]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
PowerPC64 --no-pcrel-optimize
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
bf577467 128#define elf_backend_section_flags ppc64_elf_section_flags
6911b7dc 129#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 130#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 131#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 132
5bd4f169
AM
133/* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 138#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 139#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
140
141/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 142#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 143
a078d95a
AM
144/* Offsets to some stack save slots. */
145#define STK_LR 16
146#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 147/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
5bd4f169 152/* TOC base pointers offset from start of TOC. */
411e1bfb 153#define TOC_BASE_OFF 0x8000
a27e685f
AM
154/* TOC base alignment. */
155#define TOC_BASE_ALIGN 256
411e1bfb
AM
156
157/* Offset of tp and dtp pointers from start of TLS block. */
158#define TP_OFFSET 0x7000
159#define DTP_OFFSET 0x8000
5bd4f169 160
ad8e1ba5
AM
161/* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 163 insert an addi to adjust r11. */
a078d95a 164#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
165#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
170#define BCTR 0x4e800420 /* bctr */
171
07d6d2b8 172#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
173#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
175#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183#define BNECTR 0x4ca20420 /* bnectr+ */
184#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 185
71a39c98 186#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 187#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 188#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 189
07d6d2b8
AM
190#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 193
04bdff6a 194#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 195#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 196#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 197#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
198#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 200#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 201#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 202#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 203#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 204#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 205#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 206#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
207#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
210#define PADDI_R12_PC 0x0610000039800000ULL
211#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 212#define PNOP 0x0700000000000000ULL
a345bc8d 213
9e390558
AM
214/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220#define MFLR_R12 0x7d8802a6 /* mflr %12 */
221#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 224 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 225#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
226#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
ee4bf8d2 231 /* bctr */
b9e5796b
AM
232#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
237
238/* Pad with this. */
239#define NOP 0x60000000
240
721956f4
AM
241/* Some other nops. */
242#define CROR_151515 0x4def7b82
243#define CROR_313131 0x4ffffb82
244
cedb70c5 245/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
246#define LI_R0_0 0x38000000 /* li %r0,0 */
247#define B_DOT 0x48000000 /* b . */
248
249/* After that, we need two instructions to load the index, followed by
250 a branch. */
251#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 252#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 253
deb0e272
AM
254/* Instructions used by the save and restore reg functions. */
255#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
259#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
261#define LI_R12_0 0x39800000 /* li %r12,0 */
262#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
265#define BLR 0x4e800020 /* blr */
266
41bd81ab
AM
267/* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 270 relocate .opd without reloc entries. */
41bd81ab
AM
271#ifndef NO_OPD_RELOCS
272#define NO_OPD_RELOCS 0
273#endif
810d4e75 274
a4b6fadd
AM
275#ifndef ARRAY_SIZE
276#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277#endif
278
810d4e75
AM
279static inline int
280abiversion (bfd *abfd)
281{
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283}
284
285static inline void
286set_abiversion (bfd *abfd, int ver)
287{
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290}
5bd4f169
AM
291\f
292/* Relocation HOWTO's. */
46807bf4
AM
293/* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
04c9666a 306static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 307
f3185997
NC
308static reloc_howto_type ppc64_elf_howto_raw[] =
309{
5bd4f169 310 /* This reloc does nothing. */
46807bf4
AM
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A standard 32 bit relocation. */
46807bf4
AM
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
46807bf4
AM
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* A 16 bit relocation without overflow. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address. */
46807bf4
AM
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
5bd4f169
AM
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
46807bf4
AM
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
5bd4f169
AM
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
46807bf4
AM
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
5bd4f169
AM
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
46807bf4
AM
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
5bd4f169
AM
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
5bd4f169
AM
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
5bd4f169 360
05d0e962 361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
05d0e962 364
5bd4f169 365 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
5bd4f169
AM
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
46807bf4
AM
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
5bd4f169
AM
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
46807bf4
AM
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
5bd4f169
AM
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
46807bf4
AM
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
5bd4f169
AM
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
46807bf4
AM
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
46807bf4
AM
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
46807bf4
AM
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
46807bf4
AM
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
5bd4f169
AM
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
46807bf4
AM
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
5bd4f169
AM
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
46807bf4
AM
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
5bd4f169
AM
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
