f296da3
AM
5292 /* No relocs implies we are linking a --just-symbols object, or looking
5293 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5294 if (opd_sec->reloc_count == 0)
5295 {
729eabd5 5296 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5297
729eabd5
AM
5298 if (contents == NULL)
5299 {
5300 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5301 return (bfd_vma) -1;
5302 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5303 }
ee1e4ede 5304
dbb3fbbb 5305 /* PR 17512: file: 64b9dfbb. */
451dfd38 5306 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5307 return (bfd_vma) -1;
5308
729eabd5 5309 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5310 if (code_sec != NULL)
5311 {
5312 asection *sec, *likely = NULL;
ee1e4ede 5313
aef36ac1 5314 if (in_code_sec)
4b85d634 5315 {
aef36ac1
AM
5316 sec = *code_sec;
5317 if (sec->vma <= val
5318 && val < sec->vma + sec->size)
5319 likely = sec;
5320 else
5321 val = -1;
5322 }
5323 else
5324 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5325 if (sec->vma <= val
5326 && (sec->flags & SEC_LOAD) != 0
5327 && (sec->flags & SEC_ALLOC) != 0)
5328 likely = sec;
5329 if (likely != NULL)
5330 {
5331 *code_sec = likely;
5332 if (code_off != NULL)
5333 *code_off = val - likely->vma;
4b85d634
AM
5334 }
5335 }
aef36ac1 5336 return val;
4b85d634
AM
5337 }
5338
0c8d6e5c 5339 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5340
729eabd5 5341 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5342 if (relocs == NULL)
5343 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5344 /* PR 17512: file: df8e1fd6. */
5345 if (relocs == NULL)
5346 return (bfd_vma) -1;
645ea6a9 5347
8387904d 5348 /* Go find the opd reloc at the sym address. */
8860955f 5349 lo = relocs;
8387904d 5350 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5351 val = (bfd_vma) -1;
8387904d
AM
5352 while (lo < hi)
5353 {
5354 look = lo + (hi - lo) / 2;
5355 if (look->r_offset < offset)
5356 lo = look + 1;
5357 else if (look->r_offset > offset)
5358 hi = look;
5359 else
5360 {
0ffa91dd
NC
5361 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5362
8387904d
AM
5363 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5364 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5365 {
5366 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5367 asection *sec = NULL;
8387904d 5368
b53dfeb2
AM
5369 if (symndx >= symtab_hdr->sh_info
5370 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5371 {
5372 struct elf_link_hash_entry **sym_hashes;
5373 struct elf_link_hash_entry *rh;
5374
5375 sym_hashes = elf_sym_hashes (opd_bfd);
5376 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5377 if (rh != NULL)
5378 {
5379 rh = elf_follow_link (rh);
bb854a36
AM
5380 if (rh->root.type != bfd_link_hash_defined
5381 && rh->root.type != bfd_link_hash_defweak)
5382 break;
5383 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5384 {
bb854a36
AM
5385 val = rh->root.u.def.value;
5386 sec = rh->root.u.def.section;
b53dfeb2
AM
5387 }
5388 }
5389 }
5390
5391 if (sec == NULL)
5392 {
5393 Elf_Internal_Sym *sym;
5394
5395 if (symndx < symtab_hdr->sh_info)
5396 {
5397 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5398 if (sym == NULL)
5399 {
5400 size_t symcnt = symtab_hdr->sh_info;
5401 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5402 symcnt, 0,
5403 NULL, NULL, NULL);
5404 if (sym == NULL)
5405 break;
5406 symtab_hdr->contents = (bfd_byte *) sym;
5407 }
5408 sym += symndx;
128205bb
AM
5409 }
5410 else
5411 {
b53dfeb2
AM
5412 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5413 1, symndx,
5414 NULL, NULL, NULL);
128205bb
AM
5415 if (sym == NULL)
5416 break;
128205bb 5417 }
b53dfeb2
AM
5418 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5419 if (sec == NULL)
5420 break;
5421 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5422 val = sym->st_value;
8387904d 5423 }
b53dfeb2 5424
8387904d
AM
5425 val += look->r_addend;
5426 if (code_off != NULL)
5427 *code_off = val;
5428 if (code_sec != NULL)
aef36ac1
AM
5429 {
5430 if (in_code_sec && *code_sec != sec)
5431 return -1;
5432 else
5433 *code_sec = sec;
5434 }
b53dfeb2 5435 if (sec->output_section != NULL)
8387904d 5436 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5437 }
5438 break;
5439 }
5440 }
645ea6a9 5441
645ea6a9 5442 return val;
8387904d
AM
5443}
5444
aef36ac1
AM
5445/* If the ELF symbol SYM might be a function in SEC, return the
5446 function size and set *CODE_OFF to the function's entry point,
5447 otherwise return zero. */
9f296da3 5448
aef36ac1
AM
5449static bfd_size_type
5450ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5451 bfd_vma *code_off)
9f296da3 5452{
aef36ac1
AM
5453 bfd_size_type size;
5454
5455 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5456 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5457 return 0;
5458
5459 size = 0;
5460 if (!(sym->flags & BSF_SYNTHETIC))
5461 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5462
5463 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5464 {
b07bca4e
AM
5465 struct _opd_sec_data *opd = get_opd_info (sym->section);
5466 bfd_vma symval = sym->value;
5467
5468 if (opd != NULL
5469 && opd->adjust != NULL
5470 && elf_section_data (sym->section)->relocs != NULL)
5471 {
5472 /* opd_entry_value will use cached relocs that have been
5473 adjusted, but with raw symbols. That means both local
5474 and global symbols need adjusting. */
5475 long adjust = opd->adjust[OPD_NDX (symval)];
5476 if (adjust == -1)
5477 return 0;
5478 symval += adjust;
5479 }
5480
5481 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5482 &sec, code_off, TRUE) == (bfd_vma) -1)
5483 return 0;
5484 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5485 symbol. This size has nothing to do with the code size of the
5486 function, which is what we're supposed to return, but the
5487 code size isn't available without looking up the dot-sym.
5488 However, doing that would be a waste of time particularly
5489 since elf_find_function will look at the dot-sym anyway.
5490 Now, elf_find_function will keep the largest size of any
5491 function sym found at the code address of interest, so return
5492 1 here to avoid it incorrectly caching a larger function size
5493 for a small function. This does mean we return the wrong
5494 size for a new-ABI function of size 24, but all that does is
5495 disable caching for such functions. */
5496 if (size == 24)
5497 size = 1;
9f296da3 5498 }
aef36ac1
AM
5499 else
5500 {
5501 if (sym->section != sec)
5502 return 0;
5503 *code_off = sym->value;
5504 }
5505 if (size == 0)
5506 size = 1;
5507 return size;
9f296da3
AM
5508}
5509
f378ab09
AM
5510/* Return true if symbol is a strong function defined in an ELFv2
5511 object with st_other localentry bits of zero, ie. its local entry
5512 point coincides with its global entry point. */
5513
5514static bfd_boolean
5515is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5516{
5517 return (h != NULL
5518 && h->type == STT_FUNC
5519 && h->root.type == bfd_link_hash_defined
5520 && (STO_PPC64_LOCAL_MASK & h->other) == 0
8b5f1ed8 5521 && !((struct ppc_link_hash_entry *) h)->non_zero_localentry
f378ab09
AM
5522 && is_ppc64_elf (h->root.u.def.section->owner)
5523 && abiversion (h->root.u.def.section->owner) >= 2);
5524}
5525
854b41e7
AM
5526/* Return true if symbol is defined in a regular object file. */
5527
5528static bfd_boolean
5529is_static_defined (struct elf_link_hash_entry *h)
5530{
5531 return ((h->root.type == bfd_link_hash_defined
5532 || h->root.type == bfd_link_hash_defweak)
5533 && h->root.u.def.section != NULL
5534 && h->root.u.def.section->output_section != NULL);
5535}
5536
b31867b6
AM
5537/* If FDH is a function descriptor symbol, return the associated code
5538 entry symbol if it is defined. Return NULL otherwise. */
5539
5540static struct ppc_link_hash_entry *
5541defined_code_entry (struct ppc_link_hash_entry *fdh)
5542{
5543 if (fdh->is_func_descriptor)
5544 {
5545 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5546 if (fh->elf.root.type == bfd_link_hash_defined
5547 || fh->elf.root.type == bfd_link_hash_defweak)
5548 return fh;
5549 }
5550 return NULL;
5551}
5552
5553/* If FH is a function code entry symbol, return the associated
5554 function descriptor symbol if it is defined. Return NULL otherwise. */
5555
5556static struct ppc_link_hash_entry *
5557defined_func_desc (struct ppc_link_hash_entry *fh)
5558{
5559 if (fh->oh != NULL
5560 && fh->oh->is_func_descriptor)
5561 {
5562 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5563 if (fdh->elf.root.type == bfd_link_hash_defined
5564 || fdh->elf.root.type == bfd_link_hash_defweak)
5565 return fdh;
5566 }
5567 return NULL;
5568}
5569
8c5b4e52
AM
5570static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5571
5572/* Garbage collect sections, after first dealing with dot-symbols. */
5573
5574static bfd_boolean
5575ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5576{
5577 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5578
5579 if (htab != NULL && htab->need_func_desc_adj)
5580 {
5581 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5582 htab->need_func_desc_adj = 0;
5583 }
5584 return bfd_elf_gc_sections (abfd, info);
5585}
5586
74f0fb50
AM
5587/* Mark all our entry sym sections, both opd and code section. */
5588
5589static void
5590ppc64_elf_gc_keep (struct bfd_link_info *info)
5591{
5592 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5593 struct bfd_sym_chain *sym;
5594
4dfe6ac6
NC
5595 if (htab == NULL)
5596 return;
5597
74f0fb50
AM
5598 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5599 {
b31867b6 5600 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5601 asection *sec;
5602
5603 eh = (struct ppc_link_hash_entry *)
b31867b6 5604 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, TRUE);
74f0fb50
AM
5605 if (eh == NULL)
5606 continue;
5607 if (eh->elf.root.type != bfd_link_hash_defined
5608 && eh->elf.root.type != bfd_link_hash_defweak)
5609 continue;
5610
b31867b6
AM
5611 fh = defined_code_entry (eh);
5612 if (fh != NULL)
74f0fb50 5613 {
b31867b6 5614 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5615 sec->flags |= SEC_KEEP;
5616 }
5617 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5618 && opd_entry_value (eh->elf.root.u.def.section,
5619 eh->elf.root.u.def.value,
aef36ac1 5620 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5621 sec->flags |= SEC_KEEP;
5622
5623 sec = eh->elf.root.u.def.section;
5624 sec->flags |= SEC_KEEP;
5625 }
5626}
5627
64d03ab5
AM
5628/* Mark sections containing dynamically referenced symbols. When
5629 building shared libraries, we must assume that any visible symbol is
5630 referenced. */
5631
5632static bfd_boolean
5633ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5634{
5635 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5636 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
b31867b6 5637 struct ppc_link_hash_entry *fdh;
b407645f 5638 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5639
64d03ab5 5640 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5641 fdh = defined_func_desc (eh);
5642 if (fdh != NULL)
5643 eh = fdh;
64d03ab5
AM
5644
5645 if ((eh->elf.root.type == bfd_link_hash_defined
5646 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5647 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5648 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5649 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5650 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5651 && (!bfd_link_executable (info)
e278ae05 5652 || info->gc_keep_exported
b407645f
AM
5653 || info->export_dynamic
5654 || (eh->elf.dynamic
5655 && d != NULL
2cdcc330
AM
5656 && (*d->match) (&d->head, NULL,
5657 eh->elf.root.root.string)))
e278ae05 5658 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5659 || !bfd_hide_sym_by_version (info->version_info,
5660 eh->elf.root.root.string)))))
64d03ab5
AM
5661 {
5662 asection *code_sec;
b31867b6 5663 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5664
5665 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5666
5667 /* Function descriptor syms cause the associated
5668 function code sym section to be marked. */
b31867b6
AM
5669 fh = defined_code_entry (eh);
5670 if (fh != NULL)
5671 {
5672 code_sec = fh->elf.root.u.def.section;
5673 code_sec->flags |= SEC_KEEP;
5674 }
64d03ab5
AM
5675 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5676 && opd_entry_value (eh->elf.root.u.def.section,
5677 eh->elf.root.u.def.value,
aef36ac1 5678 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5679 code_sec->flags |= SEC_KEEP;
5680 }
5681
5682 return TRUE;
5683}
5684
5bd4f169
AM
5685/* Return the section that should be marked against GC for a given
5686 relocation. */
5687
5688static asection *
4ce794b7 5689ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5690 struct bfd_link_info *info,
4ce794b7
AM
5691 Elf_Internal_Rela *rel,
5692 struct elf_link_hash_entry *h,
5693 Elf_Internal_Sym *sym)
5bd4f169 5694{
ccfa59ea
AM
5695 asection *rsec;
5696
ccfa59ea
AM
5697 /* Syms return NULL if we're marking .opd, so we avoid marking all
5698 function sections, as all functions are referenced in .opd. */
5699 rsec = NULL;
5700 if (get_opd_info (sec) != NULL)
5701 return rsec;
1e2f5b6e 5702
5bd4f169
AM
5703 if (h != NULL)
5704 {
04c9666a 5705 enum elf_ppc64_reloc_type r_type;
b31867b6 5706 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5707
4ce794b7 5708 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5709 switch (r_type)
5bd4f169
AM
5710 {
5711 case R_PPC64_GNU_VTINHERIT:
5712 case R_PPC64_GNU_VTENTRY:
5713 break;
5714
5715 default:
5716 switch (h->root.type)
5717 {
5718 case bfd_link_hash_defined:
5719 case bfd_link_hash_defweak:
ccfa59ea 5720 eh = (struct ppc_link_hash_entry *) h;
b31867b6
AM
5721 fdh = defined_func_desc (eh);
5722 if (fdh != NULL)
8c5b4e52
AM
5723 {
5724 /* -mcall-aixdesc code references the dot-symbol on
5725 a call reloc. Mark the function descriptor too
5726 against garbage collection. */
5727 fdh->elf.mark = 1;
60d67dc8
AM
5728 if (fdh->elf.is_weakalias)
5729 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5730 eh = fdh;
5731 }
1e2f5b6e
AM
5732
5733 /* Function descriptor syms cause the associated
5734 function code sym section to be marked. */
b31867b6
AM
5735 fh = defined_code_entry (eh);
5736 if (fh != NULL)
ccfa59ea
AM
5737 {
5738 /* They also mark their opd section. */
74f0fb50 5739 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5740
b31867b6 5741 rsec = fh->elf.root.u.def.section;
ccfa59ea 5742 }
8387904d
AM
5743 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5744 && opd_entry_value (eh->elf.root.u.def.section,
5745 eh->elf.root.u.def.value,
aef36ac1 5746 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5747 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5748 else
1e2f5b6e
AM
5749 rsec = h->root.u.def.section;
5750 break;
5bd4f169
AM
5751
5752 case bfd_link_hash_common:
1e2f5b6e
AM
5753 rsec = h->root.u.c.p->section;
5754 break;
5bd4f169
AM
5755
5756 default:
fb34365b 5757 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5758 }
5759 }
5760 }
5761 else
5762 {
74f0fb50 5763 struct _opd_sec_data *opd;
1e2f5b6e
AM
5764
5765 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5766 opd = get_opd_info (rsec);
5767 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5768 {
74f0fb50 5769 rsec->gc_mark = 1;
ccfa59ea 5770
51aecdc5 5771 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5772 }
5bd4f169
AM
5773 }
5774
1e2f5b6e 5775 return rsec;
5bd4f169
AM
5776}
5777
deb0e272
AM
5778/* The maximum size of .sfpr. */
5779#define SFPR_MAX (218*4)
5780
5781struct sfpr_def_parms
5782{
699733f6
AM
5783 const char name[12];
5784 unsigned char lo, hi;
2cdcc330
AM
5785 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5786 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5787};
5788
a4b6fadd
AM
5789/* Auto-generate _save*, _rest* functions in .sfpr.
5790 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5791 instead. */
deb0e272 5792
4dfe6ac6 5793static bfd_boolean
a4b6fadd
AM
5794sfpr_define (struct bfd_link_info *info,
5795 const struct sfpr_def_parms *parm,
5796 asection *stub_sec)
deb0e272
AM
5797{
5798 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5799 unsigned int i;
5800 size_t len = strlen (parm->name);
5801 bfd_boolean writing = FALSE;
699733f6 5802 char sym[16];
deb0e272 5803
4dfe6ac6
NC
5804 if (htab == NULL)
5805 return FALSE;
5806
deb0e272
AM
5807 memcpy (sym, parm->name, len);
5808 sym[len + 2] = 0;
5809
5810 for (i = parm->lo; i <= parm->hi; i++)
5811 {
a4b6fadd 5812 struct ppc_link_hash_entry *h;
deb0e272
AM
5813
5814 sym[len + 0] = i / 10 + '0';
5815 sym[len + 1] = i % 10 + '0';
a4b6fadd 5816 h = (struct ppc_link_hash_entry *)
b32547cd 5817 elf_link_hash_lookup (&htab->elf, sym, writing, TRUE, TRUE);
a4b6fadd 5818 if (stub_sec != NULL)
deb0e272 5819 {
a4b6fadd
AM
5820 if (h != NULL
5821 && h->elf.root.type == bfd_link_hash_defined
5822 && h->elf.root.u.def.section == htab->sfpr)
5823 {
5824 struct elf_link_hash_entry *s;
5825 char buf[32];
5826 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5827 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5828 if (s == NULL)
5829 return FALSE;
5830 if (s->root.type == bfd_link_hash_new
5831 || (s->root.type = bfd_link_hash_defined
5832 && s->root.u.def.section == stub_sec))
5833 {
5834 s->root.type = bfd_link_hash_defined;
5835 s->root.u.def.section = stub_sec;
7dda8d3c 5836 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5837 + h->elf.root.u.def.value);
5838 s->ref_regular = 1;
5839 s->def_regular = 1;
5840 s->ref_regular_nonweak = 1;
5841 s->forced_local = 1;
5842 s->non_elf = 0;
5843 s->root.linker_def = 1;
5844 }
5845 }
5846 continue;
5847 }
5848 if (h != NULL)
5849 {
5850 h->save_res = 1;
5851 if (!h->elf.def_regular)
deb0e272 5852 {
a4b6fadd
AM
5853 h->elf.root.type = bfd_link_hash_defined;
5854 h->elf.root.u.def.section = htab->sfpr;
5855 h->elf.root.u.def.value = htab->sfpr->size;
5856 h->elf.type = STT_FUNC;
5857 h->elf.def_regular = 1;
b32547cd 5858 h->elf.non_elf = 0;
a4b6fadd
AM
5859 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5860 writing = TRUE;
deb0e272 5861 if (htab->sfpr->contents == NULL)
a4b6fadd 5862 {
2cdcc330
AM
5863 htab->sfpr->contents
5864 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5865 if (htab->sfpr->contents == NULL)
5866 return FALSE;
5867 }
deb0e272
AM
5868 }
5869 }
5870 if (writing)
5871 {
5872 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5873 if (i != parm->hi)
5874 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5875 else
5876 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5877 htab->sfpr->size = p - htab->sfpr->contents;
5878 }
5879 }
5880
5881 return TRUE;
5882}
5883
5884static bfd_byte *
5885savegpr0 (bfd *abfd, bfd_byte *p, int r)
5886{
5887 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5888 return p + 4;
5889}
5890
5891static bfd_byte *
5892savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5893{
5894 p = savegpr0 (abfd, p, r);
a078d95a 5895 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5896 p = p + 4;
5897 bfd_put_32 (abfd, BLR, p);
5898 return p + 4;
5899}
5900
5901static bfd_byte *
5902restgpr0 (bfd *abfd, bfd_byte *p, int r)
5903{
5904 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5905 return p + 4;
5906}
5907
5908static bfd_byte *
5909restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5910{
a078d95a 5911 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5912 p = p + 4;
5913 p = restgpr0 (abfd, p, r);
5914 bfd_put_32 (abfd, MTLR_R0, p);
5915 p = p + 4;
5916 if (r == 29)
5917 {
5918 p = restgpr0 (abfd, p, 30);
5919 p = restgpr0 (abfd, p, 31);
5920 }
5921 bfd_put_32 (abfd, BLR, p);
5922 return p + 4;
5923}
5924
5925static bfd_byte *
5926savegpr1 (bfd *abfd, bfd_byte *p, int r)
5927{
5928 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5929 return p + 4;
5930}
5931
5932static bfd_byte *
5933savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5934{
5935 p = savegpr1 (abfd, p, r);
5936 bfd_put_32 (abfd, BLR, p);
5937 return p + 4;
5938}
5939
5940static bfd_byte *
5941restgpr1 (bfd *abfd, bfd_byte *p, int r)
5942{
5943 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5944 return p + 4;
5945}
5946
5947static bfd_byte *
5948restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5949{
5950 p = restgpr1 (abfd, p, r);
5951 bfd_put_32 (abfd, BLR, p);
5952 return p + 4;
5953}
5954
5955static bfd_byte *
5956savefpr (bfd *abfd, bfd_byte *p, int r)
5957{
5958 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5959 return p + 4;
5960}
5961
5962static bfd_byte *
5963savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5964{
5965 p = savefpr (abfd, p, r);
a078d95a 5966 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5967 p = p + 4;
5968 bfd_put_32 (abfd, BLR, p);
5969 return p + 4;
5970}
5971
5972static bfd_byte *
5973restfpr (bfd *abfd, bfd_byte *p, int r)
5974{
5975 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5976 return p + 4;
5977}
5978
5979static bfd_byte *
5980restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5981{
a078d95a 5982 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5983 p = p + 4;
5984 p = restfpr (abfd, p, r);
5985 bfd_put_32 (abfd, MTLR_R0, p);
5986 p = p + 4;
5987 if (r == 29)
5988 {
5989 p = restfpr (abfd, p, 30);
5990 p = restfpr (abfd, p, 31);
5991 }
5992 bfd_put_32 (abfd, BLR, p);
5993 return p + 4;
5994}
5995
5996static bfd_byte *
5997savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5998{
5999 p = savefpr (abfd, p, r);
6000 bfd_put_32 (abfd, BLR, p);
6001 return p + 4;
6002}
6003
6004static bfd_byte *
6005restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6006{
6007 p = restfpr (abfd, p, r);
6008 bfd_put_32 (abfd, BLR, p);
6009 return p + 4;
6010}
6011
6012static bfd_byte *
6013savevr (bfd *abfd, bfd_byte *p, int r)
6014{
6015 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6016 p = p + 4;
6017 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6018 return p + 4;
6019}
6020
6021static bfd_byte *
6022savevr_tail (bfd *abfd, bfd_byte *p, int r)
6023{
6024 p = savevr (abfd, p, r);
6025 bfd_put_32 (abfd, BLR, p);
6026 return p + 4;
6027}
6028
6029static bfd_byte *
6030restvr (bfd *abfd, bfd_byte *p, int r)
6031{
6032 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6033 p = p + 4;
6034 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6035 return p + 4;
6036}
6037
6038static bfd_byte *
6039restvr_tail (bfd *abfd, bfd_byte *p, int r)
6040{
6041 p = restvr (abfd, p, r);
6042 bfd_put_32 (abfd, BLR, p);
6043 return p + 4;
6044}
6045
e86ce104
AM
6046/* Called via elf_link_hash_traverse to transfer dynamic linking
6047 information on function code symbol entries to their corresponding
6048 function descriptor symbol entries. */
deb0e272 6049
b34976b6 6050static bfd_boolean
4ce794b7 6051func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6052{
e86ce104 6053 struct bfd_link_info *info;
65f38f15 6054 struct ppc_link_hash_table *htab;
50bc7936
AM
6055 struct ppc_link_hash_entry *fh;
6056 struct ppc_link_hash_entry *fdh;
6057 bfd_boolean force_local;
5bd4f169 6058
50bc7936
AM
6059 fh = (struct ppc_link_hash_entry *) h;
6060 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6061 return TRUE;
e86ce104 6062
8c5b4e52
AM
6063 if (!fh->is_func)
6064 return TRUE;
6065
6066 if (fh->elf.root.root.string[0] != '.'
6067 || fh->elf.root.root.string[1] == '\0')
6068 return TRUE;
6069
4ce794b7 6070 info = inf;
65f38f15 6071 htab = ppc_hash_table (info);
4dfe6ac6
NC
6072 if (htab == NULL)
6073 return FALSE;
5bd4f169 6074
8c5b4e52
AM
6075 /* Find the corresponding function descriptor symbol. */
6076 fdh = lookup_fdh (fh, htab);
6077
c09bdfe5
AM
6078 /* Resolve undefined references to dot-symbols as the value
6079 in the function descriptor, if we have one in a regular object.
6080 This is to satisfy cases like ".quad .foo". Calls to functions
6081 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6082 if ((fh->elf.root.type == bfd_link_hash_undefined
6083 || fh->elf.root.type == bfd_link_hash_undefweak)
6084 && (fdh->elf.root.type == bfd_link_hash_defined
6085 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6086 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6087 && opd_entry_value (fdh->elf.root.u.def.section,
6088 fdh->elf.root.u.def.value,
c09bdfe5 6089 &fh->elf.root.u.def.section,
aef36ac1 6090 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6091 {
b31867b6 6092 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6093 fh->elf.forced_local = 1;
b31867b6
AM
6094 fh->elf.def_regular = fdh->elf.def_regular;
6095 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6096 }
6097
8c5b4e52
AM
6098 if (!fh->elf.dynamic)
6099 {
6100 struct plt_entry *ent;
5bd4f169 6101
8c5b4e52
AM
6102 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6103 if (ent->plt.refcount > 0)
6104 break;
6105 if (ent == NULL)
6106 return TRUE;
6107 }
5bd4f169 6108
8c5b4e52 6109 /* Create a descriptor as undefined if necessary. */
50bc7936 6110 if (fdh == NULL
0e1862bb 6111 && !bfd_link_executable (info)
50bc7936
AM
6112 && (fh->elf.root.type == bfd_link_hash_undefined
6113 || fh->elf.root.type == bfd_link_hash_undefweak))
6114 {
908b32fc 6115 fdh = make_fdh (info, fh);
bb700d78
AM
6116 if (fdh == NULL)
6117 return FALSE;
50bc7936 6118 }
648cca2c 6119
8c5b4e52 6120 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6121 if (fdh != NULL
6122 && fdh->fake
8c5b4e52
AM
6123 && (fh->elf.root.type == bfd_link_hash_defined
6124 || fh->elf.root.type == bfd_link_hash_defweak))
6125 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6126
8c5b4e52
AM
6127 /* Transfer dynamic linking information to the function descriptor. */
6128 if (fdh != NULL)
6129 {
f5385ebf
AM
6130 fdh->elf.ref_regular |= fh->elf.ref_regular;
6131 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6132 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6133 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6134 fdh->elf.dynamic |= fh->elf.dynamic;
6135 fdh->elf.needs_plt |= (fh->elf.needs_plt
6136 || fh->elf.type == STT_FUNC
6137 || fh->elf.type == STT_GNU_IFUNC);
6138 move_plt_plist (fh, fdh);
6139
6140 if (!fdh->elf.forced_local
6141 && fh->elf.dynindx != -1)
6142 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6143 return FALSE;
e86ce104
AM
6144 }
6145
50bc7936
AM
6146 /* Now that the info is on the function descriptor, clear the
6147 function code sym info. Any function code syms for which we
6148 don't have a definition in a regular file, we force local.
6149 This prevents a shared library from exporting syms that have
6150 been imported from another library. Function code syms that
6151 are really in the library we must leave global to prevent the
6152 linker dragging in a definition from a static library. */
93f3fa99
AM
6153 force_local = (!fh->elf.def_regular
6154 || fdh == NULL
6155 || !fdh->elf.def_regular
6156 || fdh->elf.forced_local);
50bc7936
AM
6157 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6158
b34976b6 6159 return TRUE;
e86ce104 6160}
40b8271b 6161
a4b6fadd
AM
6162static const struct sfpr_def_parms save_res_funcs[] =
6163 {
6164 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6165 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6166 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6167 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6168 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6169 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6170 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6171 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6172 { "._savef", 14, 31, savefpr, savefpr1_tail },
6173 { "._restf", 14, 31, restfpr, restfpr1_tail },
6174 { "_savevr_", 20, 31, savevr, savevr_tail },
6175 { "_restvr_", 20, 31, restvr, restvr_tail }
6176 };
6177
e86ce104 6178/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6179 this hook to a) provide some gcc support functions, and b) transfer
6180 dynamic linking information gathered so far on function code symbol
6181 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6182
b34976b6 6183static bfd_boolean
4ce794b7
AM
6184ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6185 struct bfd_link_info *info)
e86ce104
AM
6186{
6187 struct ppc_link_hash_table *htab;
6188
6189 htab = ppc_hash_table (info);
4dfe6ac6
NC
6190 if (htab == NULL)
6191 return FALSE;
6192
b32547cd
AM
6193 /* Provide any missing _save* and _rest* functions. */
6194 if (htab->sfpr != NULL)
6195 {
6196 unsigned int i;
6197
6198 htab->sfpr->size = 0;
6199 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6200 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6201 return FALSE;
6202 if (htab->sfpr->size == 0)
6203 htab->sfpr->flags |= SEC_EXCLUDE;
6204 }
6205
6206 if (bfd_link_relocatable (info))
6207 return TRUE;
6208
6209 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6210 {
6211 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6212 /* Make .TOC. defined so as to prevent it being made dynamic.
6213 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6214 if (!htab->elf.hgot->def_regular
6215 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6216 {
6217 htab->elf.hgot->root.type = bfd_link_hash_defined;
6218 htab->elf.hgot->root.u.def.value = 0;
6219 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6220 htab->elf.hgot->def_regular = 1;
6221 htab->elf.hgot->root.linker_def = 1;
6222 }
dba6fa9b 6223 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6224 htab->elf.hgot->other
6225 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6226 }
c66bb0ee 6227
8c5b4e52
AM
6228 if (htab->need_func_desc_adj)
6229 {
6230 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6231 htab->need_func_desc_adj = 0;
6232 }
805fc799 6233
b34976b6 6234 return TRUE;
e86ce104
AM
6235}
6236
98bbb1b8 6237/* Find dynamic relocs for H that apply to read-only sections. */
a345bc8d 6238
98bbb1b8 6239static asection *
a345bc8d
AM
6240readonly_dynrelocs (struct elf_link_hash_entry *h)
6241{
6242 struct ppc_link_hash_entry *eh;
6243 struct elf_dyn_relocs *p;
6244
6245 eh = (struct ppc_link_hash_entry *) h;
6246 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6247 {
6248 asection *s = p->sec->output_section;
6249
6250 if (s != NULL && (s->flags & SEC_READONLY) != 0)
98bbb1b8 6251 return p->sec;
a345bc8d 6252 }
98bbb1b8 6253 return NULL;
a345bc8d
AM
6254}
6255
d311bc8b 6256/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6257 aliases, that apply to read-only sections. Cannot be used after
6258 size_dynamic_sections. */
d311bc8b
AM
6259
6260static bfd_boolean
6261alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6262{
6263 struct ppc_link_hash_entry *eh;
6264
6265 eh = (struct ppc_link_hash_entry *) h;
6266 do
6267 {
6268 if (readonly_dynrelocs (&eh->elf))
6269 return TRUE;
ab2477e1 6270 eh = (struct ppc_link_hash_entry *) eh->elf.u.alias;
2cdcc330
AM
6271 }
6272 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6273
6274 return FALSE;
6275}
8a2058b5 6276
8a9e8e72
AM
6277/* Return whether EH has pc-relative dynamic relocs. */
6278
6279static bfd_boolean
6280pc_dynrelocs (struct ppc_link_hash_entry *eh)
6281{
6282 struct elf_dyn_relocs *p;
6283
6284 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6285 if (p->pc_count != 0)
6286 return TRUE;
6287 return FALSE;
6288}
6289
8a2058b5
AM
6290/* Return true if a global entry stub will be created for H. Valid
6291 for ELFv2 before plt entries have been allocated. */
6292
6293static bfd_boolean
6294global_entry_stub (struct elf_link_hash_entry *h)
6295{
6296 struct plt_entry *pent;
6297
6298 if (!h->pointer_equality_needed
6299 || h->def_regular)
6300 return FALSE;
6301
6302 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6303 if (pent->plt.refcount > 0
6304 && pent->addend == 0)
6305 return TRUE;
6306
6307 return FALSE;
6308}
6309
e86ce104
AM
6310/* Adjust a symbol defined by a dynamic object and referenced by a
6311 regular object. The current definition is in some section of the
6312 dynamic object, but we're not including those sections. We have to
6313 change the definition to something the rest of the link can
6314 understand. */
6315
b34976b6 6316static bfd_boolean
4ce794b7
AM
6317ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6318 struct elf_link_hash_entry *h)
e86ce104
AM
6319{
6320 struct ppc_link_hash_table *htab;
5474d94f 6321 asection *s, *srel;
e86ce104
AM
6322
6323 htab = ppc_hash_table (info);
4dfe6ac6
NC
6324 if (htab == NULL)
6325 return FALSE;
e86ce104
AM
6326
6327 /* Deal with function syms. */
6328 if (h->type == STT_FUNC
e054468f 6329 || h->type == STT_GNU_IFUNC
f5385ebf 6330 || h->needs_plt)
e86ce104 6331 {
529fe20e
AM
6332 bfd_boolean local = (((struct ppc_link_hash_entry *) h)->save_res
6333 || SYMBOL_CALLS_LOCAL (info, h)
6334 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6335 /* Discard dyn_relocs when non-pic if we've decided that a
6336 function symbol is local and not an ifunc. We keep dynamic
6337 relocs for ifuncs when local rather than always emitting a
6338 plt call stub for them and defining the symbol on the call
6339 stub. We can't do that for ELFv1 anyway (a function symbol
6340 is defined on a descriptor, not code) and it can be faster at
6341 run-time due to not needing to bounce through a stub. The
6342 dyn_relocs for ifuncs will be applied even in a static
6343 executable. */
6344 if (!bfd_link_pic (info)
6345 && h->type != STT_GNU_IFUNC
6346 && local)
6347 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6348
e86ce104
AM
6349 /* Clear procedure linkage table information for any symbol that
6350 won't need a .plt entry. */
411e1bfb
AM
6351 struct plt_entry *ent;
6352 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6353 if (ent->plt.refcount > 0)
6354 break;
8387904d 6355 if (ent == NULL
2d7ad24e
AM
6356 || (h->type != STT_GNU_IFUNC
6357 && local
3e04d765
AM
6358 && (htab->can_convert_all_inline_plt
6359 || (((struct ppc_link_hash_entry *) h)->tls_mask
6360 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6361 {
411e1bfb 6362 h->plt.plist = NULL;
f5385ebf 6363 h->needs_plt = 0;
d1eca1e4 6364 h->pointer_equality_needed = 0;
40b8271b 6365 }
8a2058b5 6366 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6367 {
d1eca1e4
AM
6368 /* Taking a function's address in a read/write section
6369 doesn't require us to define the function symbol in the
6370 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6371 be used instead. The reason we prefer a few more dynamic
6372 relocs is that calling via a global entry stub costs a
6373 few more instructions, and pointer_equality_needed causes
6374 extra work in ld.so when resolving these symbols. */
529fe20e 6375 if (global_entry_stub (h))
d1eca1e4 6376 {
ab2477e1 6377 if (!readonly_dynrelocs (h))
529fe20e
AM
6378 {
6379 h->pointer_equality_needed = 0;
04383fd1
AM
6380 /* If we haven't seen a branch reloc and the symbol
6381 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6382 if (!h->needs_plt)
6383 h->plt.plist = NULL;
6384 }
6385 else if (!bfd_link_pic (info))
6386 /* We are going to be defining the function symbol on the
6387 plt stub, so no dyn_relocs needed when non-pic. */
6388 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
d1eca1e4
AM
6389 }
6390
3988aed5
AM
6391 /* ELFv2 function symbols can't have copy relocs. */
6392 return TRUE;
6393 }
6394 else if (!h->needs_plt
ab2477e1 6395 && !readonly_dynrelocs (h))
3988aed5 6396 {
04383fd1
AM
6397 /* If we haven't seen a branch reloc and the symbol isn't an
6398 ifunc then we don't need a plt entry. */
3988aed5
AM
6399 h->plt.plist = NULL;
6400 h->pointer_equality_needed = 0;
a345bc8d
AM
6401 return TRUE;
6402 }
5bd4f169 6403 }
bbd7ec4a 6404 else
411e1bfb 6405 h->plt.plist = NULL;
5bd4f169
AM
6406
6407 /* If this is a weak symbol, and there is a real definition, the
6408 processor independent code will have arranged for us to see the
6409 real definition first, and we can just use the same value. */
60d67dc8 6410 if (h->is_weakalias)
5bd4f169 6411 {
60d67dc8
AM
6412 struct elf_link_hash_entry *def = weakdef (h);
6413 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6414 h->root.u.def.section = def->root.u.def.section;
6415 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6416 if (def->root.u.def.section == htab->elf.sdynbss
6417 || def->root.u.def.section == htab->elf.sdynrelro)
6418 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
b34976b6 6419 return TRUE;
5bd4f169
AM
6420 }
6421
5bd4f169
AM
6422 /* If we are creating a shared library, we must presume that the
6423 only references to the symbol are via the global offset table.
6424 For such cases we need not do anything here; the relocations will
6425 be handled correctly by relocate_section. */
ec73ddcd 6426 if (!bfd_link_executable (info))
b34976b6 6427 return TRUE;
5bd4f169 6428
65f38f15
AM
6429 /* If there are no references to this symbol that do not use the
6430 GOT, we don't need to generate a copy reloc. */
f5385ebf 6431 if (!h->non_got_ref)
b34976b6 6432 return TRUE;
65f38f15 6433
b186458a 6434 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6435 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6436
d93d1c80
AM
6437 /* If -z nocopyreloc was given, don't generate them either. */
6438 || info->nocopyreloc
a127494f 6439
dce2246a 6440 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6441 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6442 || (ELIMINATE_COPY_RELOCS
6443 && !h->needs_copy
6444 && !alias_readonly_dynrelocs (h))
65f38f15 6445
d93d1c80
AM
6446 /* Protected variables do not work with .dynbss. The copy in
6447 .dynbss won't be used by the shared library with the protected
6448 definition for the variable. Text relocations are preferable
6449 to an incorrect program. */
6450 || h->protected_def)
529fe20e 6451 return TRUE;
a127494f 6452
5d35169e 6453 if (h->plt.plist != NULL)
97b639ba
AM
6454 {
6455 /* We should never get here, but unfortunately there are versions
6456 of gcc out there that improperly (for this ABI) put initialized
6457 function pointers, vtable refs and suchlike in read-only
6458 sections. Allow them to proceed, but warn that this might
6459 break at runtime. */
25f53a85 6460 info->callbacks->einfo
c1c8c1ef 6461 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6462 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6463 h->root.root.string);
6464 }
5d35169e
AM
6465
6466 /* This is a reference to a symbol defined by a dynamic object which
6467 is not a function. */
6468
5bd4f169
AM
6469 /* We must allocate the symbol in our .dynbss section, which will
6470 become part of the .bss section of the executable. There will be
6471 an entry for this symbol in the .dynsym section. The dynamic
6472 object will contain position independent code, so all references
6473 from the dynamic object to this symbol will go through the global
6474 offset table. The dynamic linker will use the .dynsym entry to
6475 determine the address it must put in the global offset table, so
6476 both the dynamic object and the regular object will refer to the
6477 same memory location for the variable. */
5474d94f
AM
6478 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6479 {
6480 s = htab->elf.sdynrelro;
6481 srel = htab->elf.sreldynrelro;
6482 }
6483 else
6484 {
6485 s = htab->elf.sdynbss;
6486 srel = htab->elf.srelbss;
6487 }
1d7e9d18 6488 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6489 {
4a7e5234
AM
6490 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6491 linker to copy the initial value out of the dynamic object
6492 and into the runtime process image. */
5474d94f 6493 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6494 h->needs_copy = 1;
5bd4f169
AM
6495 }
6496
529fe20e
AM
6497 /* We no longer want dyn_relocs. */
6498 ((struct ppc_link_hash_entry *) h)->dyn_relocs = NULL;
6cabe1ea 6499 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6500}
6501
e86ce104
AM
6502/* If given a function descriptor symbol, hide both the function code
6503 sym and the descriptor. */
6504static void
4ce794b7
AM
6505ppc64_elf_hide_symbol (struct bfd_link_info *info,
6506 struct elf_link_hash_entry *h,
6507 bfd_boolean force_local)
e86ce104 6508{
34814b9f 6509 struct ppc_link_hash_entry *eh;
e86ce104
AM
6510 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6511
87469ba2
AM
6512 if (ppc_hash_table (info) == NULL)
6513 return;
6514
34814b9f
AM
6515 eh = (struct ppc_link_hash_entry *) h;
6516 if (eh->is_func_descriptor)
e86ce104 6517 {
34814b9f 6518 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6519
721956f4 6520 if (fh == NULL)
d1329ca3
AM
6521 {
6522 const char *p, *q;
b8ac2841 6523 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6524 char save;
6525
6526 /* We aren't supposed to use alloca in BFD because on
6527 systems which do not have alloca the version in libiberty
6528 calls xmalloc, which might cause the program to crash
6529 when it runs out of memory. This function doesn't have a
6530 return status, so there's no way to gracefully return an
6531 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6532 accessed; It's either a string in an ELF string table,
6533 or allocated in an objalloc structure. */
d1329ca3 6534
34814b9f 6535 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6536 save = *p;
6537 *(char *) p = '.';
34814b9f 6538 fh = (struct ppc_link_hash_entry *)
b8ac2841 6539 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6540 *(char *) p = save;
6541
6542 /* Unfortunately, if it so happens that the string we were
6543 looking for was allocated immediately before this string,
6544 then we overwrote the string terminator. That's the only
6545 reason the lookup should fail. */
6546 if (fh == NULL)
6547 {
34814b9f
AM
6548 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6549 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6550 --q, --p;
34814b9f
AM
6551 if (q < eh->elf.root.root.string && *p == '.')
6552 fh = (struct ppc_link_hash_entry *)
b8ac2841 6553 elf_link_hash_lookup (htab, p, FALSE, FALSE, FALSE);
d1329ca3
AM
6554 }
6555 if (fh != NULL)
6556 {
34814b9f
AM
6557 eh->oh = fh;
6558 fh->oh = eh;
d1329ca3
AM
6559 }
6560 }
e86ce104 6561 if (fh != NULL)
34814b9f 6562 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6563 }
6564}
6565
411e1bfb 6566static bfd_boolean
8843416a
AM
6567get_sym_h (struct elf_link_hash_entry **hp,
6568 Elf_Internal_Sym **symp,
6569 asection **symsecp,
f961d9dd 6570 unsigned char **tls_maskp,
8843416a
AM
6571 Elf_Internal_Sym **locsymsp,
6572 unsigned long r_symndx,
6573 bfd *ibfd)
411e1bfb 6574{
0ffa91dd 6575 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6576
6577 if (r_symndx >= symtab_hdr->sh_info)
6578 {
6579 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6580 struct elf_link_hash_entry *h;
6581
6582 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6583 h = elf_follow_link (h);
411e1bfb
AM
6584
6585 if (hp != NULL)
6586 *hp = h;
6587
6588 if (symp != NULL)
6589 *symp = NULL;
6590
6591 if (symsecp != NULL)
6592 {
6593 asection *symsec = NULL;
6594 if (h->root.type == bfd_link_hash_defined
6595 || h->root.type == bfd_link_hash_defweak)
6596 symsec = h->root.u.def.section;
6597 *symsecp = symsec;
6598 }
6599
e7b938ca 6600 if (tls_maskp != NULL)
411e1bfb
AM
6601 {
6602 struct ppc_link_hash_entry *eh;
6603
6604 eh = (struct ppc_link_hash_entry *) h;
e7b938ca 6605 *tls_maskp = &eh->tls_mask;
411e1bfb
AM
6606 }
6607 }
6608 else
6609 {
6610 Elf_Internal_Sym *sym;
6611 Elf_Internal_Sym *locsyms = *locsymsp;
6612
6613 if (locsyms == NULL)
6614 {
6615 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6616 if (locsyms == NULL)
6617 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6618 symtab_hdr->sh_info,
6619 0, NULL, NULL, NULL);
6620 if (locsyms == NULL)
6621 return FALSE;
6622 *locsymsp = locsyms;
6623 }
6624 sym = locsyms + r_symndx;
6625
6626 if (hp != NULL)
6627 *hp = NULL;
6628
6629 if (symp != NULL)
6630 *symp = sym;
6631
6632 if (symsecp != NULL)
cb33740c 6633 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6634
e7b938ca 6635 if (tls_maskp != NULL)
411e1bfb
AM
6636 {
6637 struct got_entry **lgot_ents;
f961d9dd 6638 unsigned char *tls_mask;
411e1bfb 6639
e7b938ca 6640 tls_mask = NULL;
411e1bfb
AM
6641 lgot_ents = elf_local_got_ents (ibfd);
6642 if (lgot_ents != NULL)
6643 {
e054468f
AM
6644 struct plt_entry **local_plt = (struct plt_entry **)
6645 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6646 unsigned char *lgot_masks = (unsigned char *)
e054468f 6647 (local_plt + symtab_hdr->sh_info);
e7b938ca 6648 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6649 }
e7b938ca 6650 *tls_maskp = tls_mask;
411e1bfb
AM
6651 }
6652 }
6653 return TRUE;
6654}
6655
e7b938ca 6656/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6657 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6658 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6659
6660static int
f961d9dd 6661get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6662 unsigned long *toc_symndx,
6663 bfd_vma *toc_addend,
0d4792f7 6664 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6665 const Elf_Internal_Rela *rel,
6666 bfd *ibfd)
411e1bfb
AM
6667{
6668 unsigned long r_symndx;
0d4792f7 6669 int next_r;
411e1bfb
AM
6670 struct elf_link_hash_entry *h;
6671 Elf_Internal_Sym *sym;
6672 asection *sec;
6673 bfd_vma off;
6674
6675 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6676 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6677 return 0;
411e1bfb 6678
37da22e5
AM
6679 if ((*tls_maskp != NULL
6680 && (**tls_maskp & TLS_TLS) != 0
6681 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6682 || sec == NULL
6bee8834 6683 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6684 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6685 return 1;
411e1bfb
AM
6686
6687 /* Look inside a TOC section too. */
6688 if (h != NULL)
6689 {
6690 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6691 off = h->root.u.def.value;
6692 }
6693 else
6694 off = sym->st_value;
6695 off += rel->r_addend;
6696 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6697 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6698 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6699 if (toc_symndx != NULL)
6700 *toc_symndx = r_symndx;
3a71aa26
AM
6701 if (toc_addend != NULL)
6702 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6703 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6704 return 0;
854b41e7 6705 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6706 && (next_r == -1 || next_r == -2))
6707 return 1 - next_r;
951fd09b 6708 return 1;
411e1bfb
AM
6709}
6710
3b421ab3
AM
6711/* Find (or create) an entry in the tocsave hash table. */
6712
6713static struct tocsave_entry *
6714tocsave_find (struct ppc_link_hash_table *htab,
6715 enum insert_option insert,
6716 Elf_Internal_Sym **local_syms,
6717 const Elf_Internal_Rela *irela,
6718 bfd *ibfd)
6719{
6720 unsigned long r_indx;
6721 struct elf_link_hash_entry *h;
6722 Elf_Internal_Sym *sym;
6723 struct tocsave_entry ent, *p;
6724 hashval_t hash;
6725 struct tocsave_entry **slot;
6726
6727 r_indx = ELF64_R_SYM (irela->r_info);
6728 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6729 return NULL;
6730 if (ent.sec == NULL || ent.sec->output_section == NULL)
6731 {
4eca0228 6732 _bfd_error_handler
871b3ab2 6733 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6734 return NULL;
6735 }
6736
6737 if (h != NULL)
6738 ent.offset = h->root.u.def.value;
6739 else
6740 ent.offset = sym->st_value;
6741 ent.offset += irela->r_addend;
6742
6743 hash = tocsave_htab_hash (&ent);
6744 slot = ((struct tocsave_entry **)
6745 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6746 if (slot == NULL)
6747 return NULL;
6748
6749 if (*slot == NULL)
6750 {
6751 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6752 if (p == NULL)
6753 return NULL;
6754 *p = ent;
6755 *slot = p;
6756 }
6757 return *slot;
6758}
6759
754021d0 6760/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6761 code for the old ABI, these will already have been done. */
754021d0
AM
6762
6763static bfd_boolean
6764adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6765{
6766 struct ppc_link_hash_entry *eh;
6767 asection *sym_sec;
74f0fb50 6768 struct _opd_sec_data *opd;
754021d0
AM
6769
6770 if (h->root.type == bfd_link_hash_indirect)
6771 return TRUE;
6772
754021d0
AM
6773 if (h->root.type != bfd_link_hash_defined
6774 && h->root.type != bfd_link_hash_defweak)
6775 return TRUE;
6776
6777 eh = (struct ppc_link_hash_entry *) h;
6778 if (eh->adjust_done)
6779 return TRUE;
6780
6781 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6782 opd = get_opd_info (sym_sec);
6783 if (opd != NULL && opd->adjust != NULL)
754021d0 6784 {
51aecdc5 6785 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6786 if (adjust == -1)
6787 {
6788 /* This entry has been deleted. */
b3fac117 6789 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6790 if (dsec == NULL)
6791 {
6792 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6793 if (discarded_section (dsec))
81688140 6794 {
b3fac117 6795 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6796 break;
6797 }
6798 }
4025353c 6799 eh->elf.root.u.def.value = 0;
81688140 6800 eh->elf.root.u.def.section = dsec;
4025353c
AM
6801 }
6802 else
6803 eh->elf.root.u.def.value += adjust;
754021d0
AM
6804 eh->adjust_done = 1;
6805 }
6806 return TRUE;
6807}
6808
8c1d1bb8 6809/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6810 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6811 have already been determined. */
6812
6813static bfd_boolean
6814dec_dynrel_count (bfd_vma r_info,
6815 asection *sec,
6816 struct bfd_link_info *info,
6817 Elf_Internal_Sym **local_syms,
6818 struct elf_link_hash_entry *h,
19e08130 6819 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6820{
6821 enum elf_ppc64_reloc_type r_type;
19e08130 6822 asection *sym_sec = NULL;
8c1d1bb8
AM
6823
6824 /* Can this reloc be dynamic? This switch, and later tests here
6825 should be kept in sync with the code in check_relocs. */
6826 r_type = ELF64_R_TYPE (r_info);
6827 switch (r_type)
6828 {
6829 default:
6830 return TRUE;
6831
1bdd8fac
AM
6832 case R_PPC64_TOC16:
6833 case R_PPC64_TOC16_DS:
6834 case R_PPC64_TOC16_LO:
6835 case R_PPC64_TOC16_HI:
6836 case R_PPC64_TOC16_HA:
6837 case R_PPC64_TOC16_LO_DS:
6838 if (h == NULL)
6839 return TRUE;
6840 break;
6841
8c1d1bb8
AM
6842 case R_PPC64_TPREL16:
6843 case R_PPC64_TPREL16_LO:
6844 case R_PPC64_TPREL16_HI:
6845 case R_PPC64_TPREL16_HA:
6846 case R_PPC64_TPREL16_DS:
6847 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6848 case R_PPC64_TPREL16_HIGH:
6849 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6850 case R_PPC64_TPREL16_HIGHER:
6851 case R_PPC64_TPREL16_HIGHERA:
6852 case R_PPC64_TPREL16_HIGHEST:
6853 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6854 case R_PPC64_TPREL64:
c213164a 6855 case R_PPC64_TPREL34:
8c1d1bb8
AM
6856 case R_PPC64_DTPMOD64:
6857 case R_PPC64_DTPREL64:
6858 case R_PPC64_ADDR64:
6859 case R_PPC64_REL30:
6860 case R_PPC64_REL32:
6861 case R_PPC64_REL64:
6862 case R_PPC64_ADDR14:
6863 case R_PPC64_ADDR14_BRNTAKEN:
6864 case R_PPC64_ADDR14_BRTAKEN:
6865 case R_PPC64_ADDR16:
6866 case R_PPC64_ADDR16_DS:
6867 case R_PPC64_ADDR16_HA:
6868 case R_PPC64_ADDR16_HI:
f9c6b907
AM
6869 case R_PPC64_ADDR16_HIGH:
6870 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
6871 case R_PPC64_ADDR16_HIGHER:
6872 case R_PPC64_ADDR16_HIGHERA:
6873 case R_PPC64_ADDR16_HIGHEST:
6874 case R_PPC64_ADDR16_HIGHESTA:
6875 case R_PPC64_ADDR16_LO:
6876 case R_PPC64_ADDR16_LO_DS:
6877 case R_PPC64_ADDR24:
6878 case R_PPC64_ADDR32:
6879 case R_PPC64_UADDR16:
6880 case R_PPC64_UADDR32:
6881 case R_PPC64_UADDR64:
6882 case R_PPC64_TOC:
5663e321
AM
6883 case R_PPC64_D34:
6884 case R_PPC64_D34_LO:
6885 case R_PPC64_D34_HI30:
6886 case R_PPC64_D34_HA30:
6887 case R_PPC64_ADDR16_HIGHER34:
6888 case R_PPC64_ADDR16_HIGHERA34:
6889 case R_PPC64_ADDR16_HIGHEST34:
6890 case R_PPC64_ADDR16_HIGHESTA34:
6891 case R_PPC64_D28:
8c1d1bb8
AM
6892 break;
6893 }
6894
6895 if (local_syms != NULL)
6896 {
6897 unsigned long r_symndx;
8c1d1bb8
AM
6898 bfd *ibfd = sec->owner;
6899
6900 r_symndx = ELF64_R_SYM (r_info);
6901 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6902 return FALSE;
6903 }
6904
ec73ddcd
AM
6905 if ((h != NULL
6906 && (h->root.type == bfd_link_hash_defweak
6907 || !h->def_regular))
6908 || (h != NULL
6909 && !bfd_link_executable (info)
6910 && !SYMBOLIC_BIND (info, h))
6911 || (bfd_link_pic (info)
6912 && must_be_dyn_reloc (info, r_type))
6913 || (!bfd_link_pic (info)
6914 && (h != NULL
6915 ? h->type == STT_GNU_IFUNC
6916 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
6917 ;
6918 else
6919 return TRUE;
6920
6921 if (h != NULL)
6edfbbad 6922 {
19e08130
AM
6923 struct elf_dyn_relocs *p;
6924 struct elf_dyn_relocs **pp;
6925 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6926
6927 /* elf_gc_sweep may have already removed all dyn relocs associated
6928 with local syms for a given section. Also, symbol flags are
6929 changed by elf_gc_sweep_symbol, confusing the test above. Don't
6930 report a dynreloc miscount. */
6931 if (*pp == NULL && info->gc_sections)
6932 return TRUE;
6933
6934 while ((p = *pp) != NULL)
60124e18 6935 {
19e08130
AM
6936 if (p->sec == sec)
6937 {
6938 if (!must_be_dyn_reloc (info, r_type))
6939 p->pc_count -= 1;
6940 p->count -= 1;
6941 if (p->count == 0)
6942 *pp = p->next;
6943 return TRUE;
6944 }
6945 pp = &p->next;
60124e18 6946 }
6edfbbad 6947 }
19e08130
AM
6948 else
6949 {
6950 struct ppc_dyn_relocs *p;
6951 struct ppc_dyn_relocs **pp;
6952 void *vpp;
6953 bfd_boolean is_ifunc;
8c1d1bb8 6954
19e08130
AM
6955 if (local_syms == NULL)
6956 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
6957 if (sym_sec == NULL)
6958 sym_sec = sec;
c57da1a7 6959
19e08130
AM
6960 vpp = &elf_section_data (sym_sec)->local_dynrel;
6961 pp = (struct ppc_dyn_relocs **) vpp;
6962
6963 if (*pp == NULL && info->gc_sections)
6964 return TRUE;
6965
6966 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
6967 while ((p = *pp) != NULL)
8c1d1bb8 6968 {
19e08130
AM
6969 if (p->sec == sec && p->ifunc == is_ifunc)
6970 {
6971 p->count -= 1;
6972 if (p->count == 0)
6973 *pp = p->next;
6974 return TRUE;
6975 }
6976 pp = &p->next;
8c1d1bb8 6977 }
8c1d1bb8
AM
6978 }
6979
695344c0 6980 /* xgettext:c-format */
cf97bcb0
AM
6981 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
6982 sec->owner, sec);
8c1d1bb8
AM
6983 bfd_set_error (bfd_error_bad_value);
6984 return FALSE;
6985}
6986
754021d0
AM
6987/* Remove unused Official Procedure Descriptor entries. Currently we
6988 only remove those associated with functions in discarded link-once
6989 sections, or weakly defined functions that have been overridden. It
6990 would be possible to remove many more entries for statically linked
6991 applications. */
6992
b34976b6 6993bfd_boolean
e7d1c40c 6994ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
6995{
6996 bfd *ibfd;
754021d0 6997 bfd_boolean some_edited = FALSE;
3f764659 6998 asection *need_pad = NULL;
e7d1c40c
AM
6999 struct ppc_link_hash_table *htab;
7000
7001 htab = ppc_hash_table (info);
7002 if (htab == NULL)
7003 return FALSE;
1e2f5b6e 7004
c72f2fb2 7005 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7006 {
7007 asection *sec;
7008 Elf_Internal_Rela *relstart, *rel, *relend;
7009 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7010 Elf_Internal_Sym *local_syms;
74f0fb50 7011 struct _opd_sec_data *opd;
51aecdc5 7012 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7013 bfd_size_type cnt_16b = 0;
1e2f5b6e 7014
854b41e7
AM
7015 if (!is_ppc64_elf (ibfd))
7016 continue;
7017
1e2f5b6e 7018 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7019 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7020 continue;
7021
dbaa2011 7022 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7023 continue;
7024
1e2f5b6e
AM
7025 if (sec->output_section == bfd_abs_section_ptr)
7026 continue;
7027
7028 /* Look through the section relocs. */
7029 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7030 continue;
7031
6cdc0ccc 7032 local_syms = NULL;
0ffa91dd 7033 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7034
7035 /* Read the relocations. */
4ce794b7 7036 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7037 info->keep_memory);
1e2f5b6e 7038 if (relstart == NULL)
b34976b6 7039 return FALSE;
1e2f5b6e
AM
7040
7041 /* First run through the relocs to check they are sane, and to
7042 determine whether we need to edit this opd section. */
b34976b6 7043 need_edit = FALSE;
51aecdc5 7044 broken = FALSE;
3f764659 7045 need_pad = sec;
1e2f5b6e 7046 relend = relstart + sec->reloc_count;
50bc7936 7047 for (rel = relstart; rel < relend; )
1e2f5b6e 7048 {
04c9666a 7049 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7050 unsigned long r_symndx;
7051 asection *sym_sec;
7052 struct elf_link_hash_entry *h;
7053 Elf_Internal_Sym *sym;
51aecdc5 7054 bfd_vma offset;
1e2f5b6e 7055
51aecdc5 7056 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7057 only interested in the reloc pointing to a function entry
7058 point. */
51aecdc5
AM
7059 offset = rel->r_offset;
7060 if (rel + 1 == relend
7061 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7062 {
7063 /* If someone messes with .opd alignment then after a
7064 "ld -r" we might have padding in the middle of .opd.
7065 Also, there's nothing to prevent someone putting
7066 something silly in .opd with the assembler. No .opd
b34976b6 7067 optimization for them! */
3f764659 7068 broken_opd:
4eca0228 7069 _bfd_error_handler
871b3ab2 7070 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7071 broken = TRUE;
1e2f5b6e
AM
7072 break;
7073 }
7074
50bc7936
AM
7075 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7076 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7077 {
4eca0228 7078 _bfd_error_handler
695344c0 7079 /* xgettext:c-format */
871b3ab2 7080 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7081 ibfd, r_type);
51aecdc5 7082 broken = TRUE;
50bc7936
AM
7083 break;
7084 }
7085
1e2f5b6e 7086 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7087 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7088 r_symndx, ibfd))
50bc7936 7089 goto error_ret;
1e2f5b6e
AM
7090
7091 if (sym_sec == NULL || sym_sec->owner == NULL)
7092 {
411e1bfb
AM
7093 const char *sym_name;
7094 if (h != NULL)
7095 sym_name = h->root.root.string;
7096 else
26c61ae5
L
7097 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7098 sym_sec);
411e1bfb 7099
4eca0228 7100 _bfd_error_handler
695344c0 7101 /* xgettext:c-format */
871b3ab2 7102 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7103 ibfd, sym_name);
51aecdc5 7104 broken = TRUE;
1e2f5b6e
AM
7105 break;
7106 }
7107
51020317
AM
7108 /* opd entries are always for functions defined in the
7109 current input bfd. If the symbol isn't defined in the
7110 input bfd, then we won't be using the function in this
7111 bfd; It must be defined in a linkonce section in another
7112 bfd, or is weak. It's also possible that we are
7113 discarding the function due to a linker script /DISCARD/,
7114 which we test for via the output_section. */
7115 if (sym_sec->owner != ibfd
7116 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7117 need_edit = TRUE;
1e2f5b6e 7118
50bc7936 7119 rel += 2;
51aecdc5
AM
7120 if (rel + 1 == relend
7121 || (rel + 2 < relend
7122 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7123 ++rel;
7124
7125 if (rel == relend)
3f764659
JJ
7126 {
7127 if (sec->size == offset + 24)
7128 {
7129 need_pad = NULL;
7130 break;
7131 }
51aecdc5 7132 if (sec->size == offset + 16)
3f764659
JJ
7133 {
7134 cnt_16b++;
7135 break;
7136 }
7137 goto broken_opd;
7138 }
3f764659
JJ
7139 else if (rel + 1 < relend
7140 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7141 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7142 {
51aecdc5
AM
7143 if (rel[0].r_offset == offset + 16)
7144 cnt_16b++;
7145 else if (rel[0].r_offset != offset + 24)
7146 goto broken_opd;
3f764659
JJ
7147 }
7148 else
7149 goto broken_opd;
1e2f5b6e
AM
7150 }
7151
e7d1c40c 7152 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7153
51aecdc5 7154 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7155 {
7156 Elf_Internal_Rela *write_rel;
d4730f92 7157 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7158 bfd_byte *rptr, *wptr;
983bddc8 7159 bfd_byte *new_contents;
74f0fb50
AM
7160 bfd_size_type amt;
7161
983bddc8 7162 new_contents = NULL;
51aecdc5 7163 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7164 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7165 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7166 if (opd->adjust == NULL)
7167 return FALSE;
1e2f5b6e
AM
7168
7169 /* This seems a waste of time as input .opd sections are all
7170 zeros as generated by gcc, but I suppose there's no reason
7171 this will always be so. We might start putting something in
7172 the third word of .opd entries. */
7173 if ((sec->flags & SEC_IN_MEMORY) == 0)
7174 {
eea6121a
AM
7175 bfd_byte *loc;
7176 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7177 {
eea6121a
AM
7178 if (loc != NULL)
7179 free (loc);
50bc7936 7180 error_ret:
6cdc0ccc
AM
7181 if (local_syms != NULL
7182 && symtab_hdr->contents != (unsigned char *) local_syms)
7183 free (local_syms);
6cdc0ccc
AM
7184 if (elf_section_data (sec)->relocs != relstart)
7185 free (relstart);
b34976b6 7186 return FALSE;
6cdc0ccc 7187 }
1e2f5b6e
AM
7188 sec->contents = loc;
7189 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7190 }
7191
7192 elf_section_data (sec)->relocs = relstart;
7193
3f764659 7194 new_contents = sec->contents;
3f764659
JJ
7195 if (add_aux_fields)
7196 {
7197 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7198 if (new_contents == NULL)
7199 return FALSE;
51aecdc5 7200 need_pad = NULL;
3f764659 7201 }
b4f4e59f
AM
7202 wptr = new_contents;
7203 rptr = sec->contents;
1e2f5b6e 7204 write_rel = relstart;
51aecdc5 7205 for (rel = relstart; rel < relend; )
1e2f5b6e 7206 {
50bc7936
AM
7207 unsigned long r_symndx;
7208 asection *sym_sec;
7209 struct elf_link_hash_entry *h;
51aecdc5 7210 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7211 Elf_Internal_Sym *sym;
51aecdc5
AM
7212 long opd_ent_size;
7213 Elf_Internal_Rela *next_rel;
7214 bfd_boolean skip;
50bc7936
AM
7215
7216 r_symndx = ELF64_R_SYM (rel->r_info);
7217 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7218 r_symndx, ibfd))
50bc7936
AM
7219 goto error_ret;
7220
51aecdc5
AM
7221 next_rel = rel + 2;
7222 if (next_rel + 1 == relend
7223 || (next_rel + 2 < relend
7224 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7225 ++next_rel;
7226
7227 /* See if the .opd entry is full 24 byte or
7228 16 byte (with fd_aux entry overlapped with next
7229 fd_func). */
7230 opd_ent_size = 24;
7231 if (next_rel == relend)
1e2f5b6e 7232 {
51aecdc5 7233 if (sec->size == rel->r_offset + 16)
3f764659 7234 opd_ent_size = 16;
51aecdc5
AM
7235 }
7236 else if (next_rel->r_offset == rel->r_offset + 16)
7237 opd_ent_size = 16;
3f764659 7238
51aecdc5
AM
7239 if (h != NULL
7240 && h->root.root.string[0] == '.')
7241 {
8c5b4e52
AM
7242 fdh = ((struct ppc_link_hash_entry *) h)->oh;
7243 if (fdh != NULL)
7244 {
7245 fdh = ppc_follow_link (fdh);
7246 if (fdh->elf.root.type != bfd_link_hash_defined
7247 && fdh->elf.root.type != bfd_link_hash_defweak)
7248 fdh = NULL;
7249 }
51aecdc5 7250 }
1e2f5b6e 7251
51aecdc5
AM
7252 skip = (sym_sec->owner != ibfd
7253 || sym_sec->output_section == bfd_abs_section_ptr);
7254 if (skip)
7255 {
7256 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7257 {
51aecdc5
AM
7258 /* Arrange for the function descriptor sym
7259 to be dropped. */
7260 fdh->elf.root.u.def.value = 0;
7261 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7262 }
51aecdc5 7263 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7264
0e1862bb 7265 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7266 rel = next_rel;
7267 else
7268 while (1)
7269 {
7270 if (!dec_dynrel_count (rel->r_info, sec, info,
7271 NULL, h, sym))
7272 goto error_ret;
754021d0 7273
51aecdc5
AM
7274 if (++rel == next_rel)
7275 break;
1e2f5b6e 7276
51aecdc5
AM
7277 r_symndx = ELF64_R_SYM (rel->r_info);
7278 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7279 r_symndx, ibfd))
7280 goto error_ret;
7281 }
50bc7936
AM
7282 }
7283 else
1e2f5b6e 7284 {
51aecdc5
AM
7285 /* We'll be keeping this opd entry. */
7286 long adjust;
7287
7288 if (fdh != NULL)
7289 {
7290 /* Redefine the function descriptor symbol to
7291 this location in the opd section. It is
7292 necessary to update the value here rather
7293 than using an array of adjustments as we do
7294 for local symbols, because various places
7295 in the generic ELF code use the value
7296 stored in u.def.value. */
7297 fdh->elf.root.u.def.value = wptr - new_contents;
7298 fdh->adjust_done = 1;
7299 }
7300
7301 /* Local syms are a bit tricky. We could
7302 tweak them as they can be cached, but
7303 we'd need to look through the local syms
7304 for the function descriptor sym which we
7305 don't have at the moment. So keep an
7306 array of adjustments. */
7307 adjust = (wptr - new_contents) - (rptr - sec->contents);
7308 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7309
7310 if (wptr != rptr)
7311 memcpy (wptr, rptr, opd_ent_size);
7312 wptr += opd_ent_size;
7313 if (add_aux_fields && opd_ent_size == 16)
7314 {
7315 memset (wptr, '\0', 8);
7316 wptr += 8;
7317 }
7318
50bc7936 7319 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7320 new opd entries. */
7321 for ( ; rel != next_rel; ++rel)
7322 {
7323 rel->r_offset += adjust;
7324 if (write_rel != rel)
7325 memcpy (write_rel, rel, sizeof (*rel));
7326 ++write_rel;
7327 }
1e2f5b6e 7328 }
51aecdc5
AM
7329
7330 rptr += opd_ent_size;
1e2f5b6e
AM
7331 }
7332
3f764659 7333 sec->size = wptr - new_contents;
1e2f5b6e 7334 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7335 if (add_aux_fields)
7336 {
7337 free (sec->contents);
7338 sec->contents = new_contents;
7339 }
7340
05bf9422 7341 /* Fudge the header size too, as this is used later in
cdcf6e38 7342 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7343 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7344 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7345 some_edited = TRUE;
1e2f5b6e 7346 }
6cdc0ccc 7347 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7348 free (relstart);
6cdc0ccc 7349
411e1bfb
AM
7350 if (local_syms != NULL
7351 && symtab_hdr->contents != (unsigned char *) local_syms)
7352 {
7353 if (!info->keep_memory)
7354 free (local_syms);
7355 else
7356 symtab_hdr->contents = (unsigned char *) local_syms;
7357 }
7358 }
7359
754021d0
AM
7360 if (some_edited)
7361 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7362
3f764659
JJ
7363 /* If we are doing a final link and the last .opd entry is just 16 byte
7364 long, add a 8 byte padding after it. */
0e1862bb 7365 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7366 {
7367 bfd_byte *p;
7368
7369 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7370 {
7371 BFD_ASSERT (need_pad->size > 0);
7372
7373 p = bfd_malloc (need_pad->size + 8);
7374 if (p == NULL)
7375 return FALSE;
699733f6 7376
2cdcc330
AM
7377 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7378 p, 0, need_pad->size))
3f764659
JJ
7379 return FALSE;
7380
7381 need_pad->contents = p;
7382 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7383 }
7384 else
7385 {
7386 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7387 if (p == NULL)
7388 return FALSE;
7389
7390 need_pad->contents = p;
7391 }
7392
7393 memset (need_pad->contents + need_pad->size, 0, 8);
7394 need_pad->size += 8;
7395 }
7396
411e1bfb
AM
7397 return TRUE;
7398}
7399
3e04d765
AM
7400/* Analyze inline PLT call relocations to see whether calls to locally
7401 defined functions can be converted to direct calls. */
7402
7403bfd_boolean
7404ppc64_elf_inline_plt (struct bfd_link_info *info)
7405{
7406 struct ppc_link_hash_table *htab;
7407 bfd *ibfd;
7408 asection *sec;
7409 bfd_vma low_vma, high_vma, limit;
7410
7411 htab = ppc_hash_table (info);
7412 if (htab == NULL)
7413 return FALSE;
7414
7415 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7416 reduced somewhat to cater for possible stubs that might be added
7417 between the call and its destination. */
7418 if (htab->params->group_size < 0)
7419 {
7420 limit = -htab->params->group_size;
7421 if (limit == 1)
7422 limit = 0x1e00000;
7423 }
7424 else
7425 {
7426 limit = htab->params->group_size;
7427 if (limit == 1)
7428 limit = 0x1c00000;
7429 }
7430
7431 low_vma = -1;
7432 high_vma = 0;
7433 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7434 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7435 {
7436 if (low_vma > sec->vma)
7437 low_vma = sec->vma;
7438 if (high_vma < sec->vma + sec->size)
7439 high_vma = sec->vma + sec->size;
7440 }
7441
7442 /* If a "bl" can reach anywhere in local code sections, then we can
7443 convert all inline PLT sequences to direct calls when the symbol
7444 is local. */
7445 if (high_vma - low_vma < limit)
7446 {
7447 htab->can_convert_all_inline_plt = 1;
7448 return TRUE;
7449 }
7450
7451 /* Otherwise, go looking through relocs for cases where a direct
7452 call won't reach. Mark the symbol on any such reloc to disable
7453 the optimization and keep the PLT entry as it seems likely that
7454 this will be better than creating trampolines. Note that this
7455 will disable the optimization for all inline PLT calls to a
7456 particular symbol, not just those that won't reach. The
7457 difficulty in doing a more precise optimization is that the
7458 linker needs to make a decision depending on whether a
7459 particular R_PPC64_PLTCALL insn can be turned into a direct
7460 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7461 the sequence, and there is nothing that ties those relocs
7462 together except their symbol. */
7463
7464 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7465 {
7466 Elf_Internal_Shdr *symtab_hdr;
7467 Elf_Internal_Sym *local_syms;
7468
7469 if (!is_ppc64_elf (ibfd))
7470 continue;
7471
7472 local_syms = NULL;
7473 symtab_hdr = &elf_symtab_hdr (ibfd);
7474
7475 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7476 if (ppc64_elf_section_data (sec)->has_pltcall
7477 && !bfd_is_abs_section (sec->output_section))
7478 {
7479 Elf_Internal_Rela *relstart, *rel, *relend;
7480
7481 /* Read the relocations. */
7482 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7483 info->keep_memory);
7484 if (relstart == NULL)
7485 return FALSE;
7486
7487 relend = relstart + sec->reloc_count;
7488 for (rel = relstart; rel < relend; )
7489 {
7490 enum elf_ppc64_reloc_type r_type;
7491 unsigned long r_symndx;
7492 asection *sym_sec;
7493 struct elf_link_hash_entry *h;
7494 Elf_Internal_Sym *sym;
7495 unsigned char *tls_maskp;
7496
7497 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7498 if (r_type != R_PPC64_PLTCALL
7499 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7500 continue;
7501
7502 r_symndx = ELF64_R_SYM (rel->r_info);
7503 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7504 r_symndx, ibfd))
7505 {
7506 if (elf_section_data (sec)->relocs != relstart)
7507 free (relstart);
7508 if (local_syms != NULL
2cdcc330 7509 && symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7510 free (local_syms);
7511 return FALSE;
7512 }
7513
7514 if (sym_sec != NULL && sym_sec->output_section != NULL)
7515 {
7516 bfd_vma from, to;
7517 if (h != NULL)
7518 to = h->root.u.def.value;
7519 else
7520 to = sym->st_value;
7521 to += (rel->r_addend
7522 + sym_sec->output_offset
7523 + sym_sec->output_section->vma);
7524 from = (rel->r_offset
7525 + sec->output_offset
7526 + sec->output_section->vma);
5663e321
AM
7527 if (to - from + limit < 2 * limit
7528 && !(r_type == R_PPC64_PLTCALL_NOTOC
7529 && (((h ? h->other : sym->st_other)
7530 & STO_PPC64_LOCAL_MASK)
4a4e7361 7531 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7532 *tls_maskp &= ~PLT_KEEP;
7533 }
7534 }
7535 if (elf_section_data (sec)->relocs != relstart)
7536 free (relstart);
7537 }
7538
7539 if (local_syms != NULL
7540 && symtab_hdr->contents != (unsigned char *) local_syms)
7541 {
7542 if (!info->keep_memory)
7543 free (local_syms);
7544 else
7545 symtab_hdr->contents = (unsigned char *) local_syms;
7546 }
7547 }
7548
7549 return TRUE;
7550}
7551
e1918d23 7552/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7553
e1918d23 7554asection *
e7d1c40c 7555ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7556{
411e1bfb
AM
7557 struct ppc_link_hash_table *htab;
7558
411e1bfb 7559 htab = ppc_hash_table (info);
4dfe6ac6
NC
7560 if (htab == NULL)
7561 return NULL;
7562
ee67d69a
AM
7563 if (abiversion (info->output_bfd) == 1)
7564 htab->opd_abi = 1;
7565
e7d1c40c 7566 if (htab->params->no_multi_toc)
33c0ec9d
AM
7567 htab->do_multi_toc = 0;
7568 else if (!htab->do_multi_toc)
e7d1c40c 7569 htab->params->no_multi_toc = 1;
33c0ec9d 7570
8b5f1ed8
AM
7571 /* Default to --no-plt-localentry, as this option can cause problems
7572 with symbol interposition. For example, glibc libpthread.so and
7573 libc.so duplicate many pthread symbols, with a fallback
7574 implementation in libc.so. In some cases the fallback does more
7575 work than the pthread implementation. __pthread_condattr_destroy
7576 is one such symbol: the libpthread.so implementation is
7577 localentry:0 while the libc.so implementation is localentry:8.
7578 An app that "cleverly" uses dlopen to only load necessary
7579 libraries at runtime may omit loading libpthread.so when not
7580 running multi-threaded, which then results in the libc.so
7581 fallback symbols being used and ld.so complaining. Now there
7582 are workarounds in ld (see non_zero_localentry) to detect the
7583 pthread situation, but that may not be the only case where
7584 --plt-localentry can cause trouble. */
f378ab09 7585 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7586 htab->params->plt_localentry0 = 0;
d44c746a
AM
7587 if (htab->params->plt_localentry0
7588 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7589 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7590 _bfd_error_handler
7591 (_("warning: --plt-localentry is especially dangerous without "
7592 "ld.so support to detect ABI violations"));
f378ab09 7593
3a71aa26
AM
7594 htab->tls_get_addr = ((struct ppc_link_hash_entry *)
7595 elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7596 FALSE, FALSE, TRUE));
a7f2871e
AM
7597 /* Move dynamic linking info to the function descriptor sym. */
7598 if (htab->tls_get_addr != NULL)
7599 func_desc_adjust (&htab->tls_get_addr->elf, info);
3a71aa26
AM
7600 htab->tls_get_addr_fd = ((struct ppc_link_hash_entry *)
7601 elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7602 FALSE, FALSE, TRUE));
7c9cf415 7603 if (htab->params->tls_get_addr_opt)
a7f2871e
AM
7604 {
7605 struct elf_link_hash_entry *opt, *opt_fd, *tga, *tga_fd;
7606
7607 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7608 FALSE, FALSE, TRUE);
7609 if (opt != NULL)
7610 func_desc_adjust (opt, info);
7611 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7612 FALSE, FALSE, TRUE);
7613 if (opt_fd != NULL
7614 && (opt_fd->root.type == bfd_link_hash_defined
7615 || opt_fd->root.type == bfd_link_hash_defweak))
7616 {
7617 /* If glibc supports an optimized __tls_get_addr call stub,
7618 signalled by the presence of __tls_get_addr_opt, and we'll
7619 be calling __tls_get_addr via a plt call stub, then
7620 make __tls_get_addr point to __tls_get_addr_opt. */
7621 tga_fd = &htab->tls_get_addr_fd->elf;
7622 if (htab->elf.dynamic_sections_created
7623 && tga_fd != NULL
7624 && (tga_fd->type == STT_FUNC
7625 || tga_fd->needs_plt)
7626 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
21d68fcd 7627 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd)))
a7f2871e
AM
7628 {
7629 struct plt_entry *ent;
7630
7631 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7632 if (ent->plt.refcount > 0)
7633 break;
7634 if (ent != NULL)
7635 {
7636 tga_fd->root.type = bfd_link_hash_indirect;
7637 tga_fd->root.u.i.link = &opt_fd->root;
7638 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
b531344c 7639 opt_fd->mark = 1;
a7f2871e
AM
7640 if (opt_fd->dynindx != -1)
7641 {
7642 /* Use __tls_get_addr_opt in dynamic relocations. */
7643 opt_fd->dynindx = -1;
7644 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7645 opt_fd->dynstr_index);
7646 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7647 return NULL;
a7f2871e 7648 }
2cdcc330
AM
7649 htab->tls_get_addr_fd
7650 = (struct ppc_link_hash_entry *) opt_fd;
a7f2871e
AM
7651 tga = &htab->tls_get_addr->elf;
7652 if (opt != NULL && tga != NULL)
7653 {
7654 tga->root.type = bfd_link_hash_indirect;
7655 tga->root.u.i.link = &opt->root;
7656 ppc64_elf_copy_indirect_symbol (info, opt, tga);
b531344c 7657 opt->mark = 1;
a7f2871e
AM
7658 _bfd_elf_link_hash_hide_symbol (info, opt,
7659 tga->forced_local);
7660 htab->tls_get_addr = (struct ppc_link_hash_entry *) opt;
7661 }
7662 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7663 htab->tls_get_addr_fd->is_func_descriptor = 1;
7664 if (htab->tls_get_addr != NULL)
7665 {
7666 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7667 htab->tls_get_addr->is_func = 1;
7668 }
7669 }
7670 }
7671 }
7c9cf415
AM
7672 else if (htab->params->tls_get_addr_opt < 0)
7673 htab->params->tls_get_addr_opt = 0;
a7f2871e 7674 }
33c0ec9d 7675 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7676}
8387904d 7677
3a71aa26
AM
7678/* Return TRUE iff REL is a branch reloc with a global symbol matching
7679 HASH1 or HASH2. */
8387904d 7680
3a71aa26
AM
7681static bfd_boolean
7682branch_reloc_hash_match (const bfd *ibfd,
7683 const Elf_Internal_Rela *rel,
7684 const struct ppc_link_hash_entry *hash1,
7685 const struct ppc_link_hash_entry *hash2)
7686{
7687 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7688 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7689 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7690
e054468f 7691 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7692 {
3a71aa26
AM
7693 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7694 struct elf_link_hash_entry *h;
8387904d 7695
3a71aa26 7696 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7697 h = elf_follow_link (h);
3a71aa26
AM
7698 if (h == &hash1->elf || h == &hash2->elf)
7699 return TRUE;
a48ebf4d 7700 }
3a71aa26 7701 return FALSE;
951fd09b 7702}
411e1bfb 7703
951fd09b
AM
7704/* Run through all the TLS relocs looking for optimization
7705 opportunities. The linker has been hacked (see ppc64elf.em) to do
7706 a preliminary section layout so that we know the TLS segment
7707 offsets. We can't optimize earlier because some optimizations need
7708 to know the tp offset, and we need to optimize before allocating
7709 dynamic relocations. */
7710
7711bfd_boolean
33c0ec9d 7712ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7713{
7714 bfd *ibfd;
7715 asection *sec;
7716 struct ppc_link_hash_table *htab;
663a1470 7717 unsigned char *toc_ref;
102890f0 7718 int pass;
951fd09b 7719
3cbc1e5e 7720 if (!bfd_link_executable (info))
411e1bfb
AM
7721 return TRUE;
7722
951fd09b 7723 htab = ppc_hash_table (info);
4dfe6ac6
NC
7724 if (htab == NULL)
7725 return FALSE;
7726
663a1470
AM
7727 /* Make two passes over the relocs. On the first pass, mark toc
7728 entries involved with tls relocs, and check that tls relocs
7729 involved in setting up a tls_get_addr call are indeed followed by
7730 such a call. If they are not, we can't do any tls optimization.
7731 On the second pass twiddle tls_mask flags to notify
7732 relocate_section that optimization can be done, and adjust got
7733 and plt refcounts. */
7734 toc_ref = NULL;
7735 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7736 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7737 {
7738 Elf_Internal_Sym *locsyms = NULL;
7739 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7740
102890f0
AM
7741 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7742 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7743 {
7744 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7745 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7746
102890f0
AM
7747 /* Read the relocations. */
7748 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7749 info->keep_memory);
7750 if (relstart == NULL)
2915c55b
JK
7751 {
7752 free (toc_ref);
7753 return FALSE;
7754 }
411e1bfb 7755
102890f0
AM
7756 relend = relstart + sec->reloc_count;
7757 for (rel = relstart; rel < relend; rel++)
7758 {
7759 enum elf_ppc64_reloc_type r_type;
7760 unsigned long r_symndx;
7761 struct elf_link_hash_entry *h;
7762 Elf_Internal_Sym *sym;
7763 asection *sym_sec;
f961d9dd 7764 unsigned char *tls_mask;
46e9995a 7765 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7766 bfd_vma value;
7767 bfd_boolean ok_tprel, is_local;
7768 long toc_ref_index = 0;
7769 int expecting_tls_get_addr = 0;
663a1470 7770 bfd_boolean ret = FALSE;
411e1bfb 7771
102890f0
AM
7772 r_symndx = ELF64_R_SYM (rel->r_info);
7773 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7774 r_symndx, ibfd))
7775 {
7776 err_free_rel:
7777 if (elf_section_data (sec)->relocs != relstart)
7778 free (relstart);
7779 if (toc_ref != NULL)
7780 free (toc_ref);
7781 if (locsyms != NULL
0ffa91dd 7782 && (elf_symtab_hdr (ibfd).contents
102890f0
AM
7783 != (unsigned char *) locsyms))
7784 free (locsyms);
663a1470 7785 return ret;
102890f0 7786 }
411e1bfb 7787
102890f0
AM
7788 if (h != NULL)
7789 {
766bc656
AM
7790 if (h->root.type == bfd_link_hash_defined
7791 || h->root.type == bfd_link_hash_defweak)
7792 value = h->root.u.def.value;
7793 else if (h->root.type == bfd_link_hash_undefweak)
7794 value = 0;
7795 else
663a1470
AM
7796 {
7797 found_tls_get_addr_arg = 0;
7798 continue;
7799 }
102890f0
AM
7800 }
7801 else
7802 /* Symbols referenced by TLS relocs must be of type
7803 STT_TLS. So no need for .opd local sym adjust. */
7804 value = sym->st_value;
7805
7806 ok_tprel = FALSE;
f749f26e
AM
7807 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
7808 if (is_local)
102890f0 7809 {
766bc656
AM
7810 if (h != NULL
7811 && h->root.type == bfd_link_hash_undefweak)
7812 ok_tprel = TRUE;
c27b8c2a
AM
7813 else if (sym_sec != NULL
7814 && sym_sec->output_section != NULL)
766bc656
AM
7815 {
7816 value += sym_sec->output_offset;
7817 value += sym_sec->output_section->vma;
0b147428 7818 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
7819 /* Note that even though the prefix insns
7820 allow a 1<<33 offset we use the same test
7821 as for addis;addi. There may be a mix of
7822 pcrel and non-pcrel code and the decision
7823 to optimise is per symbol, not per TLS
7824 sequence. */
0b147428 7825 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 7826 }
102890f0 7827 }
951fd09b 7828
102890f0 7829 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
7830 /* If this section has old-style __tls_get_addr calls
7831 without marker relocs, then check that each
7832 __tls_get_addr call reloc is preceded by a reloc
7833 that conceivably belongs to the __tls_get_addr arg
7834 setup insn. If we don't find matching arg setup
7835 relocs, don't do any tls optimization. */
7836 if (pass == 0
9737e8af 7837 && sec->nomark_tls_get_addr
663a1470
AM
7838 && h != NULL
7839 && (h == &htab->tls_get_addr->elf
7840 || h == &htab->tls_get_addr_fd->elf)
7841 && !found_tls_get_addr_arg
7842 && is_branch_reloc (r_type))
7843 {
25f53a85 7844 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
7845 "TLS optimization disabled\n"),
7846 ibfd, sec, rel->r_offset);
7847 ret = TRUE;
7848 goto err_free_rel;
7849 }
7850
7851 found_tls_get_addr_arg = 0;
102890f0
AM
7852 switch (r_type)
7853 {
7854 case R_PPC64_GOT_TLSLD16:
7855 case R_PPC64_GOT_TLSLD16_LO:
c213164a 7856 case R_PPC64_GOT_TLSLD34:
102890f0 7857 expecting_tls_get_addr = 1;
663a1470 7858 found_tls_get_addr_arg = 1;
1a0670f3 7859 /* Fall through. */
102890f0
AM
7860
7861 case R_PPC64_GOT_TLSLD16_HI:
7862 case R_PPC64_GOT_TLSLD16_HA:
7863 /* These relocs should never be against a symbol
7864 defined in a shared lib. Leave them alone if
7865 that turns out to be the case. */
7866 if (!is_local)
7867 continue;
411e1bfb 7868
102890f0 7869 /* LD -> LE */
411e1bfb 7870 tls_set = 0;
102890f0
AM
7871 tls_clear = TLS_LD;
7872 tls_type = TLS_TLS | TLS_LD;
7873 break;
411e1bfb 7874
102890f0
AM
7875 case R_PPC64_GOT_TLSGD16:
7876 case R_PPC64_GOT_TLSGD16_LO:
c213164a 7877 case R_PPC64_GOT_TLSGD34:
102890f0 7878 expecting_tls_get_addr = 1;
663a1470 7879 found_tls_get_addr_arg = 1;
1a0670f3 7880 /* Fall through. */
102890f0
AM
7881
7882 case R_PPC64_GOT_TLSGD16_HI:
7883 case R_PPC64_GOT_TLSGD16_HA:
7884 if (ok_tprel)
7885 /* GD -> LE */
411e1bfb 7886 tls_set = 0;
102890f0
AM
7887 else
7888 /* GD -> IE */
b00a0a86 7889 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
7890 tls_clear = TLS_GD;
7891 tls_type = TLS_TLS | TLS_GD;
7892 break;
7893
c213164a 7894 case R_PPC64_GOT_TPREL34:
102890f0
AM
7895 case R_PPC64_GOT_TPREL16_DS:
7896 case R_PPC64_GOT_TPREL16_LO_DS:
7897 case R_PPC64_GOT_TPREL16_HI:
7898 case R_PPC64_GOT_TPREL16_HA:
7899 if (ok_tprel)
7900 {
7901 /* IE -> LE */
7902 tls_set = 0;
7903 tls_clear = TLS_TPREL;
7904 tls_type = TLS_TLS | TLS_TPREL;
7905 break;
7906 }
411e1bfb
AM
7907 continue;
7908
727fc41e 7909 case R_PPC64_TLSLD:
7d04a20a
AM
7910 if (!is_local)
7911 continue;
7912 /* Fall through. */
7913 case R_PPC64_TLSGD:
23cedd1d
AM
7914 if (rel + 1 < relend
7915 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
7916 {
7917 if (pass != 0
2cdcc330 7918 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
7919 != R_PPC64_PLTSEQ)
7920 && (ELF64_R_TYPE (rel[1].r_info)
7921 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
7922 {
7923 r_symndx = ELF64_R_SYM (rel[1].r_info);
7924 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 7925 r_symndx, ibfd))
23cedd1d
AM
7926 goto err_free_rel;
7927 if (h != NULL)
7928 {
7929 struct plt_entry *ent = NULL;
7930
7931 for (ent = h->plt.plist;
7932 ent != NULL;
7933 ent = ent->next)
7934 if (ent->addend == rel[1].r_addend)
7935 break;
7936
7937 if (ent != NULL
7938 && ent->plt.refcount > 0)
7939 ent->plt.refcount -= 1;
7940 }
7941 }
7942 continue;
7943 }
663a1470 7944 found_tls_get_addr_arg = 1;
1a0670f3 7945 /* Fall through. */
663a1470
AM
7946
7947 case R_PPC64_TLS:
7948 case R_PPC64_TOC16:
7949 case R_PPC64_TOC16_LO:
102890f0
AM
7950 if (sym_sec == NULL || sym_sec != toc)
7951 continue;
7952
7953 /* Mark this toc entry as referenced by a TLS
7954 code sequence. We can do that now in the
7955 case of R_PPC64_TLS, and after checking for
7956 tls_get_addr for the TOC16 relocs. */
7957 if (toc_ref == NULL)
2cdcc330
AM
7958 toc_ref
7959 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
7960 if (toc_ref == NULL)
7961 goto err_free_rel;
7962
102890f0
AM
7963 if (h != NULL)
7964 value = h->root.u.def.value;
7965 else
7966 value = sym->st_value;
7967 value += rel->r_addend;
73242275
AM
7968 if (value % 8 != 0)
7969 continue;
7970 BFD_ASSERT (value < toc->size
7971 && toc->output_offset % 8 == 0);
663a1470 7972 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
7973 if (r_type == R_PPC64_TLS
7974 || r_type == R_PPC64_TLSGD
7975 || r_type == R_PPC64_TLSLD)
102890f0
AM
7976 {
7977 toc_ref[toc_ref_index] = 1;
7978 continue;
7979 }
7980
7981 if (pass != 0 && toc_ref[toc_ref_index] == 0)
7982 continue;
7983
7984 tls_set = 0;
7985 tls_clear = 0;
7986 expecting_tls_get_addr = 2;
7987 break;
7988
7989 case R_PPC64_TPREL64:
7990 if (pass == 0
7991 || sec != toc
7992 || toc_ref == NULL
663a1470 7993 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
7994 continue;
7995 if (ok_tprel)
7996 {
7997 /* IE -> LE */
7998 tls_set = TLS_EXPLICIT;
7999 tls_clear = TLS_TPREL;
8000 break;
8001 }
8002 continue;
8003
8004 case R_PPC64_DTPMOD64:
8005 if (pass == 0
8006 || sec != toc
8007 || toc_ref == NULL
663a1470 8008 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8009 continue;
8010 if (rel + 1 < relend
8011 && (rel[1].r_info
8012 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8013 && rel[1].r_offset == rel->r_offset + 8)
8014 {
8015 if (ok_tprel)
8016 /* GD -> LE */
8017 tls_set = TLS_EXPLICIT | TLS_GD;
8018 else
8019 /* GD -> IE */
b00a0a86 8020 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8021 tls_clear = TLS_GD;
8022 }
8023 else
8024 {
8025 if (!is_local)
8026 continue;
8027
8028 /* LD -> LE */
8029 tls_set = TLS_EXPLICIT;
8030 tls_clear = TLS_LD;
8031 }
8032 break;
8033
8034 default:
8035 continue;
8036 }
8037
8038 if (pass == 0)
8039 {
727fc41e 8040 if (!expecting_tls_get_addr
9737e8af 8041 || !sec->nomark_tls_get_addr)
102890f0
AM
8042 continue;
8043
3a71aa26
AM
8044 if (rel + 1 < relend
8045 && branch_reloc_hash_match (ibfd, rel + 1,
8046 htab->tls_get_addr,
8047 htab->tls_get_addr_fd))
102890f0 8048 {
3a71aa26 8049 if (expecting_tls_get_addr == 2)
102890f0 8050 {
3a71aa26 8051 /* Check for toc tls entries. */
f961d9dd 8052 unsigned char *toc_tls;
3a71aa26
AM
8053 int retval;
8054
8055 retval = get_tls_mask (&toc_tls, NULL, NULL,
8056 &locsyms,
8057 rel, ibfd);
8058 if (retval == 0)
8059 goto err_free_rel;
663a1470
AM
8060 if (toc_tls != NULL)
8061 {
37da22e5
AM
8062 if ((*toc_tls & TLS_TLS) != 0
8063 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8064 found_tls_get_addr_arg = 1;
8065 if (retval > 1)
8066 toc_ref[toc_ref_index] = 1;
8067 }
102890f0 8068 }
3a71aa26 8069 continue;
102890f0
AM
8070 }
8071
102890f0
AM
8072 /* Uh oh, we didn't find the expected call. We
8073 could just mark this symbol to exclude it
8074 from tls optimization but it's safer to skip
663a1470 8075 the entire optimization. */
695344c0 8076 /* xgettext:c-format */
25f53a85 8077 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8078 "TLS optimization disabled\n"),
8079 ibfd, sec, rel->r_offset);
8080 ret = TRUE;
8081 goto err_free_rel;
102890f0
AM
8082 }
8083
37da22e5
AM
8084 /* If we don't have old-style __tls_get_addr calls
8085 without TLSGD/TLSLD marker relocs, and we haven't
8086 found a new-style __tls_get_addr call with a
8087 marker for this symbol, then we either have a
8088 broken object file or an -mlongcall style
8089 indirect call to __tls_get_addr without a marker.
8090 Disable optimization in this case. */
8091 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8092 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8093 && !sec->nomark_tls_get_addr
37da22e5
AM
8094 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8095 != (TLS_TLS | TLS_MARK)))
8096 continue;
8097
7d04a20a 8098 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8099 {
23cedd1d
AM
8100 struct plt_entry *ent = NULL;
8101
8102 if (htab->tls_get_addr != NULL)
8103 for (ent = htab->tls_get_addr->elf.plt.plist;
8104 ent != NULL;
8105 ent = ent->next)
8106 if (ent->addend == 0)
102890f0 8107 break;
411e1bfb 8108
23cedd1d
AM
8109 if (ent == NULL && htab->tls_get_addr_fd != NULL)
8110 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8111 ent != NULL;
8112 ent = ent->next)
8113 if (ent->addend == 0)
102890f0 8114 break;
23cedd1d
AM
8115
8116 if (ent != NULL
8117 && ent->plt.refcount > 0)
8118 ent->plt.refcount -= 1;
102890f0 8119 }
411e1bfb 8120
102890f0 8121 if (tls_clear == 0)
30038c59
AM
8122 continue;
8123
102890f0
AM
8124 if ((tls_set & TLS_EXPLICIT) == 0)
8125 {
8126 struct got_entry *ent;
411e1bfb 8127
102890f0
AM
8128 /* Adjust got entry for this reloc. */
8129 if (h != NULL)
8130 ent = h->got.glist;
8131 else
8132 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8133
102890f0
AM
8134 for (; ent != NULL; ent = ent->next)
8135 if (ent->addend == rel->r_addend
8136 && ent->owner == ibfd
8137 && ent->tls_type == tls_type)
8138 break;
8139 if (ent == NULL)
8140 abort ();
411e1bfb 8141
102890f0
AM
8142 if (tls_set == 0)
8143 {
8144 /* We managed to get rid of a got entry. */
8145 if (ent->got.refcount > 0)
8146 ent->got.refcount -= 1;
8147 }
8148 }
8149 else
8150 {
8151 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8152 we'll lose one or two dyn relocs. */
8153 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8154 NULL, h, sym))
102890f0 8155 return FALSE;
411e1bfb 8156
102890f0
AM
8157 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8158 {
8159 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8160 NULL, h, sym))
102890f0
AM
8161 return FALSE;
8162 }
8163 }
411e1bfb 8164
46e9995a 8165 *tls_mask |= tls_set & 0xff;
102890f0
AM
8166 *tls_mask &= ~tls_clear;
8167 }
8c1d1bb8 8168
102890f0
AM
8169 if (elf_section_data (sec)->relocs != relstart)
8170 free (relstart);
8171 }
411e1bfb 8172
663a1470
AM
8173 if (locsyms != NULL
8174 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8175 {
8176 if (!info->keep_memory)
8177 free (locsyms);
8178 else
8179 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8180 }
8181 }
411e1bfb 8182
663a1470
AM
8183 if (toc_ref != NULL)
8184 free (toc_ref);
9a23f96e 8185 htab->do_tls_opt = 1;
b34976b6 8186 return TRUE;
1e2f5b6e 8187}
b34976b6 8188
c5614fa4
AM
8189/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8190 the values of any global symbols in a toc section that has been
8191 edited. Globals in toc sections should be a rarity, so this function
8192 sets a flag if any are found in toc sections other than the one just
de194d85 8193 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8194
8195struct adjust_toc_info
8196{
8197 asection *toc;
8198 unsigned long *skip;
8199 bfd_boolean global_toc_syms;
8200};
8201
ba761f19
AM
8202enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8203
c5614fa4
AM
8204static bfd_boolean
8205adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8206{
8207 struct ppc_link_hash_entry *eh;
8208 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8209 unsigned long i;
c5614fa4 8210
c5614fa4
AM
8211 if (h->root.type != bfd_link_hash_defined
8212 && h->root.type != bfd_link_hash_defweak)
8213 return TRUE;
8214
8215 eh = (struct ppc_link_hash_entry *) h;
8216 if (eh->adjust_done)
8217 return TRUE;
8218
8219 if (eh->elf.root.u.def.section == toc_inf->toc)
8220 {
854b41e7
AM
8221 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8222 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8223 else
854b41e7
AM
8224 i = eh->elf.root.u.def.value >> 3;
8225
ba761f19 8226 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8227 {
4eca0228 8228 _bfd_error_handler
854b41e7
AM
8229 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8230 do
8231 ++i;
ba761f19 8232 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8233 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8234 }
854b41e7
AM
8235
8236 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8237 eh->adjust_done = 1;
8238 }
8239 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8240 toc_inf->global_toc_syms = TRUE;
8241
8242 return TRUE;
8243}
8244
39eeab25
AM
8245/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8246 on a _LO variety toc/got reloc. */
560c8763
AM
8247
8248static bfd_boolean
39eeab25 8249ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8250{
39eeab25
AM
8251 return ((insn & (0x3f << 26)) == 12u << 26 /* addic */
8252 || (insn & (0x3f << 26)) == 14u << 26 /* addi */
560c8763
AM
8253 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8254 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8255 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8256 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8257 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8258 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8259 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8260 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8261 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8262 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8263 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8264 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8265 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
39eeab25
AM
8266 || (insn & (0x3f << 26)) == 56u << 26 /* lq,lfq */
8267 || ((insn & (0x3f << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
8268 /* Exclude lfqu by testing reloc. If relocs are ever
8269 defined for the reduced D field in psq_lu then those
8270 will need testing too. */
8271 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8272 || ((insn & (0x3f << 26)) == 58u << 26 /* ld,lwa */
8273 && (insn & 1) == 0)
8274 || (insn & (0x3f << 26)) == 60u << 26 /* stfq */
8275 || ((insn & (0x3f << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
8276 /* Exclude stfqu. psq_stu as above for psq_lu. */
8277 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
8278 || ((insn & (0x3f << 26)) == 62u << 26 /* std,stq */
8279 && (insn & 1) == 0));
560c8763
AM
8280}
8281
4a421c53
AM
8282/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8283 pld ra,symbol@got@pcrel
dd9b12c2 8284 load/store rt,off(ra)
4a421c53 8285 or
d4b87b1e 8286 pla ra,symbol@pcrel
dd9b12c2 8287 load/store rt,off(ra)
4a421c53 8288 may be translated to
dd9b12c2 8289 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8290 nop.