46807bf4
AM
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
5bd4f169
AM
432
433 /* 32-bit PC relative. */
46807bf4
AM
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
5bd4f169 436
10ed1bba 437 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
5bd4f169
AM
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
5bd4f169
AM
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
46807bf4
AM
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
5bd4f169
AM
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
46807bf4
AM
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
5bd4f169
AM
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
46807bf4
AM
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
5bd4f169 460
c061c2d8 461 /* 16-bit section relative relocation. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
5bd4f169 464
c061c2d8 465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
5bd4f169
AM
472
473 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
5bd4f169 476
04c9666a 477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
5bd4f169
AM
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
46807bf4
AM
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address. */
46807bf4
AM
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
5bd4f169
AM
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address. */
46807bf4
AM
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
5bd4f169
AM
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
46807bf4
AM
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
5bd4f169
AM
504
505 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
5bd4f169
AM
508
509 /* 64-bit relative relocation. */
46807bf4
AM
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
5bd4f169 512
cedb70c5 513 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
5bd4f169
AM
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
5bd4f169
AM
522
523 /* 16 bit TOC-relative relocation. */
5bd4f169 524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
5bd4f169
AM
527
528 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
5bd4f169
AM
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
5bd4f169
AM
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
5bd4f169 541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
5bd4f169
AM
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
411e1bfb
AM
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
411e1bfb
AM
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
411e1bfb
AM
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
411e1bfb
AM
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
411e1bfb
AM
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
411e1bfb 624
727fc41e 625 /* Marker relocs for TLS. */
46807bf4
AM
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
727fc41e 634
23cedd1d
AM
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
46807bf4
AM
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
3b421ab3 639
23cedd1d 640 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
23cedd1d 646
411e1bfb
AM
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
46807bf4
AM
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
411e1bfb
AM
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* A 16 bit dtprel reloc. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16, but no overflow. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* A 16 bit tprel reloc. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16, but no overflow. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
411e1bfb
AM
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb 757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
5bd4f169 760
411e1bfb
AM
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb
AM
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
411e1bfb
AM
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
5bd4f169 808
411e1bfb 809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
e054468f 818
25f23106 819 /* A 16 bit relative relocation. */
46807bf4
AM
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address. */
46807bf4
AM
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
25f23106
AM
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
25f23106 835
4a969973
AM
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
a680de9a 854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
a680de9a 857
7ba71655 858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
7ba71655 861
f9c6b907 862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907
AM
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
f9c6b907 885
006589cf 886 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
006589cf 889
45965137 890 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
45965137 893
5663e321
AM
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
c213164a
AM
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
87c69f97 933 HOW (R_PPC64_GOT_TLSGD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
934 ppc64_elf_unhandled_reloc),
935
87c69f97 936 HOW (R_PPC64_GOT_TLSLD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
937 ppc64_elf_unhandled_reloc),
938
87c69f97 939 HOW (R_PPC64_GOT_TPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
940 ppc64_elf_unhandled_reloc),
941
87c69f97 942 HOW (R_PPC64_GOT_DTPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
943 ppc64_elf_unhandled_reloc),
944
5663e321
AM
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
5bd4f169 975 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978
979 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
5bd4f169
AM
982};
983
984\f
985/* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988static void
4ce794b7 989ppc_howto_init (void)
5bd4f169
AM
990{
991 unsigned int i, type;
992
a4b6fadd 993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
994 {
995 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999}
1000
1001static reloc_howto_type *
87c69f97 1002ppc64_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
87c69f97 1282 case BFD_RELOC_PPC64_GOT_TLSGD_PCREL34: r = R_PPC64_GOT_TLSGD_PCREL34;
c213164a 1283 break;
87c69f97 1284 case BFD_RELOC_PPC64_GOT_TLSLD_PCREL34: r = R_PPC64_GOT_TLSLD_PCREL34;
c213164a 1285 break;
87c69f97 1286 case BFD_RELOC_PPC64_GOT_TPREL_PCREL34: r = R_PPC64_GOT_TPREL_PCREL34;
c213164a 1287 break;
87c69f97 1288 case BFD_RELOC_PPC64_GOT_DTPREL_PCREL34: r = R_PPC64_GOT_DTPREL_PCREL34;
c213164a 1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7 1319static reloc_howto_type *
87c69f97 1320ppc64_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
157090f7
AM
1321{
1322 unsigned int i;
87c69f97
AM
1323 static char *compat_map[][2] = {
1324 { "R_PPC64_GOT_TLSGD34", "R_PPC64_GOT_TLSGD_PCREL34" },
1325 { "R_PPC64_GOT_TLSLD34", "R_PPC64_GOT_TLSLD_PCREL34" },
1326 { "R_PPC64_GOT_TPREL34", "R_PPC64_GOT_TPREL_PCREL34" },
1327 { "R_PPC64_GOT_DTPREL34", "R_PPC64_GOT_DTPREL_PCREL34" }
1328 };
157090f7 1329
a4b6fadd 1330 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1331 if (ppc64_elf_howto_raw[i].name != NULL
1332 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1333 return &ppc64_elf_howto_raw[i];
1334
87c69f97
AM
1335 /* Handle old names of relocations in case they were used by
1336 .reloc directives.
1337 FIXME: Remove this soon. Mapping the reloc names is very likely
1338 completely unnecessary. */
1339 for (i = 0; i < ARRAY_SIZE (compat_map); i++)
1340 if (strcasecmp (compat_map[i][0], r_name) == 0)
1341 {
1342 _bfd_error_handler (_("warning: %s should be used rather than %s"),
1343 compat_map[i][1], compat_map[i][0]);
1344 return ppc64_elf_reloc_name_lookup (abfd, compat_map[i][1]);
1345 }
1346
157090f7
AM
1347 return NULL;
1348}
1349
5bd4f169
AM
1350/* Set the howto pointer for a PowerPC ELF reloc. */
1351
f3185997 1352static bfd_boolean
4aef7643 1353ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1354 Elf_Internal_Rela *dst)
5bd4f169 1355{
65f38f15
AM
1356 unsigned int type;
1357
ef60b7ff 1358 /* Initialize howto table if needed. */
5bd4f169 1359 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1360 ppc_howto_init ();
1361
65f38f15 1362 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1363 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1364 {
695344c0 1365 /* xgettext:c-format */
0aa13fee 1366 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1367 abfd, type);
f3185997
NC
1368 bfd_set_error (bfd_error_bad_value);
1369 return FALSE;
d0fb9a8d 1370 }
65f38f15 1371 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1372 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1373 {
1374 /* xgettext:c-format */
1375 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1376 abfd, type);
1377 bfd_set_error (bfd_error_bad_value);
1378 return FALSE;
1379 }
2cdcc330 1380
f3185997 1381 return TRUE;
5bd4f169
AM
1382}
1383
04c9666a 1384/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1385
1386static bfd_reloc_status_type
4ce794b7
AM
1387ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1388 void *data, asection *input_section,
1389 bfd *output_bfd, char **error_message)
5bd4f169 1390{
a680de9a
PB
1391 enum elf_ppc64_reloc_type r_type;
1392 long insn;
1393 bfd_size_type octets;
3de43e7b 1394 bfd_vma value;
a680de9a 1395
805fc799
AM
1396 /* If this is a relocatable link (output_bfd test tells us), just
1397 call the generic function. Any adjustment will be done at final
1398 link time. */
1399 if (output_bfd != NULL)
cedb70c5 1400 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1401 input_section, output_bfd, error_message);
1402
5663e321
AM
1403 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1404 We won't actually be using the low bits, so trashing them
805fc799 1405 doesn't matter. */
a680de9a 1406 r_type = reloc_entry->howto->type;
5663e321
AM
1407 if (r_type == R_PPC64_ADDR16_HIGHERA34
1408 || r_type == R_PPC64_ADDR16_HIGHESTA34
1409 || r_type == R_PPC64_REL16_HIGHERA34
1410 || r_type == R_PPC64_REL16_HIGHESTA34)
1411 reloc_entry->addend += 1ULL << 33;
1412 else
1413 reloc_entry->addend += 1U << 15;
a680de9a
PB
1414 if (r_type != R_PPC64_REL16DX_HA)
1415 return bfd_reloc_continue;
1416
1417 value = 0;
1418 if (!bfd_is_com_section (symbol->section))
1419 value = symbol->value;
1420 value += (reloc_entry->addend
1421 + symbol->section->output_offset
1422 + symbol->section->output_section->vma);
1423 value -= (reloc_entry->address
1424 + input_section->output_offset
1425 + input_section->output_section->vma);
3de43e7b 1426 value = (bfd_signed_vma) value >> 16;
a680de9a 1427
bb294208 1428 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1429 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1430 insn &= ~0x1fffc1;
3de43e7b 1431 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1432 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1433 if (value + 0x8000 > 0xffff)
a680de9a
PB
1434 return bfd_reloc_overflow;
1435 return bfd_reloc_ok;
805fc799 1436}
5bd4f169 1437
2441e016
AM
1438static bfd_reloc_status_type
1439ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1440 void *data, asection *input_section,
1441 bfd *output_bfd, char **error_message)
1442{
1443 if (output_bfd != NULL)
1444 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1445 input_section, output_bfd, error_message);
1446
699733f6
AM
1447 if (strcmp (symbol->section->name, ".opd") == 0
1448 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1449 {
1450 bfd_vma dest = opd_entry_value (symbol->section,
1451 symbol->value + reloc_entry->addend,
aef36ac1 1452 NULL, NULL, FALSE);
2441e016
AM
1453 if (dest != (bfd_vma) -1)
1454 reloc_entry->addend = dest - (symbol->value
1455 + symbol->section->output_section->vma
1456 + symbol->section->output_offset);
1457 }
810d4e75
AM
1458 else
1459 {
1460 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1461
1462 if (symbol->section->owner != abfd
9f284bf9 1463 && symbol->section->owner != NULL