8291 This function returns true if the optimization is possible, placing
dd9b12c2 8292 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8293
8294 On entry to this function, the linker has already determined that
d4b87b1e 8295 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8296 while *PINSN2 is the second instruction. */
8297
8298static bfd_boolean
dd9b12c2 8299xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8300{
77486630
AM
8301 uint64_t insn1 = *pinsn1;
8302 uint64_t insn2 = *pinsn2;
dd9b12c2 8303 bfd_signed_vma off;
4a421c53 8304
77486630
AM
8305 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8306 {
8307 /* Check that regs match. */
8308 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8309 return FALSE;
8310
8311 /* P8LS or PMLS form, non-pcrel. */
8312 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8313 return FALSE;
8314
8315 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8316 *pinsn2 = PNOP;
8317 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8318 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8319 return TRUE;
8320 }
8321
8322 insn2 >>= 32;
8323
4a421c53 8324 /* Check that regs match. */
77486630 8325 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8326 return FALSE;
8327
8328 switch ((insn2 >> 26) & 63)
8329 {
8330 default:
8331 return FALSE;
8332
8333 case 32: /* lwz */
8334 case 34: /* lbz */
8335 case 36: /* stw */
8336 case 38: /* stb */
8337 case 40: /* lhz */
8338 case 42: /* lha */
8339 case 44: /* sth */
8340 case 48: /* lfs */
8341 case 50: /* lfd */
8342 case 52: /* stfs */
8343 case 54: /* stfd */
8344 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8345 on the insn. */
77486630 8346 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8347 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8348 off = insn2 & 0xffff;
4a421c53
AM
8349 break;
8350
8351 case 58: /* lwa, ld */
dd9b12c2 8352 if ((insn2 & 1) != 0)
4a421c53 8353 return FALSE;
77486630 8354 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8355 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8356 | (insn2 & (31ULL << 21)));
dd9b12c2 8357 off = insn2 & 0xfffc;
4a421c53
AM
8358 break;
8359
8360 case 57: /* lxsd, lxssp */
dd9b12c2 8361 if ((insn2 & 3) < 2)
4a421c53 8362 return FALSE;
77486630 8363 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8364 | ((40ULL | (insn2 & 3)) << 26)
8365 | (insn2 & (31ULL << 21)));
dd9b12c2 8366 off = insn2 & 0xfffc;
4a421c53
AM
8367 break;
8368
8369 case 61: /* stxsd, stxssp, lxv, stxv */
8370 if ((insn2 & 3) == 0)
8371 return FALSE;
8372 else if ((insn2 & 3) >= 2)
8373 {
77486630 8374 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8375 | ((44ULL | (insn2 & 3)) << 26)
8376 | (insn2 & (31ULL << 21)));
dd9b12c2 8377 off = insn2 & 0xfffc;
4a421c53
AM
8378 }
8379 else
8380 {
77486630 8381 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8382 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8383 | (insn2 & (31ULL << 21)));
dd9b12c2 8384 off = insn2 & 0xfff0;
4a421c53
AM
8385 }
8386 break;
8387
8388 case 56: /* lq */
77486630 8389 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8390 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8391 off = insn2 & 0xffff;
4a421c53
AM
8392 break;
8393
8394 case 62: /* std, stq */
dd9b12c2 8395 if ((insn2 & 1) != 0)
4a421c53 8396 return FALSE;
77486630 8397 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8398 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8399 | (insn2 & (31ULL << 21)));
dd9b12c2 8400 off = insn2 & 0xfffc;
4a421c53
AM
8401 break;
8402 }
8403
77486630 8404 *pinsn1 = insn1;
4a421c53 8405 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8406 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8407 return TRUE;
8408}
8409
c5614fa4
AM
8410/* Examine all relocs referencing .toc sections in order to remove
8411 unused .toc entries. */
8412
8413bfd_boolean
33c0ec9d 8414ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8415{
8416 bfd *ibfd;
8417 struct adjust_toc_info toc_inf;
67f0cbdb 8418 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8419
67f0cbdb 8420 htab->do_toc_opt = 1;
c5614fa4 8421 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8422 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8423 {
8424 asection *toc, *sec;
8425 Elf_Internal_Shdr *symtab_hdr;
8426 Elf_Internal_Sym *local_syms;
425b145b 8427 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8428 unsigned long *skip, *drop;
8429 unsigned char *used;
8430 unsigned char *keep, last, some_unused;
8431
854b41e7
AM
8432 if (!is_ppc64_elf (ibfd))
8433 continue;
8434
c5614fa4
AM
8435 toc = bfd_get_section_by_name (ibfd, ".toc");
8436 if (toc == NULL
92b7a70f 8437 || toc->size == 0
dbaa2011
AM
8438 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8439 || discarded_section (toc))
c5614fa4
AM
8440 continue;
8441
425b145b 8442 toc_relocs = NULL;
c5614fa4 8443 local_syms = NULL;
0ffa91dd 8444 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8445
8446 /* Look at sections dropped from the final link. */
8447 skip = NULL;
8448 relstart = NULL;
8449 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8450 {
8451 if (sec->reloc_count == 0
dbaa2011 8452 || !discarded_section (sec)
c5614fa4
AM
8453 || get_opd_info (sec)
8454 || (sec->flags & SEC_ALLOC) == 0
8455 || (sec->flags & SEC_DEBUGGING) != 0)
8456 continue;
8457
8458 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8459 if (relstart == NULL)
8460 goto error_ret;
8461
8462 /* Run through the relocs to see which toc entries might be
8463 unused. */
8464 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8465 {
8466 enum elf_ppc64_reloc_type r_type;
8467 unsigned long r_symndx;
8468 asection *sym_sec;
8469 struct elf_link_hash_entry *h;
8470 Elf_Internal_Sym *sym;
8471 bfd_vma val;
8472
8473 r_type = ELF64_R_TYPE (rel->r_info);
8474 switch (r_type)
8475 {
8476 default:
8477 continue;
8478
8479 case R_PPC64_TOC16:
8480 case R_PPC64_TOC16_LO:
8481 case R_PPC64_TOC16_HI:
8482 case R_PPC64_TOC16_HA:
8483 case R_PPC64_TOC16_DS:
8484 case R_PPC64_TOC16_LO_DS:
8485 break;
8486 }
8487
8488 r_symndx = ELF64_R_SYM (rel->r_info);
8489 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8490 r_symndx, ibfd))
8491 goto error_ret;
8492
8493 if (sym_sec != toc)
8494 continue;
8495
8496 if (h != NULL)
8497 val = h->root.u.def.value;
8498 else
8499 val = sym->st_value;
8500 val += rel->r_addend;
8501
8502 if (val >= toc->size)
8503 continue;
8504
8505 /* Anything in the toc ought to be aligned to 8 bytes.
8506 If not, don't mark as unused. */
8507 if (val & 7)
8508 continue;
8509
8510 if (skip == NULL)
8511 {
854b41e7 8512 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8513 if (skip == NULL)
8514 goto error_ret;
8515 }
8516
ba761f19 8517 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8518 }
8519
8520 if (elf_section_data (sec)->relocs != relstart)
8521 free (relstart);
8522 }
8523
ba761f19
AM
8524 /* For largetoc loads of address constants, we can convert
8525 . addis rx,2,addr@got@ha
8526 . ld ry,addr@got@l(rx)
8527 to
8528 . addis rx,2,addr@toc@ha
8529 . addi ry,rx,addr@toc@l
8530 when addr is within 2G of the toc pointer. This then means
8531 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8532
ba761f19
AM
8533 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8534 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8535 && toc->reloc_count != 0)
8536 {
8537 /* Read toc relocs. */
425b145b
AM
8538 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8539 info->keep_memory);
8540 if (toc_relocs == NULL)
ba761f19
AM
8541 goto error_ret;
8542
425b145b 8543 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8544 {
8545 enum elf_ppc64_reloc_type r_type;
8546 unsigned long r_symndx;
8547 asection *sym_sec;
8548 struct elf_link_hash_entry *h;
8549 Elf_Internal_Sym *sym;
8550 bfd_vma val, addr;
8551
8552 r_type = ELF64_R_TYPE (rel->r_info);
8553 if (r_type != R_PPC64_ADDR64)
8554 continue;
8555
8556 r_symndx = ELF64_R_SYM (rel->r_info);
8557 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8558 r_symndx, ibfd))
8559 goto error_ret;
8560
425b145b 8561 if (sym_sec == NULL
c27b8c2a 8562 || sym_sec->output_section == NULL
dbaa2011 8563 || discarded_section (sym_sec))
425b145b
AM
8564 continue;
8565
afe397ea 8566 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8567 continue;
8568
8569 if (h != NULL)
bddc25c9
AM
8570 {
8571 if (h->type == STT_GNU_IFUNC)
8572 continue;
8573 val = h->root.u.def.value;
8574 }
ba761f19 8575 else
bddc25c9
AM
8576 {
8577 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8578 continue;
8579 val = sym->st_value;
8580 }
ba761f19
AM
8581 val += rel->r_addend;
8582 val += sym_sec->output_section->vma + sym_sec->output_offset;
8583
8584 /* We don't yet know the exact toc pointer value, but we
8585 know it will be somewhere in the toc section. Don't
8586 optimize if the difference from any possible toc
8587 pointer is outside [ff..f80008000, 7fff7fff]. */
8588 addr = toc->output_section->vma + TOC_BASE_OFF;
8589 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8590 continue;
8591
8592 addr = toc->output_section->vma + toc->output_section->rawsize;
8593 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8594 continue;
8595
8596 if (skip == NULL)
8597 {
8598 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8599 if (skip == NULL)
8600 goto error_ret;
8601 }
8602
8603 skip[rel->r_offset >> 3]
425b145b 8604 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8605 }
ba761f19
AM
8606 }
8607
c5614fa4
AM
8608 if (skip == NULL)
8609 continue;
8610
8611 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8612 if (used == NULL)
8613 {
8614 error_ret:
8615 if (local_syms != NULL
8616 && symtab_hdr->contents != (unsigned char *) local_syms)
8617 free (local_syms);
8618 if (sec != NULL
8619 && relstart != NULL
8620 && elf_section_data (sec)->relocs != relstart)
8621 free (relstart);
425b145b
AM
8622 if (toc_relocs != NULL
8623 && elf_section_data (toc)->relocs != toc_relocs)
8624 free (toc_relocs);
c5614fa4
AM
8625 if (skip != NULL)
8626 free (skip);
8627 return FALSE;
8628 }
8629
30038c59
AM
8630 /* Now check all kept sections that might reference the toc.
8631 Check the toc itself last. */
8632 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8633 : ibfd->sections);
c5614fa4 8634 sec != NULL;
c5614fa4 8635 sec = (sec == toc ? NULL
c5614fa4 8636 : sec->next == NULL ? toc
30038c59 8637 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8638 : sec->next))
8639 {
8640 int repeat;
8641
8642 if (sec->reloc_count == 0
dbaa2011 8643 || discarded_section (sec)
c5614fa4
AM
8644 || get_opd_info (sec)
8645 || (sec->flags & SEC_ALLOC) == 0
8646 || (sec->flags & SEC_DEBUGGING) != 0)
8647 continue;
8648
854b41e7
AM
8649 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8650 info->keep_memory);
c5614fa4 8651 if (relstart == NULL)
2915c55b
JK
8652 {
8653 free (used);
8654 goto error_ret;
8655 }
c5614fa4
AM
8656
8657 /* Mark toc entries referenced as used. */
c5614fa4 8658 do
d4f1ee75
AM
8659 {
8660 repeat = 0;
8661 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8662 {
8663 enum elf_ppc64_reloc_type r_type;
8664 unsigned long r_symndx;
8665 asection *sym_sec;
8666 struct elf_link_hash_entry *h;
8667 Elf_Internal_Sym *sym;
8668 bfd_vma val;
98528052 8669
d4f1ee75 8670 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8671 switch (r_type)
8672 {
8673 case R_PPC64_TOC16:
8674 case R_PPC64_TOC16_LO:
8675 case R_PPC64_TOC16_HI:
8676 case R_PPC64_TOC16_HA:
8677 case R_PPC64_TOC16_DS:
8678 case R_PPC64_TOC16_LO_DS:
8679 /* In case we're taking addresses of toc entries. */
8680 case R_PPC64_ADDR64:
8681 break;
c5614fa4 8682
d4f1ee75
AM
8683 default:
8684 continue;
8685 }
c5614fa4 8686
d4f1ee75
AM
8687 r_symndx = ELF64_R_SYM (rel->r_info);
8688 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8689 r_symndx, ibfd))
8690 {
8691 free (used);
8692 goto error_ret;
8693 }
c5614fa4 8694
d4f1ee75
AM
8695 if (sym_sec != toc)
8696 continue;
c5614fa4 8697
d4f1ee75
AM
8698 if (h != NULL)
8699 val = h->root.u.def.value;
8700 else
8701 val = sym->st_value;
8702 val += rel->r_addend;
ba761f19 8703
d4f1ee75
AM
8704 if (val >= toc->size)
8705 continue;
ba761f19 8706
d4f1ee75
AM
8707 if ((skip[val >> 3] & can_optimize) != 0)
8708 {
8709 bfd_vma off;
8710 unsigned char opc;
8711
8712 switch (r_type)
8713 {
8714 case R_PPC64_TOC16_HA:
ba761f19 8715 break;
ba761f19 8716
d4f1ee75
AM
8717 case R_PPC64_TOC16_LO_DS:
8718 off = rel->r_offset;
8719 off += (bfd_big_endian (ibfd) ? -2 : 3);
8720 if (!bfd_get_section_contents (ibfd, sec, &opc,
8721 off, 1))
8722 {
8723 free (used);
8724 goto error_ret;
8725 }
8726 if ((opc & (0x3f << 2)) == (58u << 2))
8727 break;
1a0670f3 8728 /* Fall through. */
ba761f19 8729
d4f1ee75
AM
8730 default:
8731 /* Wrong sort of reloc, or not a ld. We may
8732 as well clear ref_from_discarded too. */
8733 skip[val >> 3] = 0;
8734 }
8735 }
8736
8737 if (sec != toc)
8738 used[val >> 3] = 1;
8739 /* For the toc section, we only mark as used if this
8740 entry itself isn't unused. */
8741 else if ((used[rel->r_offset >> 3]
8742 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8743 && !used[val >> 3])
8744 {
8745 /* Do all the relocs again, to catch reference
8746 chains. */
8747 repeat = 1;
8748 used[val >> 3] = 1;
8749 }
8750 }
8751 }
c5614fa4 8752 while (repeat);
854b41e7
AM
8753
8754 if (elf_section_data (sec)->relocs != relstart)
8755 free (relstart);
c5614fa4
AM
8756 }
8757
8758 /* Merge the used and skip arrays. Assume that TOC
8759 doublewords not appearing as either used or unused belong
de194d85 8760 to an entry more than one doubleword in size. */
c5614fa4
AM
8761 for (drop = skip, keep = used, last = 0, some_unused = 0;
8762 drop < skip + (toc->size + 7) / 8;
8763 ++drop, ++keep)
8764 {
8765 if (*keep)
8766 {
ba761f19
AM
8767 *drop &= ~ref_from_discarded;
8768 if ((*drop & can_optimize) != 0)
8769 some_unused = 1;
c5614fa4
AM
8770 last = 0;
8771 }
b140b010 8772 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
8773 {
8774 some_unused = 1;
ba761f19 8775 last = ref_from_discarded;
c5614fa4
AM
8776 }
8777 else
8778 *drop = last;
8779 }
8780
8781 free (used);
8782
8783 if (some_unused)
8784 {
8785 bfd_byte *contents, *src;
8786 unsigned long off;
d62b3684 8787 Elf_Internal_Sym *sym;
ba761f19 8788 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
8789
8790 /* Shuffle the toc contents, and at the same time convert the
8791 skip array from booleans into offsets. */
8792 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
8793 goto error_ret;
8794
8795 elf_section_data (toc)->this_hdr.contents = contents;
8796
8797 for (src = contents, off = 0, drop = skip;
8798 src < contents + toc->size;
8799 src += 8, ++drop)
8800 {
ba761f19
AM
8801 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
8802 off += 8;
c5614fa4
AM
8803 else if (off != 0)
8804 {
8805 *drop = off;
8806 memcpy (src - off, src, 8);
8807 }
8808 }
854b41e7 8809 *drop = off;
c5614fa4
AM
8810 toc->rawsize = toc->size;
8811 toc->size = src - contents - off;
8812
ba761f19
AM
8813 /* Adjust addends for relocs against the toc section sym,
8814 and optimize any accesses we can. */
c5614fa4
AM
8815 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8816 {
8817 if (sec->reloc_count == 0
dbaa2011 8818 || discarded_section (sec))
c5614fa4
AM
8819 continue;
8820
8821 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 8822 info->keep_memory);
c5614fa4
AM
8823 if (relstart == NULL)
8824 goto error_ret;
8825
8826 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8827 {
8828 enum elf_ppc64_reloc_type r_type;
8829 unsigned long r_symndx;
8830 asection *sym_sec;
8831 struct elf_link_hash_entry *h;
854b41e7 8832 bfd_vma val;
c5614fa4
AM
8833
8834 r_type = ELF64_R_TYPE (rel->r_info);
8835 switch (r_type)
8836 {
8837 default:
8838 continue;
8839
8840 case R_PPC64_TOC16:
8841 case R_PPC64_TOC16_LO:
8842 case R_PPC64_TOC16_HI:
8843 case R_PPC64_TOC16_HA:
8844 case R_PPC64_TOC16_DS:
8845 case R_PPC64_TOC16_LO_DS:
8846 case R_PPC64_ADDR64:
8847 break;
8848 }
8849
8850 r_symndx = ELF64_R_SYM (rel->r_info);
8851 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8852 r_symndx, ibfd))
8853 goto error_ret;
8854
ba761f19 8855 if (sym_sec != toc)
c5614fa4
AM
8856 continue;
8857
ba761f19
AM
8858 if (h != NULL)
8859 val = h->root.u.def.value;
8860 else
8861 {
8862 val = sym->st_value;
8863 if (val != 0)
8864 local_toc_syms = TRUE;
8865 }
8866
8867 val += rel->r_addend;
854b41e7
AM
8868
8869 if (val > toc->rawsize)
8870 val = toc->rawsize;
ba761f19
AM
8871 else if ((skip[val >> 3] & ref_from_discarded) != 0)
8872 continue;
8873 else if ((skip[val >> 3] & can_optimize) != 0)
8874 {
8875 Elf_Internal_Rela *tocrel
425b145b 8876 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
8877 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
8878
8879 switch (r_type)
8880 {
8881 case R_PPC64_TOC16_HA:
8882 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
8883 break;
8884
8885 case R_PPC64_TOC16_LO_DS:
8886 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
8887 break;
8888
8889 default:
28942f62
AM
8890 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
8891 ppc_howto_init ();
b140b010 8892 info->callbacks->einfo
695344c0 8893 /* xgettext:c-format */
174d0a74 8894 (_("%H: %s references "
b140b010
AM
8895 "optimized away TOC entry\n"),
8896 ibfd, sec, rel->r_offset,
8897 ppc64_elf_howto_table[r_type]->name);
8898 bfd_set_error (bfd_error_bad_value);
8899 goto error_ret;
ba761f19
AM
8900 }
8901 rel->r_addend = tocrel->r_addend;
8902 elf_section_data (sec)->relocs = relstart;
8903 continue;
8904 }
8905
8906 if (h != NULL || sym->st_value != 0)
8907 continue;
854b41e7
AM
8908
8909 rel->r_addend -= skip[val >> 3];
8910 elf_section_data (sec)->relocs = relstart;
c5614fa4 8911 }
854b41e7
AM
8912
8913 if (elf_section_data (sec)->relocs != relstart)
8914 free (relstart);
c5614fa4
AM
8915 }
8916
8917 /* We shouldn't have local or global symbols defined in the TOC,
8918 but handle them anyway. */
df22d223
AM
8919 if (local_syms != NULL)
8920 for (sym = local_syms;
8921 sym < local_syms + symtab_hdr->sh_info;
8922 ++sym)
8923 if (sym->st_value != 0
8924 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
8925 {
8926 unsigned long i;
854b41e7 8927
df22d223
AM
8928 if (sym->st_value > toc->rawsize)
8929 i = toc->rawsize >> 3;
8930 else
8931 i = sym->st_value >> 3;
854b41e7 8932
df22d223
AM
8933 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
8934 {
8935 if (local_toc_syms)
4eca0228 8936 _bfd_error_handler
df22d223
AM
8937 (_("%s defined on removed toc entry"),
8938 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
8939 do
8940 ++i;
8941 while ((skip[i] & (ref_from_discarded | can_optimize)));
8942 sym->st_value = (bfd_vma) i << 3;
8943 }
d62b3684 8944
df22d223
AM
8945 sym->st_value -= skip[i];
8946 symtab_hdr->contents = (unsigned char *) local_syms;
8947 }
c5614fa4 8948
854b41e7 8949 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
8950 if (toc_inf.global_toc_syms)
8951 {
8952 toc_inf.toc = toc;
8953 toc_inf.skip = skip;
8954 toc_inf.global_toc_syms = FALSE;
8955 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
8956 &toc_inf);
8957 }
854b41e7
AM
8958
8959 if (toc->reloc_count != 0)
8960 {
d4730f92 8961 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
8962 Elf_Internal_Rela *wrel;
8963 bfd_size_type sz;
8964
854b41e7 8965 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
8966 if (toc_relocs == NULL)
8967 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8968 info->keep_memory);
8969 if (toc_relocs == NULL)
8970 goto error_ret;
8971
425b145b
AM
8972 wrel = toc_relocs;
8973 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8974 if ((skip[rel->r_offset >> 3]
8975 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
8976 {
8977 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
8978 wrel->r_info = rel->r_info;
8979 wrel->r_addend = rel->r_addend;
8980 ++wrel;
8981 }
8982 else if (!dec_dynrel_count (rel->r_info, toc, info,
8983 &local_syms, NULL, NULL))
8984 goto error_ret;
8985
425b145b
AM
8986 elf_section_data (toc)->relocs = toc_relocs;
8987 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
8988 rel_hdr = _bfd_elf_single_rel_hdr (toc);
8989 sz = rel_hdr->sh_entsize;
8990 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 8991 }
c5614fa4 8992 }
28be611c
AM
8993 else if (toc_relocs != NULL
8994 && elf_section_data (toc)->relocs != toc_relocs)
425b145b 8995 free (toc_relocs);
c5614fa4
AM
8996
8997 if (local_syms != NULL
8998 && symtab_hdr->contents != (unsigned char *) local_syms)
8999 {
9000 if (!info->keep_memory)
9001 free (local_syms);
9002 else
9003 symtab_hdr->contents = (unsigned char *) local_syms;
9004 }
9005 free (skip);
9006 }
9007
066f4018 9008 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9009 a GOT relative or PC relative access, possibly reducing the
9010 number of GOT entries. */
066f4018
AM
9011 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9012 {
9013 asection *sec;
9014 Elf_Internal_Shdr *symtab_hdr;
9015 Elf_Internal_Sym *local_syms;
9016 Elf_Internal_Rela *relstart, *rel;
9017 bfd_vma got;
9018
9019 if (!is_ppc64_elf (ibfd))
9020 continue;
9021
903b777d 9022 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9023 continue;
9024
9025 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9026 got = 0;
9027 if (sec != NULL)
9028 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9029
9030 local_syms = NULL;
9031 symtab_hdr = &elf_symtab_hdr (ibfd);
9032
9033 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9034 {
9035 if (sec->reloc_count == 0
903b777d 9036 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9037 || discarded_section (sec))
9038 continue;
9039
9040 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9041 info->keep_memory);
9042 if (relstart == NULL)
9043 {
9044 got_error_ret:
9045 if (local_syms != NULL
9046 && symtab_hdr->contents != (unsigned char *) local_syms)
9047 free (local_syms);
9048 if (sec != NULL
9049 && relstart != NULL
9050 && elf_section_data (sec)->relocs != relstart)
9051 free (relstart);
9052 return FALSE;
9053 }
9054
9055 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9056 {
9057 enum elf_ppc64_reloc_type r_type;
9058 unsigned long r_symndx;
9059 Elf_Internal_Sym *sym;
9060 asection *sym_sec;
9061 struct elf_link_hash_entry *h;
9062 struct got_entry *ent;
133a1f60 9063 bfd_vma val, pc;
4a421c53 9064 unsigned char buf[8];
066f4018 9065 unsigned int insn;
903b777d 9066 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9067
9068 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9069 switch (r_type)
9070 {
9071 default:
9072 insn_check = no_check;
9073 break;
9074
9075 case R_PPC64_PLT16_HA:
9076 case R_PPC64_GOT_TLSLD16_HA:
9077 case R_PPC64_GOT_TLSGD16_HA:
9078 case R_PPC64_GOT_TPREL16_HA:
9079 case R_PPC64_GOT_DTPREL16_HA:
9080 case R_PPC64_GOT16_HA:
9081 case R_PPC64_TOC16_HA:
9082 insn_check = check_ha;
9083 break;
9084
9085 case R_PPC64_PLT16_LO:
9086 case R_PPC64_PLT16_LO_DS:
9087 case R_PPC64_GOT_TLSLD16_LO:
9088 case R_PPC64_GOT_TLSGD16_LO:
9089 case R_PPC64_GOT_TPREL16_LO_DS:
9090 case R_PPC64_GOT_DTPREL16_LO_DS:
9091 case R_PPC64_GOT16_LO:
9092 case R_PPC64_GOT16_LO_DS:
9093 case R_PPC64_TOC16_LO:
9094 case R_PPC64_TOC16_LO_DS:
9095 insn_check = check_lo;
9096 break;
9097 }
9098
9099 if (insn_check != no_check)
9100 {
9101 bfd_vma off = rel->r_offset & ~3;
9102
9103 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9104 goto got_error_ret;
9105
9106 insn = bfd_get_32 (ibfd, buf);
9107 if (insn_check == check_lo
9108 ? !ok_lo_toc_insn (insn, r_type)
9109 : ((insn & ((0x3f << 26) | 0x1f << 16))
9110 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9111 {
9112 char str[12];
9113
9114 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9115 sprintf (str, "%#08x", insn);
9116 info->callbacks->einfo
9117 /* xgettext:c-format */
9118 (_("%H: got/toc optimization is not supported for"
9119 " %s instruction\n"),
9120 ibfd, sec, rel->r_offset & ~3, str);
9121 continue;
9122 }
9123 }
9124
066f4018
AM
9125 switch (r_type)
9126 {
bb22a418
AM
9127 /* Note that we don't delete GOT entries for
9128 R_PPC64_GOT16_DS since we'd need a lot more
9129 analysis. For starters, the preliminary layout is
9130 before the GOT, PLT, dynamic sections and stubs are
9131 laid out. Then we'd need to allow for changes in
9132 distance between sections caused by alignment. */
066f4018
AM
9133 default:
9134 continue;
9135
066f4018
AM
9136 case R_PPC64_GOT16_HA:
9137 case R_PPC64_GOT16_LO_DS:
4a421c53 9138 case R_PPC64_GOT_PCREL34:
066f4018
AM
9139 break;
9140 }
9141
9142 r_symndx = ELF64_R_SYM (rel->r_info);
9143 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9144 r_symndx, ibfd))
9145 goto got_error_ret;
9146
6d5554a6
AM
9147 if (sym_sec == NULL
9148 || sym_sec->output_section == NULL
9149 || discarded_section (sym_sec))
9150 continue;
9151
066f4018
AM
9152 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9153 continue;
9154
9155 if (h != NULL)
9156 val = h->root.u.def.value;
9157 else
9158 val = sym->st_value;
133a1f60 9159 val += rel->r_addend;
066f4018
AM
9160 val += sym_sec->output_section->vma + sym_sec->output_offset;
9161
bb22a418
AM
9162/* Fudge factor to allow for the fact that the preliminary layout
9163 isn't exact. Reduce limits by this factor. */
9164#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9165
066f4018
AM
9166 switch (r_type)
9167 {
9168 default:
9169 continue;
9170
066f4018 9171 case R_PPC64_GOT16_HA:
bb22a418
AM
9172 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9173 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9174 continue;
9175
9176 if (!bfd_get_section_contents (ibfd, sec, buf,
9177 rel->r_offset & ~3, 4))
9178 goto got_error_ret;
9179 insn = bfd_get_32 (ibfd, buf);
9180 if (((insn & ((0x3f << 26) | 0x1f << 16))
9181 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9182 continue;
9183 break;
9184
9185 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9186 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9187 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9188 continue;
9189 if (!bfd_get_section_contents (ibfd, sec, buf,
9190 rel->r_offset & ~3, 4))
9191 goto got_error_ret;
9192 insn = bfd_get_32 (ibfd, buf);
9193 if ((insn & (0x3f << 26 | 0x3)) != 58u << 26 /* ld */)
9194 continue;
9195 break;
4a421c53
AM
9196
9197 case R_PPC64_GOT_PCREL34:
9198 pc = rel->r_offset;
9199 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9200 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9201 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9202 continue;
9203 if (!bfd_get_section_contents (ibfd, sec, buf,
9204 rel->r_offset & ~3, 8))
9205 goto got_error_ret;
9206 insn = bfd_get_32 (ibfd, buf);
9207 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9208 continue;
9209 insn = bfd_get_32 (ibfd, buf + 4);
9210 if ((insn & (0x3f << 26)) != 57u << 26)
9211 continue;
9212 break;
066f4018 9213 }
bb22a418 9214#undef LIMIT_ADJUST
066f4018
AM
9215
9216 if (h != NULL)
9217 ent = h->got.glist;
9218 else
9219 {
9220 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9221 ent = local_got_ents[r_symndx];
9222 }
9223 for (; ent != NULL; ent = ent->next)
133a1f60 9224 if (ent->addend == rel->r_addend
066f4018
AM
9225 && ent->owner == ibfd
9226 && ent->tls_type == 0)
9227 break;
9228 BFD_ASSERT (ent && ent->got.refcount > 0);
9229 ent->got.refcount -= 1;
9230 }
9231
9232 if (elf_section_data (sec)->relocs != relstart)
9233 free (relstart);
9234 }
9235
9236 if (local_syms != NULL
9237 && symtab_hdr->contents != (unsigned char *) local_syms)
9238 {
9239 if (!info->keep_memory)
9240 free (local_syms);
9241 else
9242 symtab_hdr->contents = (unsigned char *) local_syms;
9243 }
9244 }
9245
c5614fa4
AM
9246 return TRUE;
9247}
9248
1bbe0902
AM
9249/* Return true iff input section I references the TOC using
9250 instructions limited to +/-32k offsets. */
9251
9252bfd_boolean
9253ppc64_elf_has_small_toc_reloc (asection *i)
9254{
9255 return (is_ppc64_elf (i->owner)
9256 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9257}
9258
927be08e
AM
9259/* Allocate space for one GOT entry. */
9260
9261static void
9262allocate_got (struct elf_link_hash_entry *h,
9263 struct bfd_link_info *info,
9264 struct got_entry *gent)
9265{
9266 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
9267 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
9268 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9269 ? 16 : 8);
9270 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9271 ? 2 : 1) * sizeof (Elf64_External_Rela);
9272 asection *got = ppc64_elf_tdata (gent->owner)->got;
9273
9274 gent->got.offset = got->size;
9275 got->size += entsize;
9276
19e08130 9277 if (h->type == STT_GNU_IFUNC)
927be08e 9278 {
33e44f2e 9279 htab->elf.irelplt->size += rentsize;
19e08130 9280 htab->got_reli_size += rentsize;
927be08e 9281 }
f15d0b54 9282 else if (((bfd_link_pic (info)
f749f26e 9283 && !(gent->tls_type != 0
f15d0b54
AM
9284 && bfd_link_executable (info)
9285 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9286 || (htab->elf.dynamic_sections_created
9287 && h->dynindx != -1
9288 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9289 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9290 {
19e08130 9291 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9292 relgot->size += rentsize;
927be08e
AM
9293 }
9294}
9295
7865406b
AM
9296/* This function merges got entries in the same toc group. */
9297
9298static void
9299merge_got_entries (struct got_entry **pent)
9300{
9301 struct got_entry *ent, *ent2;
9302
9303 for (ent = *pent; ent != NULL; ent = ent->next)
9304 if (!ent->is_indirect)
9305 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9306 if (!ent2->is_indirect
9307 && ent2->addend == ent->addend
9308 && ent2->tls_type == ent->tls_type
9309 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9310 {
9311 ent2->is_indirect = TRUE;
9312 ent2->got.ent = ent;
9313 }
9314}
9315
46434633 9316/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9317
9318static bfd_boolean
46434633
AM
9319ensure_undef_dynamic (struct bfd_link_info *info,
9320 struct elf_link_hash_entry *h)
f0158f44
AM
9321{
9322 struct elf_link_hash_table *htab = elf_hash_table (info);
9323
9324 if (htab->dynamic_sections_created
46434633
AM
9325 && ((info->dynamic_undefined_weak != 0
9326 && h->root.type == bfd_link_hash_undefweak)
9327 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9328 && h->dynindx == -1
9329 && !h->forced_local
9330 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9331 return bfd_elf_link_record_dynamic_symbol (info, h);
9332 return TRUE;
9333}
9334
65f38f15
AM
9335/* Allocate space in .plt, .got and associated reloc sections for
9336 dynamic relocs. */
5bd4f169 9337
b34976b6 9338static bfd_boolean
4ce794b7 9339allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9340{
65f38f15
AM
9341 struct bfd_link_info *info;
9342 struct ppc_link_hash_table *htab;
5bd4f169 9343 asection *s;
65f38f15 9344 struct ppc_link_hash_entry *eh;
0b8bcf0d 9345 struct got_entry **pgent, *gent;
5bd4f169 9346
e92d460e 9347 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9348 return TRUE;
5bd4f169 9349
65f38f15
AM
9350 info = (struct bfd_link_info *) inf;
9351 htab = ppc_hash_table (info);
4dfe6ac6
NC
9352 if (htab == NULL)
9353 return FALSE;
5bd4f169 9354
951fd09b
AM
9355 eh = (struct ppc_link_hash_entry *) h;
9356 /* Run through the TLS GD got entries first if we're changing them
9357 to TPREL. */
b00a0a86 9358 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9359 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9360 if (gent->got.refcount > 0
9361 && (gent->tls_type & TLS_GD) != 0)
9362 {
9363 /* This was a GD entry that has been converted to TPREL. If
9364 there happens to be a TPREL entry we can use that one. */
9365 struct got_entry *ent;
9366 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9367 if (ent->got.refcount > 0
9368 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9369 && ent->addend == gent->addend
9370 && ent->owner == gent->owner)
951fd09b
AM
9371 {
9372 gent->got.refcount = 0;
9373 break;
9374 }
9375
9376 /* If not, then we'll be using our own TPREL entry. */
9377 if (gent->got.refcount != 0)
9378 gent->tls_type = TLS_TLS | TLS_TPREL;
9379 }
9380
7865406b
AM
9381 /* Remove any list entry that won't generate a word in the GOT before
9382 we call merge_got_entries. Otherwise we risk merging to empty
9383 entries. */
0b8bcf0d
AM
9384 pgent = &h->got.glist;
9385 while ((gent = *pgent) != NULL)
411e1bfb 9386 if (gent->got.refcount > 0)
7865406b
AM
9387 {
9388 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9389 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9390 {
9391 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9392 *pgent = gent->next;
9393 }
9394 else
9395 pgent = &gent->next;
9396 }
9397 else
9398 *pgent = gent->next;
9399
9400 if (!htab->do_multi_toc)
9401 merge_got_entries (&h->got.glist);
9402
9403 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9404 if (!gent->is_indirect)
411e1bfb 9405 {
ec73ddcd
AM
9406 /* Ensure we catch all the cases where this symbol should
9407 be made dynamic. */
46434633 9408 if (!ensure_undef_dynamic (info, h))
f0158f44 9409 return FALSE;
65f38f15 9410
0c8d6e5c 9411 if (!is_ppc64_elf (gent->owner))
927be08e 9412 abort ();
0ffa91dd 9413
927be08e 9414 allocate_got (h, info, gent);
411e1bfb 9415 }
65f38f15 9416
954b63d4
AM
9417 /* If no dynamic sections we can't have dynamic relocs, except for
9418 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9419 if (!htab->elf.dynamic_sections_created
9420 && h->type != STT_GNU_IFUNC)
9421 eh->dyn_relocs = NULL;
9422
529fe20e
AM
9423 /* Discard relocs on undefined symbols that must be local. */
9424 else if (h->root.type == bfd_link_hash_undefined
9425 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
9426 eh->dyn_relocs = NULL;
9427
954b63d4
AM
9428 /* Also discard relocs on undefined weak syms with non-default
9429 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9430 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
954b63d4
AM
9431 eh->dyn_relocs = NULL;
9432
8a2058b5 9433 if (eh->dyn_relocs != NULL)
65f38f15 9434 {
8a2058b5
AM
9435 struct elf_dyn_relocs *p, **pp;
9436
57e7d118
AM
9437 /* In the shared -Bsymbolic case, discard space allocated for
9438 dynamic pc-relative relocs against symbols which turn out to
9439 be defined in regular objects. For the normal shared case,
9440 discard space for relocs that have become local due to symbol
9441 visibility changes. */
57e7d118 9442 if (bfd_link_pic (info))
65f38f15 9443 {
57e7d118
AM
9444 /* Relocs that use pc_count are those that appear on a call
9445 insn, or certain REL relocs (see must_be_dyn_reloc) that
9446 can be generated via assembly. We want calls to
9447 protected symbols to resolve directly to the function
9448 rather than going via the plt. If people want function
9449 pointer comparisons to work as expected then they should
9450 avoid writing weird assembly. */
9451 if (SYMBOL_CALLS_LOCAL (info, h))
9452 {
57e7d118
AM
9453 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
9454 {
9455 p->count -= p->pc_count;
9456 p->pc_count = 0;
9457 if (p->count == 0)
9458 *pp = p->next;
9459 else
9460 pp = &p->next;
9461 }
9462 }
65f38f15 9463
954b63d4 9464 if (eh->dyn_relocs != NULL)
5bd4f169 9465 {
ec73ddcd
AM
9466 /* Ensure we catch all the cases where this symbol
9467 should be made dynamic. */
46434633 9468 if (!ensure_undef_dynamic (info, h))
f0158f44 9469 return FALSE;
5bd4f169 9470 }
65f38f15 9471 }
ec73ddcd
AM
9472
9473 /* For a fixed position executable, discard space for
9474 relocs against symbols which are not dynamic. */
9475 else if (h->type != STT_GNU_IFUNC)
57e7d118 9476 {
529fe20e
AM
9477 if (h->dynamic_adjusted
9478 && !h->def_regular
9479 && !ELF_COMMON_DEF_P (h))
f0158f44 9480 {
ec73ddcd
AM
9481 /* Ensure we catch all the cases where this symbol
9482 should be made dynamic. */
46434633 9483 if (!ensure_undef_dynamic (info, h))
f0158f44 9484 return FALSE;
dfbb6ac9 9485
ec73ddcd 9486 /* But if that didn't work out, discard dynamic relocs. */
f0158f44
AM
9487 if (h->dynindx == -1)
9488 eh->dyn_relocs = NULL;
9489 }
9490 else
8a2058b5 9491 eh->dyn_relocs = NULL;
57e7d118
AM
9492 }
9493
9494 /* Finally, allocate space. */
9495 for (p = eh->dyn_relocs; p != NULL; p = p->next)
9496 {
9497 asection *sreloc = elf_section_data (p->sec)->sreloc;
9498 if (eh->elf.type == STT_GNU_IFUNC)
9499 sreloc = htab->elf.irelplt;
9500 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9501 }
65f38f15 9502 }
57e7d118 9503
2d7ad24e
AM
9504 /* We might need a PLT entry when the symbol
9505 a) is dynamic, or
9506 b) is an ifunc, or
9507 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9508 d) has plt16 relocs and we are linking statically. */
9509 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9510 || h->type == STT_GNU_IFUNC
9511 || (h->needs_plt && h->dynamic_adjusted)
9512 || (h->needs_plt
9513 && h->def_regular
9514 && !htab->elf.dynamic_sections_created
3e04d765 9515 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
9516 && (((struct ppc_link_hash_entry *) h)->tls_mask
9517 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9518 {
57e7d118
AM
9519 struct plt_entry *pent;
9520 bfd_boolean doneone = FALSE;
9521 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9522 if (pent->plt.refcount > 0)
9523 {
9524 if (!htab->elf.dynamic_sections_created
9525 || h->dynindx == -1)
9526 {
2d7ad24e
AM
9527 if (h->type == STT_GNU_IFUNC)
9528 {
9529 s = htab->elf.iplt;
9530 pent->plt.offset = s->size;
9531 s->size += PLT_ENTRY_SIZE (htab);
9532 s = htab->elf.irelplt;
9533 }
9534 else
9535 {
9536 s = htab->pltlocal;
9537 pent->plt.offset = s->size;
9538 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9539 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9540 }
57e7d118
AM
9541 }
9542 else
9543 {
9544 /* If this is the first .plt entry, make room for the special
9545 first entry. */
9546 s = htab->elf.splt;
9547 if (s->size == 0)
9548 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9549
57e7d118 9550 pent->plt.offset = s->size;
65f38f15 9551
57e7d118
AM
9552 /* Make room for this entry. */
9553 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9554
57e7d118
AM
9555 /* Make room for the .glink code. */
9556 s = htab->glink;
9557 if (s->size == 0)
9e390558 9558 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9559 if (htab->opd_abi)
9560 {
9561 /* We need bigger stubs past index 32767. */
9e390558 9562 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9563 s->size += 4;
9564 s->size += 2*4;
9565 }
9566 else
9567 s->size += 4;
65f38f15 9568
57e7d118
AM
9569 /* We also need to make an entry in the .rela.plt section. */
9570 s = htab->elf.srelplt;
9571 }
2d7ad24e
AM
9572 if (s != NULL)
9573 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9574 doneone = TRUE;
9575 }
9576 else
9577 pent->plt.offset = (bfd_vma) -1;
9578 if (!doneone)
9579 {
9580 h->plt.plist = NULL;
9581 h->needs_plt = 0;
9582 }
65f38f15 9583 }
57e7d118 9584 else
65f38f15 9585 {
57e7d118
AM
9586 h->plt.plist = NULL;
9587 h->needs_plt = 0;
65f38f15
AM
9588 }
9589
b34976b6 9590 return TRUE;
65f38f15
AM
9591}
9592
9e390558
AM
9593#define PPC_LO(v) ((v) & 0xffff)
9594#define PPC_HI(v) (((v) >> 16) & 0xffff)
9595#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9596#define D34(v) \
9597 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9598#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9599
a345bc8d
AM
9600/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9601 to set up space for global entry stubs. These are put in glink,
9602 after the branch table. */
65f38f15 9603
b34976b6 9604static bfd_boolean
a345bc8d 9605size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9606{
a345bc8d
AM
9607 struct bfd_link_info *info;
9608 struct ppc_link_hash_table *htab;
9609 struct plt_entry *pent;
9e390558 9610 asection *s, *plt;
65f38f15 9611
a345bc8d
AM
9612 if (h->root.type == bfd_link_hash_indirect)
9613 return TRUE;
65f38f15 9614
a345bc8d
AM
9615 if (!h->pointer_equality_needed)
9616 return TRUE;
65f38f15 9617
a345bc8d
AM
9618 if (h->def_regular)
9619 return TRUE;
65f38f15 9620
a345bc8d
AM
9621 info = inf;
9622 htab = ppc_hash_table (info);
9623 if (htab == NULL)
9624 return FALSE;
9625
9e390558
AM
9626 s = htab->global_entry;
9627 plt = htab->elf.splt;
a345bc8d
AM
9628 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9629 if (pent->plt.offset != (bfd_vma) -1
9630 && pent->addend == 0)
9631 {
afe397ea
AM
9632 /* For ELFv2, if this symbol is not defined in a regular file
9633 and we are not generating a shared library or pie, then we
9634 need to define the symbol in the executable on a call stub.
9635 This is to avoid text relocations. */
9e390558
AM
9636 bfd_vma off, stub_align, stub_off, stub_size;
9637 unsigned int align_power;
9638
9639 stub_size = 16;
9640 stub_off = s->size;
9641 if (htab->params->plt_stub_align >= 0)
9642 align_power = htab->params->plt_stub_align;
9643 else
9644 align_power = -htab->params->plt_stub_align;
9645 /* Setting section alignment is delayed until we know it is
9646 non-empty. Otherwise the .text output section will be
9647 aligned at least to plt_stub_align even when no global
9648 entry stubs are needed. */
9649 if (s->alignment_power < align_power)
9650 s->alignment_power = align_power;
9651 stub_align = (bfd_vma) 1 << align_power;
9652 if (htab->params->plt_stub_align >= 0
9653 || ((((stub_off + stub_size - 1) & -stub_align)
9654 - (stub_off & -stub_align))
9655 > ((stub_size - 1) & -stub_align)))
9656 stub_off = (stub_off + stub_align - 1) & -stub_align;
9657 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9658 off -= stub_off + s->output_offset + s->output_section->vma;
9659 /* Note that for --plt-stub-align negative we have a possible
9660 dependency between stub offset and size. Break that
9661 dependency by assuming the max stub size when calculating
9662 the stub offset. */
9663 if (PPC_HA (off) == 0)
9664 stub_size -= 4;
8a2058b5 9665 h->root.type = bfd_link_hash_defined;
afe397ea 9666 h->root.u.def.section = s;
9e390558
AM
9667 h->root.u.def.value = stub_off;
9668 s->size = stub_off + stub_size;
a345bc8d
AM
9669 break;
9670 }
9671 return TRUE;
9672}
9673
9674/* Set DF_TEXTREL if we find any dynamic relocs that apply to
9675 read-only sections. */
9676
9677static bfd_boolean
98bbb1b8 9678maybe_set_textrel (struct elf_link_hash_entry *h, void *inf)
a345bc8d 9679{
98bbb1b8
AM
9680 asection *sec;
9681
a345bc8d
AM
9682 if (h->root.type == bfd_link_hash_indirect)
9683 return TRUE;
9684
98bbb1b8
AM
9685 sec = readonly_dynrelocs (h);
9686 if (sec != NULL)
a345bc8d 9687 {
98bbb1b8
AM
9688 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9689
9690 info->flags |= DF_TEXTREL;
2cdcc330
AM
9691 info->callbacks->minfo (_("%pB: dynamic relocation against `%pT'"
9692 " in read-only section `%pA'\n"),
9693 sec->owner, h->root.root.string, sec);
a345bc8d
AM
9694
9695 /* Not an error, just cut short the traversal. */
9696 return FALSE;
65f38f15 9697 }
b34976b6 9698 return TRUE;
65f38f15
AM
9699}
9700
9701/* Set the sizes of the dynamic sections. */
9702
b34976b6 9703static bfd_boolean
ee67d69a 9704ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9705 struct bfd_link_info *info)
65f38f15
AM
9706{
9707 struct ppc_link_hash_table *htab;
9708 bfd *dynobj;
9709 asection *s;
b34976b6 9710 bfd_boolean relocs;
65f38f15 9711 bfd *ibfd;
7865406b 9712 struct got_entry *first_tlsld;
65f38f15
AM
9713
9714 htab = ppc_hash_table (info);
4dfe6ac6
NC
9715 if (htab == NULL)
9716 return FALSE;
9717
65f38f15
AM
9718 dynobj = htab->elf.dynobj;
9719 if (dynobj == NULL)
9720 abort ();
9721
9722 if (htab->elf.dynamic_sections_created)
9723 {
9724 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9725 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9726 {
3d4d4302 9727 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9728 if (s == NULL)
9729 abort ();
eea6121a 9730 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9731 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9732 }
9733 }
9734
9735 /* Set up .got offsets for local syms, and space for local dynamic
9736 relocs. */
c72f2fb2 9737 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9738 {
411e1bfb
AM
9739 struct got_entry **lgot_ents;
9740 struct got_entry **end_lgot_ents;
e054468f
AM
9741 struct plt_entry **local_plt;
9742 struct plt_entry **end_local_plt;
f961d9dd 9743 unsigned char *lgot_masks;
65f38f15
AM
9744 bfd_size_type locsymcount;
9745 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9746
0c8d6e5c 9747 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9748 continue;
9749
9750 for (s = ibfd->sections; s != NULL; s = s->next)
9751 {
19e08130 9752 struct ppc_dyn_relocs *p;
65f38f15 9753
6edfbbad 9754 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9755 {
ec338859
AM
9756 if (!bfd_is_abs_section (p->sec)
9757 && bfd_is_abs_section (p->sec->output_section))
9758 {
9759 /* Input section has been discarded, either because
9760 it is a copy of a linkonce section or due to
9761 linker script /DISCARD/, so we'll be discarding
9762 the relocs too. */
9763 }
248866a8 9764 else if (p->count != 0)
ec338859 9765 {
19e08130
AM
9766 asection *srel = elf_section_data (p->sec)->sreloc;
9767 if (p->ifunc)
33e44f2e 9768 srel = htab->elf.irelplt;
eea6121a 9769 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9770 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9771 info->flags |= DF_TEXTREL;
ec338859 9772 }
65f38f15
AM
9773 }
9774 }
9775
411e1bfb
AM
9776 lgot_ents = elf_local_got_ents (ibfd);
9777 if (!lgot_ents)
65f38f15
AM
9778 continue;
9779
0ffa91dd 9780 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9781 locsymcount = symtab_hdr->sh_info;
411e1bfb 9782 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9783 local_plt = (struct plt_entry **) end_lgot_ents;
9784 end_local_plt = local_plt + locsymcount;
f961d9dd 9785 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9786 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9787 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9788 {
0b8bcf0d 9789 struct got_entry **pent, *ent;
411e1bfb 9790
0b8bcf0d
AM
9791 pent = lgot_ents;
9792 while ((ent = *pent) != NULL)
411e1bfb
AM
9793 if (ent->got.refcount > 0)
9794 {
e7b938ca 9795 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9796 {
927be08e 9797 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 9798 *pent = ent->next;
411e1bfb
AM
9799 }
9800 else
9801 {
19e08130
AM
9802 unsigned int ent_size = 8;
9803 unsigned int rel_size = sizeof (Elf64_External_Rela);
9804
eea6121a 9805 ent->got.offset = s->size;
e7b938ca 9806 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 9807 {
19e08130
AM
9808 ent_size *= 2;
9809 rel_size *= 2;
9810 }
9811 s->size += ent_size;
37da22e5 9812 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 9813 {
33e44f2e 9814 htab->elf.irelplt->size += rel_size;
19e08130
AM
9815 htab->got_reli_size += rel_size;
9816 }
93370e8e
AM
9817 else if (bfd_link_pic (info)
9818 && !(ent->tls_type != 0
9819 && bfd_link_executable (info)))
19e08130
AM
9820 {
9821 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9822 srel->size += rel_size;
927be08e 9823 }
0b8bcf0d 9824 pent = &ent->next;
411e1bfb
AM
9825 }
9826 }
9827 else
0b8bcf0d 9828 *pent = ent->next;
65f38f15 9829 }
e054468f 9830
2d7ad24e
AM
9831 /* Allocate space for plt calls to local syms. */
9832 lgot_masks = (unsigned char *) end_local_plt;
9833 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
9834 {
9835 struct plt_entry *ent;
9836
9837 for (ent = *local_plt; ent != NULL; ent = ent->next)
9838 if (ent->plt.refcount > 0)
9839 {
2d7ad24e
AM
9840 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
9841 {
9842 s = htab->elf.iplt;
9843 ent->plt.offset = s->size;
9844 s->size += PLT_ENTRY_SIZE (htab);
9845 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
9846 }
3e04d765
AM
9847 else if (htab->can_convert_all_inline_plt
9848 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
9849 ent->plt.offset = (bfd_vma) -1;
9850 else
9851 {
9852 s = htab->pltlocal;
9853 ent->plt.offset = s->size;
9854 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9855 if (bfd_link_pic (info))
9856 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
9857 }
e054468f
AM
9858 }
9859 else
9860 ent->plt.offset = (bfd_vma) -1;
9861 }
65f38f15
AM
9862 }
9863
9864 /* Allocate global sym .plt and .got entries, and space for global
9865 sym dynamic relocs. */
4ce794b7 9866 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 9867
0e1862bb 9868 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 9869 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 9870
7865406b 9871 first_tlsld = NULL;
c72f2fb2 9872 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 9873 {
7865406b
AM
9874 struct got_entry *ent;
9875
0c8d6e5c 9876 if (!is_ppc64_elf (ibfd))
102890f0
AM
9877 continue;
9878
7865406b
AM
9879 ent = ppc64_tlsld_got (ibfd);
9880 if (ent->got.refcount > 0)
102890f0 9881 {
7865406b 9882 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 9883 {
7865406b
AM
9884 ent->is_indirect = TRUE;
9885 ent->got.ent = first_tlsld;
9886 }
9887 else
9888 {
9889 if (first_tlsld == NULL)
9890 first_tlsld = ent;
9891 s = ppc64_elf_tdata (ibfd)->got;
9892 ent->got.offset = s->size;
9893 ent->owner = ibfd;
9894 s->size += 16;
f749f26e 9895 if (bfd_link_dll (info))
7865406b
AM
9896 {
9897 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
9898 srel->size += sizeof (Elf64_External_Rela);
9899 }
102890f0
AM
9900 }
9901 }
9902 else
7865406b 9903 ent->got.offset = (bfd_vma) -1;
102890f0
AM
9904 }
9905
65f38f15
AM
9906 /* We now have determined the sizes of the various dynamic sections.