810d4e75
AM
1464 && abiversion (symbol->section->owner) >= 2)
1465 {
1466 unsigned int i;
1467
1468 for (i = 0; i < symbol->section->owner->symcount; ++i)
1469 {
1470 asymbol *symdef = symbol->section->owner->outsymbols[i];
1471
1472 if (strcmp (symdef->name, symbol->name) == 0)
1473 {
1474 elfsym = (elf_symbol_type *) symdef;
1475 break;
1476 }
1477 }
1478 }
1479 reloc_entry->addend
1480 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1481 }
2441e016
AM
1482 return bfd_reloc_continue;
1483}
1484
805fc799 1485static bfd_reloc_status_type
4ce794b7
AM
1486ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1487 void *data, asection *input_section,
1488 bfd *output_bfd, char **error_message)
805fc799
AM
1489{
1490 long insn;
04c9666a 1491 enum elf_ppc64_reloc_type r_type;
805fc799 1492 bfd_size_type octets;
794e51c0
AM
1493 /* Assume 'at' branch hints. */
1494 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1495
1496 /* If this is a relocatable link (output_bfd test tells us), just
1497 call the generic function. Any adjustment will be done at final
1498 link time. */
5bd4f169 1499 if (output_bfd != NULL)
cedb70c5 1500 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1501 input_section, output_bfd, error_message);
1502
bb294208 1503 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1504 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1505 insn &= ~(0x01 << 21);
4ce794b7 1506 r_type = reloc_entry->howto->type;
805fc799
AM
1507 if (r_type == R_PPC64_ADDR14_BRTAKEN
1508 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1509 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1510
794e51c0 1511 if (is_isa_v2)
5bd4f169 1512 {
805fc799
AM
1513 /* Set 'a' bit. This is 0b00010 in BO field for branch
1514 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1515 for branch on CTR insns (BO == 1a00t or 1a01t). */
1516 if ((insn & (0x14 << 21)) == (0x04 << 21))
1517 insn |= 0x02 << 21;
1518 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1519 insn |= 0x08 << 21;
1520 else
2441e016 1521 goto out;
5bd4f169 1522 }
805fc799
AM
1523 else
1524 {
1525 bfd_vma target = 0;
1526 bfd_vma from;
5bd4f169 1527
805fc799
AM
1528 if (!bfd_is_com_section (symbol->section))
1529 target = symbol->value;
1530 target += symbol->section->output_section->vma;
1531 target += symbol->section->output_offset;
1532 target += reloc_entry->addend;
5bd4f169 1533
805fc799
AM
1534 from = (reloc_entry->address
1535 + input_section->output_offset
1536 + input_section->output_section->vma);
5bd4f169 1537
805fc799
AM
1538 /* Invert 'y' bit if not the default. */
1539 if ((bfd_signed_vma) (target - from) < 0)
1540 insn ^= 0x01 << 21;
1541 }
4ce794b7 1542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1543 out:
1544 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1545 input_section, output_bfd, error_message);
805fc799 1546}
5bd4f169 1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1558 input_section, output_bfd, error_message);
5bd4f169 1559
805fc799
AM
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1562 return bfd_reloc_continue;
1563}
1564
805fc799 1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 /* If this is a relocatable link (output_bfd test tells us), just
1571 call the generic function. Any adjustment will be done at final
1572 link time. */
1573 if (output_bfd != NULL)
cedb70c5 1574 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1575 input_section, output_bfd, error_message);
1576
1577 /* Subtract the symbol section base address. */
1578 reloc_entry->addend -= symbol->section->output_section->vma;
1579
1580 /* Adjust the addend for sign extension of the low 16 bits. */
1581 reloc_entry->addend += 0x8000;
1582 return bfd_reloc_continue;
1583}
1584
1585static bfd_reloc_status_type
4ce794b7
AM
1586ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1587 void *data, asection *input_section,
1588 bfd *output_bfd, char **error_message)
805fc799
AM
1589{
1590 bfd_vma TOCstart;
1591
1592 /* If this is a relocatable link (output_bfd test tells us), just
1593 call the generic function. Any adjustment will be done at final
1594 link time. */
1595 if (output_bfd != NULL)
cedb70c5 1596 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1597 input_section, output_bfd, error_message);
1598
1599 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1600 if (TOCstart == 0)
1c865ab2 1601 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1602
1603 /* Subtract the TOC base address. */
1604 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1605 return bfd_reloc_continue;
1606}
1607
1608static bfd_reloc_status_type
4ce794b7
AM
1609ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1610 void *data, asection *input_section,
1611 bfd *output_bfd, char **error_message)
805fc799
AM
1612{
1613 bfd_vma TOCstart;
1614
1615 /* If this is a relocatable link (output_bfd test tells us), just
1616 call the generic function. Any adjustment will be done at final
1617 link time. */
1618 if (output_bfd != NULL)
cedb70c5 1619 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1620 input_section, output_bfd, error_message);
1621
1622 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1623 if (TOCstart == 0)
1c865ab2 1624 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1625
1626 /* Subtract the TOC base address. */
1627 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1628
1629 /* Adjust the addend for sign extension of the low 16 bits. */
1630 reloc_entry->addend += 0x8000;
1631 return bfd_reloc_continue;
1632}
1633
1634static bfd_reloc_status_type
4ce794b7
AM
1635ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1636 void *data, asection *input_section,
1637 bfd *output_bfd, char **error_message)
805fc799
AM
1638{
1639 bfd_vma TOCstart;
1640 bfd_size_type octets;
1641
1642 /* If this is a relocatable link (output_bfd test tells us), just
1643 call the generic function. Any adjustment will be done at final
1644 link time. */
1645 if (output_bfd != NULL)
cedb70c5 1646 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1647 input_section, output_bfd, error_message);
1648
1649 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1650 if (TOCstart == 0)
1c865ab2 1651 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1652
bb294208 1653 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1654 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1655 return bfd_reloc_ok;
1656}
1657
5663e321
AM
1658static bfd_reloc_status_type
1659ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1660 void *data, asection *input_section,
1661 bfd *output_bfd, char **error_message)
1662{
1663 uint64_t insn;
1664 bfd_vma targ;
1665
1666 if (output_bfd != NULL)
1667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1668 input_section, output_bfd, error_message);
1669
1670 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1671 insn <<= 32;
1672 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1673
1674 targ = (symbol->section->output_section->vma
1675 + symbol->section->output_offset
1676 + reloc_entry->addend);
1677 if (!bfd_is_com_section (symbol->section))
1678 targ += symbol->value;
1679 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1680 targ += 1ULL << 33;
1681 if (reloc_entry->howto->pc_relative)
1682 {
1683 bfd_vma from = (reloc_entry->address
1684 + input_section->output_offset
1685 + input_section->output_section->vma);
1686 targ -=from;
1687 }
1688 targ >>= reloc_entry->howto->rightshift;
1689 insn &= ~reloc_entry->howto->dst_mask;
1690 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1691 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1692 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1693 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1694 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1695 >= 1ULL << reloc_entry->howto->bitsize))
1696 return bfd_reloc_overflow;
1697 return bfd_reloc_ok;
1698}
1699
805fc799 1700static bfd_reloc_status_type
4ce794b7
AM
1701ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1702 void *data, asection *input_section,
1703 bfd *output_bfd, char **error_message)
805fc799
AM
1704{
1705 /* If this is a relocatable link (output_bfd test tells us), just
1706 call the generic function. Any adjustment will be done at final
1707 link time. */
1708 if (output_bfd != NULL)
cedb70c5 1709 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1710 input_section, output_bfd, error_message);
1711
1712 if (error_message != NULL)
1713 {
1714 static char buf[60];
1715 sprintf (buf, "generic linker can't handle %s",
1716 reloc_entry->howto->name);
1717 *error_message = buf;
1718 }
1719 return bfd_reloc_dangerous;
1720}
1721
927be08e
AM
1722/* Track GOT entries needed for a given symbol. We might need more
1723 than one got entry per symbol. */
1724struct got_entry
1725{
1726 struct got_entry *next;
1727
1728 /* The symbol addend that we'll be placing in the GOT. */
1729 bfd_vma addend;
1730
1731 /* Unlike other ELF targets, we use separate GOT entries for the same
1732 symbol referenced from different input files. This is to support
1733 automatic multiple TOC/GOT sections, where the TOC base can vary
1734 from one input file to another. After partitioning into TOC groups
1735 we merge entries within the group.