9907 Allocate memory for them. */
b34976b6 9908 relocs = FALSE;
65f38f15
AM
9909 for (s = dynobj->sections; s != NULL; s = s->next)
9910 {
9911 if ((s->flags & SEC_LINKER_CREATED) == 0)
9912 continue;
9913
4ce794b7 9914 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
9915 /* These haven't been allocated yet; don't strip. */
9916 continue;
33e44f2e
AM
9917 else if (s == htab->elf.sgot
9918 || s == htab->elf.splt
9919 || s == htab->elf.iplt
2d7ad24e 9920 || s == htab->pltlocal
c456f082 9921 || s == htab->glink
9e390558 9922 || s == htab->global_entry
5474d94f
AM
9923 || s == htab->elf.sdynbss
9924 || s == htab->elf.sdynrelro)
65f38f15
AM
9925 {
9926 /* Strip this section if we don't need it; see the
9927 comment below. */
5bd4f169 9928 }
58d180e8
AM
9929 else if (s == htab->glink_eh_frame)
9930 {
9931 if (!bfd_is_abs_section (s->output_section))
9932 /* Not sized yet. */
9933 continue;
9934 }
70cc837d 9935 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 9936 {
c456f082 9937 if (s->size != 0)
5bd4f169 9938 {
33e44f2e 9939 if (s != htab->elf.srelplt)
b34976b6 9940 relocs = TRUE;
5bd4f169
AM
9941
9942 /* We use the reloc_count field as a counter if we need
9943 to copy relocs into the output file. */
9944 s->reloc_count = 0;
9945 }
9946 }
65f38f15 9947 else
5bd4f169
AM
9948 {
9949 /* It's not one of our sections, so don't allocate space. */
9950 continue;
9951 }
9952
eea6121a 9953 if (s->size == 0)
5bd4f169 9954 {
c456f082
AM
9955 /* If we don't need this section, strip it from the
9956 output file. This is mostly to handle .rela.bss and
9957 .rela.plt. We must create both sections in
9958 create_dynamic_sections, because they must be created
9959 before the linker maps input sections to output
9960 sections. The linker does that before
9961 adjust_dynamic_symbol is called, and it is that
9962 function which decides whether anything needs to go
9963 into these sections. */
8423293d 9964 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
9965 continue;
9966 }
9967
06bcf541
AM
9968 if (bfd_is_abs_section (s->output_section))
9969 _bfd_error_handler (_("warning: discarding dynamic section %s"),
9970 s->name);
9971
c456f082 9972 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
9973 continue;
9974
65f38f15
AM
9975 /* Allocate memory for the section contents. We use bfd_zalloc
9976 here in case unused entries are not reclaimed before the
9977 section's contents are written out. This should not happen,
411e1bfb
AM
9978 but this way if it does we get a R_PPC64_NONE reloc in .rela
9979 sections instead of garbage.
9980 We also rely on the section contents being zero when writing
5474d94f 9981 the GOT and .dynrelro. */
eea6121a 9982 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 9983 if (s->contents == NULL)
b34976b6 9984 return FALSE;
5bd4f169
AM
9985 }
9986
c72f2fb2 9987 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 9988 {
0c8d6e5c 9989 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
9990 continue;
9991
e717da7e 9992 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 9993 if (s != NULL && s != htab->elf.sgot)
e717da7e 9994 {
eea6121a 9995 if (s->size == 0)
8423293d 9996 s->flags |= SEC_EXCLUDE;
e717da7e
AM
9997 else
9998 {
eea6121a 9999 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10000 if (s->contents == NULL)
10001 return FALSE;
10002 }
10003 }
10004 s = ppc64_elf_tdata (ibfd)->relgot;
10005 if (s != NULL)
10006 {
eea6121a 10007 if (s->size == 0)
8423293d 10008 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10009 else
10010 {
eea6121a 10011 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10012 if (s->contents == NULL)
10013 return FALSE;
10014 relocs = TRUE;
10015 s->reloc_count = 0;
10016 }
10017 }
10018 }
10019
e86ce104 10020 if (htab->elf.dynamic_sections_created)
5bd4f169 10021 {
e8910a83
AM
10022 bfd_boolean tls_opt;
10023
5bd4f169
AM
10024 /* Add some entries to the .dynamic section. We fill in the
10025 values later, in ppc64_elf_finish_dynamic_sections, but we
10026 must add the entries now so that we get the correct size for
10027 the .dynamic section. The DT_DEBUG entry is filled in by the
10028 dynamic linker and used by the debugger. */
dc810e39 10029#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10030 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10031
0e1862bb 10032 if (bfd_link_executable (info))
5bd4f169 10033 {
dc810e39 10034 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10035 return FALSE;
5bd4f169
AM
10036 }
10037
33e44f2e 10038 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10039 {
dc810e39
AM
10040 if (!add_dynamic_entry (DT_PLTGOT, 0)
10041 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10042 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10043 || !add_dynamic_entry (DT_JMPREL, 0)
10044 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10045 return FALSE;
5bd4f169
AM
10046 }
10047
ee67d69a 10048 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10049 {
10050 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10051 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10052 return FALSE;
19397422
AM
10053 }
10054
7c9cf415 10055 tls_opt = (htab->params->tls_get_addr_opt
e8910a83
AM
10056 && htab->tls_get_addr_fd != NULL
10057 && htab->tls_get_addr_fd->elf.plt.plist != NULL);
10058 if (tls_opt || !htab->opd_abi)
10059 {
10060 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10061 return FALSE;
10062 }
a7f2871e 10063
5bd4f169
AM
10064 if (relocs)
10065 {
dc810e39
AM
10066 if (!add_dynamic_entry (DT_RELA, 0)
10067 || !add_dynamic_entry (DT_RELASZ, 0)
10068 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10069 return FALSE;
5bd4f169 10070
65f38f15
AM
10071 /* If any dynamic relocs apply to a read-only section,
10072 then we need a DT_TEXTREL entry. */
248866a8 10073 if ((info->flags & DF_TEXTREL) == 0)
a345bc8d 10074 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
5bd4f169 10075
65f38f15 10076 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10077 {
65f38f15 10078 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10079 return FALSE;
5bd4f169 10080 }
5bd4f169 10081 }
5bd4f169 10082 }
65f38f15 10083#undef add_dynamic_entry
5bd4f169 10084
b34976b6 10085 return TRUE;
5bd4f169
AM
10086}
10087
a345bc8d
AM
10088/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10089
10090static bfd_boolean
10091ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10092{
10093 if (h->plt.plist != NULL
10094 && !h->def_regular
10095 && !h->pointer_equality_needed)
10096 return FALSE;
10097
10098 return _bfd_elf_hash_symbol (h);
10099}
10100
721956f4 10101/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10102
4ce794b7
AM
10103static inline enum ppc_stub_type
10104ppc_type_of_stub (asection *input_sec,
10105 const Elf_Internal_Rela *rel,
10106 struct ppc_link_hash_entry **hash,
e054468f 10107 struct plt_entry **plt_ent,
6911b7dc
AM
10108 bfd_vma destination,
10109 unsigned long local_off)
5bd4f169 10110{
721956f4
AM
10111 struct ppc_link_hash_entry *h = *hash;
10112 bfd_vma location;
10113 bfd_vma branch_offset;
10114 bfd_vma max_branch_offset;
4ce794b7 10115 enum elf_ppc64_reloc_type r_type;
5bd4f169 10116
721956f4
AM
10117 if (h != NULL)
10118 {
e054468f 10119 struct plt_entry *ent;
7fe2b9a6 10120 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10121 if (h->oh != NULL
10122 && h->oh->is_func_descriptor)
7b8f6675
AM
10123 {
10124 fdh = ppc_follow_link (h->oh);
10125 *hash = fdh;
10126 }
8387904d 10127
e054468f
AM
10128 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10129 if (ent->addend == rel->r_addend
10130 && ent->plt.offset != (bfd_vma) -1)
10131 {
e054468f
AM
10132 *plt_ent = ent;
10133 return ppc_stub_plt_call;
10134 }
5bd4f169 10135
7fe2b9a6
AM
10136 /* Here, we know we don't have a plt entry. If we don't have a
10137 either a defined function descriptor or a defined entry symbol
10138 in a regular object file, then it is pointless trying to make
10139 any other type of stub. */
854b41e7
AM
10140 if (!is_static_defined (&fdh->elf)
10141 && !is_static_defined (&h->elf))
721956f4 10142 return ppc_stub_none;
5d1634d7 10143 }
e054468f
AM
10144 else if (elf_local_got_ents (input_sec->owner) != NULL)
10145 {
10146 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10147 struct plt_entry **local_plt = (struct plt_entry **)
10148 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10149 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10150
10151 if (local_plt[r_symndx] != NULL)
10152 {
10153 struct plt_entry *ent;
10154
10155 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10156 if (ent->addend == rel->r_addend
10157 && ent->plt.offset != (bfd_vma) -1)
10158 {
10159 *plt_ent = ent;
10160 return ppc_stub_plt_call;
10161 }
10162 }
10163 }
5d1634d7 10164
721956f4
AM
10165 /* Determine where the call point is. */
10166 location = (input_sec->output_offset
10167 + input_sec->output_section->vma
10168 + rel->r_offset);
5d1634d7 10169
721956f4
AM
10170 branch_offset = destination - location;
10171 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10172
721956f4
AM
10173 /* Determine if a long branch stub is needed. */
10174 max_branch_offset = 1 << 25;
23cedd1d
AM
10175 if (r_type == R_PPC64_REL14
10176 || r_type == R_PPC64_REL14_BRTAKEN
10177 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10178 max_branch_offset = 1 << 15;
5d1634d7 10179
6911b7dc 10180 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10181 /* We need a stub. Figure out whether a long_branch or plt_branch
10182 is needed later. */
10183 return ppc_stub_long_branch;
5d1634d7 10184
721956f4 10185 return ppc_stub_none;
5d1634d7
AM
10186}
10187
f891966f
AM
10188/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10189 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10190 . mflr %r12
10191 . bcl 20,31,1f
10192 .1: mflr %r11
10193 . mtlr %r12
05d0e962 10194 . lis %r12,xxx-1b@highest
f891966f 10195 . ori %r12,%r12,xxx-1b@higher
05d0e962 10196 . sldi %r12,%r12,32
f891966f 10197 . oris %r12,%r12,xxx-1b@high
05d0e962 10198 . ori %r12,%r12,xxx-1b@l
f891966f 10199 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10200
10201static bfd_byte *
10202build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10203{
f891966f
AM
10204 bfd_put_32 (abfd, MFLR_R12, p);
10205 p += 4;
10206 bfd_put_32 (abfd, BCL_20_31, p);
10207 p += 4;
10208 bfd_put_32 (abfd, MFLR_R11, p);
10209 p += 4;
10210 bfd_put_32 (abfd, MTLR_R12, p);
10211 p += 4;
05d0e962
AM
10212 if (off + 0x8000 < 0x10000)
10213 {
10214 if (load)
10215 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10216 else
10217 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10218 p += 4;
10219 }
10220 else if (off + 0x80008000ULL < 0x100000000ULL)
10221 {
10222 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10223 p += 4;
10224 if (load)
10225 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10226 else
10227 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10228 p += 4;
10229 }
10230 else
10231 {
10232 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10233 {
10234 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10235 p += 4;
10236 }
10237 else
10238 {
10239 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10240 p += 4;
10241 if (((off >> 32) & 0xffff) != 0)
10242 {
10243 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10244 p += 4;
10245 }
10246 }
10247 if (((off >> 32) & 0xffffffffULL) != 0)
10248 {
10249 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10250 p += 4;
10251 }
10252 if (PPC_HI (off) != 0)
10253 {
10254 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10255 p += 4;
10256 }
10257 if (PPC_LO (off) != 0)
10258 {
10259 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10260 p += 4;
10261 }
10262 if (load)
10263 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10264 else
10265 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10266 p += 4;
10267 }
10268 return p;
10269}
10270
10271static unsigned int
10272size_offset (bfd_vma off)
10273{
10274 unsigned int size;
10275 if (off + 0x8000 < 0x10000)
10276 size = 4;
10277 else if (off + 0x80008000ULL < 0x100000000ULL)
10278 size = 8;
10279 else
10280 {
10281 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10282 size = 4;
10283 else
10284 {
10285 size = 4;
10286 if (((off >> 32) & 0xffff) != 0)
10287 size += 4;
10288 }
10289 if (((off >> 32) & 0xffffffffULL) != 0)
10290 size += 4;
10291 if (PPC_HI (off) != 0)
10292 size += 4;
10293 if (PPC_LO (off) != 0)
10294 size += 4;
10295 size += 4;
10296 }
f891966f 10297 return size + 16;
05d0e962
AM
10298}
10299
3d58e1fc
AM
10300static unsigned int
10301num_relocs_for_offset (bfd_vma off)
10302{
10303 unsigned int num_rel;
10304 if (off + 0x8000 < 0x10000)
10305 num_rel = 1;
10306 else if (off + 0x80008000ULL < 0x100000000ULL)
10307 num_rel = 2;
10308 else
10309 {
10310 num_rel = 1;
10311 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10312 && ((off >> 32) & 0xffff) != 0)
10313 num_rel += 1;
10314 if (PPC_HI (off) != 0)
10315 num_rel += 1;
10316 if (PPC_LO (off) != 0)
10317 num_rel += 1;
10318 }
10319 return num_rel;
10320}
10321
10322static Elf_Internal_Rela *
10323emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10324 bfd_vma roff, bfd_vma targ, bfd_vma off)
10325{
10326 bfd_vma relative_targ = targ - (roff - 8);
10327 if (bfd_big_endian (info->output_bfd))
10328 roff += 2;
10329 r->r_offset = roff;
10330 r->r_addend = relative_targ + roff;
10331 if (off + 0x8000 < 0x10000)
10332 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10333 else if (off + 0x80008000ULL < 0x100000000ULL)
10334 {
10335 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10336 ++r;
10337 roff += 4;
10338 r->r_offset = roff;
10339 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10340 r->r_addend = relative_targ + roff;
10341 }
10342 else
10343 {
10344 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10345 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10346 else
10347 {
10348 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10349 if (((off >> 32) & 0xffff) != 0)
10350 {
10351 ++r;
10352 roff += 4;
10353 r->r_offset = roff;
10354 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10355 r->r_addend = relative_targ + roff;
10356 }
10357 }
10358 if (((off >> 32) & 0xffffffffULL) != 0)
10359 roff += 4;
10360 if (PPC_HI (off) != 0)
10361 {
10362 ++r;
10363 roff += 4;
10364 r->r_offset = roff;
10365 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10366 r->r_addend = relative_targ + roff;
10367 }
10368 if (PPC_LO (off) != 0)
10369 {
10370 ++r;
10371 roff += 4;
10372 r->r_offset = roff;
10373 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10374 r->r_addend = relative_targ + roff;
10375 }
10376 }
10377 return r;
10378}
10379
04bdff6a
AM
10380static bfd_byte *
10381build_powerxx_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
10382 bfd_boolean load)
10383{
10384 uint64_t insn;
10385 if (off - odd + (1ULL << 33) < 1ULL << 34)
10386 {
10387 off -= odd;
10388 if (odd)
10389 {
10390 bfd_put_32 (abfd, NOP, p);
10391 p += 4;
10392 }
10393 if (load)
10394 insn = PLD_R12_PC;
10395 else
10396 insn = PADDI_R12_PC;
10397 insn |= D34 (off);
10398 bfd_put_32 (abfd, insn >> 32, p);
10399 p += 4;
10400 bfd_put_32 (abfd, insn, p);
10401 }
10402 /* The minimum value for paddi is -0x200000000. The minimum value
10403 for li is -0x8000, which when shifted by 34 and added gives a
10404 minimum value of -0x2000200000000. The maximum value is
10405 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10406 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10407 {
10408 off -= 8 - odd;
10409 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10410 p += 4;
10411 if (!odd)
10412 {
10413 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10414 p += 4;
10415 }
10416 insn = PADDI_R12_PC | D34 (off);
10417 bfd_put_32 (abfd, insn >> 32, p);
10418 p += 4;
10419 bfd_put_32 (abfd, insn, p);
10420 p += 4;
10421 if (odd)
10422 {
10423 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10424 p += 4;
10425 }
10426 if (load)
10427 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10428 else
10429 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10430 }
10431 else
10432 {
10433 off -= odd + 8;
10434 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10435 p += 4;
10436 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10437 p += 4;
10438 if (odd)
10439 {
10440 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10441 p += 4;
10442 }
10443 insn = PADDI_R12_PC | D34 (off);
10444 bfd_put_32 (abfd, insn >> 32, p);
10445 p += 4;
10446 bfd_put_32 (abfd, insn, p);
10447 p += 4;
10448 if (!odd)
10449 {
10450 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10451 p += 4;
10452 }
10453 if (load)
10454 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10455 else
10456 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10457 }
10458 p += 4;
10459 return p;
10460}
10461
10462static unsigned int
10463size_powerxx_offset (bfd_vma off, int odd)
10464{
10465 if (off - odd + (1ULL << 33) < 1ULL << 34)
10466 return odd + 8;
10467 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10468 return 20;
10469 else
10470 return 24;
10471}
10472
10473static unsigned int
10474num_relocs_for_powerxx_offset (bfd_vma off, int odd)
10475{
10476 if (off - odd + (1ULL << 33) < 1ULL << 34)
10477 return 1;
10478 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10479 return 2;
10480 else
10481 return 3;
10482}
10483
10484static Elf_Internal_Rela *
10485emit_relocs_for_powerxx_offset (struct bfd_link_info *info,
10486 Elf_Internal_Rela *r, bfd_vma roff,
10487 bfd_vma targ, bfd_vma off, int odd)
10488{
10489 if (off - odd + (1ULL << 33) < 1ULL << 34)
10490 roff += odd;
10491 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10492 {
10493 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10494 r->r_offset = roff + d_offset;
10495 r->r_addend = targ + 8 - odd - d_offset;
10496 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10497 ++r;
10498 roff += 8 - odd;
10499 }
10500 else
10501 {
10502 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10503 r->r_offset = roff + d_offset;
10504 r->r_addend = targ + 8 + odd - d_offset;
10505 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10506 ++r;
10507 roff += 4;
10508 r->r_offset = roff + d_offset;
10509 r->r_addend = targ + 4 + odd - d_offset;
10510 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10511 ++r;
10512 roff += 4 + odd;
10513 }
10514 r->r_offset = roff;
10515 r->r_addend = targ;
10516 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10517 return r;
10518}
10519
df136d64
AM
10520/* Emit .eh_frame opcode to advance pc by DELTA. */
10521
10522static bfd_byte *
10523eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10524{
10525 delta /= 4;
10526 if (delta < 64)
10527 *eh++ = DW_CFA_advance_loc + delta;
10528 else if (delta < 256)
10529 {
10530 *eh++ = DW_CFA_advance_loc1;
10531 *eh++ = delta;
10532 }
10533 else if (delta < 65536)
10534 {
10535 *eh++ = DW_CFA_advance_loc2;
10536 bfd_put_16 (abfd, delta, eh);
10537 eh += 2;
10538 }
10539 else
10540 {
10541 *eh++ = DW_CFA_advance_loc4;
10542 bfd_put_32 (abfd, delta, eh);
10543 eh += 4;
10544 }
10545 return eh;
10546}
10547
10548/* Size of required .eh_frame opcode to advance pc by DELTA. */
10549
10550static unsigned int
10551eh_advance_size (unsigned int delta)
10552{
10553 if (delta < 64 * 4)
10554 /* DW_CFA_advance_loc+[1..63]. */
10555 return 1;
10556 if (delta < 256 * 4)
10557 /* DW_CFA_advance_loc1, byte. */
10558 return 2;
10559 if (delta < 65536 * 4)
10560 /* DW_CFA_advance_loc2, 2 bytes. */
10561 return 3;
10562 /* DW_CFA_advance_loc4, 4 bytes. */
10563 return 5;
10564}
10565
794e51c0
AM
10566/* With power7 weakly ordered memory model, it is possible for ld.so
10567 to update a plt entry in one thread and have another thread see a
10568 stale zero toc entry. To avoid this we need some sort of acquire
10569 barrier in the call stub. One solution is to make the load of the
10570 toc word seem to appear to depend on the load of the function entry
10571 word. Another solution is to test for r2 being zero, and branch to
10572 the appropriate glink entry if so.
10573
10574 . fake dep barrier compare
71a39c98
AM
10575 . ld 12,xxx(2) ld 12,xxx(2)
10576 . mtctr 12 mtctr 12
10577 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10578 . add 2,2,11 cmpldi 2,0
10579 . ld 2,xxx+8(2) bnectr+
10580 . bctr b <glink_entry>
10581
10582 The solution involving the compare turns out to be faster, so
10583 that's what we use unless the branch won't reach. */
10584
10585#define ALWAYS_USE_FAKE_DEP 0
10586#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10587
794e51c0
AM
10588static inline unsigned int
10589plt_stub_size (struct ppc_link_hash_table *htab,
10590 struct ppc_stub_hash_entry *stub_entry,
10591 bfd_vma off)
10592{
05d0e962 10593 unsigned size;
b9e5796b 10594
05d0e962
AM
10595 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10596 {
04bdff6a
AM
10597 if (htab->powerxx_stubs)
10598 {
10599 bfd_vma start = (stub_entry->stub_offset
10600 + stub_entry->group->stub_sec->output_offset
10601 + stub_entry->group->stub_sec->output_section->vma);
10602 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10603 start += 4;
10604 size = 8 + size_powerxx_offset (off, start & 4);
10605 }
10606 else
10607 size = 8 + size_offset (off - 8);
05d0e962
AM
10608 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10609 size += 4;
10610 return size;
10611 }
10612
10613 size = 12;
b9e5796b
AM
10614 if (ALWAYS_EMIT_R2SAVE
10615 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10616 size += 4;
10617 if (PPC_HA (off) != 0)
794e51c0 10618 size += 4;
b9e5796b
AM
10619 if (htab->opd_abi)
10620 {
10621 size += 4;
e7d1c40c 10622 if (htab->params->plt_static_chain)
b9e5796b 10623 size += 4;
bd4d2eaa
AM
10624 if (htab->params->plt_thread_safe
10625 && htab->elf.dynamic_sections_created
10626 && stub_entry->h != NULL
10627 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10628 size += 8;
e7d1c40c 10629 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10630 size += 4;
10631 }
794e51c0
AM
10632 if (stub_entry->h != NULL
10633 && (stub_entry->h == htab->tls_get_addr_fd
10634 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10635 && htab->params->tls_get_addr_opt)
f378ab09
AM
10636 {
10637 size += 7 * 4;
e81b4c93 10638 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
407aa07c 10639 size += 6 * 4;
f378ab09 10640 }
794e51c0
AM
10641 return size;
10642}
10643
2420fff6
AM
10644/* Depending on the sign of plt_stub_align:
10645 If positive, return the padding to align to a 2**plt_stub_align
10646 boundary.
10647 If negative, if this stub would cross fewer 2**plt_stub_align
10648 boundaries if we align, then return the padding needed to do so. */
10649
794e51c0
AM
10650static inline unsigned int
10651plt_stub_pad (struct ppc_link_hash_table *htab,
10652 struct ppc_stub_hash_entry *stub_entry,
10653 bfd_vma plt_off)
10654{
2420fff6 10655 int stub_align;
1aa42141 10656 unsigned stub_size;
6f20ed8a 10657 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10658
2420fff6
AM
10659 if (htab->params->plt_stub_align >= 0)
10660 {
10661 stub_align = 1 << htab->params->plt_stub_align;
10662 if ((stub_off & (stub_align - 1)) != 0)
10663 return stub_align - (stub_off & (stub_align - 1));
10664 return 0;
10665 }
10666
10667 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10668 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10669 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10670 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10671 return stub_align - (stub_off & (stub_align - 1));
10672 return 0;
10673}
10674
10675/* Build a .plt call stub. */
10676
10677static inline bfd_byte *
10678build_plt_stub (struct ppc_link_hash_table *htab,
10679 struct ppc_stub_hash_entry *stub_entry,
10680 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10681{
e7d1c40c 10682 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10683 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10684 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10685 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10686 && htab->elf.dynamic_sections_created
10687 && stub_entry->h != NULL
10688 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10689 bfd_boolean use_fake_dep = plt_thread_safe;
10690 bfd_vma cmp_branch_off = 0;
10691
10692 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10693 && plt_load_toc
794e51c0 10694 && plt_thread_safe
bd4d2eaa
AM
10695 && !((stub_entry->h == htab->tls_get_addr_fd
10696 || stub_entry->h == htab->tls_get_addr)
7c9cf415 10697 && htab->params->tls_get_addr_opt))
794e51c0
AM
10698 {
10699 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10700 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10701 / PLT_ENTRY_SIZE (htab));
9e390558 10702 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10703 bfd_vma to, from;
10704
68d62958
AM
10705 if (pltindex > 32768)
10706 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10707 to = (glinkoff
10708 + htab->glink->output_offset
10709 + htab->glink->output_section->vma);
6f20ed8a 10710 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10711 + 4 * (ALWAYS_EMIT_R2SAVE
10712 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10713 + 4 * (PPC_HA (offset) != 0)
10714 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10715 != PPC_HA (offset))
10716 + 4 * (plt_static_chain != 0)
10717 + 20
6f20ed8a
AM
10718 + stub_entry->group->stub_sec->output_offset
10719 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10720 cmp_branch_off = to - from;
10721 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10722 }
10723
ac2df442
AM
10724 if (PPC_HA (offset) != 0)
10725 {
176a0d42
AM
10726 if (r != NULL)
10727 {
794e51c0
AM
10728 if (ALWAYS_EMIT_R2SAVE
10729 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10730 r[0].r_offset += 4;
176a0d42 10731 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10732 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10733 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10734 r[1].r_addend = r[0].r_addend;
b9e5796b 10735 if (plt_load_toc)
176a0d42 10736 {
b9e5796b 10737 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10738 {
b9e5796b
AM
10739 r[2].r_offset = r[1].r_offset + 4;
10740 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10741 r[2].r_addend = r[0].r_addend;
10742 }
10743 else
10744 {
10745 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10746 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10747 r[2].r_addend = r[0].r_addend + 8;
10748 if (plt_static_chain)
10749 {
10750 r[3].r_offset = r[2].r_offset + 4;
10751 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10752 r[3].r_addend = r[0].r_addend + 16;
10753 }
c7131b65 10754 }
176a0d42
AM
10755 }
10756 }
794e51c0
AM
10757 if (ALWAYS_EMIT_R2SAVE
10758 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10759 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10760 if (plt_load_toc)
10761 {
10762 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10763 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10764 }
10765 else
10766 {
10767 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10768 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10769 }
b9e5796b
AM
10770 if (plt_load_toc
10771 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10772 {
71a39c98 10773 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10774 offset = 0;
10775 }
71a39c98 10776 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10777 if (plt_load_toc)
794e51c0 10778 {
b9e5796b
AM
10779 if (use_fake_dep)
10780 {
10781 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10782 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10783 }
10784 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10785 if (plt_static_chain)
10786 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10787 }
ac2df442
AM
10788 }
10789 else
10790 {
176a0d42
AM
10791 if (r != NULL)
10792 {
794e51c0
AM
10793 if (ALWAYS_EMIT_R2SAVE
10794 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10795 r[0].r_offset += 4;
176a0d42 10796 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 10797 if (plt_load_toc)
176a0d42 10798 {
b9e5796b 10799 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10800 {
b9e5796b
AM
10801 r[1].r_offset = r[0].r_offset + 4;
10802 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
10803 r[1].r_addend = r[0].r_addend;
10804 }
10805 else
10806 {
10807 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
10808 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10809 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
10810 if (plt_static_chain)
10811 {
10812 r[2].r_offset = r[1].r_offset + 4;
10813 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
10814 r[2].r_addend = r[0].r_addend + 8;
10815 }
c7131b65 10816 }
176a0d42
AM
10817 }
10818 }
794e51c0
AM
10819 if (ALWAYS_EMIT_R2SAVE
10820 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10821 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 10822 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
10823 if (plt_load_toc
10824 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
10825 {
10826 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
10827 offset = 0;
10828 }
71a39c98 10829 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10830 if (plt_load_toc)
794e51c0 10831 {
b9e5796b
AM
10832 if (use_fake_dep)
10833 {
10834 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
10835 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
10836 }
10837 if (plt_static_chain)
10838 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
10839 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 10840 }
ac2df442 10841 }
b9e5796b 10842 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
10843 {
10844 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
10845 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 10846 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
10847 }
10848 else
407aa07c 10849 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
10850 return p;
10851}
10852
a7f2871e
AM
10853/* Build a special .plt call stub for __tls_get_addr. */
10854
10855#define LD_R11_0R3 0xe9630000
10856#define LD_R12_0R3 0xe9830000
10857#define MR_R0_R3 0x7c601b78
10858#define CMPDI_R11_0 0x2c2b0000
10859#define ADD_R3_R12_R13 0x7c6c6a14
10860#define BEQLR 0x4d820020
10861#define MR_R3_R0 0x7c030378
a7f2871e
AM
10862#define STD_R11_0R1 0xf9610000
10863#define BCTRL 0x4e800421
10864#define LD_R11_0R1 0xe9610000
a7f2871e
AM
10865#define MTLR_R11 0x7d6803a6
10866
10867static inline bfd_byte *
794e51c0
AM
10868build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
10869 struct ppc_stub_hash_entry *stub_entry,
10870 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 10871{
e7d1c40c 10872 bfd *obfd = htab->params->stub_bfd;
df136d64 10873 bfd_byte *loc = p;
794e51c0 10874
a7f2871e
AM
10875 bfd_put_32 (obfd, LD_R11_0R3 + 0, p), p += 4;
10876 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
10877 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
10878 bfd_put_32 (obfd, CMPDI_R11_0, p), p += 4;
10879 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
10880 bfd_put_32 (obfd, BEQLR, p), p += 4;
10881 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
f378ab09
AM
10882 if (r != NULL)
10883 r[0].r_offset += 7 * 4;
e81b4c93 10884 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
f378ab09
AM
10885 return build_plt_stub (htab, stub_entry, p, offset, r);
10886
a7f2871e 10887 bfd_put_32 (obfd, MFLR_R11, p), p += 4;
a078d95a 10888 bfd_put_32 (obfd, STD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10889
10890 if (r != NULL)
f378ab09 10891 r[0].r_offset += 2 * 4;
794e51c0 10892 p = build_plt_stub (htab, stub_entry, p, offset, r);
407aa07c 10893 bfd_put_32 (obfd, BCTRL, p - 4);
a7f2871e 10894
a078d95a 10895 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p), p += 4;
bd4d2eaa 10896 bfd_put_32 (obfd, LD_R11_0R1 + STK_LINKER (htab), p), p += 4;
a7f2871e
AM
10897 bfd_put_32 (obfd, MTLR_R11, p), p += 4;
10898 bfd_put_32 (obfd, BLR, p), p += 4;
10899
df136d64
AM
10900 if (htab->glink_eh_frame != NULL
10901 && htab->glink_eh_frame->size != 0)
10902 {
10903 bfd_byte *base, *eh;
10904 unsigned int lr_used, delta;
10905
10906 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
10907 eh = base + stub_entry->group->eh_size;
10908 lr_used = stub_entry->stub_offset + (p - 20 - loc);
10909 delta = lr_used - stub_entry->group->lr_restore;
10910 stub_entry->group->lr_restore = lr_used + 16;
10911 eh = eh_advance (htab->elf.dynobj, eh, delta);
10912 *eh++ = DW_CFA_offset_extended_sf;
10913 *eh++ = 65;
10914 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
10915 *eh++ = DW_CFA_advance_loc + 4;
10916 *eh++ = DW_CFA_restore_extended;
10917 *eh++ = 65;
10918 stub_entry->group->eh_size = eh - base;
10919 }
a7f2871e
AM
10920 return p;
10921}
10922
176a0d42
AM
10923static Elf_Internal_Rela *
10924get_relocs (asection *sec, int count)
10925{
10926 Elf_Internal_Rela *relocs;
10927 struct bfd_elf_section_data *elfsec_data;
10928
10929 elfsec_data = elf_section_data (sec);
10930 relocs = elfsec_data->relocs;
10931 if (relocs == NULL)
10932 {
10933 bfd_size_type relsize;
10934 relsize = sec->reloc_count * sizeof (*relocs);
10935 relocs = bfd_alloc (sec->owner, relsize);
10936 if (relocs == NULL)
10937 return NULL;
10938 elfsec_data->relocs = relocs;
d4730f92
BS
10939 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
10940 sizeof (Elf_Internal_Shdr));
10941 if (elfsec_data->rela.hdr == NULL)
10942 return NULL;
10943 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
10944 * sizeof (Elf64_External_Rela));
10945 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
10946 sec->reloc_count = 0;
10947 }
10948 relocs += sec->reloc_count;
10949 sec->reloc_count += count;
10950 return relocs;
10951}
10952
3d58e1fc
AM
10953/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
10954 forms, to the equivalent relocs against the global symbol given by
10955 STUB_ENTRY->H. */
10956
10957static bfd_boolean
10958use_global_in_relocs (struct ppc_link_hash_table *htab,
10959 struct ppc_stub_hash_entry *stub_entry,
10960 Elf_Internal_Rela *r, unsigned int num_rel)
10961{
10962 struct elf_link_hash_entry **hashes;
10963 unsigned long symndx;
10964 struct ppc_link_hash_entry *h;
10965 bfd_vma symval;
10966
10967 /* Relocs are always against symbols in their own object file. Fake
10968 up global sym hashes for the stub bfd (which has no symbols). */
10969 hashes = elf_sym_hashes (htab->params->stub_bfd);
10970 if (hashes == NULL)
10971 {
10972 bfd_size_type hsize;
10973
10974 /* When called the first time, stub_globals will contain the
10975 total number of symbols seen during stub sizing. After
10976 allocating, stub_globals is used as an index to fill the
10977 hashes array. */
10978 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
10979 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
10980 if (hashes == NULL)
10981 return FALSE;
10982 elf_sym_hashes (htab->params->stub_bfd) = hashes;
10983 htab->stub_globals = 1;
10984 }
10985 symndx = htab->stub_globals++;
10986 h = stub_entry->h;
10987 hashes[symndx] = &h->elf;
10988 if (h->oh != NULL && h->oh->is_func)
10989 h = ppc_follow_link (h->oh);
10990 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
10991 || h->elf.root.type == bfd_link_hash_defweak);
10992 symval = (h->elf.root.u.def.value
10993 + h->elf.root.u.def.section->output_offset
10994 + h->elf.root.u.def.section->output_section->vma);
10995 while (num_rel-- != 0)
10996 {
10997 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
10998 if (h->elf.root.u.def.section != stub_entry->target_section)
10999 {
11000 /* H is an opd symbol. The addend must be zero, and the
11001 branch reloc is the only one we can convert. */
11002 r->r_addend = 0;
11003 break;
11004 }
11005 else
11006 r->r_addend -= symval;
11007 --r;
11008 }
11009 return TRUE;
11010}
11011
aa374f67 11012static bfd_vma
25f53a85 11013get_r2off (struct bfd_link_info *info,
aa374f67
AM
11014 struct ppc_stub_hash_entry *stub_entry)
11015{
25f53a85 11016 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11017 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11018
11019 if (r2off == 0)
11020 {
11021 /* Support linking -R objects. Get the toc pointer from the
11022 opd entry. */
11023 char buf[8];
b9e5796b
AM
11024 if (!htab->opd_abi)
11025 return r2off;
aa374f67
AM
11026 asection *opd = stub_entry->h->elf.root.u.def.section;
11027 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11028
11029 if (strcmp (opd->name, ".opd") != 0
11030 || opd->reloc_count != 0)
11031 {
2cdcc330
AM
11032 info->callbacks->einfo
11033 (_("%P: cannot find opd entry toc for `%pT'\n"),
11034 stub_entry->h->elf.root.root.string);
aa374f67 11035 bfd_set_error (bfd_error_bad_value);
a7c49797 11036 return (bfd_vma) -1;
aa374f67
AM
11037 }
11038 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11039 return (bfd_vma) -1;
aa374f67 11040 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11041 r2off -= elf_gp (info->output_bfd);
aa374f67 11042 }
6f20ed8a 11043 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11044 return r2off;
11045}
11046
b34976b6 11047static bfd_boolean
4ce794b7 11048ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11049{
721956f4
AM
11050 struct ppc_stub_hash_entry *stub_entry;
11051 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11052 struct bfd_link_info *info;
11053 struct ppc_link_hash_table *htab;
721956f4 11054 bfd_byte *loc;
3d58e1fc 11055 bfd_byte *p, *relp;
1aa42141 11056 bfd_vma targ, off;
176a0d42 11057 Elf_Internal_Rela *r;
e054468f 11058 asection *plt;
3d58e1fc 11059 int num_rel;
04bdff6a 11060 int odd;
5d1634d7 11061
721956f4
AM
11062 /* Massage our args to the form they really have. */
11063 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11064 info = in_arg;
5d1634d7 11065
5d1634d7 11066 htab = ppc_hash_table (info);
4dfe6ac6
NC
11067 if (htab == NULL)
11068 return FALSE;
5d1634d7 11069
1aa42141 11070 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11071 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11072
4ce794b7 11073 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11074 switch (stub_entry->stub_type)
5d1634d7 11075 {
721956f4 11076 case ppc_stub_long_branch:
ad8e1ba5 11077 case ppc_stub_long_branch_r2off:
721956f4 11078 /* Branches are relative. This is where we are going to. */
1aa42141 11079 targ = (stub_entry->target_value
6911b7dc
AM
11080 + stub_entry->target_section->output_offset
11081 + stub_entry->target_section->output_section->vma);
1aa42141 11082 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11083
721956f4 11084 /* And this is where we are coming from. */
1aa42141
AM
11085 off = (stub_entry->stub_offset
11086 + stub_entry->group->stub_sec->output_offset
11087 + stub_entry->group->stub_sec->output_section->vma);
11088 off = targ - off;
e86ce104 11089
9e390558 11090 p = loc;
ac2df442 11091 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11092 {
25f53a85 11093 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11094
a7c49797 11095 if (r2off == (bfd_vma) -1)
aa374f67
AM
11096 {
11097 htab->stub_error = TRUE;
11098 return FALSE;
11099 }
9e390558
AM
11100 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11101 p += 4;
ac2df442
AM
11102 if (PPC_HA (r2off) != 0)
11103 {
e7d1c40c 11104 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11105 ADDIS_R2_R2 | PPC_HA (r2off), p);
11106 p += 4;
a7c49797
AM
11107 }
11108 if (PPC_LO (r2off) != 0)
11109 {
11110 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11111 ADDI_R2_R2 | PPC_LO (r2off), p);
11112 p += 4;
ac2df442 11113 }
9e390558 11114 off -= p - loc;
ad8e1ba5 11115 }
9e390558
AM
11116 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11117 p += 4;
ad8e1ba5 11118
5c3dead3
AM
11119 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11120 {
cf97bcb0
AM
11121 _bfd_error_handler
11122 (_("long branch stub `%s' offset overflow"),
bc30df16 11123 stub_entry->root.string);
5c3dead3
AM
11124 htab->stub_error = TRUE;
11125 return FALSE;
11126 }
ee75fd95
AM
11127
11128 if (info->emitrelocations)
11129 {
6f20ed8a 11130 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11131 if (r == NULL)
11132 return FALSE;
9e390558 11133 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11134 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11135 r->r_addend = targ;
3d58e1fc
AM
11136 if (stub_entry->h != NULL
11137 && !use_global_in_relocs (htab, stub_entry, r, 1))
11138 return FALSE;
ee75fd95 11139 }
721956f4 11140 break;
e86ce104 11141
721956f4 11142 case ppc_stub_plt_branch:
ad8e1ba5 11143 case ppc_stub_plt_branch_r2off:
721956f4
AM
11144 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11145 stub_entry->root.string + 9,
b34976b6 11146 FALSE, FALSE);
721956f4
AM
11147 if (br_entry == NULL)
11148 {
cf97bcb0
AM
11149 _bfd_error_handler (_("can't find branch stub `%s'"),
11150 stub_entry->root.string);
b34976b6
AM
11151 htab->stub_error = TRUE;
11152 return FALSE;
721956f4
AM
11153 }
11154
1aa42141 11155 targ = (stub_entry->target_value
176a0d42
AM
11156 + stub_entry->target_section->output_offset
11157 + stub_entry->target_section->output_section->vma);
6911b7dc 11158 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11159 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11160
1aa42141 11161 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11162 htab->brlt->contents + br_entry->offset);
721956f4 11163
f94498ff 11164 if (br_entry->iter == htab->stub_iteration)
721956f4 11165 {
f94498ff 11166 br_entry->iter = 0;
84f5d08e 11167
f94498ff 11168 if (htab->relbrlt != NULL)
84f5d08e 11169 {
f94498ff
AM
11170 /* Create a reloc for the branch lookup table entry. */
11171 Elf_Internal_Rela rela;
11172 bfd_byte *rl;
11173
11174 rela.r_offset = (br_entry->offset
11175 + htab->brlt->output_offset
11176 + htab->brlt->output_section->vma);
11177 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11178 rela.r_addend = targ;
f94498ff
AM
11179
11180 rl = htab->relbrlt->contents;
11181 rl += (htab->relbrlt->reloc_count++
11182 * sizeof (Elf64_External_Rela));
11183 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11184 }
11185 else if (info->emitrelocations)
11186 {
176a0d42
AM
11187 r = get_relocs (htab->brlt, 1);
11188 if (r == NULL)
11189 return FALSE;
11190 /* brlt, being SEC_LINKER_CREATED does not go through the
11191 normal reloc processing. Symbols and offsets are not
11192 translated from input file to output file form, so
11193 set up the offset per the output file. */
f94498ff
AM
11194 r->r_offset = (br_entry->offset
11195 + htab->brlt->output_offset
11196 + htab->brlt->output_section->vma);
11197 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11198 r->r_addend = targ;
84f5d08e 11199 }
84f5d08e 11200 }
721956f4 11201
1aa42141 11202 targ = (br_entry->offset
176a0d42
AM
11203 + htab->brlt->output_offset
11204 + htab->brlt->output_section->vma);
11205
1aa42141
AM
11206 off = (elf_gp (info->output_bfd)
11207 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11208 off = targ - off;
721956f4 11209
ad8e1ba5 11210 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11211 {
25f53a85 11212 info->callbacks->einfo
c1c8c1ef 11213 (_("%P: linkage table error against `%pT'\n"),
721956f4 11214 stub_entry->root.string);
5d1634d7 11215 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11216 htab->stub_error = TRUE;
11217 return FALSE;
5d1634d7 11218 }
41bd81ab 11219
176a0d42
AM
11220 if (info->emitrelocations)
11221 {
6f20ed8a 11222 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11223 if (r == NULL)
11224 return FALSE;
6f20ed8a 11225 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11226 if (bfd_big_endian (info->output_bfd))
11227 r[0].r_offset += 2;
00f412ee 11228 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11229 r[0].r_offset += 4;
11230 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11231 r[0].r_addend = targ;
176a0d42
AM
11232 if (PPC_HA (off) != 0)
11233 {
11234 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11235 r[1].r_offset = r[0].r_offset + 4;
11236 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11237 r[1].r_addend = r[0].r_addend;
11238 }
11239 }
11240
9e390558 11241 p = loc;
00f412ee 11242 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11243 {
176a0d42 11244 if (PPC_HA (off) != 0)
ac2df442 11245 {
e7d1c40c 11246 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11247 ADDIS_R12_R2 | PPC_HA (off), p);
11248 p += 4;
e7d1c40c 11249 bfd_put_32 (htab->params->stub_bfd,
9e390558 11250 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11251 }
11252 else
9e390558
AM
11253 bfd_put_32 (htab->params->stub_bfd,
11254 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11255 }
11256 else
11257 {
25f53a85 11258 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11259
a7c49797 11260 if (r2off == (bfd_vma) -1)
aa374f67
AM
11261 {
11262 htab->stub_error = TRUE;
11263 return FALSE;
11264 }
ad8e1ba5 11265
9e390558
AM
11266 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11267 p += 4;
176a0d42 11268 if (PPC_HA (off) != 0)
ac2df442 11269 {
e7d1c40c 11270 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11271 ADDIS_R12_R2 | PPC_HA (off), p);
11272 p += 4;
e7d1c40c 11273 bfd_put_32 (htab->params->stub_bfd,
9e390558 11274 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11275 }
11276 else
9e390558 11277 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11278
11279 if (PPC_HA (r2off) != 0)
11280 {
9e390558 11281 p += 4;
e7d1c40c 11282 bfd_put_32 (htab->params->stub_bfd,
9e390558 11283 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11284 }
11285 if (PPC_LO (r2off) != 0)
11286 {
9e390558 11287 p += 4;
e7d1c40c 11288 bfd_put_32 (htab->params->stub_bfd,
9e390558 11289 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11290 }
ad8e1ba5 11291 }
9e390558
AM
11292 p += 4;
11293 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11294 p += 4;
407aa07c
AM
11295 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11296 p += 4;
721956f4 11297 break;
5d1634d7 11298
05d0e962
AM
11299 case ppc_stub_long_branch_notoc:
11300 case ppc_stub_long_branch_both:
11301 case ppc_stub_plt_branch_notoc:
11302 case ppc_stub_plt_branch_both:
11303 case ppc_stub_plt_call_notoc:
11304 case ppc_stub_plt_call_both:
11305 p = loc;
f891966f 11306 off = (stub_entry->stub_offset
05d0e962
AM
11307 + stub_entry->group->stub_sec->output_offset
11308 + stub_entry->group->stub_sec->output_section->vma);
11309 if (stub_entry->stub_type == ppc_stub_long_branch_both
11310 || stub_entry->stub_type == ppc_stub_plt_branch_both
11311 || stub_entry->stub_type == ppc_stub_plt_call_both)
11312 {
11313 off += 4;
11314 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11315 p += 4;
11316 }
11317 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11318 {
11319 targ = stub_entry->plt_ent->plt.offset & ~1;
11320 if (targ >= (bfd_vma) -2)
11321 abort ();
11322
11323 plt = htab->elf.splt;
11324 if (!htab->elf.dynamic_sections_created
11325 || stub_entry->h == NULL
11326 || stub_entry->h->elf.dynindx == -1)
11327 {
11328 if (stub_entry->symtype == STT_GNU_IFUNC)
11329 plt = htab->elf.iplt;
11330 else
11331 plt = htab->pltlocal;
11332 }
11333 targ += plt->output_offset + plt->output_section->vma;
11334 }
11335 else
11336 targ = (stub_entry->target_value
11337 + stub_entry->target_section->output_offset
11338 + stub_entry->target_section->output_section->vma);
04bdff6a 11339 odd = off & 4;
05d0e962 11340 off = targ - off;
f891966f 11341
3d58e1fc
AM
11342 relp = p;
11343 num_rel = 0;
04bdff6a
AM
11344 if (htab->powerxx_stubs)
11345 {
11346 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
11347 p = build_powerxx_offset (htab->params->stub_bfd, p, off, odd, load);
11348 }
11349 else
11350 {
11351 /* The notoc stubs calculate their target (either a PLT entry or
11352 the global entry point of a function) relative to the PC
11353 returned by the "bcl" two instructions past the start of the
11354 sequence emitted by build_offset. The offset is therefore 8
11355 less than calculated from the start of the sequence. */
11356 off -= 8;
11357 p = build_offset (htab->params->stub_bfd, p, off,
11358 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11359 }
11360
f891966f 11361 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11362 {
f891966f 11363 bfd_vma from;
3d58e1fc 11364 num_rel = 1;
f891966f
AM
11365 from = (stub_entry->stub_offset
11366 + stub_entry->group->stub_sec->output_offset
11367 + stub_entry->group->stub_sec->output_section->vma
11368 + (p - loc));
05d0e962 11369 bfd_put_32 (htab->params->stub_bfd,
f891966f 11370 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11371 }
11372 else
11373 {
11374 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11375 p += 4;
11376 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11377 }
11378 p += 4;
df136d64 11379
3d58e1fc
AM
11380 if (info->emitrelocations)
11381 {
04bdff6a
AM
11382 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
11383 if (htab->powerxx_stubs)
11384 num_rel += num_relocs_for_powerxx_offset (off, odd);
11385 else
11386 {
11387 num_rel += num_relocs_for_offset (off);
11388 roff += 16;
11389 }
3d58e1fc
AM
11390 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11391 if (r == NULL)
11392 return FALSE;
04bdff6a
AM
11393 if (htab->powerxx_stubs)
11394 r = emit_relocs_for_powerxx_offset (info, r, roff, targ, off, odd);
11395 else
11396 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11397 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11398 || stub_entry->stub_type == ppc_stub_long_branch_both)
11399 {
11400 ++r;
11401 roff = p - 4 - stub_entry->group->stub_sec->contents;
11402 r->r_offset = roff;
11403 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11404 r->r_addend = targ;
11405 if (stub_entry->h != NULL
11406 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11407 return FALSE;
11408 }
11409 }
11410
04bdff6a
AM
11411 if (!htab->powerxx_stubs
11412 && htab->glink_eh_frame != NULL
11413 && htab->glink_eh_frame->size != 0)
df136d64
AM
11414 {
11415 bfd_byte *base, *eh;
11416 unsigned int lr_used, delta;
11417
11418 base = (htab->glink_eh_frame->contents
11419 + stub_entry->group->eh_base + 17);
11420 eh = base + stub_entry->group->eh_size;
11421 lr_used = stub_entry->stub_offset + 8;
11422 if (stub_entry->stub_type == ppc_stub_long_branch_both
11423 || stub_entry->stub_type == ppc_stub_plt_branch_both
11424 || stub_entry->stub_type == ppc_stub_plt_call_both)
11425 lr_used += 4;
11426 delta = lr_used - stub_entry->group->lr_restore;
11427 stub_entry->group->lr_restore = lr_used + 8;
11428 eh = eh_advance (htab->elf.dynobj, eh, delta);
11429 *eh++ = DW_CFA_register;
11430 *eh++ = 65;
11431 *eh++ = 12;
11432 *eh++ = DW_CFA_advance_loc + 2;
11433 *eh++ = DW_CFA_restore_extended;
11434 *eh++ = 65;
11435 stub_entry->group->eh_size = eh - base;
11436 }
05d0e962
AM
11437 break;
11438
721956f4 11439 case ppc_stub_plt_call:
794e51c0 11440 case ppc_stub_plt_call_r2save:
e054468f 11441 if (stub_entry->h != NULL
b31867b6
AM
11442 && stub_entry->h->is_func_descriptor
11443 && stub_entry->h->oh != NULL)
c862ae31 11444 {
b31867b6
AM
11445 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11446
11447 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11448 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11449 if (fh->elf.root.type == bfd_link_hash_undefined
11450 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11451 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11452 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11453 }
11454
721956f4 11455 /* Now build the stub. */
1aa42141
AM
11456 targ = stub_entry->plt_ent->plt.offset & ~1;
11457 if (targ >= (bfd_vma) -2)
721956f4
AM
11458 abort ();
11459
33e44f2e 11460 plt = htab->elf.splt;
25f23106
AM
11461 if (!htab->elf.dynamic_sections_created
11462 || stub_entry->h == NULL
11463 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11464 {
11465 if (stub_entry->symtype == STT_GNU_IFUNC)
11466 plt = htab->elf.iplt;
11467 else
11468 plt = htab->pltlocal;
11469 }
1aa42141 11470 targ += plt->output_offset + plt->output_section->vma;
e054468f 11471
1aa42141
AM
11472 off = (elf_gp (info->output_bfd)
11473 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11474 off = targ - off;
721956f4 11475
ad8e1ba5 11476 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11477 {
25f53a85 11478 info->callbacks->einfo
695344c0 11479 /* xgettext:c-format */
c1c8c1ef 11480 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11481 stub_entry->h != NULL
11482 ? stub_entry->h->elf.root.root.string
11483 : "<local sym>");
721956f4 11484 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11485 htab->stub_error = TRUE;
11486 return FALSE;
721956f4
AM
11487 }
11488
176a0d42
AM
11489 r = NULL;
11490 if (info->emitrelocations)
11491 {
6f20ed8a 11492 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11493 ((PPC_HA (off) != 0)
11494 + (htab->opd_abi
e7d1c40c 11495 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11496 && PPC_HA (off + 16) == PPC_HA (off))
11497 : 1)));
176a0d42
AM
11498 if (r == NULL)
11499 return FALSE;
6f20ed8a 11500 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11501 if (bfd_big_endian (info->output_bfd))
11502 r[0].r_offset += 2;
1aa42141 11503 r[0].r_addend = targ;
176a0d42 11504 }
a7f2871e
AM
11505 if (stub_entry->h != NULL
11506 && (stub_entry->h == htab->tls_get_addr_fd
11507 || stub_entry->h == htab->tls_get_addr)
7c9cf415 11508 && htab->params->tls_get_addr_opt)
794e51c0 11509 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11510 else
794e51c0 11511 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11512 break;
11513
a4b6fadd
AM
11514 case ppc_stub_save_res:
11515 return TRUE;
11516
721956f4
AM
11517 default:
11518 BFD_FAIL ();
b34976b6 11519 return FALSE;
721956f4
AM
11520 }
11521
1aa42141 11522 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11523
e7d1c40c 11524 if (htab->params->emit_stub_syms)
97b639ba
AM
11525 {
11526 struct elf_link_hash_entry *h;
ee75fd95
AM
11527 size_t len1, len2;
11528 char *name;
11529 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11530 "long_branch",
11531 "long_branch",
3f6ff479
AM
11532 "long_branch",
11533 "plt_branch",
ee75fd95 11534 "plt_branch",
05d0e962
AM
11535 "plt_branch",
11536 "plt_branch",
11537 "plt_call",
11538 "plt_call",
794e51c0 11539 "plt_call",
ee75fd95
AM
11540 "plt_call" };
11541
11542 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11543 len2 = strlen (stub_entry->root.string);
11544 name = bfd_malloc (len1 + len2 + 2);
11545 if (name == NULL)
11546 return FALSE;
11547 memcpy (name, stub_entry->root.string, 9);
11548 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11549 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11550 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11551 if (h == NULL)
11552 return FALSE;
11553 if (h->root.type == bfd_link_hash_new)
11554 {
11555 h->root.type = bfd_link_hash_defined;
6f20ed8a 11556 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11557 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11558 h->ref_regular = 1;
11559 h->def_regular = 1;
11560 h->ref_regular_nonweak = 1;
11561 h->forced_local = 1;
11562 h->non_elf = 0;
2ec55de3 11563 h->root.linker_def = 1;
97b639ba
AM
11564 }
11565 }
11566
b34976b6 11567 return TRUE;
721956f4
AM
11568}
11569
11570/* As above, but don't actually build the stub. Just bump offset so
11571 we know stub section sizes, and select plt_branch stubs where
11572 long_branch stubs won't do. */
11573
b34976b6 11574static bfd_boolean
4ce794b7 11575ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11576{
11577 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11578 struct bfd_link_info *info;
721956f4 11579 struct ppc_link_hash_table *htab;
f891966f
AM
11580 asection *plt;
11581 bfd_vma targ, off, r2off;
04bdff6a 11582 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11583
11584 /* Massage our args to the form they really have. */
11585 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11586 info = in_arg;
11587
11588 htab = ppc_hash_table (info);
4dfe6ac6
NC
11589 if (htab == NULL)
11590 return FALSE;
721956f4 11591
1aa42141
AM
11592 /* Make a note of the offset within the stubs for this entry. */
11593 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11594
a4b6fadd
AM
11595 if (stub_entry->h != NULL
11596 && stub_entry->h->save_res
11597 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11598 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11599 {
11600 /* Don't make stubs to out-of-line register save/restore
11601 functions. Instead, emit copies of the functions. */
11602 stub_entry->group->needs_save_res = 1;
11603 stub_entry->stub_type = ppc_stub_save_res;
11604 return TRUE;
11605 }
11606
f891966f 11607 switch (stub_entry->stub_type)
721956f4 11608 {
f891966f
AM
11609 case ppc_stub_plt_branch:
11610 case ppc_stub_plt_branch_r2off:
11611 /* Reset the stub type from the plt branch variant in case we now
11612 can reach with a shorter stub. */
11613 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11614 /* Fall through. */
11615 case ppc_stub_long_branch:
11616 case ppc_stub_long_branch_r2off:
1aa42141
AM
11617 targ = (stub_entry->target_value
11618 + stub_entry->target_section->output_offset
11619 + stub_entry->target_section->output_section->vma);
f891966f 11620 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11621 off = (stub_entry->stub_offset
11622 + stub_entry->group->stub_sec->output_offset
11623 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11624
ad8e1ba5 11625 size = 4;
f891966f 11626 r2off = 0;
ad8e1ba5
AM
11627 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11628 {
25f53a85 11629 r2off = get_r2off (info, stub_entry);
a7c49797 11630 if (r2off == (bfd_vma) -1)
aa374f67
AM
11631 {
11632 htab->stub_error = TRUE;
11633 return FALSE;
11634 }
a7c49797 11635 size = 8;
ac2df442 11636 if (PPC_HA (r2off) != 0)
a7c49797
AM
11637 size += 4;
11638 if (PPC_LO (r2off) != 0)
11639 size += 4;
1aa42141 11640 off += size - 4;
ad8e1ba5 11641 }
1aa42141 11642 off = targ - off;
ad8e1ba5 11643
f891966f
AM
11644 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11645 Do the same for -R objects without function descriptors. */
11646 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11647 && r2off == 0
11648 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11649 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11650 {
f891966f 11651 struct ppc_branch_hash_entry *br_entry;
df136d64 11652
f891966f
AM
11653 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11654 stub_entry->root.string + 9,
11655 TRUE, FALSE);
11656 if (br_entry == NULL)
721956f4 11657 {
f891966f
AM
11658 _bfd_error_handler (_("can't build branch stub `%s'"),
11659 stub_entry->root.string);
11660 htab->stub_error = TRUE;
11661 return FALSE;
721956f4
AM
11662 }
11663
f891966f 11664 if (br_entry->iter != htab->stub_iteration)
721956f4 11665 {
f891966f
AM
11666 br_entry->iter = htab->stub_iteration;
11667 br_entry->offset = htab->brlt->size;
11668 htab->brlt->size += 8;
63bc6f6c 11669
f891966f
AM
11670 if (htab->relbrlt != NULL)
11671 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11672 else if (info->emitrelocations)
84f5d08e 11673 {
f891966f
AM
11674 htab->brlt->reloc_count += 1;
11675 htab->brlt->flags |= SEC_RELOC;
05d0e962 11676 }
f891966f 11677 }
ac2df442 11678
f891966f
AM
11679 targ = (br_entry->offset
11680 + htab->brlt->output_offset
11681 + htab->brlt->output_section->vma);
11682 off = (elf_gp (info->output_bfd)
11683 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11684 off = targ - off;
176a0d42 11685
f891966f
AM
11686 if (info->emitrelocations)
11687 {
11688 stub_entry->group->stub_sec->reloc_count
11689 += 1 + (PPC_HA (off) != 0);
11690 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11691 }
05d0e962 11692
f891966f
AM
11693 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
11694 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
11695 {
11696 size = 12;
11697 if (PPC_HA (off) != 0)
11698 size = 16;
ac2df442 11699 }
f891966f 11700 else
ac2df442 11701 {
f891966f
AM
11702 size = 16;
11703 if (PPC_HA (off) != 0)
11704 size += 4;
11705
11706 if (PPC_HA (r2off) != 0)
11707 size += 4;
11708 if (PPC_LO (r2off) != 0)
11709 size += 4;
ac2df442 11710 }
721956f4 11711 }
f891966f
AM
11712 else if (info->emitrelocations)
11713 {
11714 stub_entry->group->stub_sec->reloc_count += 1;
11715 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11716 }
11717 break;
11718
11719 case ppc_stub_plt_branch_notoc:
11720 case ppc_stub_plt_branch_both:
11721 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11722 /* Fall through. */
11723 case ppc_stub_long_branch_notoc:
11724 case ppc_stub_long_branch_both:
11725 off = (stub_entry->stub_offset
11726 + stub_entry->group->stub_sec->output_offset
11727 + stub_entry->group->stub_sec->output_section->vma);
11728 size = 0;
11729 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11730 size = 4;
11731 off += size;
11732 targ = (stub_entry->target_value
11733 + stub_entry->target_section->output_offset
11734 + stub_entry->target_section->output_section->vma);
04bdff6a 11735 odd = off & 4;
f891966f
AM
11736 off = targ - off;
11737
3d58e1fc
AM
11738 if (info->emitrelocations)
11739 {
04bdff6a
AM
11740 unsigned int num_rel;
11741 if (htab->powerxx_stubs)
11742 num_rel = num_relocs_for_powerxx_offset (off, odd);
11743 else
11744 num_rel = num_relocs_for_offset (off - 8);
11745 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11746 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11747 }
11748
04bdff6a
AM
11749 if (htab->powerxx_stubs)
11750 extra = size_powerxx_offset (off, odd);
11751 else
11752 extra = size_offset (off - 8);
f891966f
AM
11753 /* Include branch insn plus those in the offset sequence. */
11754 size += 4 + extra;
11755 /* The branch insn is at the end, or "extra" bytes along. So
11756 its offset will be "extra" bytes less that that already
11757 calculated. */
11758 off -= extra;
11759
04bdff6a
AM
11760 if (!htab->powerxx_stubs)
11761 {
11762 /* After the bcl, lr has been modified so we need to emit
11763 .eh_frame info saying the return address is in r12. */
11764 lr_used = stub_entry->stub_offset + 8;
11765 if (stub_entry->stub_type == ppc_stub_long_branch_both)
11766 lr_used += 4;
11767 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11768 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11769 DW_CFA_restore_extended 65. */
11770 delta = lr_used - stub_entry->group->lr_restore;
11771 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11772 stub_entry->group->lr_restore = lr_used + 8;
11773 }
f891966f
AM
11774
11775 /* If the branch can't reach, use a plt_branch. */
11776 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11777 {
11778 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
11779 - ppc_stub_long_branch_notoc);
11780 size += 4;
11781 }
3d58e1fc
AM
11782 else if (info->emitrelocations)
11783 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
11784 break;
11785
11786 case ppc_stub_plt_call_notoc:
11787 case ppc_stub_plt_call_both:
11788 off = (stub_entry->stub_offset
11789 + stub_entry->group->stub_sec->output_offset
11790 + stub_entry->group->stub_sec->output_section->vma);
11791 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11792 off += 4;
11793 targ = stub_entry->plt_ent->plt.offset & ~1;
11794 if (targ >= (bfd_vma) -2)
11795 abort ();
11796
11797 plt = htab->elf.splt;
11798 if (!htab->elf.dynamic_sections_created
11799 || stub_entry->h == NULL
11800 || stub_entry->h->elf.dynindx == -1)
11801 {
11802 if (stub_entry->symtype == STT_GNU_IFUNC)
11803 plt = htab->elf.iplt;
11804 else
11805 plt = htab->pltlocal;
11806 }
11807 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 11808 odd = off & 4;
f891966f
AM
11809 off = targ - off;
11810
11811 if (htab->params->plt_stub_align != 0)
11812 {
11813 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11814
11815 stub_entry->group->stub_sec->size += pad;
11816 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11817 off -= pad;
11818 }
11819
3d58e1fc
AM
11820 if (info->emitrelocations)
11821 {
04bdff6a
AM
11822 unsigned int num_rel;
11823 if (htab->powerxx_stubs)
11824 num_rel = num_relocs_for_powerxx_offset (off, odd);
11825 else
11826 num_rel = num_relocs_for_offset (off - 8);
11827 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
11828 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11829 }
11830
f891966f
AM
11831 size = plt_stub_size (htab, stub_entry, off);
11832
04bdff6a
AM
11833 if (!htab->powerxx_stubs)
11834 {
11835 /* After the bcl, lr has been modified so we need to emit
11836 .eh_frame info saying the return address is in r12. */
11837 lr_used = stub_entry->stub_offset + 8;
11838 if (stub_entry->stub_type == ppc_stub_plt_call_both)
11839 lr_used += 4;
11840 /* The eh_frame info will consist of a DW_CFA_advance_loc or
11841 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
11842 DW_CFA_restore_extended 65. */
11843 delta = lr_used - stub_entry->group->lr_restore;
11844 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11845 stub_entry->group->lr_restore = lr_used + 8;
11846 }
f891966f
AM
11847 break;
11848
11849 case ppc_stub_plt_call:
11850 case ppc_stub_plt_call_r2save:
11851 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
11852 if (targ >= (bfd_vma) -2)
11853 abort ();
11854 plt = htab->elf.splt;
11855 if (!htab->elf.dynamic_sections_created
11856 || stub_entry->h == NULL
11857 || stub_entry->h->elf.dynindx == -1)
11858 {
11859 if (stub_entry->symtype == STT_GNU_IFUNC)
11860 plt = htab->elf.iplt;
11861 else
11862 plt = htab->pltlocal;
11863 }
11864 targ += plt->output_offset + plt->output_section->vma;
11865
11866 off = (elf_gp (info->output_bfd)
11867 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11868 off = targ - off;
11869
11870 if (htab->params->plt_stub_align != 0)
11871 {
11872 unsigned pad = plt_stub_pad (htab, stub_entry, off);
11873
11874 stub_entry->group->stub_sec->size += pad;
11875 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11876 }
11877
11878 if (info->emitrelocations)
11879 {
11880 stub_entry->group->stub_sec->reloc_count
11881 += ((PPC_HA (off) != 0)
11882 + (htab->opd_abi
11883 ? 2 + (htab->params->plt_static_chain
11884 && PPC_HA (off + 16) == PPC_HA (off))
11885 : 1));
11886 stub_entry->group->stub_sec->flags |= SEC_RELOC;
11887 }
11888
11889 size = plt_stub_size (htab, stub_entry, off);
11890
11891 if (stub_entry->h != NULL
11892 && (stub_entry->h == htab->tls_get_addr_fd
11893 || stub_entry->h == htab->tls_get_addr)
11894 && htab->params->tls_get_addr_opt
11895 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
11896 {
11897 /* After the bctrl, lr has been modified so we need to
11898 emit .eh_frame info saying the return address is
11899 on the stack. In fact we put the EH info specifying
11900 that the return address is on the stack *at* the
11901 call rather than after it, because the EH info for a
11902 call needs to be specified by that point.
11903 See libgcc/unwind-dw2.c execute_cfa_program. */
11904 lr_used = stub_entry->stub_offset + size - 20;
11905 /* The eh_frame info will consist of a DW_CFA_advance_loc
11906 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
11907 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
11908 delta = lr_used - stub_entry->group->lr_restore;
11909 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
11910 stub_entry->group->lr_restore = size - 4;
11911 }
11912 break;
11913
11914 default:
11915 BFD_FAIL ();
11916 return FALSE;
721956f4
AM
11917 }
11918
6f20ed8a 11919 stub_entry->group->stub_sec->size += size;
b34976b6 11920 return TRUE;
721956f4
AM
11921}
11922
11923/* Set up various things so that we can make a list of input sections
11924 for each output section included in the link. Returns -1 on error,
cedb70c5 11925 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
11926
11927int
e7d1c40c 11928ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 11929{
6f20ed8a 11930 unsigned int id;
721956f4
AM
11931 bfd_size_type amt;
11932 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11933
4dfe6ac6
NC
11934 if (htab == NULL)
11935 return -1;
4c52953f 11936
7cf7fcc8 11937 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
11938 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
11939 htab->sec_info = bfd_zmalloc (amt);
11940 if (htab->sec_info == NULL)
721956f4
AM
11941 return -1;
11942
3d6f9012
AM
11943 /* Set toc_off for com, und, abs and ind sections. */
11944 for (id = 0; id < 3; id++)
6f20ed8a 11945 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 11946
721956f4
AM
11947 return 1;
11948}
11949
927be08e
AM
11950/* Set up for first pass at multitoc partitioning. */
11951
11952void
11953ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
11954{
11955 struct ppc_link_hash_table *htab = ppc_hash_table (info);
11956
1c865ab2 11957 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
11958 htab->toc_bfd = NULL;
11959 htab->toc_first_sec = NULL;
11960}
11961
e717da7e
AM
11962/* The linker repeatedly calls this function for each TOC input section
11963 and linker generated GOT section. Group input bfds such that the toc
927be08e 11964 within a group is less than 64k in size. */
ad8e1ba5 11965
927be08e 11966bfd_boolean
4ce794b7 11967ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
11968{
11969 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 11970 bfd_vma addr, off, limit;
ad8e1ba5 11971
4dfe6ac6
NC
11972 if (htab == NULL)
11973 return FALSE;
11974
927be08e 11975 if (!htab->second_toc_pass)
4c52953f 11976 {
927be08e 11977 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
11978 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
11979
11980 if (new_bfd)
bf102f86
AM
11981 {
11982 htab->toc_bfd = isec->owner;
11983 htab->toc_first_sec = isec;
11984 }
927be08e 11985
bf102f86
AM
11986 addr = isec->output_offset + isec->output_section->vma;
11987 off = addr - htab->toc_curr;
d77c8a4b
AM
11988 limit = 0x80008000;
11989 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
11990 limit = 0x10000;
11991 if (off + isec->size > limit)
bf102f86
AM
11992 {
11993 addr = (htab->toc_first_sec->output_offset
11994 + htab->toc_first_sec->output_section->vma);
11995 htab->toc_curr = addr;
a27e685f 11996 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 11997 }
99877b66 11998
927be08e
AM
11999 /* toc_curr is the base address of this toc group. Set elf_gp
12000 for the input section to be the offset relative to the
12001 output toc base plus 0x8000. Making the input elf_gp an
12002 offset allows us to move the toc as a whole without
12003 recalculating input elf_gp. */
06bcf541 12004 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12005 off += TOC_BASE_OFF;
12006
12007 /* Die if someone uses a linker script that doesn't keep input
12008 file .toc and .got together. */
a4fd3de5
AM
12009 if (new_bfd
12010 && elf_gp (isec->owner) != 0
927be08e
AM
12011 && elf_gp (isec->owner) != off)
12012 return FALSE;
12013
12014 elf_gp (isec->owner) = off;
12015 return TRUE;
4c52953f 12016 }
927be08e
AM
12017
12018 /* During the second pass toc_first_sec points to the start of
12019 a toc group, and toc_curr is used to track the old elf_gp.
12020 We use toc_bfd to ensure we only look at each bfd once. */
12021 if (htab->toc_bfd == isec->owner)
12022 return TRUE;
12023 htab->toc_bfd = isec->owner;
12024
12025 if (htab->toc_first_sec == NULL
12026 || htab->toc_curr != elf_gp (isec->owner))
12027 {
12028 htab->toc_curr = elf_gp (isec->owner);
12029 htab->toc_first_sec = isec;
12030 }
12031 addr = (htab->toc_first_sec->output_offset
12032 + htab->toc_first_sec->output_section->vma);
06bcf541 12033 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12034 elf_gp (isec->owner) = off;
12035
12036 return TRUE;
ad8e1ba5
AM
12037}
12038
927be08e
AM
12039/* Called via elf_link_hash_traverse to merge GOT entries for global
12040 symbol H. */
12041
12042static bfd_boolean
12043merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12044{
12045 if (h->root.type == bfd_link_hash_indirect)
12046 return TRUE;
12047
927be08e
AM
12048 merge_got_entries (&h->got.glist);
12049
12050 return TRUE;
12051}
12052
12053/* Called via elf_link_hash_traverse to allocate GOT entries for global
12054 symbol H. */
12055
12056static bfd_boolean
12057reallocate_got (struct elf_link_hash_entry *h, void *inf)
12058{
12059 struct got_entry *gent;
12060
12061 if (h->root.type == bfd_link_hash_indirect)
12062 return TRUE;
12063
927be08e
AM
12064 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12065 if (!gent->is_indirect)
12066 allocate_got (h, (struct bfd_link_info *) inf, gent);
12067 return TRUE;
12068}
12069
12070/* Called on the first multitoc pass after the last call to
12071 ppc64_elf_next_toc_section. This function removes duplicate GOT
12072 entries. */
12073
12074bfd_boolean
12075ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12076{
12077 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12078 struct bfd *ibfd, *ibfd2;
12079 bfd_boolean done_something;
12080
12081 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12082
7865406b
AM
12083 if (!htab->do_multi_toc)
12084 return FALSE;
12085
d0fae19d 12086 /* Merge global sym got entries within a toc group. */
927be08e
AM
12087 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12088
12089 /* And tlsld_got. */
c72f2fb2 12090 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12091 {
12092 struct got_entry *ent, *ent2;
12093
12094 if (!is_ppc64_elf (ibfd))
12095 continue;
12096
12097 ent = ppc64_tlsld_got (ibfd);
12098 if (!ent->is_indirect
12099 && ent->got.offset != (bfd_vma) -1)
12100 {
c72f2fb2 12101 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12102 {
12103 if (!is_ppc64_elf (ibfd2))
12104 continue;
12105
12106 ent2 = ppc64_tlsld_got (ibfd2);
12107 if (!ent2->is_indirect
12108 && ent2->got.offset != (bfd_vma) -1
12109 && elf_gp (ibfd2) == elf_gp (ibfd))
12110 {
12111 ent2->is_indirect = TRUE;
12112 ent2->got.ent = ent;
12113 }
12114 }
12115 }
12116 }
12117
12118 /* Zap sizes of got sections. */
33e44f2e
AM
12119 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12120 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12121 htab->got_reli_size = 0;
12122
c72f2fb2 12123 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12124 {
12125 asection *got, *relgot;
12126
12127 if (!is_ppc64_elf (ibfd))
12128 continue;
12129
12130 got = ppc64_elf_tdata (ibfd)->got;
12131 if (got != NULL)
12132 {
12133 got->rawsize = got->size;
12134 got->size = 0;
12135 relgot = ppc64_elf_tdata (ibfd)->relgot;
12136 relgot->rawsize = relgot->size;
12137 relgot->size = 0;
12138 }
12139 }
12140
12141 /* Now reallocate the got, local syms first. We don't need to
12142 allocate section contents again since we never increase size. */
c72f2fb2 12143 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12144 {
12145 struct got_entry **lgot_ents;
12146 struct got_entry **end_lgot_ents;
12147 struct plt_entry **local_plt;
12148 struct plt_entry **end_local_plt;
f961d9dd 12149 unsigned char *lgot_masks;
927be08e
AM
12150 bfd_size_type locsymcount;
12151 Elf_Internal_Shdr *symtab_hdr;
19e08130 12152 asection *s;
927be08e
AM
12153
12154 if (!is_ppc64_elf (ibfd))
12155 continue;
12156
12157 lgot_ents = elf_local_got_ents (ibfd);
12158 if (!lgot_ents)
12159 continue;
12160
12161 symtab_hdr = &elf_symtab_hdr (ibfd);
12162 locsymcount = symtab_hdr->sh_info;
12163 end_lgot_ents = lgot_ents + locsymcount;
12164 local_plt = (struct plt_entry **) end_lgot_ents;
12165 end_local_plt = local_plt + locsymcount;
f961d9dd 12166 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12167 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12168 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12169 {
12170 struct got_entry *ent;
12171
12172 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12173 {
19e08130
AM
12174 unsigned int ent_size = 8;
12175 unsigned int rel_size = sizeof (Elf64_External_Rela);
12176
d0fae19d
AM
12177 ent->got.offset = s->size;
12178 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12179 {
19e08130
AM
12180 ent_size *= 2;
12181 rel_size *= 2;
12182 }
12183 s->size += ent_size;
37da22e5 12184 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12185 {
33e44f2e 12186 htab->elf.irelplt->size += rel_size;
19e08130
AM
12187 htab->got_reli_size += rel_size;
12188 }
6a3858a6 12189 else if (bfd_link_pic (info)
f749f26e 12190 && !(ent->tls_type != 0
6a3858a6 12191 && bfd_link_executable (info)))
19e08130
AM
12192 {
12193 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12194 srel->size += rel_size;
d0fae19d
AM
12195 }
12196 }
927be08e
AM
12197 }
12198 }
12199
12200 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12201
c72f2fb2 12202 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12203 {
12204 struct got_entry *ent;
12205
12206 if (!is_ppc64_elf (ibfd))
12207 continue;
12208
12209 ent = ppc64_tlsld_got (ibfd);
12210 if (!ent->is_indirect
12211 && ent->got.offset != (bfd_vma) -1)
12212 {
12213 asection *s = ppc64_elf_tdata (ibfd)->got;
12214 ent->got.offset = s->size;
12215 s->size += 16;
f749f26e 12216 if (bfd_link_dll (info))
927be08e
AM
12217 {
12218 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12219 srel->size += sizeof (Elf64_External_Rela);
12220 }
12221 }
12222 }
12223
33e44f2e 12224 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12225 if (!done_something)
c72f2fb2 12226 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12227 {
12228 asection *got;
12229
12230 if (!is_ppc64_elf (ibfd))
12231 continue;
12232
12233 got = ppc64_elf_tdata (ibfd)->got;
12234 if (got != NULL)
12235 {
12236 done_something = got->rawsize != got->size;
12237 if (done_something)
12238 break;
12239 }
12240 }
12241
12242 if (done_something)
e7d1c40c 12243 (*htab->params->layout_sections_again) ();
927be08e
AM
12244
12245 /* Set up for second pass over toc sections to recalculate elf_gp
12246 on input sections. */
12247 htab->toc_bfd = NULL;
12248 htab->toc_first_sec = NULL;
12249 htab->second_toc_pass = TRUE;
12250 return done_something;
12251}
12252
12253/* Called after second pass of multitoc partitioning. */
12254
12255void
12256ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12257{
12258 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12259
12260 /* After the second pass, toc_curr tracks the TOC offset used
12261 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12262 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12263}
12264
9b5ecbd0
AM
12265/* No toc references were found in ISEC. If the code in ISEC makes no
12266 calls, then there's no need to use toc adjusting stubs when branching
12267 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12268 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12269 needed, and 2 if a cyclical call-graph was found but no other reason
12270 for a stub was detected. If called from the top level, a return of
12271 2 means the same as a return of 0. */
9b5ecbd0
AM
12272
12273static int
4ce794b7 12274toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12275{
9b5ecbd0 12276 int ret;
70cc837d
AM
12277
12278 /* Mark this section as checked. */
12279 isec->call_check_done = 1;
9b5ecbd0 12280
772119ce
AM
12281 /* We know none of our code bearing sections will need toc stubs. */
12282 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12283 return 0;
12284
eea6121a 12285 if (isec->size == 0)
082c50f8
AM
12286 return 0;
12287
4c52953f
AM
12288 if (isec->output_section == NULL)
12289 return 0;
12290
4c52953f 12291 ret = 0;
70cc837d 12292 if (isec->reloc_count != 0)
9b5ecbd0 12293 {
70cc837d
AM
12294 Elf_Internal_Rela *relstart, *rel;
12295 Elf_Internal_Sym *local_syms;
12296 struct ppc_link_hash_table *htab;
2917689a 12297
70cc837d
AM
12298 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12299 info->keep_memory);
12300 if (relstart == NULL)
12301 return -1;
90aecf7a 12302
70cc837d
AM
12303 /* Look for branches to outside of this section. */
12304 local_syms = NULL;
12305 htab = ppc_hash_table (info);
12306 if (htab == NULL)
12307 return -1;
4c52953f 12308
70cc837d 12309 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12310 {
70cc837d
AM
12311 enum elf_ppc64_reloc_type r_type;
12312 unsigned long r_symndx;
12313 struct elf_link_hash_entry *h;
12314 struct ppc_link_hash_entry *eh;
12315 Elf_Internal_Sym *sym;
12316 asection *sym_sec;
12317 struct _opd_sec_data *opd;
12318 bfd_vma sym_value;
12319 bfd_vma dest;
12320
12321 r_type = ELF64_R_TYPE (rel->r_info);
12322 if (r_type != R_PPC64_REL24
05d0e962 12323 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12324 && r_type != R_PPC64_REL14
12325 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12326 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12327 && r_type != R_PPC64_PLTCALL
12328 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12329 continue;
4c52953f 12330
70cc837d
AM
12331 r_symndx = ELF64_R_SYM (rel->r_info);
12332 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12333 isec->owner))
4c52953f 12334 {
70cc837d
AM
12335 ret = -1;
12336 break;
12337 }
4c52953f 12338
70cc837d
AM
12339 /* Calls to dynamic lib functions go through a plt call stub
12340 that uses r2. */
12341 eh = (struct ppc_link_hash_entry *) h;
12342 if (eh != NULL
12343 && (eh->elf.plt.plist != NULL
12344 || (eh->oh != NULL
12345 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12346 {
12347 ret = 1;
12348 break;
4c52953f
AM
12349 }
12350
70cc837d
AM
12351 if (sym_sec == NULL)
12352 /* Ignore other undefined symbols. */
4c52953f 12353 continue;
4c52953f 12354
70cc837d
AM
12355 /* Assume branches to other sections not included in the
12356 link need stubs too, to cover -R and absolute syms. */
12357 if (sym_sec->output_section == NULL)
12358 {
12359 ret = 1;
12360 break;
12361 }
4c52953f 12362
70cc837d
AM
12363 if (h == NULL)
12364 sym_value = sym->st_value;
12365 else
12366 {
12367 if (h->root.type != bfd_link_hash_defined
12368 && h->root.type != bfd_link_hash_defweak)
12369 abort ();
12370 sym_value = h->root.u.def.value;
12371 }
12372 sym_value += rel->r_addend;
4c52953f 12373
70cc837d
AM
12374 /* If this branch reloc uses an opd sym, find the code section. */
12375 opd = get_opd_info (sym_sec);
12376 if (opd != NULL)
12377 {
12378 if (h == NULL && opd->adjust != NULL)
12379 {
12380 long adjust;
4c52953f 12381
92a9c616 12382 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12383 if (adjust == -1)
12384 /* Assume deleted functions won't ever be called. */
12385 continue;
12386 sym_value += adjust;
12387 }
4c52953f 12388
aef36ac1
AM
12389 dest = opd_entry_value (sym_sec, sym_value,
12390 &sym_sec, NULL, FALSE);
70cc837d
AM
12391 if (dest == (bfd_vma) -1)
12392 continue;
12393 }
12394 else
12395 dest = (sym_value
12396 + sym_sec->output_offset
12397 + sym_sec->output_section->vma);
4c52953f 12398
70cc837d
AM
12399 /* Ignore branch to self. */
12400 if (sym_sec == isec)
12401 continue;
4c52953f 12402
70cc837d
AM
12403 /* If the called function uses the toc, we need a stub. */
12404 if (sym_sec->has_toc_reloc
12405 || sym_sec->makes_toc_func_call)
4c52953f 12406 {
70cc837d 12407 ret = 1;
4c52953f
AM
12408 break;
12409 }
70cc837d
AM
12410
12411 /* Assume any branch that needs a long branch stub might in fact
12412 need a plt_branch stub. A plt_branch stub uses r2. */
12413 else if (dest - (isec->output_offset
12414 + isec->output_section->vma
6911b7dc
AM
12415 + rel->r_offset) + (1 << 25)
12416 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12417 ? h->other
12418 : sym->st_other))
4c52953f 12419 {
70cc837d
AM
12420 ret = 1;
12421 break;
12422 }
12423
12424 /* If calling back to a section in the process of being
12425 tested, we can't say for sure that no toc adjusting stubs
12426 are needed, so don't return zero. */
12427 else if (sym_sec->call_check_in_progress)
12428 ret = 2;
12429
12430 /* Branches to another section that itself doesn't have any TOC
12431 references are OK. Recursively call ourselves to check. */
12432 else if (!sym_sec->call_check_done)
12433 {
12434 int recur;
12435
12436 /* Mark current section as indeterminate, so that other
12437 sections that call back to current won't be marked as
12438 known. */
12439 isec->call_check_in_progress = 1;
12440 recur = toc_adjusting_stub_needed (info, sym_sec);
12441 isec->call_check_in_progress = 0;
12442
4c52953f
AM
12443 if (recur != 0)
12444 {
70cc837d
AM
12445 ret = recur;
12446 if (recur != 2)
12447 break;
4c52953f
AM
12448 }
12449 }
4c52953f 12450 }
70cc837d
AM
12451
12452 if (local_syms != NULL
12453 && (elf_symtab_hdr (isec->owner).contents
12454 != (unsigned char *) local_syms))
12455 free (local_syms);
12456 if (elf_section_data (isec)->relocs != relstart)
12457 free (relstart);
9b5ecbd0
AM
12458 }
12459
70cc837d
AM
12460 if ((ret & 1) == 0
12461 && isec->map_head.s != NULL
12462 && (strcmp (isec->output_section->name, ".init") == 0
12463 || strcmp (isec->output_section->name, ".fini") == 0))
12464 {
12465 if (isec->map_head.s->has_toc_reloc
12466 || isec->map_head.s->makes_toc_func_call)
12467 ret = 1;
12468 else if (!isec->map_head.s->call_check_done)
12469 {
12470 int recur;
12471 isec->call_check_in_progress = 1;
12472 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12473 isec->call_check_in_progress = 0;
12474 if (recur != 0)
12475 ret = recur;
12476 }
12477 }
12478
12479 if (ret == 1)
12480 isec->makes_toc_func_call = 1;
4c52953f 12481
9b5ecbd0
AM
12482 return ret;
12483}
12484
721956f4
AM
12485/* The linker repeatedly calls this function for each input section,
12486 in the order that input sections are linked into output sections.
12487 Build lists of input sections to determine groupings between which
12488 we may insert linker stubs. */
12489
9b5ecbd0 12490bfd_boolean
4ce794b7 12491ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12492{
12493 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12494
4dfe6ac6
NC
12495 if (htab == NULL)
12496 return FALSE;
12497
734b6cf9 12498 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12499 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12500 {
3d6f9012
AM
12501 /* This happens to make the list in reverse order,
12502 which is what we want. */
6f20ed8a
AM
12503 htab->sec_info[isec->id].u.list
12504 = htab->sec_info[isec->output_section->id].u.list;
12505 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12506 }
ad8e1ba5 12507
4c52953f 12508 if (htab->multi_toc_needed)
9b5ecbd0 12509 {
8b974ba3
AM
12510 /* Analyse sections that aren't already flagged as needing a
12511 valid toc pointer. Exclude .fixup for the linux kernel.
12512 .fixup contains branches, but only back to the function that
12513 hit an exception. */
12514 if (!(isec->has_toc_reloc
12515 || (isec->flags & SEC_CODE) == 0
12516 || strcmp (isec->name, ".fixup") == 0
12517 || isec->call_check_done))
12518 {
12519 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12520 return FALSE;
8b974ba3
AM
12521 }
12522 /* Make all sections use the TOC assigned for this object file.
12523 This will be wrong for pasted sections; We fix that in
12524 check_pasted_section(). */
12525 if (elf_gp (isec->owner) != 0)
12526 htab->toc_curr = elf_gp (isec->owner);
12527 }
12528
6f20ed8a 12529 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12530 return TRUE;
721956f4
AM
12531}
12532
70cc837d
AM
12533/* Check that all .init and .fini sections use the same toc, if they
12534 have toc relocs. */
12535
12536static bfd_boolean
12537check_pasted_section (struct bfd_link_info *info, const char *name)
12538{
12539 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12540
12541 if (o != NULL)
12542 {
12543 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12544 bfd_vma toc_off = 0;
12545 asection *i;
12546
12547 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12548 if (i->has_toc_reloc)
12549 {
12550 if (toc_off == 0)
6f20ed8a
AM
12551 toc_off = htab->sec_info[i->id].toc_off;
12552 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12553 return FALSE;
12554 }
6683a28d
AM
12555
12556 if (toc_off == 0)
12557 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12558 if (i->makes_toc_func_call)
12559 {
6f20ed8a 12560 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12561 break;
12562 }
12563
70cc837d
AM
12564 /* Make sure the whole pasted function uses the same toc offset. */
12565 if (toc_off != 0)
12566 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12567 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12568 }
12569 return TRUE;
12570}
12571
12572bfd_boolean
12573ppc64_elf_check_init_fini (struct bfd_link_info *info)
12574{
12575 return (check_pasted_section (info, ".init")
12576 & check_pasted_section (info, ".fini"));
12577}
12578
721956f4
AM
12579/* See whether we can group stub sections together. Grouping stub
12580 sections may result in fewer stubs. More importantly, we need to
12581 put all .init* and .fini* stubs at the beginning of the .init or
12582 .fini output sections respectively, because glibc splits the
12583 _init and _fini functions into multiple parts. Putting a stub in
12584 the middle of a function is not a good idea. */
12585
6f20ed8a
AM
12586static bfd_boolean
12587group_sections (struct bfd_link_info *info,
4ce794b7
AM
12588 bfd_size_type stub_group_size,
12589 bfd_boolean stubs_always_before_branch)
721956f4 12590{
6f20ed8a
AM
12591 struct ppc_link_hash_table *htab;
12592 asection *osec;
7c8fe5c4
AM
12593 bfd_boolean suppress_size_errors;
12594
6f20ed8a
AM
12595 htab = ppc_hash_table (info);
12596 if (htab == NULL)
12597 return FALSE;
12598
7c8fe5c4 12599 suppress_size_errors = FALSE;
7c8fe5c4
AM
12600 if (stub_group_size == 1)
12601 {
12602 /* Default values. */
12603 if (stubs_always_before_branch)
09f92717 12604 stub_group_size = 0x1e00000;
7c8fe5c4 12605 else
09f92717 12606 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12607 suppress_size_errors = TRUE;
12608 }
12609
6f20ed8a 12610 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12611 {
6f20ed8a
AM
12612 asection *tail;
12613
12614 if (osec->id >= htab->sec_info_arr_size)
12615 continue;
12616
12617 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12618 while (tail != NULL)
721956f4 12619 {
734b6cf9
AM
12620 asection *curr;
12621 asection *prev;
12622 bfd_size_type total;
12623 bfd_boolean big_sec;
12624 bfd_vma curr_toc;
6f20ed8a 12625 struct map_stub *group;
09f92717 12626 bfd_size_type group_size;
734b6cf9
AM
12627
12628 curr = tail;
eea6121a 12629 total = tail->size;
09f92717
AM
12630 group_size = (ppc64_elf_section_data (tail) != NULL
12631 && ppc64_elf_section_data (tail)->has_14bit_branch
12632 ? stub_group_size >> 10 : stub_group_size);
12633
12634 big_sec = total > group_size;
7c8fe5c4 12635 if (big_sec && !suppress_size_errors)
695344c0 12636 /* xgettext:c-format */
871b3ab2 12637 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12638 tail->owner, tail);
6f20ed8a 12639 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12640
6f20ed8a 12641 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12642 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12643 < (ppc64_elf_section_data (prev) != NULL
12644 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12645 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12646 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12647 curr = prev;
12648
12649 /* OK, the size from the start of CURR to the end is less
09f92717 12650 than group_size and thus can be handled by one stub
734b6cf9 12651 section. (or the tail section is itself larger than
09f92717
AM
12652 group_size, in which case we may be toast.) We should
12653 really be keeping track of the total size of stubs added
12654 here, as stubs contribute to the final output section
12655 size. That's a little tricky, and this way will only
12656 break if stubs added make the total size more than 2^25,
12657 ie. for the default stub_group_size, if stubs total more
12658 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12659 group = bfd_alloc (curr->owner, sizeof (*group));
12660 if (group == NULL)
12661 return FALSE;
12662 group->link_sec = curr;
12663 group->stub_sec = NULL;
a4b6fadd 12664 group->needs_save_res = 0;
df136d64
AM
12665 group->lr_restore = 0;
12666 group->eh_size = 0;
12667 group->eh_base = 0;
a4b6fadd
AM
12668 group->next = htab->group;
12669 htab->group = group;
734b6cf9 12670 do
721956f4 12671 {
6f20ed8a 12672 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12673 /* Set up this stub group. */
6f20ed8a 12674 htab->sec_info[tail->id].u.group = group;
721956f4 12675 }
734b6cf9
AM
12676 while (tail != curr && (tail = prev) != NULL);
12677
09f92717 12678 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12679 bytes before the stub section can be handled by it too.
12680 Don't do this if we have a really large section after the
12681 stubs, as adding more stubs increases the chance that
12682 branches may not reach into the stub section. */
12683 if (!stubs_always_before_branch && !big_sec)
12684 {
12685 total = 0;
12686 while (prev != NULL
12687 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
12688 < (ppc64_elf_section_data (prev) != NULL
12689 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
12690 ? (group_size = stub_group_size >> 10)
12691 : group_size))
6f20ed8a 12692 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12693 {
12694 tail = prev;
6f20ed8a
AM
12695 prev = htab->sec_info[tail->id].u.list;
12696 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
12697 }
12698 }
12699 tail = prev;
721956f4
AM
12700 }
12701 }
6f20ed8a 12702 return TRUE;
721956f4
AM
12703}
12704
58d180e8
AM
12705static const unsigned char glink_eh_frame_cie[] =
12706{
12707 0, 0, 0, 16, /* length. */
12708 0, 0, 0, 0, /* id. */
12709 1, /* CIE version. */
12710 'z', 'R', 0, /* Augmentation string. */
12711 4, /* Code alignment. */
12712 0x78, /* Data alignment. */
12713 65, /* RA reg. */
12714 1, /* Augmentation size. */
12715 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 12716 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
12717};
12718
d969d15f
AM
12719/* Stripping output sections is normally done before dynamic section
12720 symbols have been allocated. This function is called later, and
12721 handles cases like htab->brlt which is mapped to its own output
12722 section. */
12723
12724static void
12725maybe_strip_output (struct bfd_link_info *info, asection *isec)
12726{
12727 if (isec->size == 0
12728 && isec->output_section->size == 0
53d8967a 12729 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
12730 && !bfd_section_removed_from_list (info->output_bfd,
12731 isec->output_section)
12732 && elf_section_data (isec->output_section)->dynindx == 0)
12733 {
12734 isec->output_section->flags |= SEC_EXCLUDE;
12735 bfd_section_list_remove (info->output_bfd, isec->output_section);
12736 info->output_bfd->section_count--;
12737 }
12738}
12739
721956f4
AM
12740/* Determine and set the size of the stub section for a final link.