1736
1737 Point to the BFD owning this GOT entry. */
1738 bfd *owner;
1739
1740 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1741 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1742 unsigned char tls_type;
927be08e
AM
1743
1744 /* Non-zero if got.ent points to real entry. */
f961d9dd 1745 unsigned char is_indirect;
927be08e
AM
1746
1747 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1748 union
2cdcc330
AM
1749 {
1750 bfd_signed_vma refcount;
1751 bfd_vma offset;
1752 struct got_entry *ent;
1753 } got;
927be08e
AM
1754};
1755
1756/* The same for PLT. */
1757struct plt_entry
1758{
1759 struct plt_entry *next;
1760
1761 bfd_vma addend;
1762
1763 union
2cdcc330
AM
1764 {
1765 bfd_signed_vma refcount;
1766 bfd_vma offset;
1767 } plt;
927be08e
AM
1768};
1769
e717da7e
AM
1770struct ppc64_elf_obj_tdata
1771{
1772 struct elf_obj_tdata elf;
1773
1774 /* Shortcuts to dynamic linker sections. */
1775 asection *got;
1776 asection *relgot;
1777
b3fac117
AM
1778 /* Used during garbage collection. We attach global symbols defined
1779 on removed .opd entries to this section so that the sym is removed. */
1780 asection *deleted_section;
81688140 1781
927be08e 1782 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1783 sections means we potentially need one of these for each input bfd. */
927be08e 1784 struct got_entry tlsld_got;
8860955f 1785
2cdcc330
AM
1786 union
1787 {
729eabd5
AM
1788 /* A copy of relocs before they are modified for --emit-relocs. */
1789 Elf_Internal_Rela *relocs;
1790
1791 /* Section contents. */
1792 bfd_byte *contents;
1793 } opd;
d77c8a4b
AM
1794
1795 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1796 the reloc to be in the range -32768 to 32767. */
98528052
AM
1797 unsigned int has_small_toc_reloc : 1;
1798
560c8763
AM
1799 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1800 instruction not one we handle. */
1801 unsigned int unexpected_toc_insn : 1;
066f4018 1802
903b777d
AM
1803 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1804 this file. */
1805 unsigned int has_optrel : 1;
e717da7e
AM
1806};
1807
1808#define ppc64_elf_tdata(bfd) \
1809 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1810
1811#define ppc64_tlsld_got(bfd) \
1812 (&ppc64_elf_tdata (bfd)->tlsld_got)
1813
0c8d6e5c
AM
1814#define is_ppc64_elf(bfd) \
1815 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1816 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1817
e717da7e
AM
1818/* Override the generic function because we store some extras. */
1819
1820static bfd_boolean
1821ppc64_elf_mkobject (bfd *abfd)
1822{
0ffa91dd 1823 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1824 PPC64_ELF_DATA);
e717da7e
AM
1825}
1826
feee612b 1827/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1828 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1829
b34976b6 1830static bfd_boolean
4ce794b7 1831ppc64_elf_object_p (bfd *abfd)
feee612b 1832{
14b57c7c
AM
1833 if (!abfd->arch_info->the_default)
1834 return TRUE;
1835
1836 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1837 {
1838 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1839
1840 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1841 {
1842 /* Relies on arch after 32 bit default being 64 bit default. */
1843 abfd->arch_info = abfd->arch_info->next;
1844 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1845 }
1846 }
14b57c7c 1847 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1848}
1849
d37c89e5
AM
1850/* Support for core dump NOTE sections. */
1851
1852static bfd_boolean
1853ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1854{
eea6121a 1855 size_t offset, size;
d37c89e5
AM
1856
1857 if (note->descsz != 504)
1858 return FALSE;
1859
1860 /* pr_cursig */
228e534f 1861 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1862
1863 /* pr_pid */
228e534f 1864 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1865
1866 /* pr_reg */
1867 offset = 112;
eea6121a 1868 size = 384;
d37c89e5
AM
1869
1870 /* Make a ".reg/999" section. */
1871 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1872 size, note->descpos + offset);
d37c89e5
AM
1873}
1874
1875static bfd_boolean
1876ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1877{
1878 if (note->descsz != 136)
1879 return FALSE;
1880
228e534f 1881 elf_tdata (abfd)->core->pid
bc989cdc 1882 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1883 elf_tdata (abfd)->core->program
d37c89e5 1884 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1885 elf_tdata (abfd)->core->command
d37c89e5
AM
1886 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1887
1888 return TRUE;
1889}
1890
183e98be
AM
1891static char *
1892ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1893 ...)