12741
12742 The basic idea here is to examine all the relocations looking for
12743 PC-relative calls to a target that is unreachable with a "bl"
12744 instruction. */
12745
b34976b6 12746bfd_boolean
e7d1c40c 12747ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
12748{
12749 bfd_size_type stub_group_size;
b34976b6 12750 bfd_boolean stubs_always_before_branch;
721956f4
AM
12751 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12752
4dfe6ac6
NC
12753 if (htab == NULL)
12754 return FALSE;
12755
0e1862bb 12756 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 12757 htab->params->plt_thread_safe = 1;
b9e5796b 12758 if (!htab->opd_abi)
e7d1c40c
AM
12759 htab->params->plt_thread_safe = 0;
12760 else if (htab->params->plt_thread_safe == -1)
794e51c0 12761 {
e2458743 12762 static const char *const thread_starter[] =
794e51c0
AM
12763 {
12764 "pthread_create",
12765 /* libstdc++ */
12766 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12767 /* librt */
12768 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12769 "mq_notify", "create_timer",
12770 /* libanl */
12771 "getaddrinfo_a",
12772 /* libgomp */
2300b5a1 12773 "GOMP_parallel",
794e51c0 12774 "GOMP_parallel_start",
2300b5a1 12775 "GOMP_parallel_loop_static",
794e51c0 12776 "GOMP_parallel_loop_static_start",
2300b5a1 12777 "GOMP_parallel_loop_dynamic",
794e51c0 12778 "GOMP_parallel_loop_dynamic_start",
2300b5a1 12779 "GOMP_parallel_loop_guided",
794e51c0 12780 "GOMP_parallel_loop_guided_start",
2300b5a1 12781 "GOMP_parallel_loop_runtime",
794e51c0 12782 "GOMP_parallel_loop_runtime_start",
2300b5a1 12783 "GOMP_parallel_sections",
68ffbac6 12784 "GOMP_parallel_sections_start",
f9dffbf0
AM
12785 /* libgo */
12786 "__go_go",
794e51c0
AM
12787 };
12788 unsigned i;
12789
a4b6fadd 12790 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
12791 {
12792 struct elf_link_hash_entry *h;
12793 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
12794 FALSE, FALSE, TRUE);
e7d1c40c
AM
12795 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
12796 if (htab->params->plt_thread_safe)
794e51c0
AM
12797 break;
12798 }
12799 }
e7d1c40c
AM
12800 stubs_always_before_branch = htab->params->group_size < 0;
12801 if (htab->params->group_size < 0)
12802 stub_group_size = -htab->params->group_size;
721956f4 12803 else
e7d1c40c 12804 stub_group_size = htab->params->group_size;
721956f4 12805
6f20ed8a
AM
12806 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
12807 return FALSE;
721956f4 12808
c9301e31
AM
12809#define STUB_SHRINK_ITER 20
12810 /* Loop until no stubs added. After iteration 20 of this loop we may
12811 exit on a stub section shrinking. This is to break out of a
12812 pathological case where adding stubs on one iteration decreases
12813 section gaps (perhaps due to alignment), which then requires
12814 fewer or smaller stubs on the next iteration. */
12815
721956f4
AM
12816 while (1)
12817 {
12818 bfd *input_bfd;
12819 unsigned int bfd_indx;
a4b6fadd 12820 struct map_stub *group;
721956f4
AM
12821
12822 htab->stub_iteration += 1;
721956f4
AM
12823
12824 for (input_bfd = info->input_bfds, bfd_indx = 0;
12825 input_bfd != NULL;
c72f2fb2 12826 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
12827 {
12828 Elf_Internal_Shdr *symtab_hdr;
12829 asection *section;
6cdc0ccc 12830 Elf_Internal_Sym *local_syms = NULL;
721956f4 12831
0c8d6e5c 12832 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
12833 continue;
12834
721956f4 12835 /* We'll need the symbol table in a second. */
0ffa91dd 12836 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
12837 if (symtab_hdr->sh_info == 0)
12838 continue;
12839
721956f4
AM
12840 /* Walk over each section attached to the input bfd. */
12841 for (section = input_bfd->sections;
12842 section != NULL;
12843 section = section->next)
12844 {
721956f4 12845 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
12846
12847 /* If there aren't any relocs, then there's nothing more
12848 to do. */
12849 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
12850 || (section->flags & SEC_ALLOC) == 0
12851 || (section->flags & SEC_LOAD) == 0
12852 || (section->flags & SEC_CODE) == 0
721956f4
AM
12853 || section->reloc_count == 0)
12854 continue;
12855
12856 /* If this section is a link-once section that will be
12857 discarded, then don't create any stubs. */
12858 if (section->output_section == NULL
927be08e 12859 || section->output_section->owner != info->output_bfd)
721956f4
AM
12860 continue;
12861
1e2f5b6e
AM
12862 /* Get the relocs. */
12863 internal_relocs
4ce794b7 12864 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 12865 info->keep_memory);
721956f4 12866 if (internal_relocs == NULL)
1e2f5b6e 12867 goto error_ret_free_local;
721956f4
AM
12868
12869 /* Now examine each relocation. */
12870 irela = internal_relocs;
12871 irelaend = irela + section->reloc_count;
12872 for (; irela < irelaend; irela++)
12873 {
4ce794b7
AM
12874 enum elf_ppc64_reloc_type r_type;
12875 unsigned int r_indx;
721956f4
AM
12876 enum ppc_stub_type stub_type;
12877 struct ppc_stub_hash_entry *stub_entry;
8387904d 12878 asection *sym_sec, *code_sec;
e054468f 12879 bfd_vma sym_value, code_value;
721956f4 12880 bfd_vma destination;
6911b7dc 12881 unsigned long local_off;
8843416a 12882 bfd_boolean ok_dest;
721956f4 12883 struct ppc_link_hash_entry *hash;
8387904d 12884 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
12885 struct elf_link_hash_entry *h;
12886 Elf_Internal_Sym *sym;
721956f4
AM
12887 char *stub_name;
12888 const asection *id_sec;
74f0fb50 12889 struct _opd_sec_data *opd;
e054468f 12890 struct plt_entry *plt_ent;
721956f4
AM
12891
12892 r_type = ELF64_R_TYPE (irela->r_info);
12893 r_indx = ELF64_R_SYM (irela->r_info);
12894
4ce794b7 12895 if (r_type >= R_PPC64_max)
721956f4
AM
12896 {
12897 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 12898 goto error_ret_free_internal;
721956f4
AM
12899 }
12900
12901 /* Only look for stubs on branch instructions. */
4ce794b7 12902 if (r_type != R_PPC64_REL24
05d0e962 12903 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
12904 && r_type != R_PPC64_REL14
12905 && r_type != R_PPC64_REL14_BRTAKEN
12906 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
12907 continue;
12908
12909 /* Now determine the call target, its name, value,
12910 section. */
411e1bfb
AM
12911 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
12912 r_indx, input_bfd))
12913 goto error_ret_free_internal;
12914 hash = (struct ppc_link_hash_entry *) h;
12915
8843416a 12916 ok_dest = FALSE;
8387904d 12917 fdh = NULL;
7fe2b9a6 12918 sym_value = 0;
411e1bfb 12919 if (hash == NULL)
721956f4 12920 {
411e1bfb 12921 sym_value = sym->st_value;
c27b8c2a
AM
12922 if (sym_sec != NULL
12923 && sym_sec->output_section != NULL)
12924 ok_dest = TRUE;
721956f4 12925 }
7fe2b9a6
AM
12926 else if (hash->elf.root.type == bfd_link_hash_defined
12927 || hash->elf.root.type == bfd_link_hash_defweak)
12928 {
12929 sym_value = hash->elf.root.u.def.value;
12930 if (sym_sec->output_section != NULL)
12931 ok_dest = TRUE;
12932 }
12933 else if (hash->elf.root.type == bfd_link_hash_undefweak
12934 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 12935 {
99877b66 12936 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
12937 use the func descriptor sym instead if it is
12938 defined. */
ceb1f1ef 12939 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 12940 && hash->oh != NULL)
8387904d 12941 {
8c5b4e52 12942 fdh = ppc_follow_link (hash->oh);
8387904d
AM
12943 if (fdh->elf.root.type == bfd_link_hash_defined
12944 || fdh->elf.root.type == bfd_link_hash_defweak)
12945 {
12946 sym_sec = fdh->elf.root.u.def.section;
12947 sym_value = fdh->elf.root.u.def.value;
12948 if (sym_sec->output_section != NULL)
12949 ok_dest = TRUE;
12950 }
99877b66
AM
12951 else
12952 fdh = NULL;
8387904d 12953 }
7fe2b9a6
AM
12954 }
12955 else
12956 {
12957 bfd_set_error (bfd_error_bad_value);
12958 goto error_ret_free_internal;
721956f4
AM
12959 }
12960
8843416a 12961 destination = 0;
6911b7dc 12962 local_off = 0;
8843416a
AM
12963 if (ok_dest)
12964 {
12965 sym_value += irela->r_addend;
12966 destination = (sym_value
12967 + sym_sec->output_offset
12968 + sym_sec->output_section->vma);
6911b7dc
AM
12969 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
12970 ? hash->elf.other
12971 : sym->st_other);
8843416a
AM
12972 }
12973
8387904d 12974 code_sec = sym_sec;
e054468f 12975 code_value = sym_value;
74f0fb50
AM
12976 opd = get_opd_info (sym_sec);
12977 if (opd != NULL)
8387904d
AM
12978 {
12979 bfd_vma dest;
12980
74f0fb50 12981 if (hash == NULL && opd->adjust != NULL)
8387904d 12982 {
51aecdc5 12983 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
12984 if (adjust == -1)
12985 continue;
e054468f 12986 code_value += adjust;
8387904d
AM
12987 sym_value += adjust;
12988 }
12989 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 12990 &code_sec, &code_value, FALSE);
8387904d
AM
12991 if (dest != (bfd_vma) -1)
12992 {
12993 destination = dest;
12994 if (fdh != NULL)
12995 {
12996 /* Fixup old ABI sym to point at code
12997 entry. */
99877b66 12998 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 12999 hash->elf.root.u.def.section = code_sec;
e054468f 13000 hash->elf.root.u.def.value = code_value;
8387904d
AM
13001 }
13002 }
13003 }
13004
721956f4 13005 /* Determine what (if any) linker stub is needed. */
e054468f 13006 plt_ent = NULL;
721956f4 13007 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13008 &plt_ent, destination,
13009 local_off);
ad8e1ba5 13010
05d0e962
AM
13011 if (r_type == R_PPC64_REL24_NOTOC)
13012 {
13013 if (stub_type == ppc_stub_plt_call)
13014 stub_type = ppc_stub_plt_call_notoc;
13015 else if (stub_type == ppc_stub_long_branch
13016 || (code_sec != NULL
13017 && code_sec->output_section != NULL
13018 && (((hash ? hash->elf.other : sym->st_other)
13019 & STO_PPC64_LOCAL_MASK)
4a4e7361 13020 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13021 stub_type = ppc_stub_long_branch_notoc;
13022 }
13023 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13024 {
13025 /* Check whether we need a TOC adjusting stub.
13026 Since the linker pastes together pieces from
13027 different object files when creating the
13028 _init and _fini functions, it may be that a
13029 call to what looks like a local sym is in
13030 fact a call needing a TOC adjustment. */
33cb30a1
AM
13031 if ((code_sec != NULL
13032 && code_sec->output_section != NULL
13033 && (htab->sec_info[code_sec->id].toc_off
13034 != htab->sec_info[section->id].toc_off)
13035 && (code_sec->has_toc_reloc
13036 || code_sec->makes_toc_func_call))
13037 || (((hash ? hash->elf.other : sym->st_other)
13038 & STO_PPC64_LOCAL_MASK)
13039 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13040 stub_type = ppc_stub_long_branch_r2off;
13041 }
13042
721956f4
AM
13043 if (stub_type == ppc_stub_none)
13044 continue;
13045
411e1bfb
AM
13046 /* __tls_get_addr calls might be eliminated. */
13047 if (stub_type != ppc_stub_plt_call
05d0e962 13048 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13049 && hash != NULL
8387904d
AM
13050 && (hash == htab->tls_get_addr
13051 || hash == htab->tls_get_addr_fd)
411e1bfb
AM
13052 && section->has_tls_reloc
13053 && irela != internal_relocs)
13054 {
13055 /* Get tls info. */
f961d9dd 13056 unsigned char *tls_mask;
411e1bfb 13057
3a71aa26 13058 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13059 irela - 1, input_bfd))
13060 goto error_ret_free_internal;
37da22e5 13061 if ((*tls_mask & TLS_TLS) != 0)
411e1bfb
AM
13062 continue;
13063 }
13064
f378ab09 13065 if (stub_type == ppc_stub_plt_call)
794e51c0 13066 {
6e1816be
AM
13067 if (!htab->opd_abi
13068 && htab->params->plt_localentry0 != 0
13069 && is_elfv2_localentry0 (&hash->elf))
13070 htab->has_plt_localentry0 = 1;
13071 else if (irela + 1 < irelaend
13072 && irela[1].r_offset == irela->r_offset + 4
13073 && (ELF64_R_TYPE (irela[1].r_info)
13074 == R_PPC64_TOCSAVE))
f378ab09
AM
13075 {
13076 if (!tocsave_find (htab, INSERT,
13077 &local_syms, irela + 1, input_bfd))
13078 goto error_ret_free_internal;
13079 }
f378ab09
AM
13080 else
13081 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13082 }
3b421ab3 13083
721956f4 13084 /* Support for grouping stub sections. */
6f20ed8a 13085 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13086
13087 /* Get the name of this stub. */
13088 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13089 if (!stub_name)
13090 goto error_ret_free_internal;
13091
13092 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13093 stub_name, FALSE, FALSE);
721956f4
AM
13094 if (stub_entry != NULL)
13095 {
05d0e962
AM
13096 enum ppc_stub_type old_type;
13097 /* A stub has already been created, but it may
13098 not be the required type. We shouldn't be
13099 transitioning from plt_call to long_branch
13100 stubs or vice versa, but we might be
13101 upgrading from plt_call to plt_call_r2save or
13102 from long_branch to long_branch_r2off. */
721956f4 13103 free (stub_name);
05d0e962
AM
13104 old_type = stub_entry->stub_type;
13105 switch (old_type)
13106 {
13107 default:
13108 abort ();
13109
13110 case ppc_stub_save_res:
13111 continue;
13112
13113 case ppc_stub_plt_call:
13114 case ppc_stub_plt_call_r2save:
13115 case ppc_stub_plt_call_notoc:
13116 case ppc_stub_plt_call_both:
13117 if (stub_type == ppc_stub_plt_call)
13118 continue;
13119 else if (stub_type == ppc_stub_plt_call_r2save)
13120 {
13121 if (old_type == ppc_stub_plt_call_notoc)
13122 stub_type = ppc_stub_plt_call_both;
13123 }
13124 else if (stub_type == ppc_stub_plt_call_notoc)
13125 {
13126 if (old_type == ppc_stub_plt_call_r2save)
13127 stub_type = ppc_stub_plt_call_both;
13128 }
13129 else
13130 abort ();
13131 break;
13132
13133 case ppc_stub_plt_branch:
13134 case ppc_stub_plt_branch_r2off:
13135 case ppc_stub_plt_branch_notoc:
13136 case ppc_stub_plt_branch_both:
13137 old_type += (ppc_stub_long_branch
13138 - ppc_stub_plt_branch);
13139 /* Fall through. */
13140 case ppc_stub_long_branch:
13141 case ppc_stub_long_branch_r2off:
13142 case ppc_stub_long_branch_notoc:
13143 case ppc_stub_long_branch_both:
13144 if (stub_type == ppc_stub_long_branch)
13145 continue;
13146 else if (stub_type == ppc_stub_long_branch_r2off)
13147 {
13148 if (old_type == ppc_stub_long_branch_notoc)
13149 stub_type = ppc_stub_long_branch_both;
13150 }
13151 else if (stub_type == ppc_stub_long_branch_notoc)
13152 {
13153 if (old_type == ppc_stub_long_branch_r2off)
13154 stub_type = ppc_stub_long_branch_both;
13155 }
13156 else
13157 abort ();
13158 break;
13159 }
13160 if (old_type < stub_type)
794e51c0 13161 stub_entry->stub_type = stub_type;
721956f4
AM
13162 continue;
13163 }
13164
25f53a85 13165 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13166 if (stub_entry == NULL)
13167 {
13168 free (stub_name);
6cdc0ccc
AM
13169 error_ret_free_internal:
13170 if (elf_section_data (section)->relocs == NULL)
13171 free (internal_relocs);
13172 error_ret_free_local:
13173 if (local_syms != NULL
13174 && (symtab_hdr->contents
13175 != (unsigned char *) local_syms))
13176 free (local_syms);
b34976b6 13177 return FALSE;
721956f4
AM
13178 }
13179
ad8e1ba5 13180 stub_entry->stub_type = stub_type;
05d0e962
AM
13181 if (stub_type >= ppc_stub_plt_call
13182 && stub_type <= ppc_stub_plt_call_both)
e054468f 13183 {
05d0e962
AM
13184 stub_entry->target_value = sym_value;
13185 stub_entry->target_section = sym_sec;
e054468f
AM
13186 }
13187 else
13188 {
05d0e962
AM
13189 stub_entry->target_value = code_value;
13190 stub_entry->target_section = code_sec;
e054468f 13191 }
721956f4 13192 stub_entry->h = hash;
e054468f 13193 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13194 stub_entry->symtype
13195 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13196 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13197
3d58e1fc
AM
13198 if (hash != NULL
13199 && (hash->elf.root.type == bfd_link_hash_defined
13200 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13201 htab->stub_globals += 1;
721956f4
AM
13202 }
13203
13204 /* We're done with the internal relocs, free them. */
6cdc0ccc 13205 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13206 free (internal_relocs);
721956f4 13207 }
6cdc0ccc
AM
13208
13209 if (local_syms != NULL
13210 && symtab_hdr->contents != (unsigned char *) local_syms)
13211 {
13212 if (!info->keep_memory)
13213 free (local_syms);
13214 else
13215 symtab_hdr->contents = (unsigned char *) local_syms;
13216 }
721956f4
AM
13217 }
13218
5c3dead3 13219 /* We may have added some stubs. Find out the new size of the
721956f4 13220 stub sections. */
d4aaa2a0 13221 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13222 {
13223 group->lr_restore = 0;
13224 group->eh_size = 0;
13225 if (group->stub_sec != NULL)
13226 {
13227 asection *stub_sec = group->stub_sec;
13228
13229 if (htab->stub_iteration <= STUB_SHRINK_ITER
13230 || stub_sec->rawsize < stub_sec->size)
13231 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13232 stub_sec->rawsize = stub_sec->size;
13233 stub_sec->size = 0;
13234 stub_sec->reloc_count = 0;
13235 stub_sec->flags &= ~SEC_RELOC;
13236 }
13237 }
eea6121a 13238
ba21f564
AM
13239 if (htab->stub_iteration <= STUB_SHRINK_ITER
13240 || htab->brlt->rawsize < htab->brlt->size)
13241 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13242 htab->brlt->size = 0;
84f5d08e
AM
13243 htab->brlt->reloc_count = 0;
13244 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13245 if (htab->relbrlt != NULL)
eea6121a 13246 htab->relbrlt->size = 0;
721956f4 13247
63bc6f6c 13248 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13249
a4b6fadd
AM
13250 for (group = htab->group; group != NULL; group = group->next)
13251 if (group->needs_save_res)
13252 group->stub_sec->size += htab->sfpr->size;
13253
176a0d42
AM
13254 if (info->emitrelocations
13255 && htab->glink != NULL && htab->glink->size != 0)
13256 {
13257 htab->glink->reloc_count = 1;
13258 htab->glink->flags |= SEC_RELOC;
13259 }
13260
58d180e8
AM
13261 if (htab->glink_eh_frame != NULL
13262 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13263 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13264 {
2e0ce1c8 13265 size_t size = 0, align = 4;
58d180e8 13266
d4aaa2a0 13267 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13268 if (group->eh_size != 0)
13269 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13270 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13271 size += (24 + align - 1) & -align;
58d180e8 13272 if (size != 0)
2e0ce1c8
AM
13273 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13274 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13275 size = (size + align - 1) & -align;
58d180e8
AM
13276 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13277 htab->glink_eh_frame->size = size;
13278 }
13279
e7d1c40c 13280 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13281 for (group = htab->group; group != NULL; group = group->next)
13282 if (group->stub_sec != NULL)
691d2e9a
AM
13283 {
13284 int align = abs (htab->params->plt_stub_align);
13285 group->stub_sec->size
13286 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13287 }
d4aaa2a0
AM
13288
13289 for (group = htab->group; group != NULL; group = group->next)
13290 if (group->stub_sec != NULL
13291 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13292 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13293 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13294 break;
13295
d4aaa2a0 13296 if (group == NULL
ba21f564
AM
13297 && (htab->brlt->rawsize == htab->brlt->size
13298 || (htab->stub_iteration > STUB_SHRINK_ITER
13299 && htab->brlt->rawsize > htab->brlt->size))
58d180e8
AM
13300 && (htab->glink_eh_frame == NULL
13301 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size))
5c3dead3
AM
13302 break;
13303
721956f4 13304 /* Ask the linker to do its stuff. */
e7d1c40c 13305 (*htab->params->layout_sections_again) ();
721956f4
AM
13306 }
13307
da44f4e5
AM
13308 if (htab->glink_eh_frame != NULL
13309 && htab->glink_eh_frame->size != 0)
13310 {
13311 bfd_vma val;
13312 bfd_byte *p, *last_fde;
13313 size_t last_fde_len, size, align, pad;
d4aaa2a0 13314 struct map_stub *group;
da44f4e5 13315
df136d64
AM
13316 /* It is necessary to at least have a rough outline of the
13317 linker generated CIEs and FDEs written before
13318 bfd_elf_discard_info is run, in order for these FDEs to be
13319 indexed in .eh_frame_hdr. */
da44f4e5
AM
13320 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13321 if (p == NULL)
13322 return FALSE;
13323 htab->glink_eh_frame->contents = p;
13324 last_fde = p;
2e0ce1c8 13325 align = 4;
da44f4e5
AM
13326
13327 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13328 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13329 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13330 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13331 p += last_fde_len + 4;
da44f4e5 13332
d4aaa2a0 13333 for (group = htab->group; group != NULL; group = group->next)
df136d64 13334 if (group->eh_size != 0)
da44f4e5 13335 {
df136d64 13336 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13337 last_fde = p;
df136d64 13338 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13339 /* FDE length. */
2e0ce1c8 13340 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13341 p += 4;
13342 /* CIE pointer. */
13343 val = p - htab->glink_eh_frame->contents;
13344 bfd_put_32 (htab->elf.dynobj, val, p);
13345 p += 4;
13346 /* Offset to stub section, written later. */
13347 p += 4;
13348 /* stub section size. */
d4aaa2a0 13349 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13350 p += 4;
13351 /* Augmentation. */
13352 p += 1;
df136d64
AM
13353 /* Make sure we don't have all nops. This is enough for
13354 elf-eh-frame.c to detect the last non-nop opcode. */
13355 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13356 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13357 }
13358 if (htab->glink != NULL && htab->glink->size != 0)
13359 {
13360 last_fde = p;
2e0ce1c8 13361 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13362 /* FDE length. */
2e0ce1c8 13363 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13364 p += 4;
13365 /* CIE pointer. */
13366 val = p - htab->glink_eh_frame->contents;
13367 bfd_put_32 (htab->elf.dynobj, val, p);
13368 p += 4;
13369 /* Offset to .glink, written later. */
13370 p += 4;
13371 /* .glink size. */
13372 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13373 p += 4;
13374 /* Augmentation. */
13375 p += 1;
13376
13377 *p++ = DW_CFA_advance_loc + 1;
13378 *p++ = DW_CFA_register;
13379 *p++ = 65;
9f08fa5c 13380 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13381 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13382 *p++ = DW_CFA_restore_extended;
13383 *p++ = 65;
2e0ce1c8 13384 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13385 }
13386 /* Subsume any padding into the last FDE if user .eh_frame
13387 sections are aligned more than glink_eh_frame. Otherwise any
13388 zero padding will be seen as a terminator. */
2e0ce1c8 13389 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13390 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13391 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13392 htab->glink_eh_frame->size = size + pad;
13393 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13394 }
13395
d969d15f
AM
13396 maybe_strip_output (info, htab->brlt);
13397 if (htab->glink_eh_frame != NULL)
13398 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13399
b34976b6 13400 return TRUE;
721956f4
AM
13401}
13402
13403/* Called after we have determined section placement. If sections
805fc799 13404 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13405
805fc799 13406bfd_vma
1c865ab2 13407ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13408{
805fc799 13409 asection *s;
a27e685f 13410 bfd_vma TOCstart, adjust;
721956f4 13411
43417696
AM
13412 if (info != NULL)
13413 {
13414 struct elf_link_hash_entry *h;
13415 struct elf_link_hash_table *htab = elf_hash_table (info);
13416
13417 if (is_elf_hash_table (htab)
13418 && htab->hgot != NULL)
13419 h = htab->hgot;
13420 else
13421 {
13422 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13423 if (is_elf_hash_table (htab))
13424 htab->hgot = h;
13425 }
13426 if (h != NULL
13427 && h->root.type == bfd_link_hash_defined
13428 && !h->root.linker_def
13429 && (!is_elf_hash_table (htab)
13430 || h->def_regular))
13431 {
13432 TOCstart = (h->root.u.def.value - TOC_BASE_OFF
13433 + h->root.u.def.section->output_offset
13434 + h->root.u.def.section->output_section->vma);
13435 _bfd_set_gp_value (obfd, TOCstart);
13436 return TOCstart;
13437 }
13438 }
13439
805fc799
AM
13440 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13441 order. The TOC starts where the first of these sections starts. */
13442 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13443 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13444 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13445 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13446 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13447 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13448 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13449 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13450 {
13451 /* This may happen for
13452 o references to TOC base (SYM@toc / TOC[tc0]) without a
13453 .toc directive
13454 o bad linker script
13455 o --gc-sections and empty TOC sections
13456
13457 FIXME: Warn user? */
13458
13459 /* Look for a likely section. We probably won't even be
13460 using TOCstart. */
13461 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13462 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13463 | SEC_EXCLUDE))
805fc799
AM
13464 == (SEC_ALLOC | SEC_SMALL_DATA))
13465 break;
721956f4 13466 if (s == NULL)
805fc799 13467 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13468 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13469 == (SEC_ALLOC | SEC_SMALL_DATA))
13470 break;
721956f4 13471 if (s == NULL)
805fc799 13472 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13473 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13474 == SEC_ALLOC)
805fc799 13475 break;
721956f4 13476 if (s == NULL)
805fc799 13477 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13478 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13479 break;
13480 }
721956f4 13481
805fc799
AM
13482 TOCstart = 0;
13483 if (s != NULL)
13484 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13485
a27e685f
AM
13486 /* Force alignment. */
13487 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13488 TOCstart -= adjust;
1c865ab2
AM
13489 _bfd_set_gp_value (obfd, TOCstart);
13490
810d4e75 13491 if (info != NULL && s != NULL)
1c865ab2
AM
13492 {
13493 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13494
810d4e75
AM
13495 if (htab != NULL)
13496 {
13497 if (htab->elf.hgot != NULL)
13498 {
a27e685f 13499 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13500 htab->elf.hgot->root.u.def.section = s;
13501 }
13502 }
13503 else
1c865ab2 13504 {
810d4e75
AM
13505 struct bfd_link_hash_entry *bh = NULL;
13506 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13507 s, TOC_BASE_OFF - adjust,
13508 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13509 }
13510 }
805fc799 13511 return TOCstart;
721956f4
AM
13512}
13513
a345bc8d 13514/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13515 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13516
13517static bfd_boolean
49c09209 13518build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13519{
13520 struct bfd_link_info *info;
13521 struct ppc_link_hash_table *htab;
49c09209 13522 struct plt_entry *ent;
a345bc8d
AM
13523 asection *s;
13524
13525 if (h->root.type == bfd_link_hash_indirect)
13526 return TRUE;
13527
49c09209
AM
13528 info = inf;
13529 htab = ppc_hash_table (info);
13530 if (htab == NULL)
13531 return FALSE;
13532
13533 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13534 if (ent->plt.offset != (bfd_vma) -1)
13535 {
13536 /* This symbol has an entry in the procedure linkage
13537 table. Set it up. */
13538 Elf_Internal_Rela rela;
2d7ad24e 13539 asection *plt, *relplt;
49c09209
AM
13540 bfd_byte *loc;
13541
13542 if (!htab->elf.dynamic_sections_created
13543 || h->dynindx == -1)
13544 {
13545 if (!(h->def_regular
13546 && (h->root.type == bfd_link_hash_defined
13547 || h->root.type == bfd_link_hash_defweak)))
13548 continue;
2d7ad24e
AM
13549 if (h->type == STT_GNU_IFUNC)
13550 {
13551 plt = htab->elf.iplt;
13552 relplt = htab->elf.irelplt;
13553 htab->local_ifunc_resolver = 1;
13554 if (htab->opd_abi)
13555 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13556 else
13557 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13558 }
49c09209 13559 else
2d7ad24e
AM
13560 {
13561 plt = htab->pltlocal;
13562 if (bfd_link_pic (info))
13563 {
13564 relplt = htab->relpltlocal;
13565 if (htab->opd_abi)
13566 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13567 else
13568 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13569 }
13570 else
13571 relplt = NULL;
13572 }
49c09209
AM
13573 rela.r_addend = (h->root.u.def.value
13574 + h->root.u.def.section->output_offset
13575 + h->root.u.def.section->output_section->vma
13576 + ent->addend);
2d7ad24e
AM
13577
13578 if (relplt == NULL)
13579 {
13580 loc = plt->contents + ent->plt.offset;
13581 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13582 if (htab->opd_abi)
13583 {
13584 bfd_vma toc = elf_gp (info->output_bfd);
13585 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13586 bfd_put_64 (info->output_bfd, toc, loc + 8);
13587 }
13588 }
13589 else
13590 {
13591 rela.r_offset = (plt->output_section->vma
13592 + plt->output_offset
13593 + ent->plt.offset);
13594 loc = relplt->contents + (relplt->reloc_count++
13595 * sizeof (Elf64_External_Rela));
13596 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13597 }
49c09209
AM
13598 }
13599 else
13600 {
13601 rela.r_offset = (htab->elf.splt->output_section->vma
13602 + htab->elf.splt->output_offset
13603 + ent->plt.offset);
13604 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
13605 rela.r_addend = ent->addend;
13606 loc = (htab->elf.srelplt->contents
13607 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
13608 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
13609 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
13610 htab->maybe_local_ifunc_resolver = 1;
2d7ad24e 13611 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 13612 }
49c09209
AM
13613 }
13614
a345bc8d
AM
13615 if (!h->pointer_equality_needed)
13616 return TRUE;
13617
13618 if (h->def_regular)
13619 return TRUE;
13620
9e390558 13621 s = htab->global_entry;
49c09209
AM
13622 if (s == NULL || s->size == 0)
13623 return TRUE;
13624
13625 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13626 if (ent->plt.offset != (bfd_vma) -1
13627 && ent->addend == 0)
a345bc8d
AM
13628 {
13629 bfd_byte *p;
13630 asection *plt;
13631 bfd_vma off;
13632
a345bc8d 13633 p = s->contents + h->root.u.def.value;
33e44f2e 13634 plt = htab->elf.splt;
a345bc8d
AM
13635 if (!htab->elf.dynamic_sections_created
13636 || h->dynindx == -1)
2d7ad24e
AM
13637 {
13638 if (h->type == STT_GNU_IFUNC)
13639 plt = htab->elf.iplt;
13640 else
13641 plt = htab->pltlocal;
13642 }
49c09209 13643 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
13644 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
13645
13646 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
13647 {
13648 info->callbacks->einfo
c1c8c1ef 13649 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
13650 h->root.root.string);
13651 bfd_set_error (bfd_error_bad_value);
13652 htab->stub_error = TRUE;
13653 }
13654
7341d5e2
AM
13655 htab->stub_count[ppc_stub_global_entry - 1] += 1;
13656 if (htab->params->emit_stub_syms)
13657 {
13658 size_t len = strlen (h->root.root.string);
13659 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
13660
13661 if (name == NULL)
13662 return FALSE;
13663
13664 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
13665 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
13666 if (h == NULL)
13667 return FALSE;
13668 if (h->root.type == bfd_link_hash_new)
13669 {
13670 h->root.type = bfd_link_hash_defined;
13671 h->root.u.def.section = s;
13672 h->root.u.def.value = p - s->contents;
13673 h->ref_regular = 1;
13674 h->def_regular = 1;
13675 h->ref_regular_nonweak = 1;
13676 h->forced_local = 1;
13677 h->non_elf = 0;
2ec55de3 13678 h->root.linker_def = 1;
7341d5e2
AM
13679 }
13680 }
13681
a345bc8d
AM
13682 if (PPC_HA (off) != 0)
13683 {
13684 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
13685 p += 4;
13686 }
13687 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
13688 p += 4;
13689 bfd_put_32 (s->owner, MTCTR_R12, p);
13690 p += 4;
407aa07c 13691 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
13692 break;
13693 }
13694 return TRUE;
13695}
13696
49c09209
AM
13697/* Write PLT relocs for locals. */
13698
13699static bfd_boolean
13700write_plt_relocs_for_local_syms (struct bfd_link_info *info)
13701{
13702 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13703 bfd *ibfd;
13704
13705 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
13706 {
13707 struct got_entry **lgot_ents, **end_lgot_ents;
13708 struct plt_entry **local_plt, **lplt, **end_local_plt;
13709 Elf_Internal_Shdr *symtab_hdr;
13710 bfd_size_type locsymcount;
13711 Elf_Internal_Sym *local_syms = NULL;
13712 struct plt_entry *ent;
13713
13714 if (!is_ppc64_elf (ibfd))
13715 continue;
13716
13717 lgot_ents = elf_local_got_ents (ibfd);
13718 if (!lgot_ents)
13719 continue;
13720
13721 symtab_hdr = &elf_symtab_hdr (ibfd);
13722 locsymcount = symtab_hdr->sh_info;
13723 end_lgot_ents = lgot_ents + locsymcount;
13724 local_plt = (struct plt_entry **) end_lgot_ents;
13725 end_local_plt = local_plt + locsymcount;
13726 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
13727 for (ent = *lplt; ent != NULL; ent = ent->next)
13728 if (ent->plt.offset != (bfd_vma) -1)
13729 {
13730 Elf_Internal_Sym *sym;
13731 asection *sym_sec;
13732 asection *plt, *relplt;
13733 bfd_byte *loc;
13734 bfd_vma val;
49c09209
AM
13735
13736 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
13737 lplt - local_plt, ibfd))
13738 {
13739 if (local_syms != NULL
13740 && symtab_hdr->contents != (unsigned char *) local_syms)
13741 free (local_syms);
13742 return FALSE;
13743 }
13744
13745 val = sym->st_value + ent->addend;
ba85c15d
AM
13746 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
13747 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
13748 if (sym_sec != NULL && sym_sec->output_section != NULL)
13749 val += sym_sec->output_offset + sym_sec->output_section->vma;
13750
2d7ad24e
AM
13751 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13752 {
13753 htab->local_ifunc_resolver = 1;
13754 plt = htab->elf.iplt;
13755 relplt = htab->elf.irelplt;
13756 }
13757 else
13758 {
13759 plt = htab->pltlocal;
13760 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
13761 }
49c09209 13762
2d7ad24e
AM
13763 if (relplt == NULL)
13764 {
13765 loc = plt->contents + ent->plt.offset;
13766 bfd_put_64 (info->output_bfd, val, loc);
13767 if (htab->opd_abi)
13768 {
13769 bfd_vma toc = elf_gp (ibfd);
13770 bfd_put_64 (info->output_bfd, toc, loc + 8);
13771 }
13772 }
49c09209 13773 else
2d7ad24e
AM
13774 {
13775 Elf_Internal_Rela rela;
13776 rela.r_offset = (ent->plt.offset
13777 + plt->output_offset
13778 + plt->output_section->vma);
13779 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
13780 {
13781 if (htab->opd_abi)
13782 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13783 else
13784 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13785 }
13786 else
13787 {
13788 if (htab->opd_abi)
13789 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13790 else
13791 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13792 }
13793 rela.r_addend = val;
13794 loc = relplt->contents + (relplt->reloc_count++
13795 * sizeof (Elf64_External_Rela));
13796 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13797 }
49c09209
AM
13798 }
13799
13800 if (local_syms != NULL
13801 && symtab_hdr->contents != (unsigned char *) local_syms)
13802 {
13803 if (!info->keep_memory)
13804 free (local_syms);
13805 else
13806 symtab_hdr->contents = (unsigned char *) local_syms;
13807 }
13808 }
13809 return TRUE;
13810}
13811
721956f4
AM
13812/* Build all the stubs associated with the current output file.
13813 The stubs are kept in a hash table attached to the main linker
13814 hash table. This function is called via gldelf64ppc_finish. */
13815
b34976b6 13816bfd_boolean
e7d1c40c 13817ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 13818 char **stats)
5d1634d7
AM
13819{
13820 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 13821 struct map_stub *group;
721956f4 13822 asection *stub_sec;
5d1634d7 13823 bfd_byte *p;
e717da7e 13824 int stub_sec_count = 0;
5d1634d7 13825
4dfe6ac6
NC
13826 if (htab == NULL)
13827 return FALSE;
13828
eea6121a 13829 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 13830 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13831 {
13832 group->eh_size = 0;
13833 group->lr_restore = 0;
13834 if ((stub_sec = group->stub_sec) != NULL
13835 && stub_sec->size != 0)
13836 {
13837 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
13838 stub_sec->size);
13839 if (stub_sec->contents == NULL)
13840 return FALSE;
13841 stub_sec->size = 0;
13842 }
13843 }
5d1634d7 13844
23eb7e01 13845 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 13846 {
9f951329 13847 unsigned int indx;
ad8e1ba5 13848 bfd_vma plt0;
9f951329 13849
721956f4 13850 /* Build the .glink plt call stub. */
e7d1c40c 13851 if (htab->params->emit_stub_syms)
97b639ba
AM
13852 {
13853 struct elf_link_hash_entry *h;
468392fb
AM
13854 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
13855 TRUE, FALSE, FALSE);
97b639ba
AM
13856 if (h == NULL)
13857 return FALSE;
13858 if (h->root.type == bfd_link_hash_new)
13859 {
13860 h->root.type = bfd_link_hash_defined;
13861 h->root.u.def.section = htab->glink;
ee4bf8d2 13862 h->root.u.def.value = 8;
f5385ebf
AM
13863 h->ref_regular = 1;
13864 h->def_regular = 1;
13865 h->ref_regular_nonweak = 1;
13866 h->forced_local = 1;
13867 h->non_elf = 0;
2ec55de3 13868 h->root.linker_def = 1;
97b639ba
AM
13869 }
13870 }
33e44f2e
AM
13871 plt0 = (htab->elf.splt->output_section->vma
13872 + htab->elf.splt->output_offset
13873 - 16);
176a0d42
AM
13874 if (info->emitrelocations)
13875 {
13876 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
13877 if (r == NULL)
13878 return FALSE;
13879 r->r_offset = (htab->glink->output_offset
13880 + htab->glink->output_section->vma);
13881 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
13882 r->r_addend = plt0;
13883 }
4ce794b7 13884 p = htab->glink->contents;
176a0d42 13885 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
13886 bfd_put_64 (htab->glink->owner, plt0, p);
13887 p += 8;
b9e5796b
AM
13888 if (htab->opd_abi)
13889 {
13890 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
13891 p += 4;
13892 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13893 p += 4;
13894 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13895 p += 4;
13896 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13897 p += 4;
13898 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
13899 p += 4;
13900 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13901 p += 4;
13902 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13903 p += 4;
13904 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
13905 p += 4;
13906 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13907 p += 4;
13908 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
13909 p += 4;
13910 }
13911 else
13912 {
13913 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
13914 p += 4;
13915 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
13916 p += 4;
13917 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
13918 p += 4;
f378ab09
AM
13919 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
13920 p += 4;
b9e5796b
AM
13921 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
13922 p += 4;
13923 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
13924 p += 4;
13925 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
13926 p += 4;
13927 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
13928 p += 4;
13929 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
13930 p += 4;
13931 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
13932 p += 4;
13933 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
13934 p += 4;
13935 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
13936 p += 4;
13937 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
13938 p += 4;
13939 }
407aa07c
AM
13940 bfd_put_32 (htab->glink->owner, BCTR, p);
13941 p += 4;
c75bc4f7 13942 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 13943
9f951329
AM
13944 /* Build the .glink lazy link call stubs. */
13945 indx = 0;
9e390558 13946 while (p < htab->glink->contents + htab->glink->size)
9f951329 13947 {
b9e5796b 13948 if (htab->opd_abi)
9f951329 13949 {
b9e5796b
AM
13950 if (indx < 0x8000)
13951 {
13952 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
13953 p += 4;
13954 }
13955 else
13956 {
13957 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
13958 p += 4;
13959 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
13960 p);
13961 p += 4;
13962 }
9f951329 13963 }
4ce794b7 13964 bfd_put_32 (htab->glink->owner,
ee4bf8d2 13965 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 13966 indx++;
9f951329
AM
13967 p += 4;
13968 }
5d1634d7 13969 }
5d1634d7 13970
49c09209
AM
13971 /* Build .glink global entry stubs, and PLT relocs for globals. */
13972 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
13973
13974 if (!write_plt_relocs_for_local_syms (info))
13975 return FALSE;
9e390558 13976
7341d5e2 13977 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 13978 {
4ce794b7 13979 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 13980 htab->brlt->size);
4ce794b7 13981 if (htab->brlt->contents == NULL)
b34976b6 13982 return FALSE;
721956f4 13983 }
ee75fd95 13984 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
13985 {
13986 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 13987 htab->relbrlt->size);
63bc6f6c
AM
13988 if (htab->relbrlt->contents == NULL)
13989 return FALSE;
13990 }
5d1634d7 13991
721956f4
AM
13992 /* Build the stubs as directed by the stub hash table. */
13993 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 13994
a4b6fadd
AM
13995 for (group = htab->group; group != NULL; group = group->next)
13996 if (group->needs_save_res)
7dda8d3c 13997 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 13998
aa8a7074
AM
13999 if (htab->relbrlt != NULL)
14000 htab->relbrlt->reloc_count = 0;
14001
e7d1c40c 14002 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14003 for (group = htab->group; group != NULL; group = group->next)
14004 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14005 {
14006 int align = abs (htab->params->plt_stub_align);
14007 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14008 }
794e51c0 14009
7dda8d3c
AM
14010 for (group = htab->group; group != NULL; group = group->next)
14011 if (group->needs_save_res)
14012 {
14013 stub_sec = group->stub_sec;
14014 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14015 htab->sfpr->contents, htab->sfpr->size);
14016 if (htab->params->emit_stub_syms)
14017 {
14018 unsigned int i;
14019
14020 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14021 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14022 return FALSE;
14023 }
14024 }
14025
df136d64
AM
14026 if (htab->glink_eh_frame != NULL
14027 && htab->glink_eh_frame->size != 0)
14028 {
14029 bfd_vma val;
14030 size_t align = 4;
14031
14032 p = htab->glink_eh_frame->contents;
14033 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14034
14035 for (group = htab->group; group != NULL; group = group->next)
14036 if (group->eh_size != 0)
14037 {
14038 /* Offset to stub section. */
14039 val = (group->stub_sec->output_section->vma
14040 + group->stub_sec->output_offset);
14041 val -= (htab->glink_eh_frame->output_section->vma
14042 + htab->glink_eh_frame->output_offset
14043 + (p + 8 - htab->glink_eh_frame->contents));
14044 if (val + 0x80000000 > 0xffffffff)
14045 {
14046 _bfd_error_handler
14047 (_("%s offset too large for .eh_frame sdata4 encoding"),
14048 group->stub_sec->name);
14049 return FALSE;
14050 }
14051 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14052 p += (group->eh_size + 17 + 3) & -4;
14053 }
14054 if (htab->glink != NULL && htab->glink->size != 0)
14055 {
14056 /* Offset to .glink. */
14057 val = (htab->glink->output_section->vma
14058 + htab->glink->output_offset
14059 + 8);
14060 val -= (htab->glink_eh_frame->output_section->vma
14061 + htab->glink_eh_frame->output_offset
14062 + (p + 8 - htab->glink_eh_frame->contents));
14063 if (val + 0x80000000 > 0xffffffff)
14064 {
14065 _bfd_error_handler
14066 (_("%s offset too large for .eh_frame sdata4 encoding"),
14067 htab->glink->name);
14068 return FALSE;
14069 }
14070 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14071 p += (24 + align - 1) & -align;
14072 }
14073 }
14074
d4aaa2a0
AM
14075 for (group = htab->group; group != NULL; group = group->next)
14076 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14077 {
14078 stub_sec_count += 1;
c9301e31
AM
14079 if (stub_sec->rawsize != stub_sec->size
14080 && (htab->stub_iteration <= STUB_SHRINK_ITER
14081 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14082 break;
14083 }
5d1634d7 14084
25516cc5 14085 if (group != NULL)
5d1634d7 14086 {
b34976b6 14087 htab->stub_error = TRUE;
cf97bcb0 14088 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14089 }
721956f4 14090
d2a300cf
AM
14091 if (htab->stub_error)
14092 return FALSE;
14093
14094 if (stats != NULL)
14095 {
db84fff3 14096 size_t len;
d2a300cf
AM
14097 *stats = bfd_malloc (500);
14098 if (*stats == NULL)
14099 return FALSE;
14100
db84fff3
AM
14101 len = sprintf (*stats,
14102 ngettext ("linker stubs in %u group\n",
14103 "linker stubs in %u groups\n",
14104 stub_sec_count),
14105 stub_sec_count);
05d0e962
AM
14106 sprintf (*stats + len, _(" branch %lu\n"
14107 " branch toc adj %lu\n"
14108 " branch notoc %lu\n"
14109 " branch both %lu\n"
14110 " long branch %lu\n"
14111 " long toc adj %lu\n"
14112 " long notoc %lu\n"
14113 " long both %lu\n"
14114 " plt call %lu\n"
14115 " plt call save %lu\n"
14116 " plt call notoc %lu\n"
14117 " plt call both %lu\n"
14118 " global entry %lu"),
4ce794b7
AM
14119 htab->stub_count[ppc_stub_long_branch - 1],
14120 htab->stub_count[ppc_stub_long_branch_r2off - 1],
05d0e962
AM
14121 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14122 htab->stub_count[ppc_stub_long_branch_both - 1],
4ce794b7
AM
14123 htab->stub_count[ppc_stub_plt_branch - 1],
14124 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
05d0e962
AM
14125 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14126 htab->stub_count[ppc_stub_plt_branch_both - 1],
794e51c0 14127 htab->stub_count[ppc_stub_plt_call - 1],
7341d5e2 14128 htab->stub_count[ppc_stub_plt_call_r2save - 1],
05d0e962
AM
14129 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14130 htab->stub_count[ppc_stub_plt_call_both - 1],
7341d5e2 14131 htab->stub_count[ppc_stub_global_entry - 1]);
d2a300cf
AM
14132 }
14133 return TRUE;
5bd4f169
AM
14134}
14135
60124e18
AM
14136/* What to do when ld finds relocations against symbols defined in
14137 discarded sections. */
14138
14139static unsigned int
14140ppc64_elf_action_discarded (asection *sec)
14141{
14142 if (strcmp (".opd", sec->name) == 0)
14143 return 0;
14144
14145 if (strcmp (".toc", sec->name) == 0)
14146 return 0;
14147
bce50a28
JJ
14148 if (strcmp (".toc1", sec->name) == 0)
14149 return 0;
14150
60124e18
AM
14151 return _bfd_elf_default_action_discarded (sec);
14152}
14153
e59a1001
AM
14154/* These are the dynamic relocations supported by glibc. */
14155
14156static bfd_boolean
14157ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14158{
14159 switch (r_type)
14160 {
14161 case R_PPC64_RELATIVE:
14162 case R_PPC64_NONE:
14163 case R_PPC64_ADDR64:
14164 case R_PPC64_GLOB_DAT:
14165 case R_PPC64_IRELATIVE:
14166 case R_PPC64_JMP_IREL:
14167 case R_PPC64_JMP_SLOT:
14168 case R_PPC64_DTPMOD64:
14169 case R_PPC64_DTPREL64:
14170 case R_PPC64_TPREL64:
14171 case R_PPC64_TPREL16_LO_DS:
14172 case R_PPC64_TPREL16_DS:
14173 case R_PPC64_TPREL16:
14174 case R_PPC64_TPREL16_LO:
14175 case R_PPC64_TPREL16_HI:
14176 case R_PPC64_TPREL16_HIGH:
14177 case R_PPC64_TPREL16_HA:
14178 case R_PPC64_TPREL16_HIGHA:
14179 case R_PPC64_TPREL16_HIGHER:
14180 case R_PPC64_TPREL16_HIGHEST:
14181 case R_PPC64_TPREL16_HIGHERA:
14182 case R_PPC64_TPREL16_HIGHESTA:
14183 case R_PPC64_ADDR16_LO_DS:
14184 case R_PPC64_ADDR16_LO:
14185 case R_PPC64_ADDR16_HI:
14186 case R_PPC64_ADDR16_HIGH:
14187 case R_PPC64_ADDR16_HA:
14188 case R_PPC64_ADDR16_HIGHA:
14189 case R_PPC64_REL30:
14190 case R_PPC64_COPY:
14191 case R_PPC64_UADDR64:
14192 case R_PPC64_UADDR32:
14193 case R_PPC64_ADDR32:
14194 case R_PPC64_ADDR24:
14195 case R_PPC64_ADDR16:
14196 case R_PPC64_UADDR16:
14197 case R_PPC64_ADDR16_DS:
14198 case R_PPC64_ADDR16_HIGHER:
14199 case R_PPC64_ADDR16_HIGHEST:
14200 case R_PPC64_ADDR16_HIGHERA:
14201 case R_PPC64_ADDR16_HIGHESTA:
14202 case R_PPC64_ADDR14:
14203 case R_PPC64_ADDR14_BRTAKEN:
14204 case R_PPC64_ADDR14_BRNTAKEN:
14205 case R_PPC64_REL32:
14206 case R_PPC64_REL64:
14207 return TRUE;
14208
14209 default:
14210 return FALSE;
14211 }
14212}
14213
5bd4f169
AM
14214/* The RELOCATE_SECTION function is called by the ELF backend linker
14215 to handle the relocations for a section.
14216
14217 The relocs are always passed as Rela structures; if the section
14218 actually uses Rel structures, the r_addend field will always be
14219 zero.
14220
14221 This function is responsible for adjust the section contents as
14222 necessary, and (if using Rela relocs and generating a
1049f94e 14223 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14224 necessary.
14225
14226 This function does not have to worry about setting the reloc
14227 address or the reloc symbol index.
14228
14229 LOCAL_SYMS is a pointer to the swapped in local symbols.
14230
14231 LOCAL_SECTIONS is an array giving the section in the input file
14232 corresponding to the st_shndx field of each local symbol.
14233
14234 The global hash table entry for the global symbols can be found
14235 via elf_sym_hashes (input_bfd).
14236
1049f94e 14237 When generating relocatable output, this function must handle
5bd4f169
AM
14238 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14239 going to be the section symbol corresponding to the output
14240 section, which means that the addend must be adjusted
14241 accordingly. */
14242
b34976b6 14243static bfd_boolean
4ce794b7
AM
14244ppc64_elf_relocate_section (bfd *output_bfd,
14245 struct bfd_link_info *info,
14246 bfd *input_bfd,
14247 asection *input_section,
14248 bfd_byte *contents,
14249 Elf_Internal_Rela *relocs,
14250 Elf_Internal_Sym *local_syms,
14251 asection **local_sections)
5bd4f169 14252{
65f38f15 14253 struct ppc_link_hash_table *htab;
5bd4f169
AM
14254 Elf_Internal_Shdr *symtab_hdr;
14255 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14256 Elf_Internal_Rela *rel;
c316a17c 14257 Elf_Internal_Rela *wrel;
5bd4f169 14258 Elf_Internal_Rela *relend;
411e1bfb
AM
14259 Elf_Internal_Rela outrel;
14260 bfd_byte *loc;
411e1bfb 14261 struct got_entry **local_got_ents;
5bd4f169 14262 bfd_vma TOCstart;
b34976b6
AM
14263 bfd_boolean ret = TRUE;
14264 bfd_boolean is_opd;
794e51c0
AM
14265 /* Assume 'at' branch hints. */
14266 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14267 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14268 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14269
65f38f15 14270 /* Initialize howto table if needed. */
5bd4f169 14271 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14272 ppc_howto_init ();
14273
65f38f15 14274 htab = ppc_hash_table (info);
4dfe6ac6
NC
14275 if (htab == NULL)
14276 return FALSE;
ee75fd95
AM
14277
14278 /* Don't relocate stub sections. */
e7d1c40c 14279 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14280 return TRUE;
14281
7af5d5c4
AM
14282 if (!is_ppc64_elf (input_bfd))
14283 {
14284 bfd_set_error (bfd_error_wrong_format);
14285 return FALSE;
14286 }
0ffa91dd 14287
411e1bfb 14288 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14289 TOCstart = elf_gp (output_bfd);
0ffa91dd 14290 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14291 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14292 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14293
c316a17c 14294 rel = wrel = relocs;
5bd4f169 14295 relend = relocs + input_section->reloc_count;
c316a17c 14296 for (; rel < relend; wrel++, rel++)
5bd4f169 14297 {
04c9666a 14298 enum elf_ppc64_reloc_type r_type;
31c76678 14299 bfd_vma addend;
5bd4f169
AM
14300 bfd_reloc_status_type r;
14301 Elf_Internal_Sym *sym;
14302 asection *sec;
039b3fef
AM
14303 struct elf_link_hash_entry *h_elf;
14304 struct ppc_link_hash_entry *h;
14305 struct ppc_link_hash_entry *fdh;
5bd4f169 14306 const char *sym_name;
0d4792f7 14307 unsigned long r_symndx, toc_symndx;
3a71aa26 14308 bfd_vma toc_addend;
f961d9dd
AM
14309 unsigned char tls_mask, tls_gd, tls_type;
14310 unsigned char sym_type;
5bd4f169 14311 bfd_vma relocation;
23cedd1d 14312 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14313 bfd_boolean warned;
bc30df16 14314 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14315 unsigned int insn;
e11840f9 14316 unsigned int mask;
721956f4
AM
14317 struct ppc_stub_hash_entry *stub_entry;
14318 bfd_vma max_br_offset;
14319 bfd_vma from;
c316a17c 14320 Elf_Internal_Rela orig_rel;
b80eed39
AM
14321 reloc_howto_type *howto;
14322 struct reloc_howto_struct alt_howto;
4a421c53
AM
14323 uint64_t pinsn;
14324 bfd_vma offset;
5bd4f169 14325
c316a17c
AM
14326 again:
14327 orig_rel = *rel;
14328
4ce794b7 14329 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14330 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14331
14332 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14333 symbol of the previous ADDR64 reloc. The symbol gives us the
14334 proper TOC base to use. */
14335 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14336 && wrel != relocs
14337 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14338 && is_opd)
c316a17c 14339 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14340
4ce794b7
AM
14341 sym = NULL;
14342 sec = NULL;
039b3fef 14343 h_elf = NULL;
4ce794b7 14344 sym_name = NULL;
b34976b6
AM
14345 unresolved_reloc = FALSE;
14346 warned = FALSE;
65f38f15 14347
0b13192e 14348 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14349 {
14350 /* It's a local symbol. */
74f0fb50 14351 struct _opd_sec_data *opd;
4025353c 14352
5bd4f169
AM
14353 sym = local_syms + r_symndx;
14354 sec = local_sections[r_symndx];
26c61ae5 14355 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14356 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14357 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14358 opd = get_opd_info (sec);
14359 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14360 {
51aecdc5
AM
14361 long adjust = opd->adjust[OPD_NDX (sym->st_value
14362 + rel->r_addend)];
4025353c
AM
14363 if (adjust == -1)
14364 relocation = 0;
14365 else
4cc603a5
AM
14366 {
14367 /* If this is a relocation against the opd section sym
14368 and we have edited .opd, adjust the reloc addend so
14369 that ld -r and ld --emit-relocs output is correct.
14370 If it is a reloc against some other .opd symbol,
14371 then the symbol value will be adjusted later. */
14372 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14373 rel->r_addend += adjust;
14374 else
14375 relocation += adjust;
14376 }
1e2f5b6e 14377 }
5bd4f169
AM
14378 }
14379 else
14380 {
62d887d4
L
14381 bfd_boolean ignored;
14382
b2a8e766
AM
14383 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14384 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14385 h_elf, sec, relocation,
62d887d4 14386 unresolved_reloc, warned, ignored);
039b3fef
AM
14387 sym_name = h_elf->root.root.string;
14388 sym_type = h_elf->type;
b69fdb4e
AM
14389 if (sec != NULL
14390 && sec->owner == output_bfd
14391 && strcmp (sec->name, ".opd") == 0)
14392 {
14393 /* This is a symbol defined in a linker script. All
14394 such are defined in output sections, even those
14395 defined by simple assignment from a symbol defined in
14396 an input section. Transfer the symbol to an
14397 appropriate input .opd section, so that a branch to
14398 this symbol will be mapped to the location specified
14399 by the opd entry. */
14400 struct bfd_link_order *lo;
14401 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14402 if (lo->type == bfd_indirect_link_order)
14403 {
14404 asection *isec = lo->u.indirect.section;
14405 if (h_elf->root.u.def.value >= isec->output_offset
14406 && h_elf->root.u.def.value < (isec->output_offset
14407 + isec->size))
14408 {
14409 h_elf->root.u.def.value -= isec->output_offset;
14410 h_elf->root.u.def.section = isec;
14411 sec = isec;
14412 break;
14413 }
14414 }
14415 }
5bd4f169 14416 }
039b3fef 14417 h = (struct ppc_link_hash_entry *) h_elf;
5bd4f169 14418
dbaa2011 14419 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14420 {
14421 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14422 input_bfd, input_section,
0930cb30 14423 contents, rel->r_offset);
c316a17c
AM
14424 wrel->r_offset = rel->r_offset;
14425 wrel->r_info = 0;
14426 wrel->r_addend = 0;
14427
14428 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14429 symbols defined in discarded sections. Not done for
c316a17c
AM
14430 non-debug to preserve relocs in .eh_frame which the
14431 eh_frame editing code expects to be present. */
14432 if (bfd_link_relocatable (info)
14433 && (input_section->flags & SEC_DEBUGGING))
14434 wrel--;
14435
14436 continue;
14437 }
ab96bf03 14438
0e1862bb 14439 if (bfd_link_relocatable (info))
c316a17c 14440 goto copy_reloc;
ab96bf03 14441
f40da81b
AM
14442 if (h != NULL && &h->elf == htab->elf.hgot)
14443 {
6f20ed8a 14444 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14445 sec = bfd_abs_section_ptr;
14446 unresolved_reloc = FALSE;
14447 }
14448
951fd09b
AM
14449 /* TLS optimizations. Replace instruction sequences and relocs
14450 based on information we collected in tls_optimize. We edit
14451 RELOCS so that --emit-relocs will output something sensible
14452 for the final instruction stream. */
14453 tls_mask = 0;
14454 tls_gd = 0;
0d4792f7 14455 toc_symndx = 0;
727fc41e
AM
14456 if (h != NULL)
14457 tls_mask = h->tls_mask;
14458 else if (local_got_ents != NULL)
411e1bfb 14459 {
e054468f
AM
14460 struct plt_entry **local_plt = (struct plt_entry **)
14461 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14462 unsigned char *lgot_masks = (unsigned char *)
e054468f 14463 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14464 tls_mask = lgot_masks[r_symndx];
14465 }
37da22e5 14466 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14467 && (r_type == R_PPC64_TLS
14468 || r_type == R_PPC64_TLSGD
14469 || r_type == R_PPC64_TLSLD))
14470 {
14471 /* Check for toc tls entries. */
f961d9dd 14472 unsigned char *toc_tls;
0d4792f7 14473
727fc41e
AM
14474 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14475 &local_syms, rel, input_bfd))
14476 return FALSE;
0d4792f7 14477
727fc41e
AM
14478 if (toc_tls)
14479 tls_mask = *toc_tls;
0d4792f7
AM
14480 }
14481
14482 /* Check that tls relocs are used with tls syms, and non-tls
14483 relocs are used with non-tls syms. */
cf35638d 14484 if (r_symndx != STN_UNDEF
0d4792f7
AM
14485 && r_type != R_PPC64_NONE
14486 && (h == NULL
039b3fef
AM
14487 || h->elf.root.type == bfd_link_hash_defined
14488 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14489 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14490 {
37da22e5 14491 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14492 && (r_type == R_PPC64_TLS
14493 || r_type == R_PPC64_TLSGD
14494 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14495 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14496 ;
14497 else
25f53a85 14498 info->callbacks->einfo
1d483afe 14499 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14500 /* xgettext:c-format */
c1c8c1ef 14501 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14502 /* xgettext:c-format */
c1c8c1ef 14503 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14504 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14505 ppc64_elf_howto_table[r_type]->name,
14506 sym_name);
411e1bfb
AM
14507 }
14508
14509 /* Ensure reloc mapping code below stays sane. */
14510 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14511 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14512 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14513 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14514 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
14515 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
14516 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
14517 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
14518 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
14519 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
14520 abort ();
0d4792f7 14521
411e1bfb
AM
14522 switch (r_type)
14523 {
14524 default:
411e1bfb
AM
14525 break;
14526
ba761f19 14527 case R_PPC64_LO_DS_OPT:
95f0d0d2 14528 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
ba761f19
AM
14529 if ((insn & (0x3f << 26)) != 58u << 26)
14530 abort ();
14531 insn += (14u << 26) - (58u << 26);
95f0d0d2 14532 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
14533 r_type = R_PPC64_TOC16_LO;
14534 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14535 break;
14536
411e1bfb
AM
14537 case R_PPC64_TOC16:
14538 case R_PPC64_TOC16_LO:
14539 case R_PPC64_TOC16_DS:
14540 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
14541 {
14542 /* Check for toc tls entries. */
f961d9dd 14543 unsigned char *toc_tls;
951fd09b 14544 int retval;
411e1bfb 14545
3a71aa26
AM
14546 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14547 &local_syms, rel, input_bfd);
951fd09b 14548 if (retval == 0)
411e1bfb
AM
14549 return FALSE;
14550
14551 if (toc_tls)
14552 {
951fd09b 14553 tls_mask = *toc_tls;
411e1bfb
AM
14554 if (r_type == R_PPC64_TOC16_DS
14555 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 14556 {
37da22e5 14557 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
14558 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
14559 goto toctprel;
14560 }
411e1bfb 14561 else
951fd09b
AM
14562 {
14563 /* If we found a GD reloc pair, then we might be
14564 doing a GD->IE transition. */
14565 if (retval == 2)
14566 {
b00a0a86 14567 tls_gd = TLS_GDIE;
37da22e5
AM
14568 if ((tls_mask & TLS_TLS) != 0
14569 && (tls_mask & TLS_GD) == 0)
102890f0 14570 goto tls_ldgd_opt;
951fd09b
AM
14571 }
14572 else if (retval == 3)
14573 {
37da22e5
AM
14574 if ((tls_mask & TLS_TLS) != 0
14575 && (tls_mask & TLS_LD) == 0)
102890f0 14576 goto tls_ldgd_opt;
951fd09b
AM
14577 }
14578 }
411e1bfb
AM
14579 }
14580 }
14581 break;
14582
9d6ded02
AM
14583 case R_PPC64_GOT_TPREL16_HI:
14584 case R_PPC64_GOT_TPREL16_HA:
37da22e5 14585 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
14586 && (tls_mask & TLS_TPREL) == 0)
14587 {
14588 rel->r_offset -= d_offset;
95f0d0d2 14589 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
14590 r_type = R_PPC64_NONE;
14591 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14592 }
14593 break;
14594
411e1bfb
AM
14595 case R_PPC64_GOT_TPREL16_DS:
14596 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 14597 if ((tls_mask & TLS_TLS) != 0
951fd09b 14598 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14599 {
81407a69 14600 toctprel:
95f0d0d2 14601 insn = bfd_get_32 (input_bfd,
c316a17c 14602 contents + rel->r_offset - d_offset);
411e1bfb
AM
14603 insn &= 31 << 21;
14604 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 14605 bfd_put_32 (input_bfd, insn,
c316a17c 14606 contents + rel->r_offset - d_offset);
411e1bfb 14607 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
14608 if (toc_symndx != 0)
14609 {
14610 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 14611 rel->r_addend = toc_addend;
0d4792f7
AM
14612 /* We changed the symbol. Start over in order to
14613 get h, sym, sec etc. right. */
c316a17c 14614 goto again;
0d4792f7
AM
14615 }
14616 else
14617 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14618 }
14619 break;
14620
c213164a
AM
14621 case R_PPC64_GOT_TPREL34:
14622 if ((tls_mask & TLS_TLS) != 0
14623 && (tls_mask & TLS_TPREL) == 0)
14624 {
14625 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
14626 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14627 pinsn <<= 32;
14628 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14629 pinsn += ((2ULL << 56) + (-1ULL << 52)
14630 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
14631 bfd_put_32 (input_bfd, pinsn >> 32,
14632 contents + rel->r_offset);
14633 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14634 contents + rel->r_offset + 4);
14635 r_type = R_PPC64_TPREL34;
14636 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14637 }
14638 break;
14639
411e1bfb 14640 case R_PPC64_TLS:
37da22e5 14641 if ((tls_mask & TLS_TLS) != 0
951fd09b 14642 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 14643 {
c213164a 14644 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
14645 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
14646 if (insn == 0)
c213164a
AM
14647 break;
14648 if ((rel->r_offset & 3) == 0)
0d4792f7 14649 {
c213164a
AM
14650 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
14651 /* Was PPC64_TLS which sits on insn boundary, now
14652 PPC64_TPREL16_LO which is at low-order half-word. */
14653 rel->r_offset += d_offset;
14654 r_type = R_PPC64_TPREL16_LO;
14655 if (toc_symndx != 0)
14656 {
14657 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
14658 rel->r_addend = toc_addend;
14659 /* We changed the symbol. Start over in order to
14660 get h, sym, sec etc. right. */
14661 goto again;
14662 }
14663 else
14664 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14665 }
14666 else if ((rel->r_offset & 3) == 1)
14667 {
14668 /* For pcrel IE to LE we already have the full
14669 offset and thus don't need an addi here. A nop
14670 or mr will do. */
14671 if ((insn & (0x3f << 26)) == 14 << 26)
14672 {
14673 /* Extract regs from addi rt,ra,si. */
14674 unsigned int rt = (insn >> 21) & 0x1f;
14675 unsigned int ra = (insn >> 16) & 0x1f;
14676 if (rt == ra)
14677 insn = NOP;
14678 else
14679 {
14680 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
14681 insn = (rt << 16) | (ra << 21) | (ra << 11);
14682 insn |= (31u << 26) | (444u << 1);
14683 }
14684 }
14685 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 14686 }
411e1bfb
AM
14687 }
14688 break;
14689
411e1bfb
AM
14690 case R_PPC64_GOT_TLSGD16_HI:
14691 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 14692 tls_gd = TLS_GDIE;
37da22e5 14693 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
14694 goto tls_gdld_hi;
14695 break;
14696
411e1bfb
AM
14697 case R_PPC64_GOT_TLSLD16_HI:
14698 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 14699 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 14700 {
951fd09b
AM
14701 tls_gdld_hi:
14702 if ((tls_mask & tls_gd) != 0)
14703 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
14704 + R_PPC64_GOT_TPREL16_DS);
14705 else
411e1bfb 14706 {
4fe5ca5b 14707 rel->r_offset -= d_offset;
95f0d0d2 14708 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 14709 r_type = R_PPC64_NONE;
411e1bfb 14710 }
951fd09b 14711 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
14712 }
14713 break;
14714
951fd09b
AM
14715 case R_PPC64_GOT_TLSGD16:
14716 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 14717 tls_gd = TLS_GDIE;
37da22e5 14718 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 14719 goto tls_ldgd_opt;
951fd09b 14720 break;
411e1bfb 14721
951fd09b
AM
14722 case R_PPC64_GOT_TLSLD16:
14723 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 14724 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 14725 {
b9f04fe0 14726 unsigned int insn1, insn2;
102890f0
AM
14727
14728 tls_ldgd_opt:
727fc41e
AM
14729 offset = (bfd_vma) -1;
14730 /* If not using the newer R_PPC64_TLSGD/LD to mark
14731 __tls_get_addr calls, we must trust that the call
14732 stays with its arg setup insns, ie. that the next
14733 reloc is the __tls_get_addr call associated with
14734 the current reloc. Edit both insns. */
9737e8af 14735 if (input_section->nomark_tls_get_addr
727fc41e
AM
14736 && rel + 1 < relend
14737 && branch_reloc_hash_match (input_bfd, rel + 1,
14738 htab->tls_get_addr,
14739 htab->tls_get_addr_fd))
14740 offset = rel[1].r_offset;
b86ac8e3
AM
14741 /* We read the low GOT_TLS (or TOC16) insn because we
14742 need to keep the destination reg. It may be
14743 something other than the usual r3, and moved to r3
14744 before the call by intervening code. */
95f0d0d2 14745 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 14746 contents + rel->r_offset - d_offset);
102890f0 14747 if ((tls_mask & tls_gd) != 0)
411e1bfb 14748 {
102890f0 14749 /* IE */
b86ac8e3 14750 insn1 &= (0x1f << 21) | (0x1f << 16);
102890f0
AM
14751 insn1 |= 58 << 26; /* ld */
14752 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 14753 if (offset != (bfd_vma) -1)
f58d5a2d 14754 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
14755 if (r_type == R_PPC64_TOC16
14756 || r_type == R_PPC64_TOC16_LO)
102890f0 14757 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
14758 else
14759 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
14760 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
14761 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14762 }
14763 else
14764 {
14765 /* LE */
b86ac8e3
AM
14766 insn1 &= 0x1f << 21;
14767 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
14768 insn2 = 0x38630000; /* addi 3,3,0 */
14769 if (tls_gd == 0)
951fd09b 14770 {
102890f0 14771 /* Was an LD reloc. */
71c4e95a 14772 r_symndx = STN_UNDEF;
102890f0 14773 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 14774 }
102890f0 14775 else if (toc_symndx != 0)
3a71aa26
AM
14776 {
14777 r_symndx = toc_symndx;
14778 rel->r_addend = toc_addend;
14779 }
102890f0
AM
14780 r_type = R_PPC64_TPREL16_HA;
14781 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14782 if (offset != (bfd_vma) -1)
14783 {
14784 rel[1].r_info = ELF64_R_INFO (r_symndx,
14785 R_PPC64_TPREL16_LO);
14786 rel[1].r_offset = offset + d_offset;
14787 rel[1].r_addend = rel->r_addend;
14788 }
102890f0 14789 }
95f0d0d2 14790 bfd_put_32 (input_bfd, insn1,
3a71aa26 14791 contents + rel->r_offset - d_offset);
727fc41e 14792 if (offset != (bfd_vma) -1)
c96e0573
AM
14793 {
14794 bfd_put_32 (input_bfd, insn2, contents + offset);
14795 if (offset + 8 <= input_section->size)
14796 {
14797 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
14798 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
14799 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
14800 }
14801 }
727fc41e
AM
14802 if ((tls_mask & tls_gd) == 0
14803 && (tls_gd == 0 || toc_symndx != 0))
14804 {
14805 /* We changed the symbol. Start over in order
14806 to get h, sym, sec etc. right. */
c316a17c 14807 goto again;
727fc41e
AM
14808 }
14809 }
14810 break;
14811
c213164a
AM
14812 case R_PPC64_GOT_TLSGD34:
14813 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
14814 {
14815 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14816 pinsn <<= 32;
14817 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14818 if ((tls_mask & TLS_GDIE) != 0)
14819 {
14820 /* IE, pla -> pld */
14821 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
14822 r_type = R_PPC64_GOT_TPREL34;
14823 }
14824 else
14825 {
14826 /* LE, pla pcrel -> paddi r13 */
14827 pinsn += (-1ULL << 52) + (13ULL << 16);
14828 r_type = R_PPC64_TPREL34;
14829 }
14830 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14831 bfd_put_32 (input_bfd, pinsn >> 32,
14832 contents + rel->r_offset);
14833 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14834 contents + rel->r_offset + 4);
14835 }
14836 break;
14837
14838 case R_PPC64_GOT_TLSLD34:
14839 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
14840 {
14841 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
14842 pinsn <<= 32;
14843 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
14844 pinsn += (-1ULL << 52) + (13ULL << 16);
14845 bfd_put_32 (input_bfd, pinsn >> 32,
14846 contents + rel->r_offset);
14847 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
14848 contents + rel->r_offset + 4);
14849 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14850 r_symndx = STN_UNDEF;
14851 r_type = R_PPC64_TPREL34;
14852 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14853 goto again;
14854 }
14855 break;
14856
727fc41e 14857 case R_PPC64_TLSGD:
37da22e5 14858 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 14859 && rel + 1 < relend)
727fc41e 14860 {
b9f04fe0 14861 unsigned int insn2;
5663e321 14862 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14863
4a421c53 14864 offset = rel->r_offset;
5663e321 14865 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14866 {
14867 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14868 if (r_type1 == R_PPC64_PLT_PCREL34
14869 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14870 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14871 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14872 break;
14873 }
14874
14875 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14876 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14877
b00a0a86 14878 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
14879 {
14880 /* IE */
14881 r_type = R_PPC64_NONE;
14882 insn2 = 0x7c636a14; /* add 3,3,13 */
14883 }
14884 else
14885 {
14886 /* LE */
14887 if (toc_symndx != 0)
14888 {
14889 r_symndx = toc_symndx;
14890 rel->r_addend = toc_addend;
14891 }
c213164a
AM
14892 if (r_type1 == R_PPC64_REL24_NOTOC
14893 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14894 {
14895 r_type = R_PPC64_NONE;
14896 insn2 = NOP;
14897 }
14898 else
14899 {
14900 rel->r_offset = offset + d_offset;
14901 r_type = R_PPC64_TPREL16_LO;
14902 insn2 = 0x38630000; /* addi 3,3,0 */
14903 }
727fc41e
AM
14904 }
14905 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14906 /* Zap the reloc on the _tls_get_addr call too. */
14907 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14908 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14909 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14910 if ((tls_mask & TLS_GDIE) == 0
14911 && toc_symndx != 0
14912 && r_type != R_PPC64_NONE)
c316a17c 14913 goto again;
411e1bfb 14914 }
411e1bfb
AM
14915 break;
14916
727fc41e 14917 case R_PPC64_TLSLD:
37da22e5 14918 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 14919 && rel + 1 < relend)
727fc41e 14920 {
b9f04fe0 14921 unsigned int insn2;
5663e321 14922 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 14923
4a421c53 14924 offset = rel->r_offset;
5663e321 14925 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
14926 {
14927 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
14928 if (r_type1 == R_PPC64_PLT_PCREL34
14929 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
14930 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
14931 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
14932 break;
14933 }
14934
14935 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
14936 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
14937
c213164a
AM
14938 if (r_type1 == R_PPC64_REL24_NOTOC
14939 || r_type1 == R_PPC64_PLTCALL_NOTOC)
14940 {
14941 r_type = R_PPC64_NONE;
14942 insn2 = NOP;
14943 }
14944 else
14945 {
14946 rel->r_offset = offset + d_offset;
14947 r_symndx = STN_UNDEF;
14948 r_type = R_PPC64_TPREL16_LO;
14949 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
14950 insn2 = 0x38630000; /* addi 3,3,0 */
14951 }
727fc41e 14952 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
14953 /* Zap the reloc on the _tls_get_addr call too. */
14954 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 14955 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 14956 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
14957 if (r_type != R_PPC64_NONE)
14958 goto again;
727fc41e
AM
14959 }
14960 break;
14961
411e1bfb 14962 case R_PPC64_DTPMOD64:
951fd09b
AM
14963 if (rel + 1 < relend
14964 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
14965 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 14966 {
951fd09b
AM
14967 if ((tls_mask & TLS_GD) == 0)
14968 {
14969 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 14970 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
14971 r_type = R_PPC64_TPREL64;
14972 else
14973 {
4ce794b7 14974 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
14975 r_type = R_PPC64_NONE;
14976 }
14977 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14978 }
14979 }
14980 else
14981 {
14982 if ((tls_mask & TLS_LD) == 0)
411e1bfb 14983 {
4ce794b7 14984 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 14985 r_type = R_PPC64_NONE;
951fd09b 14986 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 14987 }
411e1bfb
AM
14988 }
14989 break;
14990
14991 case R_PPC64_TPREL64:
951fd09b 14992 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
14993 {
14994 r_type = R_PPC64_NONE;
14995 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
14996 }
14997 break;
52a82034 14998
006589cf
AM
14999 case R_PPC64_ENTRY:
15000 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15001 if (!bfd_link_pic (info)
15002 && !info->traditional_format
15003 && relocation + 0x80008000 <= 0xffffffff)
15004 {
15005 unsigned int insn1, insn2;
15006
15007 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15008 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15009 if ((insn1 & ~0xfffc) == LD_R2_0R12
15010 && insn2 == ADD_R2_R2_R12)
15011 {
95f0d0d2 15012 bfd_put_32 (input_bfd,
006589cf
AM
15013 LIS_R2 + PPC_HA (relocation),
15014 contents + rel->r_offset);
95f0d0d2 15015 bfd_put_32 (input_bfd,
006589cf
AM
15016 ADDI_R2_R2 + PPC_LO (relocation),
15017 contents + rel->r_offset + 4);
15018 }
15019 }
15020 else
15021 {
15022 relocation -= (rel->r_offset
15023 + input_section->output_offset
15024 + input_section->output_section->vma);
15025 if (relocation + 0x80008000 <= 0xffffffff)
15026 {
15027 unsigned int insn1, insn2;
15028
15029 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15030 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15031 if ((insn1 & ~0xfffc) == LD_R2_0R12
15032 && insn2 == ADD_R2_R2_R12)
15033 {
95f0d0d2 15034 bfd_put_32 (input_bfd,
006589cf
AM
15035 ADDIS_R2_R12 + PPC_HA (relocation),
15036 contents + rel->r_offset);
95f0d0d2 15037 bfd_put_32 (input_bfd,
006589cf
AM
15038 ADDI_R2_R2 + PPC_LO (relocation),
15039 contents + rel->r_offset + 4);
15040 }
15041 }
15042 }
15043 break;
15044
52a82034
AM
15045 case R_PPC64_REL16_HA:
15046 /* If we are generating a non-PIC executable, edit
15047 . 0: addis 2,12,.TOC.-0b@ha
15048 . addi 2,2,.TOC.-0b@l
15049 used by ELFv2 global entry points to set up r2, to
15050 . lis 2,.TOC.@ha
15051 . addi 2,2,.TOC.@l
15052 if .TOC. is in range. */
0e1862bb 15053 if (!bfd_link_pic (info)
810d4e75 15054 && !info->traditional_format
006589cf 15055 && !htab->opd_abi
4f038ee5 15056 && rel->r_addend == d_offset
52a82034
AM
15057 && h != NULL && &h->elf == htab->elf.hgot
15058 && rel + 1 < relend
15059 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15060 && rel[1].r_offset == rel->r_offset + 4
15061 && rel[1].r_addend == rel->r_addend + 4
15062 && relocation + 0x80008000 <= 0xffffffff)
15063 {
15064 unsigned int insn1, insn2;
4a421c53 15065 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15066 insn1 = bfd_get_32 (input_bfd, contents + offset);
15067 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15068 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15069 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15070 {
15071 r_type = R_PPC64_ADDR16_HA;
15072 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15073 rel->r_addend -= d_offset;
15074 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15075 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15076 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15077 }
15078 }
15079 break;
411e1bfb
AM
15080 }
15081
15082 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15083 insn = 0;
b25116a9
AM
15084 max_br_offset = 1 << 25;
15085 addend = rel->r_addend;
bc30df16 15086 reloc_dest = DEST_NORMAL;
65f38f15 15087 switch (r_type)
5bd4f169
AM
15088 {
15089 default:
65f38f15 15090 break;
5bd4f169 15091
3b421ab3
AM
15092 case R_PPC64_TOCSAVE:
15093 if (relocation + addend == (rel->r_offset
15094 + input_section->output_offset
15095 + input_section->output_section->vma)
15096 && tocsave_find (htab, NO_INSERT,
15097 &local_syms, rel, input_bfd))
15098 {
15099 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15100 if (insn == NOP
15101 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15102 bfd_put_32 (input_bfd,
15103 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15104 contents + rel->r_offset);
15105 }
15106 break;
15107
65f38f15
AM
15108 /* Branch taken prediction relocations. */
15109 case R_PPC64_ADDR14_BRTAKEN:
15110 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15111 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15112 /* Fall through. */
65f38f15 15113
86c76c7b 15114 /* Branch not taken prediction relocations. */
65f38f15
AM
15115 case R_PPC64_ADDR14_BRNTAKEN:
15116 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15117 insn |= bfd_get_32 (input_bfd,
411e1bfb 15118 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15119 /* Fall through. */
86c76c7b 15120
b25116a9
AM
15121 case R_PPC64_REL14:
15122 max_br_offset = 1 << 15;
1a0670f3 15123 /* Fall through. */
5bd4f169 15124
65f38f15 15125 case R_PPC64_REL24:
05d0e962 15126 case R_PPC64_REL24_NOTOC:
23cedd1d 15127 case R_PPC64_PLTCALL:
5663e321 15128 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15129 /* Calls to functions with a different TOC, such as calls to
15130 shared objects, need to alter the TOC pointer. This is
15131 done using a linkage stub. A REL24 branching to these
15132 linkage stubs needs to be followed by a nop, as the nop
15133 will be replaced with an instruction to restore the TOC
15134 base pointer. */
8387904d 15135 fdh = h;
b31867b6
AM
15136 if (h != NULL
15137 && h->oh != NULL
15138 && h->oh->is_func_descriptor)
15139 fdh = ppc_follow_link (h->oh);
31c76678
DK
15140 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15141 htab);
5663e321
AM
15142 if ((r_type == R_PPC64_PLTCALL
15143 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15144 && stub_entry != NULL
05d0e962
AM
15145 && stub_entry->stub_type >= ppc_stub_plt_call
15146 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15147 stub_entry = NULL;
15148
6abec6bc 15149 if (stub_entry != NULL
d0abeec8
AM
15150 && ((stub_entry->stub_type >= ppc_stub_plt_call
15151 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15152 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15153 || stub_entry->stub_type == ppc_stub_plt_branch_both
15154 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15155 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15156 {
b25116a9 15157 bfd_boolean can_plt_call = FALSE;
721956f4 15158
6e1816be
AM
15159 if (stub_entry->stub_type == ppc_stub_plt_call
15160 && !htab->opd_abi
15161 && htab->params->plt_localentry0 != 0
15162 && is_elfv2_localentry0 (&h->elf))
15163 {
15164 /* The function doesn't use or change r2. */
15165 can_plt_call = TRUE;
15166 }
05d0e962
AM
15167 else if (r_type == R_PPC64_REL24_NOTOC)
15168 {
15169 /* NOTOC calls don't need to restore r2. */
15170 can_plt_call = TRUE;
15171 }
6e1816be 15172
f378ab09 15173 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15174 branch and link followed by a nop. The nop is
15175 replaced by an insn to restore r2. */
6e1816be 15176 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15177 {
ba8ca3e7
AM
15178 unsigned long br;
15179
15180 br = bfd_get_32 (input_bfd,
15181 contents + rel->r_offset);
15182 if ((br & 1) != 0)
41bd81ab 15183 {
ba8ca3e7
AM
15184 unsigned long nop;
15185
15186 nop = bfd_get_32 (input_bfd,
15187 contents + rel->r_offset + 4);
23cedd1d
AM
15188 if (nop == LD_R2_0R1 + STK_TOC (htab))
15189 can_plt_call = TRUE;
15190 else if (nop == NOP
15191 || nop == CROR_151515
15192 || nop == CROR_313131)
a7f2871e 15193 {
ba8ca3e7
AM
15194 if (h != NULL
15195 && (h == htab->tls_get_addr_fd
15196 || h == htab->tls_get_addr)
7c9cf415 15197 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15198 {
15199 /* Special stub used, leave nop alone. */
15200 }
15201 else
a078d95a
AM
15202 bfd_put_32 (input_bfd,
15203 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15204 contents + rel->r_offset + 4);
15205 can_plt_call = TRUE;
a7f2871e 15206 }
41bd81ab 15207 }
5bd4f169 15208 }
721956f4 15209
ba8ca3e7 15210 if (!can_plt_call && h != NULL)
721956f4 15211 {
ba8ca3e7
AM
15212 const char *name = h->elf.root.root.string;
15213
15214 if (*name == '.')
15215 ++name;
15216
15217 if (strncmp (name, "__libc_start_main", 17) == 0
15218 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15219 {
ba8ca3e7
AM
15220 /* Allow crt1 branch to go via a toc adjusting
15221 stub. Other calls that never return could do
15222 the same, if we could detect such. */
b25116a9 15223 can_plt_call = TRUE;
6ab189d5 15224 }
ba8ca3e7
AM
15225 }
15226
15227 if (!can_plt_call)
15228 {
15229 /* g++ as of 20130507 emits self-calls without a
15230 following nop. This is arguably wrong since we
15231 have conflicting information. On the one hand a
15232 global symbol and on the other a local call
15233 sequence, but don't error for this special case.
15234 It isn't possible to cheaply verify we have
15235 exactly such a call. Allow all calls to the same
15236 section. */
15237 asection *code_sec = sec;
15238
15239 if (get_opd_info (sec) != NULL)
ad8e1ba5 15240 {
ba8ca3e7
AM
15241 bfd_vma off = (relocation + addend
15242 - sec->output_section->vma
15243 - sec->output_offset);
bc30df16 15244
ba8ca3e7 15245 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15246 }
ba8ca3e7
AM
15247 if (code_sec == input_section)
15248 can_plt_call = TRUE;
15249 }
15250
15251 if (!can_plt_call)
15252 {
05d0e962
AM
15253 if (stub_entry->stub_type >= ppc_stub_plt_call
15254 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15255 info->callbacks->einfo
695344c0 15256 /* xgettext:c-format */
c1c8c1ef 15257 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15258 "(plt call stub)\n"),
4805fc55
AM
15259 input_bfd, input_section, rel->r_offset, sym_name);
15260 else
15261 info->callbacks->einfo
695344c0 15262 /* xgettext:c-format */
c1c8c1ef 15263 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15264 "(toc save/adjust stub)\n"),
4805fc55 15265 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15266
15267 bfd_set_error (bfd_error_bad_value);
15268 ret = FALSE;
721956f4
AM
15269 }
15270
b25116a9 15271 if (can_plt_call
05d0e962
AM
15272 && stub_entry->stub_type >= ppc_stub_plt_call
15273 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15274 unresolved_reloc = FALSE;
15275 }
15276
6abec6bc
AM
15277 if ((stub_entry == NULL
15278 || stub_entry->stub_type == ppc_stub_long_branch
15279 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15280 && get_opd_info (sec) != NULL)
15281 {
15282 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15283 bfd_vma off = (relocation + addend
15284 - sec->output_section->vma
15285 - sec->output_offset);
aef36ac1 15286 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15287 if (dest != (bfd_vma) -1)
15288 {
15289 relocation = dest;
15290 addend = 0;
bc30df16 15291 reloc_dest = DEST_OPD;
8387904d
AM
15292 }
15293 }
15294
b25116a9
AM
15295 /* If the branch is out of reach we ought to have a long
15296 branch stub. */
15297 from = (rel->r_offset
15298 + input_section->output_offset
15299 + input_section->output_section->vma);
15300
6911b7dc
AM
15301 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15302 ? fdh->elf.other
15303 : sym->st_other);
15304
6abec6bc
AM
15305 if (stub_entry != NULL
15306 && (stub_entry->stub_type == ppc_stub_long_branch
15307 || stub_entry->stub_type == ppc_stub_plt_branch)
15308 && (r_type == R_PPC64_ADDR14_BRTAKEN
15309 || r_type == R_PPC64_ADDR14_BRNTAKEN
15310 || (relocation + addend - from + max_br_offset
15311 < 2 * max_br_offset)))
15312 /* Don't use the stub if this branch is in range. */
15313 stub_entry = NULL;
b25116a9 15314
05d0e962
AM
15315 if (stub_entry != NULL
15316 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15317 || stub_entry->stub_type == ppc_stub_long_branch_both
15318 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15319 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15320 && (r_type != R_PPC64_REL24_NOTOC
15321 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15322 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15323 && (relocation + addend - from + max_br_offset
15324 < 2 * max_br_offset))
15325 stub_entry = NULL;
15326
15327 if (stub_entry != NULL
15328 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15329 || stub_entry->stub_type == ppc_stub_long_branch_both
15330 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15331 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15332 && r_type == R_PPC64_REL24_NOTOC
15333 && (relocation + addend - from + max_br_offset
15334 < 2 * max_br_offset))
15335 stub_entry = NULL;
15336
b25116a9
AM
15337 if (stub_entry != NULL)
15338 {
15339 /* Munge up the value and addend so that we call the stub
15340 rather than the procedure directly. */
a4b6fadd
AM
15341 asection *stub_sec = stub_entry->group->stub_sec;
15342
15343 if (stub_entry->stub_type == ppc_stub_save_res)
15344 relocation += (stub_sec->output_offset
15345 + stub_sec->output_section->vma
15346 + stub_sec->size - htab->sfpr->size
15347 - htab->sfpr->output_offset
15348 - htab->sfpr->output_section->vma);
15349 else
15350 relocation = (stub_entry->stub_offset
15351 + stub_sec->output_offset
15352 + stub_sec->output_section->vma);
b25116a9 15353 addend = 0;
bc30df16 15354 reloc_dest = DEST_STUB;
3b421ab3 15355
05d0e962
AM
15356 if (((stub_entry->stub_type == ppc_stub_plt_call
15357 && ALWAYS_EMIT_R2SAVE)
15358 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15359 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93
AM
15360 && !(h != NULL
15361 && (h == htab->tls_get_addr_fd
15362 || h == htab->tls_get_addr)
15363 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15364 && rel + 1 < relend
15365 && rel[1].r_offset == rel->r_offset + 4
15366 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15367 relocation += 4;
05d0e962
AM
15368 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15369 || stub_entry->stub_type == ppc_stub_plt_branch_both
15370 || stub_entry->stub_type == ppc_stub_plt_call_both)
15371 && r_type == R_PPC64_REL24_NOTOC)
15372 relocation += 4;
5663e321
AM
15373
15374 if (r_type == R_PPC64_REL24_NOTOC
15375 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15376 || stub_entry->stub_type == ppc_stub_plt_call_both))
15377 htab->notoc_plt = 1;
b25116a9
AM
15378 }
15379
15380 if (insn != 0)
15381 {
794e51c0 15382 if (is_isa_v2)
721956f4 15383 {
b25116a9
AM
15384 /* Set 'a' bit. This is 0b00010 in BO field for branch
15385 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15386 for branch on CTR insns (BO == 1a00t or 1a01t). */
15387 if ((insn & (0x14 << 21)) == (0x04 << 21))
15388 insn |= 0x02 << 21;
15389 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15390 insn |= 0x08 << 21;
15391 else
15392 break;
15393 }
15394 else
15395 {
15396 /* Invert 'y' bit if not the default. */
4cc603a5 15397 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15398 insn ^= 0x01 << 21;
721956f4 15399 }
b25116a9 15400
95f0d0d2 15401 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15402 }
e86ce104 15403
06da1e8e
AM
15404 /* NOP out calls to undefined weak functions.
15405 We can thus call a weak function without first
15406 checking whether the function is defined. */
b25116a9 15407 else if (h != NULL
039b3fef 15408 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15409 && h->elf.dynindx == -1
05d0e962
AM
15410 && (r_type == R_PPC64_REL24
15411 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15412 && relocation == 0
4cc603a5 15413 && addend == 0)
e86ce104 15414 {
95f0d0d2 15415 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15416 goto copy_reloc;
e86ce104 15417 }
65f38f15 15418 break;
066f4018
AM
15419
15420 case R_PPC64_GOT16_DS:
15421 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15422 if (relocation + addend - from + 0x8000 < 0x10000
15423 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15424 {
15425 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15426 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15427 {
15428 insn += (14u << 26) - (58u << 26);
15429 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15430 r_type = R_PPC64_TOC16;
15431 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15432 }
15433 }
15434 break;
15435
15436 case R_PPC64_GOT16_LO_DS:
15437 case R_PPC64_GOT16_HA:
15438 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15439 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15440 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15441 {
15442 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
15443 if ((insn & (0x3f << 26 | 0x3)) == 58u << 26 /* ld */)
15444 {
15445 insn += (14u << 26) - (58u << 26);
15446 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15447 r_type = R_PPC64_TOC16_LO;
15448 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15449 }
15450 else if ((insn & (0x3f << 26)) == 15u << 26 /* addis */)
15451 {
15452 r_type = R_PPC64_TOC16_HA;
15453 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15454 }
15455 }
15456 break;
4a421c53
AM
15457
15458 case R_PPC64_GOT_PCREL34:
15459 from = (rel->r_offset
15460 + input_section->output_section->vma
15461 + input_section->output_offset);
15462 if (relocation - from + (1ULL << 33) < 1ULL << 34
15463 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15464 {
15465 offset = rel->r_offset;
15466 pinsn = bfd_get_32 (input_bfd, contents + offset);
15467 pinsn <<= 32;
15468 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15469 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15470 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15471 {
15472 /* Replace with paddi. */
15473 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15474 r_type = R_PPC64_PCREL34;
15475 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15476 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15477 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15478 goto pcrelopt;
15479 }
15480 }
15481 break;
15482
15483 case R_PPC64_PCREL34:
15484 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15485 {
15486 offset = rel->r_offset;
15487 pinsn = bfd_get_32 (input_bfd, contents + offset);
15488 pinsn <<= 32;
15489 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15490 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15491 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15492 | (14ULL << 26) /* paddi */))
15493 {
15494 pcrelopt:
15495 if (rel + 1 < relend
15496 && rel[1].r_offset == offset
15497 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15498 {
15499 bfd_vma off2 = rel[1].r_addend;
15500 if (off2 == 0)
15501 /* zero means next insn. */
15502 off2 = 8;
15503 off2 += offset;
15504 if (off2 + 4 <= input_section->size)
15505 {
15506 uint64_t pinsn2;
dd9b12c2 15507 bfd_signed_vma addend_off;
4a421c53
AM
15508 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
15509 pinsn2 <<= 32;
15510 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
15511 {
15512 if (off2 + 8 > input_section->size)
15513 break;
15514 pinsn2 |= bfd_get_32 (input_bfd,
15515 contents + off2 + 4);
15516 }
dd9b12c2 15517 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 15518 {
dd9b12c2
AM
15519 addend += addend_off;
15520 rel->r_addend = addend;
4a421c53
AM
15521 bfd_put_32 (input_bfd, pinsn >> 32,
15522 contents + offset);
15523 bfd_put_32 (input_bfd, pinsn,
15524 contents + offset + 4);
15525 bfd_put_32 (input_bfd, pinsn2 >> 32,
15526 contents + off2);
77486630
AM
15527 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
15528 bfd_put_32 (input_bfd, pinsn2,
15529 contents + off2 + 4);
4a421c53
AM
15530 }
15531 }
15532 }
15533 }
15534 }
15535 break;
65f38f15 15536 }
5bd4f169 15537
411e1bfb 15538 tls_type = 0;
23cedd1d 15539 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
15540 switch (r_type)
15541 {
15542 default:
cf97bcb0
AM
15543 /* xgettext:c-format */
15544 _bfd_error_handler (_("%pB: %s unsupported"),
15545 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 15546
65f38f15 15547 bfd_set_error (bfd_error_bad_value);
b34976b6 15548 ret = FALSE;
c316a17c 15549 goto copy_reloc;
5bd4f169 15550
65f38f15 15551 case R_PPC64_NONE:
411e1bfb 15552 case R_PPC64_TLS:
727fc41e
AM
15553 case R_PPC64_TLSGD:
15554 case R_PPC64_TLSLD:
3b421ab3 15555 case R_PPC64_TOCSAVE:
04c9666a
AM
15556 case R_PPC64_GNU_VTINHERIT:
15557 case R_PPC64_GNU_VTENTRY:
006589cf 15558 case R_PPC64_ENTRY:
4a421c53 15559 case R_PPC64_PCREL_OPT:
c316a17c 15560 goto copy_reloc;
5bd4f169
AM
15561
15562 /* GOT16 relocations. Like an ADDR16 using the symbol's
15563 address in the GOT as relocation value instead of the
411e1bfb 15564 symbol's value itself. Also, create a GOT entry for the
5bd4f169 15565 symbol and put the symbol value there. */
411e1bfb
AM
15566 case R_PPC64_GOT_TLSGD16:
15567 case R_PPC64_GOT_TLSGD16_LO:
15568 case R_PPC64_GOT_TLSGD16_HI:
15569 case R_PPC64_GOT_TLSGD16_HA:
c213164a 15570 case R_PPC64_GOT_TLSGD34:
951fd09b 15571 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
15572 goto dogot;
15573
15574 case R_PPC64_GOT_TLSLD16:
15575 case R_PPC64_GOT_TLSLD16_LO:
15576 case R_PPC64_GOT_TLSLD16_HI:
15577 case R_PPC64_GOT_TLSLD16_HA:
c213164a 15578 case R_PPC64_GOT_TLSLD34:
951fd09b 15579 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
15580 goto dogot;
15581
15582 case R_PPC64_GOT_TPREL16_DS:
15583 case R_PPC64_GOT_TPREL16_LO_DS:
15584 case R_PPC64_GOT_TPREL16_HI:
15585 case R_PPC64_GOT_TPREL16_HA:
c213164a 15586 case R_PPC64_GOT_TPREL34:
411e1bfb
AM
15587 tls_type = TLS_TLS | TLS_TPREL;
15588 goto dogot;
15589
15590 case R_PPC64_GOT_DTPREL16_DS:
15591 case R_PPC64_GOT_DTPREL16_LO_DS:
15592 case R_PPC64_GOT_DTPREL16_HI:
15593 case R_PPC64_GOT_DTPREL16_HA:
c213164a 15594 case R_PPC64_GOT_DTPREL34:
411e1bfb
AM
15595 tls_type = TLS_TLS | TLS_DTPREL;
15596 goto dogot;
15597
65f38f15
AM
15598 case R_PPC64_GOT16:
15599 case R_PPC64_GOT16_LO:
15600 case R_PPC64_GOT16_HI:
15601 case R_PPC64_GOT16_HA:
15602 case R_PPC64_GOT16_DS:
15603 case R_PPC64_GOT16_LO_DS:
5663e321 15604 case R_PPC64_GOT_PCREL34:
411e1bfb 15605 dogot:
5bd4f169
AM
15606 {
15607 /* Relocation is to the entry for this symbol in the global
15608 offset table. */
e717da7e 15609 asection *got;
d881513a 15610 bfd_vma *offp;
5bd4f169 15611 bfd_vma off;
d881513a 15612 unsigned long indx = 0;
927be08e 15613 struct got_entry *ent;
65f38f15 15614
d881513a 15615 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 15616 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 15617 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 15618 else
5bd4f169 15619 {
d881513a
AM
15620 if (h != NULL)
15621 {
f0158f44
AM
15622 if (!htab->elf.dynamic_sections_created
15623 || h->elf.dynindx == -1
15624 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 15625 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
15626 /* This is actually a static link, or it is a
15627 -Bsymbolic link and the symbol is defined
15628 locally, or the symbol was forced to be local
15629 because of a version file. */
15630 ;
15631 else
15632 {
039b3fef 15633 indx = h->elf.dynindx;
d881513a
AM
15634 unresolved_reloc = FALSE;
15635 }
039b3fef 15636 ent = h->elf.got.glist;
d881513a 15637 }
411e1bfb 15638 else
5bd4f169 15639 {
d881513a
AM
15640 if (local_got_ents == NULL)
15641 abort ();
15642 ent = local_got_ents[r_symndx];
5bd4f169 15643 }
d881513a
AM
15644
15645 for (; ent != NULL; ent = ent->next)
133a1f60 15646 if (ent->addend == orig_rel.r_addend
e717da7e 15647 && ent->owner == input_bfd
d881513a
AM
15648 && ent->tls_type == tls_type)
15649 break;
5bd4f169 15650 }
411e1bfb 15651
927be08e
AM
15652 if (ent == NULL)
15653 abort ();
15654 if (ent->is_indirect)
15655 ent = ent->got.ent;
15656 offp = &ent->got.offset;
15657 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
15658 if (got == NULL)
15659 abort ();
15660
411e1bfb
AM
15661 /* The offset must always be a multiple of 8. We use the
15662 least significant bit to record whether we have already
15663 processed this entry. */
d881513a 15664 off = *offp;
411e1bfb
AM
15665 if ((off & 1) != 0)
15666 off &= ~1;
5bd4f169
AM
15667 else
15668 {
411e1bfb
AM
15669 /* Generate relocs for the dynamic linker, except in
15670 the case of TLSLD where we'll use one entry per
15671 module. */
25f23106
AM
15672 asection *relgot;
15673 bfd_boolean ifunc;
e717da7e 15674
d881513a 15675 *offp = off | 1;
25f23106
AM
15676 relgot = NULL;
15677 ifunc = (h != NULL
15678 ? h->elf.type == STT_GNU_IFUNC
15679 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 15680 if (ifunc)
82e66161
AM
15681 {
15682 relgot = htab->elf.irelplt;
15683 if (indx == 0)
15684 htab->local_ifunc_resolver = 1;
15685 else if (is_static_defined (&h->elf))
15686 htab->maybe_local_ifunc_resolver = 1;
15687 }
f0158f44
AM
15688 else if (indx != 0
15689 || (bfd_link_pic (info)
15690 && (h == NULL
f749f26e
AM
15691 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
15692 && !(tls_type != 0
f15d0b54
AM
15693 && bfd_link_executable (info)
15694 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 15695 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 15696 if (relgot != NULL)
5bd4f169 15697 {
e717da7e
AM
15698 outrel.r_offset = (got->output_section->vma
15699 + got->output_offset
411e1bfb 15700 + off);
133a1f60 15701 outrel.r_addend = orig_rel.r_addend;
d881513a 15702 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 15703 {
411e1bfb 15704 outrel.r_addend = 0;
e515b051 15705 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
15706 if (tls_type == (TLS_TLS | TLS_GD))
15707 {
e717da7e
AM
15708 loc = relgot->contents;
15709 loc += (relgot->reloc_count++
d881513a
AM
15710 * sizeof (Elf64_External_Rela));
15711 bfd_elf64_swap_reloca_out (output_bfd,
15712 &outrel, loc);
e515b051 15713 outrel.r_offset += 8;
133a1f60 15714 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
15715 outrel.r_info
15716 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 15717 }
411e1bfb 15718 }
951fd09b 15719 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 15720 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 15721 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 15722 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
15723 else if (indx != 0)
15724 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
15725 else
81407a69 15726 {
25f23106
AM
15727 if (ifunc)
15728 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
15729 else
15730 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
15731
15732 /* Write the .got section contents for the sake
15733 of prelink. */
e717da7e 15734 loc = got->contents + off;
23fbd6fa
JJ
15735 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
15736 loc);
81407a69 15737 }
81407a69
AM
15738
15739 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
15740 {
15741 outrel.r_addend += relocation;
15742 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
15743 {
15744 if (htab->elf.tls_sec == NULL)
15745 outrel.r_addend = 0;
15746 else
15747 outrel.r_addend -= htab->elf.tls_sec->vma;
15748 }
e515b051 15749 }
e717da7e
AM
15750 loc = relgot->contents;
15751 loc += (relgot->reloc_count++
411e1bfb
AM
15752 * sizeof (Elf64_External_Rela));
15753 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
15754 }
15755
ad8e1ba5 15756 /* Init the .got section contents here if we're not
81407a69 15757 emitting a reloc. */
d881513a 15758 else
411e1bfb 15759 {
133a1f60 15760 relocation += orig_rel.r_addend;
f0158f44 15761 if (tls_type != 0)
411e1bfb 15762 {
989f9879
AM
15763 if (htab->elf.tls_sec == NULL)
15764 relocation = 0;
15765 else
15766 {
f0158f44
AM
15767 if (tls_type & TLS_LD)
15768 relocation = 0;
15769 else
15770 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 15771 if (tls_type & TLS_TPREL)
989f9879
AM
15772 relocation += DTP_OFFSET - TP_OFFSET;
15773 }
5bd4f169 15774
f0158f44 15775 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
15776 {
15777 bfd_put_64 (output_bfd, relocation,
e717da7e 15778 got->contents + off + 8);
676ee2b5 15779 relocation = 1;
7b609f53 15780 }
411e1bfb
AM
15781 }
15782 bfd_put_64 (output_bfd, relocation,
e717da7e 15783 got->contents + off);
5bd4f169
AM
15784 }
15785 }
15786
65f38f15
AM
15787 if (off >= (bfd_vma) -2)
15788 abort ();
15789
bf102f86 15790 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 15791 addend = 0;
c213164a
AM
15792 if (!(r_type == R_PPC64_GOT_PCREL34
15793 || r_type == R_PPC64_GOT_TLSGD34
15794 || r_type == R_PPC64_GOT_TLSLD34
15795 || r_type == R_PPC64_GOT_TPREL34
15796 || r_type == R_PPC64_GOT_DTPREL34))
5663e321 15797 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 15798 }
65f38f15
AM
15799 break;
15800
15801 case R_PPC64_PLT16_HA:
15802 case R_PPC64_PLT16_HI:
15803 case R_PPC64_PLT16_LO:
08be3224 15804 case R_PPC64_PLT16_LO_DS:
5663e321
AM
15805 case R_PPC64_PLT_PCREL34:
15806 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
15807 case R_PPC64_PLT32:
15808 case R_PPC64_PLT64:
23cedd1d 15809 case R_PPC64_PLTSEQ:
5663e321 15810 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 15811 case R_PPC64_PLTCALL:
5663e321 15812 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
15813 /* Relocation is to the entry for this symbol in the
15814 procedure linkage table. */
23cedd1d 15815 unresolved_reloc = TRUE;
cbf95972
AM
15816 {
15817 struct plt_entry **plt_list = NULL;
15818 if (h != NULL)
15819 plt_list = &h->elf.plt.plist;
15820 else if (local_got_ents != NULL)
15821 {
15822 struct plt_entry **local_plt = (struct plt_entry **)
15823 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 15824 plt_list = local_plt + r_symndx;
cbf95972
AM
15825 }
15826 if (plt_list)
15827 {
15828 struct plt_entry *ent;
65f38f15 15829
cbf95972
AM
15830 for (ent = *plt_list; ent != NULL; ent = ent->next)
15831 if (ent->plt.offset != (bfd_vma) -1
133a1f60 15832 && ent->addend == orig_rel.r_addend)
cbf95972
AM
15833 {
15834 asection *plt;
08be3224 15835 bfd_vma got;
cbf95972
AM
15836
15837 plt = htab->elf.splt;
15838 if (!htab->elf.dynamic_sections_created
15839 || h == NULL
15840 || h->elf.dynindx == -1)
2d7ad24e
AM
15841 {
15842 if (h != NULL
15843 ? h->elf.type == STT_GNU_IFUNC
15844 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
15845 plt = htab->elf.iplt;
15846 else
15847 plt = htab->pltlocal;
15848 }
15849 relocation = (plt->output_section->vma
15850 + plt->output_offset
15851 + ent->plt.offset);
08be3224 15852 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
15853 || r_type == R_PPC64_PLT16_HI
15854 || r_type == R_PPC64_PLT16_LO
15855 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
15856 {
15857 got = (elf_gp (output_bfd)
15858 + htab->sec_info[input_section->id].toc_off);
15859 relocation -= got;
15860 }
133a1f60 15861 addend = 0;
cbf95972
AM
15862 unresolved_reloc = FALSE;
15863 break;
15864 }
15865 }
15866 }
65f38f15 15867 break;
5bd4f169 15868
0b13192e
AM
15869 case R_PPC64_TOC:
15870 /* Relocation value is TOC base. */
15871 relocation = TOCstart;
cf35638d 15872 if (r_symndx == STN_UNDEF)
6f20ed8a 15873 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
15874 else if (unresolved_reloc)
15875 ;
6f20ed8a
AM
15876 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
15877 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
15878 else
15879 unresolved_reloc = TRUE;
ab96bf03 15880 goto dodyn;
0b13192e 15881
5bd4f169
AM
15882 /* TOC16 relocs. We want the offset relative to the TOC base,
15883 which is the address of the start of the TOC plus 0x8000.