1894{
1895 switch (note_type)
1896 {
1897 default:
1898 return NULL;
1899
1900 case NT_PRPSINFO:
1901 {
9ef6d1e3 1902 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1903 va_list ap;
1904
1905 va_start (ap, note_type);
75cd47ed 1906 memset (data, 0, sizeof (data));
183e98be 1907 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1908#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1909 DIAGNOSTIC_PUSH;
be3e27bb 1910 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1911 -Wstringop-truncation:
1912 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1913 */
95da9854
L
1914 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1915#endif
183e98be 1916 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1917#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1918 DIAGNOSTIC_POP;
fe75810f 1919#endif
183e98be
AM
1920 va_end (ap);
1921 return elfcore_write_note (abfd, buf, bufsiz,
1922 "CORE", note_type, data, sizeof (data));
1923 }
1924
1925 case NT_PRSTATUS:
1926 {
1927 char data[504];
1928 va_list ap;
1929 long pid;
1930 int cursig;
1931 const void *greg;
1932
1933 va_start (ap, note_type);
1934 memset (data, 0, 112);
1935 pid = va_arg (ap, long);
1936 bfd_put_32 (abfd, pid, data + 32);
1937 cursig = va_arg (ap, int);
1938 bfd_put_16 (abfd, cursig, data + 12);
1939 greg = va_arg (ap, const void *);
1940 memcpy (data + 112, greg, 384);
1941 memset (data + 496, 0, 8);
1942 va_end (ap);
1943 return elfcore_write_note (abfd, buf, bufsiz,
1944 "CORE", note_type, data, sizeof (data));
1945 }
1946 }
1947}
1948
5d35169e
AM
1949/* Add extra PPC sections. */
1950
2cdcc330 1951static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1952{
07d6d2b8
AM
1953 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1954 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1955 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1956 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1957 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1958 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1959 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1960};
1961
7c8fe5c4
AM
1962enum _ppc64_sec_type {
1963 sec_normal = 0,
1964 sec_opd = 1,
1965 sec_toc = 2
1966};
1967
f0abc2a1
AM
1968struct _ppc64_elf_section_data
1969{
1970 struct bfd_elf_section_data elf;
411e1bfb 1971
f0abc2a1
AM
1972 union
1973 {
51aecdc5
AM
1974 /* An array with one entry for each opd function descriptor,
1975 and some spares since opd entries may be either 16 or 24 bytes. */
1976#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1977 struct _opd_sec_data
1978 {
1979 /* Points to the function code section for local opd entries. */
1980 asection **func_sec;
1981
1982 /* After editing .opd, adjust references to opd local syms. */
1983 long *adjust;
1984 } opd;
7c8fe5c4 1985
3a71aa26
AM
1986 /* An array for toc sections, indexed by offset/8. */
1987 struct _toc_sec_data
1988 {
1989 /* Specifies the relocation symbol index used at a given toc offset. */
1990 unsigned *symndx;
1991
1992 /* And the relocation addend. */
1993 bfd_vma *add;
1994 } toc;
7c8fe5c4
AM
1995 } u;
1996
1997 enum _ppc64_sec_type sec_type:2;
411e1bfb 1998
7c8fe5c4
AM
1999 /* Flag set when small branches are detected. Used to
2000 select suitable defaults for the stub group size. */
2001 unsigned int has_14bit_branch:1;
3e04d765
AM
2002
2003 /* Flag set when PLTCALL relocs are detected. */
2004 unsigned int has_pltcall:1;
066f4018 2005
903b777d
AM
2006 /* Flag set when section has PLT/GOT/TOC relocations that can be
2007 optimised. */
2008 unsigned int has_optrel:1;
f0abc2a1
AM
2009};
2010
2011#define ppc64_elf_section_data(sec) \
411e1bfb 2012 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2013
2014static bfd_boolean
4ce794b7 2015ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 2016{
f592407e
AM
2017 if (!sec->used_by_bfd)
2018 {
2019 struct _ppc64_elf_section_data *sdata;
986f0783 2020 size_t amt = sizeof (*sdata);