15884 The TOC consists of sections .got, .toc, .tocbss, and .plt,
15885 in this order. */
65f38f15
AM
15886 case R_PPC64_TOC16:
15887 case R_PPC64_TOC16_LO:
15888 case R_PPC64_TOC16_HI:
15889 case R_PPC64_TOC16_DS:
15890 case R_PPC64_TOC16_LO_DS:
15891 case R_PPC64_TOC16_HA:
6f20ed8a 15892 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
15893 if (h != NULL)
15894 goto dodyn;
5bd4f169
AM
15895 break;
15896
15897 /* Relocate against the beginning of the section. */
65f38f15
AM
15898 case R_PPC64_SECTOFF:
15899 case R_PPC64_SECTOFF_LO:
15900 case R_PPC64_SECTOFF_HI:
15901 case R_PPC64_SECTOFF_DS:
15902 case R_PPC64_SECTOFF_LO_DS:
15903 case R_PPC64_SECTOFF_HA:
4ce794b7 15904 if (sec != NULL)
65f38f15 15905 addend -= sec->output_section->vma;
5bd4f169
AM
15906 break;
15907
25f23106
AM
15908 case R_PPC64_REL16:
15909 case R_PPC64_REL16_LO:
15910 case R_PPC64_REL16_HI:
15911 case R_PPC64_REL16_HA:
4a969973
AM
15912 case R_PPC64_REL16_HIGH:
15913 case R_PPC64_REL16_HIGHA:
15914 case R_PPC64_REL16_HIGHER:
15915 case R_PPC64_REL16_HIGHERA:
15916 case R_PPC64_REL16_HIGHEST:
15917 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
15918 case R_PPC64_REL16_HIGHER34:
15919 case R_PPC64_REL16_HIGHERA34:
15920 case R_PPC64_REL16_HIGHEST34:
15921 case R_PPC64_REL16_HIGHESTA34:
a680de9a 15922 case R_PPC64_REL16DX_HA:
721956f4
AM
15923 case R_PPC64_REL14:
15924 case R_PPC64_REL14_BRNTAKEN:
15925 case R_PPC64_REL14_BRTAKEN:
5d1634d7 15926 case R_PPC64_REL24:
05d0e962 15927 case R_PPC64_REL24_NOTOC:
5663e321
AM
15928 case R_PPC64_PCREL34:
15929 case R_PPC64_PCREL28:
5d1634d7
AM
15930 break;
15931
411e1bfb
AM
15932 case R_PPC64_TPREL16:
15933 case R_PPC64_TPREL16_LO:
15934 case R_PPC64_TPREL16_HI:
15935 case R_PPC64_TPREL16_HA:
15936 case R_PPC64_TPREL16_DS:
15937 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
15938 case R_PPC64_TPREL16_HIGH:
15939 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
15940 case R_PPC64_TPREL16_HIGHER:
15941 case R_PPC64_TPREL16_HIGHERA:
15942 case R_PPC64_TPREL16_HIGHEST:
15943 case R_PPC64_TPREL16_HIGHESTA:
c213164a 15944 case R_PPC64_TPREL34:
766bc656
AM
15945 if (h != NULL
15946 && h->elf.root.type == bfd_link_hash_undefweak
15947 && h->elf.dynindx == -1)
15948 {
15949 /* Make this relocation against an undefined weak symbol
15950 resolve to zero. This is really just a tweak, since
15951 code using weak externs ought to check that they are
15952 defined before using them. */
15953 bfd_byte *p = contents + rel->r_offset - d_offset;
15954
95f0d0d2 15955 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
15956 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
15957 if (insn != 0)
95f0d0d2 15958 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
15959 break;
15960 }
989f9879
AM
15961 if (htab->elf.tls_sec != NULL)
15962 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
15963 /* The TPREL16 relocs shouldn't really be used in shared
15964 libs or with non-local symbols as that will result in
15965 DT_TEXTREL being set, but support them anyway. */
15966 goto dodyn;
411e1bfb
AM
15967
15968 case R_PPC64_DTPREL16:
15969 case R_PPC64_DTPREL16_LO:
15970 case R_PPC64_DTPREL16_HI:
15971 case R_PPC64_DTPREL16_HA:
15972 case R_PPC64_DTPREL16_DS:
15973 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
15974 case R_PPC64_DTPREL16_HIGH:
15975 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
15976 case R_PPC64_DTPREL16_HIGHER:
15977 case R_PPC64_DTPREL16_HIGHERA:
15978 case R_PPC64_DTPREL16_HIGHEST:
15979 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 15980 case R_PPC64_DTPREL34:
989f9879
AM
15981 if (htab->elf.tls_sec != NULL)
15982 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
15983 break;
15984
45965137
AM
15985 case R_PPC64_ADDR64_LOCAL:
15986 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
15987 ? h->elf.other
15988 : sym->st_other);
15989 break;
15990
e515b051
AM
15991 case R_PPC64_DTPMOD64:
15992 relocation = 1;
15993 addend = 0;
15994 goto dodyn;
15995
411e1bfb 15996 case R_PPC64_TPREL64:
989f9879
AM
15997 if (htab->elf.tls_sec != NULL)
15998 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
15999 goto dodyn;
16000
16001 case R_PPC64_DTPREL64:
989f9879
AM
16002 if (htab->elf.tls_sec != NULL)
16003 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16004 /* Fall through. */
411e1bfb 16005
65f38f15
AM
16006 /* Relocations that may need to be propagated if this is a
16007 dynamic object. */
04c9666a 16008 case R_PPC64_REL30:
65f38f15
AM
16009 case R_PPC64_REL32:
16010 case R_PPC64_REL64:
16011 case R_PPC64_ADDR14:
16012 case R_PPC64_ADDR14_BRNTAKEN:
16013 case R_PPC64_ADDR14_BRTAKEN:
16014 case R_PPC64_ADDR16:
16015 case R_PPC64_ADDR16_DS:
16016 case R_PPC64_ADDR16_HA:
16017 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16018 case R_PPC64_ADDR16_HIGH:
16019 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16020 case R_PPC64_ADDR16_HIGHER:
16021 case R_PPC64_ADDR16_HIGHERA:
16022 case R_PPC64_ADDR16_HIGHEST:
16023 case R_PPC64_ADDR16_HIGHESTA:
16024 case R_PPC64_ADDR16_LO:
16025 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16026 case R_PPC64_ADDR16_HIGHER34:
16027 case R_PPC64_ADDR16_HIGHERA34:
16028 case R_PPC64_ADDR16_HIGHEST34:
16029 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16030 case R_PPC64_ADDR24:
65f38f15
AM
16031 case R_PPC64_ADDR32:
16032 case R_PPC64_ADDR64:
16033 case R_PPC64_UADDR16:
16034 case R_PPC64_UADDR32:
16035 case R_PPC64_UADDR64:
5663e321
AM
16036 case R_PPC64_D34:
16037 case R_PPC64_D34_LO:
16038 case R_PPC64_D34_HI30:
16039 case R_PPC64_D34_HA30:
16040 case R_PPC64_D28:
411e1bfb 16041 dodyn:
5d1634d7 16042 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16043 break;
16044
41bd81ab
AM
16045 if (NO_OPD_RELOCS && is_opd)
16046 break;
16047
8a9e8e72 16048 if (bfd_link_pic (info)
b1b07054
AM
16049 ? ((h == NULL
16050 || h->dyn_relocs != NULL)
16051 && ((h != NULL && pc_dynrelocs (h))
16052 || must_be_dyn_reloc (info, r_type)))
8a9e8e72
AM
16053 : (h != NULL
16054 ? h->dyn_relocs != NULL
d311bc8b 16055 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16056 {
b34976b6 16057 bfd_boolean skip, relocate;
65f38f15 16058 asection *sreloc;
1cf1f670 16059 bfd_vma out_off;
82e66161 16060 long indx = 0;
65f38f15
AM
16061
16062 /* When generating a dynamic object, these relocations
16063 are copied into the output file to be resolved at run
16064 time. */
16065
b34976b6
AM
16066 skip = FALSE;
16067 relocate = FALSE;
65f38f15 16068
1cf1f670
AM
16069 out_off = _bfd_elf_section_offset (output_bfd, info,
16070 input_section, rel->r_offset);
16071 if (out_off == (bfd_vma) -1)
b34976b6 16072 skip = TRUE;
1cf1f670 16073 else if (out_off == (bfd_vma) -2)
b34976b6 16074 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16075 out_off += (input_section->output_section->vma
16076 + input_section->output_offset);
16077 outrel.r_offset = out_off;
411e1bfb 16078 outrel.r_addend = rel->r_addend;
65f38f15 16079
1cf1f670
AM
16080 /* Optimize unaligned reloc use. */
16081 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16082 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16083 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16084 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16085 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16086 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16087 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16088 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16089 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16090
65f38f15 16091 if (skip)
0bb2d96a 16092 memset (&outrel, 0, sizeof outrel);
afe397ea 16093 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16094 && !is_opd
16095 && r_type != R_PPC64_TOC)
14acf4dc 16096 {
82e66161
AM
16097 indx = h->elf.dynindx;
16098 BFD_ASSERT (indx != -1);
16099 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16100 }
65f38f15
AM
16101 else
16102 {
41bd81ab
AM
16103 /* This symbol is local, or marked to become local,
16104 or this is an opd section reloc which must point
16105 at a local function. */
65f38f15 16106 outrel.r_addend += relocation;
e86ce104 16107 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16108 {
3fad3c7c 16109 if (is_opd && h != NULL)
afbe61cf
AM
16110 {
16111 /* Lie about opd entries. This case occurs
16112 when building shared libraries and we
16113 reference a function in another shared
3fad3c7c
AM
16114 lib. The same thing happens for a weak
16115 definition in an application that's
16116 overridden by a strong definition in a
16117 shared lib. (I believe this is a generic
16118 bug in binutils handling of weak syms.)
16119 In these cases we won't use the opd
1e2f5b6e 16120 entry in this lib. */
b34976b6 16121 unresolved_reloc = FALSE;
afbe61cf 16122 }
25f23106
AM
16123 if (!is_opd
16124 && r_type == R_PPC64_ADDR64
16125 && (h != NULL
16126 ? h->elf.type == STT_GNU_IFUNC
16127 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16128 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16129 else
16130 {
16131 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16132
25f23106
AM
16133 /* We need to relocate .opd contents for ld.so.
16134 Prelink also wants simple and consistent rules
16135 for relocs. This make all RELATIVE relocs have
16136 *r_offset equal to r_addend. */
16137 relocate = TRUE;
16138 }
65f38f15
AM
16139 }
16140 else
16141 {
25f23106
AM
16142 if (h != NULL
16143 ? h->elf.type == STT_GNU_IFUNC
16144 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16145 {
25f53a85 16146 info->callbacks->einfo
695344c0 16147 /* xgettext:c-format */
174d0a74 16148 (_("%H: %s for indirect "
c1c8c1ef 16149 "function `%pT' unsupported\n"),
25f53a85 16150 input_bfd, input_section, rel->r_offset,
25f23106
AM
16151 ppc64_elf_howto_table[r_type]->name,
16152 sym_name);
16153 ret = FALSE;
16154 }
cf35638d 16155 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16156 ;
16157 else if (sec == NULL || sec->owner == NULL)
16158 {
16159 bfd_set_error (bfd_error_bad_value);
b34976b6 16160 return FALSE;
65f38f15
AM
16161 }
16162 else
16163 {
f26a3287 16164 asection *osec = sec->output_section;
65f38f15 16165
f26a3287
AM
16166 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16167 {
16168 /* TLS symbol values are relative to the
16169 TLS segment. Dynamic relocations for
16170 local TLS symbols therefore can't be
16171 reduced to a relocation against their
16172 section symbol because it holds the
16173 address of the section, not a value
16174 relative to the TLS segment. We could
16175 change the .tdata dynamic section symbol
16176 to be zero value but STN_UNDEF works
16177 and is used elsewhere, eg. for TPREL64
16178 GOT relocs against local TLS symbols. */
16179 osec = htab->elf.tls_sec;
16180 indx = 0;
16181 }
16182 else
74541ad4 16183 {
74541ad4 16184 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16185 if (indx == 0)
16186 {
16187 if ((osec->flags & SEC_READONLY) == 0
16188 && htab->elf.data_index_section != NULL)
16189 osec = htab->elf.data_index_section;
16190 else
16191 osec = htab->elf.text_index_section;
16192 indx = elf_section_data (osec)->dynindx;
16193 }
16194 BFD_ASSERT (indx != 0);
74541ad4 16195 }
74541ad4 16196
65f38f15
AM
16197 /* We are turning this relocation into one
16198 against a section symbol, so subtract out
16199 the output section's address but not the
16200 offset of the input section in the output
16201 section. */
16202 outrel.r_addend -= osec->vma;
16203 }
16204
16205 outrel.r_info = ELF64_R_INFO (indx, r_type);
16206 }
16207 }
16208
16209 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16210 if (h != NULL
16211 ? h->elf.type == STT_GNU_IFUNC
16212 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16213 {
16214 sreloc = htab->elf.irelplt;
16215 if (indx == 0)
16216 htab->local_ifunc_resolver = 1;
16217 else if (is_static_defined (&h->elf))
16218 htab->maybe_local_ifunc_resolver = 1;
16219 }
65f38f15
AM
16220 if (sreloc == NULL)
16221 abort ();
16222
dfbb6ac9
AM
16223 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16224 >= sreloc->size)
16225 abort ();
947216bf
AM
16226 loc = sreloc->contents;
16227 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16228 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16229
e59a1001
AM
16230 if (!warned_dynamic
16231 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16232 {
16233 info->callbacks->einfo
16234 /* xgettext:c-format */
16235 (_("%X%P: %pB: %s against %pT "
16236 "is not supported by glibc as a dynamic relocation\n"),
16237 input_bfd,
16238 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16239 sym_name);
16240 warned_dynamic = TRUE;
16241 }
16242
65f38f15
AM
16243 /* If this reloc is against an external symbol, it will
16244 be computed at runtime, so there's no need to do
81407a69
AM
16245 anything now. However, for the sake of prelink ensure
16246 that the section contents are a known value. */
2cdcc330 16247 if (!relocate)
81407a69
AM
16248 {
16249 unresolved_reloc = FALSE;
16250 /* The value chosen here is quite arbitrary as ld.so
16251 ignores section contents except for the special
16252 case of .opd where the contents might be accessed
16253 before relocation. Choose zero, as that won't
16254 cause reloc overflow. */
16255 relocation = 0;
16256 addend = 0;
16257 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16258 to improve backward compatibility with older
16259 versions of ld. */
16260 if (r_type == R_PPC64_ADDR64)
16261 addend = outrel.r_addend;
16262 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16263 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16264 addend = outrel.r_offset;
81407a69 16265 }
65f38f15 16266 }
5bd4f169
AM
16267 break;
16268
65f38f15
AM
16269 case R_PPC64_COPY:
16270 case R_PPC64_GLOB_DAT:
16271 case R_PPC64_JMP_SLOT:
25f23106 16272 case R_PPC64_JMP_IREL:
65f38f15
AM
16273 case R_PPC64_RELATIVE:
16274 /* We shouldn't ever see these dynamic relocs in relocatable
16275 files. */
ae9a127f 16276 /* Fall through. */
65f38f15
AM
16277
16278 case R_PPC64_PLTGOT16:
16279 case R_PPC64_PLTGOT16_DS:
16280 case R_PPC64_PLTGOT16_HA:
16281 case R_PPC64_PLTGOT16_HI:
16282 case R_PPC64_PLTGOT16_LO:
16283 case R_PPC64_PLTGOT16_LO_DS:
16284 case R_PPC64_PLTREL32:
16285 case R_PPC64_PLTREL64:
16286 /* These ones haven't been implemented yet. */
16287
25f53a85 16288 info->callbacks->einfo
695344c0 16289 /* xgettext:c-format */
c1c8c1ef 16290 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16291 input_bfd,
4ce794b7 16292 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16293
16294 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16295 ret = FALSE;
c316a17c 16296 goto copy_reloc;
65f38f15 16297 }
5bd4f169 16298
67f0cbdb
AM
16299 /* Multi-instruction sequences that access the TOC can be
16300 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16301 to nop; addi rb,r2,x; */
67f0cbdb
AM
16302 switch (r_type)
16303 {
16304 default:
16305 break;
16306
16307 case R_PPC64_GOT_TLSLD16_HI:
16308 case R_PPC64_GOT_TLSGD16_HI:
16309 case R_PPC64_GOT_TPREL16_HI:
16310 case R_PPC64_GOT_DTPREL16_HI:
16311 case R_PPC64_GOT16_HI:
16312 case R_PPC64_TOC16_HI:
16313 /* These relocs would only be useful if building up an
16314 offset to later add to r2, perhaps in an indexed
16315 addressing mode instruction. Don't try to optimize.
16316 Unfortunately, the possibility of someone building up an
16317 offset like this or even with the HA relocs, means that
16318 we need to check the high insn when optimizing the low
16319 insn. */
16320 break;
16321
5663e321
AM
16322 case R_PPC64_PLTCALL_NOTOC:
16323 if (!unresolved_reloc)
16324 htab->notoc_plt = 1;
16325 /* Fall through. */
23cedd1d
AM
16326 case R_PPC64_PLTCALL:
16327 if (unresolved_reloc)
16328 {
16329 /* No plt entry. Make this into a direct call. */
16330 bfd_byte *p = contents + rel->r_offset;
16331 insn = bfd_get_32 (input_bfd, p);
16332 insn &= 1;
16333 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16334 if (r_type == R_PPC64_PLTCALL)
16335 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16336 unresolved_reloc = save_unresolved_reloc;
16337 r_type = R_PPC64_REL24;
16338 }
16339 break;
16340
5663e321 16341 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16342 case R_PPC64_PLTSEQ:
16343 if (unresolved_reloc)
16344 {
16345 unresolved_reloc = FALSE;
16346 goto nop_it;
16347 }
16348 break;
16349
5663e321
AM
16350 case R_PPC64_PLT_PCREL34_NOTOC:
16351 if (!unresolved_reloc)
16352 htab->notoc_plt = 1;
16353 /* Fall through. */
16354 case R_PPC64_PLT_PCREL34:
16355 if (unresolved_reloc)
16356 {
16357 bfd_byte *p = contents + rel->r_offset;
16358 bfd_put_32 (input_bfd, PNOP >> 32, p);
16359 bfd_put_32 (input_bfd, PNOP, p + 4);
16360 unresolved_reloc = FALSE;
16361 goto copy_reloc;
16362 }
16363 break;
16364
23cedd1d
AM
16365 case R_PPC64_PLT16_HA:
16366 if (unresolved_reloc)
16367 {
16368 unresolved_reloc = FALSE;
16369 goto nop_it;
16370 }
16371 /* Fall through. */
67f0cbdb
AM
16372 case R_PPC64_GOT_TLSLD16_HA:
16373 case R_PPC64_GOT_TLSGD16_HA:
16374 case R_PPC64_GOT_TPREL16_HA:
16375 case R_PPC64_GOT_DTPREL16_HA:
16376 case R_PPC64_GOT16_HA:
16377 case R_PPC64_TOC16_HA:
98528052 16378 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16379 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16380 {
23cedd1d
AM
16381 bfd_byte *p;
16382 nop_it:
16383 p = contents + (rel->r_offset & ~3);
98528052 16384 bfd_put_32 (input_bfd, NOP, p);
d830549d 16385 goto copy_reloc;
98528052 16386 }
67f0cbdb
AM
16387 break;
16388
23cedd1d
AM
16389 case R_PPC64_PLT16_LO:
16390 case R_PPC64_PLT16_LO_DS:
16391 if (unresolved_reloc)
16392 {
16393 unresolved_reloc = FALSE;
16394 goto nop_it;
16395 }
16396 /* Fall through. */
67f0cbdb
AM
16397 case R_PPC64_GOT_TLSLD16_LO:
16398 case R_PPC64_GOT_TLSGD16_LO:
16399 case R_PPC64_GOT_TPREL16_LO_DS:
16400 case R_PPC64_GOT_DTPREL16_LO_DS:
16401 case R_PPC64_GOT16_LO:
16402 case R_PPC64_GOT16_LO_DS:
16403 case R_PPC64_TOC16_LO:
16404 case R_PPC64_TOC16_LO_DS:
98528052 16405 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16406 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16407 {
16408 bfd_byte *p = contents + (rel->r_offset & ~3);
16409 insn = bfd_get_32 (input_bfd, p);
560c8763
AM
16410 if ((insn & (0x3f << 26)) == 12u << 26 /* addic */)
16411 {
16412 /* Transform addic to addi when we change reg. */
16413 insn &= ~((0x3f << 26) | (0x1f << 16));
16414 insn |= (14u << 26) | (2 << 16);
16415 }
16416 else
67f0cbdb 16417 {
98528052
AM
16418 insn &= ~(0x1f << 16);
16419 insn |= 2 << 16;
67f0cbdb 16420 }
560c8763 16421 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16422 }
16423 break;
9a23f96e
AM
16424
16425 case R_PPC64_TPREL16_HA:
16426 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16427 {
16428 bfd_byte *p = contents + (rel->r_offset & ~3);
16429 insn = bfd_get_32 (input_bfd, p);
16430 if ((insn & ((0x3f << 26) | 0x1f << 16))
16431 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16432 /* xgettext:c-format */
16433 info->callbacks->minfo
16434 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16435 input_bfd, input_section, rel->r_offset,
16436 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16437 else
d830549d
AM
16438 {
16439 bfd_put_32 (input_bfd, NOP, p);
16440 goto copy_reloc;
16441 }
9a23f96e
AM
16442 }
16443 break;
16444
16445 case R_PPC64_TPREL16_LO:
16446 case R_PPC64_TPREL16_LO_DS:
16447 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16448 {
16449 bfd_byte *p = contents + (rel->r_offset & ~3);
16450 insn = bfd_get_32 (input_bfd, p);
16451 insn &= ~(0x1f << 16);
16452 insn |= 13 << 16;
16453 bfd_put_32 (input_bfd, insn, p);
16454 }
16455 break;
67f0cbdb
AM
16456 }
16457
65f38f15
AM
16458 /* Do any further special processing. */
16459 switch (r_type)
16460 {
16461 default:
16462 break;
16463
25f23106 16464 case R_PPC64_REL16_HA:
4a969973
AM
16465 case R_PPC64_REL16_HIGHA:
16466 case R_PPC64_REL16_HIGHERA:
16467 case R_PPC64_REL16_HIGHESTA:
a680de9a 16468 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16469 case R_PPC64_ADDR16_HA:
16470 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16471 case R_PPC64_ADDR16_HIGHERA:
16472 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16473 case R_PPC64_TOC16_HA:
16474 case R_PPC64_SECTOFF_HA:
411e1bfb 16475 case R_PPC64_TPREL16_HA:
f9c6b907 16476 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16477 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16478 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16479 case R_PPC64_DTPREL16_HA:
16480 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16481 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16482 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16483 /* It's just possible that this symbol is a weak symbol
16484 that's not actually defined anywhere. In that case,
16485 'sec' would be NULL, and we should leave the symbol
16486 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16487 if (sec == NULL)
16488 break;
1a0670f3 16489 /* Fall through. */
5c5f6e17
AM
16490
16491 case R_PPC64_GOT16_HA:
16492 case R_PPC64_PLTGOT16_HA:
16493 case R_PPC64_PLT16_HA:
16494 case R_PPC64_GOT_TLSGD16_HA:
16495 case R_PPC64_GOT_TLSLD16_HA:
16496 case R_PPC64_GOT_TPREL16_HA:
16497 case R_PPC64_GOT_DTPREL16_HA:
16498 /* Add 0x10000 if sign bit in 0:15 is set.
16499 Bits 0:15 are not used. */
16500 addend += 0x8000;
65f38f15
AM
16501 break;
16502
5663e321
AM
16503 case R_PPC64_D34_HA30:
16504 case R_PPC64_ADDR16_HIGHERA34:
16505 case R_PPC64_ADDR16_HIGHESTA34:
16506 case R_PPC64_REL16_HIGHERA34:
16507 case R_PPC64_REL16_HIGHESTA34:
16508 if (sec != NULL)
16509 addend += 1ULL << 33;
16510 break;
16511
65f38f15
AM
16512 case R_PPC64_ADDR16_DS:
16513 case R_PPC64_ADDR16_LO_DS:
16514 case R_PPC64_GOT16_DS:
16515 case R_PPC64_GOT16_LO_DS:
16516 case R_PPC64_PLT16_LO_DS:
16517 case R_PPC64_SECTOFF_DS:
16518 case R_PPC64_SECTOFF_LO_DS:
16519 case R_PPC64_TOC16_DS:
16520 case R_PPC64_TOC16_LO_DS:
16521 case R_PPC64_PLTGOT16_DS:
16522 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
16523 case R_PPC64_GOT_TPREL16_DS:
16524 case R_PPC64_GOT_TPREL16_LO_DS:
16525 case R_PPC64_GOT_DTPREL16_DS:
16526 case R_PPC64_GOT_DTPREL16_LO_DS:
16527 case R_PPC64_TPREL16_DS:
16528 case R_PPC64_TPREL16_LO_DS:
16529 case R_PPC64_DTPREL16_DS:
16530 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
16531 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
16532 mask = 3;
a680de9a
PB
16533 /* If this reloc is against an lq, lxv, or stxv insn, then
16534 the value must be a multiple of 16. This is somewhat of
16535 a hack, but the "correct" way to do this by defining _DQ
16536 forms of all the _DS relocs bloats all reloc switches in
16537 this file. It doesn't make much sense to use these
16538 relocs in data, so testing the insn should be safe. */
16539 if ((insn & (0x3f << 26)) == (56u << 26)
16540 || ((insn & (0x3f << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 16541 mask = 15;
a680de9a
PB
16542 relocation += addend;
16543 addend = insn & (mask ^ 3);
16544 if ((relocation & mask) != 0)
65f38f15 16545 {
a680de9a 16546 relocation ^= relocation & mask;
25f53a85 16547 info->callbacks->einfo
695344c0 16548 /* xgettext:c-format */
174d0a74 16549 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 16550 input_bfd, input_section, rel->r_offset,
d830549d 16551 ppc64_elf_howto_table[r_type]->name,
adadcc0c 16552 mask + 1);
65f38f15 16553 bfd_set_error (bfd_error_bad_value);
b34976b6 16554 ret = FALSE;
c316a17c 16555 goto copy_reloc;
65f38f15
AM
16556 }
16557 break;
5bd4f169
AM
16558 }
16559
239e1f3a
AM
16560 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
16561 because such sections are not SEC_ALLOC and thus ld.so will
16562 not process them. */
d830549d 16563 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 16564 if (unresolved_reloc
239e1f3a 16565 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
16566 && h->elf.def_dynamic)
16567 && _bfd_elf_section_offset (output_bfd, info, input_section,
16568 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 16569 {
25f53a85 16570 info->callbacks->einfo
695344c0 16571 /* xgettext:c-format */
c1c8c1ef 16572 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 16573 input_bfd, input_section, rel->r_offset,
b80eed39 16574 howto->name,
039b3fef 16575 h->elf.root.root.string);
b34976b6 16576 ret = FALSE;
9c07fe7c 16577 }
5bd4f169 16578
b80eed39
AM
16579 /* 16-bit fields in insns mostly have signed values, but a
16580 few insns have 16-bit unsigned values. Really, we should
16581 have different reloc types. */
16582 if (howto->complain_on_overflow != complain_overflow_dont
16583 && howto->dst_mask == 0xffff
16584 && (input_section->flags & SEC_CODE) != 0)
16585 {
16586 enum complain_overflow complain = complain_overflow_signed;
16587
16588 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
16589 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
16590 complain = complain_overflow_bitfield;
16591 else if (howto->rightshift == 0
16592 ? ((insn & (0x3f << 26)) == 28u << 26 /* andi */
16593 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
16594 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
16595 : ((insn & (0x3f << 26)) == 29u << 26 /* andis */
16596 || (insn & (0x3f << 26)) == 25u << 26 /* oris */
16597 || (insn & (0x3f << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
16598 complain = complain_overflow_unsigned;
16599 if (howto->complain_on_overflow != complain)
16600 {
16601 alt_howto = *howto;
16602 alt_howto.complain_on_overflow = complain;
16603 howto = &alt_howto;
16604 }
16605 }
16606
5663e321 16607 switch (r_type)
a680de9a 16608 {
5663e321
AM
16609 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
16610 case R_PPC64_D34:
16611 case R_PPC64_D34_LO:
16612 case R_PPC64_D34_HI30:
16613 case R_PPC64_D34_HA30:
16614 case R_PPC64_PCREL34:
16615 case R_PPC64_GOT_PCREL34:
c213164a
AM
16616 case R_PPC64_TPREL34:
16617 case R_PPC64_DTPREL34:
16618 case R_PPC64_GOT_TLSGD34:
16619 case R_PPC64_GOT_TLSLD34:
16620 case R_PPC64_GOT_TPREL34:
16621 case R_PPC64_GOT_DTPREL34:
5663e321
AM
16622 case R_PPC64_PLT_PCREL34:
16623 case R_PPC64_PLT_PCREL34_NOTOC:
16624 case R_PPC64_D28:
16625 case R_PPC64_PCREL28:
16626 if (rel->r_offset + 8 > input_section->size)
16627 r = bfd_reloc_outofrange;
16628 else
16629 {
5663e321
AM
16630 relocation += addend;
16631 if (howto->pc_relative)
16632 relocation -= (rel->r_offset
16633 + input_section->output_offset
16634 + input_section->output_section->vma);
16635 relocation >>= howto->rightshift;
16636
16637 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16638 pinsn <<= 32;
16639 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
16640
16641 pinsn &= ~howto->dst_mask;
16642 pinsn |= (((relocation << 16) | (relocation & 0xffff))
16643 & howto->dst_mask);
16644 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
16645 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
16646 r = bfd_reloc_ok;
16647 if (howto->complain_on_overflow == complain_overflow_signed
16648 && (relocation + (1ULL << (howto->bitsize - 1))
16649 >= 1ULL << howto->bitsize))
16650 r = bfd_reloc_overflow;
16651 }
16652 break;
16653
16654 case R_PPC64_REL16DX_HA:
a680de9a
PB
16655 if (rel->r_offset + 4 > input_section->size)
16656 r = bfd_reloc_outofrange;
16657 else
16658 {
16659 relocation += addend;
16660 relocation -= (rel->r_offset
16661 + input_section->output_offset
16662 + input_section->output_section->vma);
3de43e7b 16663 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
16664 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
16665 insn &= ~0x1fffc1;
3de43e7b 16666 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
16667 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
16668 r = bfd_reloc_ok;
3de43e7b 16669 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
16670 r = bfd_reloc_overflow;
16671 }
5663e321
AM
16672 break;
16673
16674 default:
16675 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
16676 contents, rel->r_offset,
16677 relocation, addend);
a680de9a 16678 }
5bd4f169 16679
ef60b7ff 16680 if (r != bfd_reloc_ok)
5bd4f169 16681 {
bc30df16 16682 char *more_info = NULL;
b80eed39 16683 const char *reloc_name = howto->name;
bc30df16
AM
16684
16685 if (reloc_dest != DEST_NORMAL)
16686 {
16687 more_info = bfd_malloc (strlen (reloc_name) + 8);
16688 if (more_info != NULL)
16689 {
16690 strcpy (more_info, reloc_name);
16691 strcat (more_info, (reloc_dest == DEST_OPD
16692 ? " (OPD)" : " (stub)"));
16693 reloc_name = more_info;
16694 }
16695 }
16696
cd27b276 16697 if (r == bfd_reloc_overflow)
5bd4f169 16698 {
8131c122
AM
16699 /* On code like "if (foo) foo();" don't report overflow
16700 on a branch to zero when foo is undefined. */
16701 if (!warned
16702 && (reloc_dest == DEST_STUB
16703 || !(h != NULL
16704 && (h->elf.root.type == bfd_link_hash_undefweak
16705 || h->elf.root.type == bfd_link_hash_undefined)
16706 && is_branch_reloc (r_type))))
1a72702b
AM
16707 info->callbacks->reloc_overflow (info, &h->elf.root,
16708 sym_name, reloc_name,
16709 orig_rel.r_addend,
16710 input_bfd, input_section,
16711 rel->r_offset);
ef60b7ff
AM
16712 }
16713 else
16714 {
25f53a85 16715 info->callbacks->einfo
695344c0 16716 /* xgettext:c-format */
c1c8c1ef 16717 (_("%H: %s against `%pT': error %d\n"),
25f53a85 16718 input_bfd, input_section, rel->r_offset,
bc30df16 16719 reloc_name, sym_name, (int) r);
b34976b6 16720 ret = FALSE;
ef60b7ff 16721 }
bc30df16
AM
16722 if (more_info != NULL)
16723 free (more_info);
5bd4f169 16724 }
c316a17c
AM
16725 copy_reloc:
16726 if (wrel != rel)
16727 *wrel = *rel;
16728 }
16729
16730 if (wrel != rel)
16731 {
16732 Elf_Internal_Shdr *rel_hdr;
16733 size_t deleted = rel - wrel;
16734
16735 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
16736 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16737 if (rel_hdr->sh_size == 0)
16738 {
16739 /* It is too late to remove an empty reloc section. Leave
16740 one NONE reloc.
16741 ??? What is wrong with an empty section??? */
16742 rel_hdr->sh_size = rel_hdr->sh_entsize;
16743 deleted -= 1;
16744 }
16745 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
16746 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
16747 input_section->reloc_count -= deleted;
5bd4f169
AM
16748 }
16749
645ea6a9
AM
16750 /* If we're emitting relocations, then shortly after this function
16751 returns, reloc offsets and addends for this section will be
16752 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
16753 file rather than the input. Save a copy of the relocs for
16754 opd_entry_value. */
0e1862bb 16755 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
16756 {
16757 bfd_size_type amt;
16758 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
16759 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
16760 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
16761 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
16762 if (rel == NULL)
16763 return FALSE;
16764 memcpy (rel, relocs, amt);
16765 }
5bd4f169
AM
16766 return ret;
16767}
16768
754021d0
AM
16769/* Adjust the value of any local symbols in opd sections. */
16770
6e0b88f1 16771static int
754021d0
AM
16772ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
16773 const char *name ATTRIBUTE_UNUSED,
16774 Elf_Internal_Sym *elfsym,
16775 asection *input_sec,
16776 struct elf_link_hash_entry *h)
16777{
74f0fb50
AM
16778 struct _opd_sec_data *opd;
16779 long adjust;
754021d0
AM
16780 bfd_vma value;
16781
4025353c 16782 if (h != NULL)
6e0b88f1 16783 return 1;
4025353c 16784
74f0fb50
AM
16785 opd = get_opd_info (input_sec);
16786 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 16787 return 1;
754021d0
AM
16788
16789 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 16790 if (!bfd_link_relocatable (info))
754021d0
AM
16791 value -= input_sec->output_section->vma;
16792
51aecdc5 16793 adjust = opd->adjust[OPD_NDX (value)];
4025353c 16794 if (adjust == -1)
6e0b88f1
AM
16795 return 2;
16796
16797 elfsym->st_value += adjust;
16798 return 1;
754021d0
AM
16799}
16800
5bd4f169
AM
16801/* Finish up dynamic symbol handling. We set the contents of various
16802 dynamic sections here. */
16803
b34976b6 16804static bfd_boolean
4ce794b7
AM
16805ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
16806 struct bfd_link_info *info,
16807 struct elf_link_hash_entry *h,
4aef7643 16808 Elf_Internal_Sym *sym)
5bd4f169 16809{
65f38f15 16810 struct ppc_link_hash_table *htab;
8387904d 16811 struct plt_entry *ent;
5bd4f169 16812
65f38f15 16813 htab = ppc_hash_table (info);
4dfe6ac6
NC
16814 if (htab == NULL)
16815 return FALSE;
5bd4f169 16816
49c09209
AM
16817 if (!htab->opd_abi && !h->def_regular)
16818 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
16819 if (ent->plt.offset != (bfd_vma) -1)
16820 {
16821 /* Mark the symbol as undefined, rather than as
16822 defined in glink. Leave the value if there were
16823 any relocations where pointer equality matters
16824 (this is a clue for the dynamic linker, to make
16825 function pointer comparisons work between an
16826 application and shared library), otherwise set it
16827 to zero. */
16828 sym->st_shndx = SHN_UNDEF;
16829 if (!h->pointer_equality_needed)
16830 sym->st_value = 0;
16831 else if (!h->ref_regular_nonweak)
16832 {
16833 /* This breaks function pointer comparisons, but
16834 that is better than breaking tests for a NULL
16835 function pointer. */
16836 sym->st_value = 0;
16837 }
16838 break;
16839 }
5bd4f169 16840
1bdd8fac
AM
16841 if (h->needs_copy
16842 && (h->root.type == bfd_link_hash_defined
16843 || h->root.type == bfd_link_hash_defweak)
16844 && (h->root.u.def.section == htab->elf.sdynbss
16845 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 16846 {
65f38f15 16847 /* This symbol needs a copy reloc. Set it up. */
49c09209 16848 Elf_Internal_Rela rela;
5474d94f 16849 asection *srel;
49c09209 16850 bfd_byte *loc;
5bd4f169 16851
1bdd8fac 16852 if (h->dynindx == -1)
65f38f15 16853 abort ();
5bd4f169
AM
16854
16855 rela.r_offset = (h->root.u.def.value
16856 + h->root.u.def.section->output_section->vma
16857 + h->root.u.def.section->output_offset);
16858 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
16859 rela.r_addend = 0;
afbf7e8e 16860 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
16861 srel = htab->elf.sreldynrelro;
16862 else
16863 srel = htab->elf.srelbss;
16864 loc = srel->contents;
16865 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 16866 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
16867 }
16868
b34976b6 16869 return TRUE;
5bd4f169
AM
16870}
16871
65f38f15
AM
16872/* Used to decide how to sort relocs in an optimal manner for the
16873 dynamic linker, before writing them out. */
16874
16875static enum elf_reloc_type_class
7e612e98
AM
16876ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
16877 const asection *rel_sec,
16878 const Elf_Internal_Rela *rela)
65f38f15 16879{
04c9666a 16880 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
16881 struct ppc_link_hash_table *htab = ppc_hash_table (info);
16882
33e44f2e 16883 if (rel_sec == htab->elf.irelplt)
7e612e98 16884 return reloc_class_ifunc;
a33d1f77 16885
4ce794b7 16886 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 16887 switch (r_type)
65f38f15
AM
16888 {
16889 case R_PPC64_RELATIVE:
16890 return reloc_class_relative;
16891 case R_PPC64_JMP_SLOT:
16892 return reloc_class_plt;
16893 case R_PPC64_COPY:
16894 return reloc_class_copy;
16895 default:
16896 return reloc_class_normal;
16897 }
16898}
16899
5bd4f169
AM
16900/* Finish up the dynamic sections. */
16901
b34976b6 16902static bfd_boolean
4ce794b7
AM
16903ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
16904 struct bfd_link_info *info)
5bd4f169 16905{
65f38f15
AM
16906 struct ppc_link_hash_table *htab;
16907 bfd *dynobj;
5bd4f169 16908 asection *sdyn;
5bd4f169 16909
65f38f15 16910 htab = ppc_hash_table (info);
4dfe6ac6
NC
16911 if (htab == NULL)
16912 return FALSE;
16913
65f38f15 16914 dynobj = htab->elf.dynobj;
3d4d4302 16915 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 16916
65f38f15 16917 if (htab->elf.dynamic_sections_created)
5bd4f169 16918 {
5bd4f169
AM
16919 Elf64_External_Dyn *dyncon, *dynconend;
16920
33e44f2e 16921 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 16922 abort ();
5bd4f169
AM
16923
16924 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 16925 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
16926 for (; dyncon < dynconend; dyncon++)
16927 {
16928 Elf_Internal_Dyn dyn;
19397422 16929 asection *s;
5bd4f169
AM
16930
16931 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
16932
16933 switch (dyn.d_tag)
16934 {
65f38f15
AM
16935 default:
16936 continue;
5bd4f169 16937
5d1634d7 16938 case DT_PPC64_GLINK:
4ce794b7 16939 s = htab->glink;
6348e046 16940 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
16941 /* We stupidly defined DT_PPC64_GLINK to be the start
16942 of glink rather than the first entry point, which is
16943 what ld.so needs, and now have a bigger stub to
16944 support automatic multiple TOCs. */
9e390558 16945 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
16946 break;
16947
19397422
AM
16948 case DT_PPC64_OPD:
16949 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16950 if (s == NULL)
16951 continue;
16952 dyn.d_un.d_ptr = s->vma;
19397422
AM
16953 break;
16954
e8910a83 16955 case DT_PPC64_OPT:
5663e321
AM
16956 if ((htab->do_multi_toc && htab->multi_toc_needed)
16957 || htab->notoc_plt)
e8910a83 16958 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
16959 if (htab->has_plt_localentry0)
16960 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
16961 break;
16962
19397422
AM
16963 case DT_PPC64_OPDSZ:
16964 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
16965 if (s == NULL)
16966 continue;
eea6121a 16967 dyn.d_un.d_val = s->size;
19397422
AM
16968 break;
16969
65f38f15 16970 case DT_PLTGOT:
33e44f2e 16971 s = htab->elf.splt;
6348e046 16972 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
16973 break;
16974
16975 case DT_JMPREL:
33e44f2e 16976 s = htab->elf.srelplt;
6348e046 16977 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 16978 break;
5bd4f169 16979
65f38f15 16980 case DT_PLTRELSZ:
33e44f2e 16981 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 16982 break;
82e66161
AM
16983
16984 case DT_TEXTREL:
16985 if (htab->local_ifunc_resolver)
16986 info->callbacks->einfo
16987 (_("%X%P: text relocations and GNU indirect "
16988 "functions will result in a segfault at runtime\n"));
16989 else if (htab->maybe_local_ifunc_resolver)
16990 info->callbacks->einfo
16991 (_("%P: warning: text relocations and GNU indirect "
16992 "functions may result in a segfault at runtime\n"));
16993 continue;
5bd4f169 16994 }
5bd4f169 16995
65f38f15 16996 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 16997 }
5bd4f169
AM
16998 }
16999
6528b6eb
AM
17000 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17001 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17002 {
17003 /* Fill in the first entry in the global offset table.
17004 We use it to hold the link-time TOCbase. */
17005 bfd_put_64 (output_bfd,
60ee0d4a 17006 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17007 htab->elf.sgot->contents);
5d1634d7
AM
17008
17009 /* Set .got entry size. */
2cdcc330
AM
17010 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17011 = 8;
5d1634d7
AM
17012 }
17013
6528b6eb
AM
17014 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17015 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17016 {
17017 /* Set .plt entry size. */
33e44f2e 17018 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17019 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17020 }
17021
84f5d08e
AM
17022 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17023 brlt ourselves if emitrelocations. */
17024 if (htab->brlt != NULL
17025 && htab->brlt->reloc_count != 0
17026 && !_bfd_elf_link_output_relocs (output_bfd,
17027 htab->brlt,
d4730f92 17028 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17029 elf_section_data (htab->brlt)->relocs,
17030 NULL))
17031 return FALSE;
17032
176a0d42
AM
17033 if (htab->glink != NULL
17034 && htab->glink->reloc_count != 0
17035 && !_bfd_elf_link_output_relocs (output_bfd,
17036 htab->glink,
d4730f92 17037 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17038 elf_section_data (htab->glink)->relocs,
17039 NULL))
17040 return FALSE;
17041
da44f4e5 17042
df136d64
AM
17043 if (htab->glink_eh_frame != NULL
17044 && htab->glink_eh_frame->size != 0
17045 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17046 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17047 htab->glink_eh_frame,
17048 htab->glink_eh_frame->contents))
17049 return FALSE;
58d180e8 17050
e717da7e 17051 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17052 since we didn't add them to DYNOBJ. We know dynobj is the first
17053 bfd. */
c72f2fb2 17054 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17055 {
17056 asection *s;
7b53ace3 17057
0c8d6e5c 17058 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17059 continue;
17060
e717da7e
AM
17061 s = ppc64_elf_tdata (dynobj)->got;
17062 if (s != NULL
eea6121a 17063 && s->size != 0
e717da7e
AM
17064 && s->output_section != bfd_abs_section_ptr
17065 && !bfd_set_section_contents (output_bfd, s->output_section,
17066 s->contents, s->output_offset,
eea6121a 17067 s->size))
e717da7e
AM
17068 return FALSE;
17069 s = ppc64_elf_tdata (dynobj)->relgot;
17070 if (s != NULL
eea6121a 17071 && s->size != 0
e717da7e
AM
17072 && s->output_section != bfd_abs_section_ptr
17073 && !bfd_set_section_contents (output_bfd, s->output_section,
17074 s->contents, s->output_offset,
eea6121a 17075 s->size))
e717da7e
AM
17076 return FALSE;
17077 }
f6c52c13 17078
b34976b6 17079 return TRUE;
5bd4f169
AM
17080}
17081
5bd4f169 17082#include "elf64-target.h"
7b8e7dad
AM
17083
17084/* FreeBSD support */
17085
17086#undef TARGET_LITTLE_SYM
17087#undef TARGET_LITTLE_NAME
17088
17089#undef TARGET_BIG_SYM
6d00b590 17090#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17091#undef TARGET_BIG_NAME
17092#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17093
17094#undef ELF_OSABI
17095#define ELF_OSABI ELFOSABI_FREEBSD
17096
17097#undef elf64_bed
17098#define elf64_bed elf64_powerpc_fbsd_bed
17099
17100#include "elf64-target.h"