f0abc2a1 2021
f592407e
AM
2022 sdata = bfd_zalloc (abfd, amt);
2023 if (sdata == NULL)
2024 return FALSE;
2025 sec->used_by_bfd = sdata;
2026 }
f0abc2a1
AM
2027
2028 return _bfd_elf_new_section_hook (abfd, sec);
2029}
4025353c 2030
bf577467
AM
2031static bfd_boolean
2032ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2033{
2034 const char *name = hdr->bfd_section->name;
2035
2036 if (strncmp (name, ".sbss", 5) == 0
2037 || strncmp (name, ".sdata", 6) == 0)
2038 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2039
2040 return TRUE;
2041}
2042
74f0fb50 2043static struct _opd_sec_data *
4025353c
AM
2044get_opd_info (asection * sec)
2045{
2046 if (sec != NULL
2047 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2048 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2049 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2050 return NULL;
2051}
90e3cdf2
JJ
2052\f
2053/* Parameters for the qsort hook. */
90e3cdf2 2054static bfd_boolean synthetic_relocatable;
cd285db5 2055static asection *synthetic_opd;
90e3cdf2 2056
699733f6 2057/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2058
2059static int
2060compare_symbols (const void *ap, const void *bp)
2061{
2cdcc330
AM
2062 const asymbol *a = *(const asymbol **) ap;
2063 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2064
699733f6
AM
2065 /* Section symbols first. */
2066 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2067 return -1;
699733f6 2068 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2069 return 1;
2070
699733f6 2071 /* then .opd symbols. */
cd285db5
AM
2072 if (synthetic_opd != NULL)
2073 {
2074 if (strcmp (a->section->name, ".opd") == 0
2075 && strcmp (b->section->name, ".opd") != 0)
2076 return -1;
2077 if (strcmp (a->section->name, ".opd") != 0
2078 && strcmp (b->section->name, ".opd") == 0)
2079 return 1;
2080 }
90e3cdf2 2081
699733f6 2082 /* then other code symbols. */
2cdcc330
AM
2083 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2084 == (SEC_CODE | SEC_ALLOC))
2085 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2086 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2087 return -1;
2088
2cdcc330
AM
2089 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2090 != (SEC_CODE | SEC_ALLOC))
2091 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2092 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2093 return 1;
2094
2095 if (synthetic_relocatable)
2096 {
2097 if (a->section->id < b->section->id)
2098 return -1;
2099
2100 if (a->section->id > b->section->id)
2101 return 1;
2102 }
2103
2104 if (a->value + a->section->vma < b->value + b->section->vma)
2105 return -1;
2106
2107 if (a->value + a->section->vma > b->value + b->section->vma)
2108 return 1;
2109
4d35a0aa
AM
2110 /* For syms with the same value, prefer strong dynamic global function
2111 syms over other syms. */
2112 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2113 return -1;
2114
2115 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2116 return 1;
2117
2118 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2119 return -1;
2120
2121 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2122 return 1;
2123
2124 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2125 return -1;
2126
2127 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2128 return 1;
2129
2130 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2131 return -1;
2132
2133 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2134 return 1;
2135
dcea6a95
AM
2136 /* Finally, sort on where the symbol is in memory. The symbols will
2137 be in at most two malloc'd blocks, one for static syms, one for
2138 dynamic syms, and we distinguish the two blocks above by testing
2139 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2140 originally in the same order as the symbols (and we're not
2141 sorting the symbols themselves), this ensures a stable sort. */
2142 if (a < b)
2143 return -1;
2144 if (a > b)
2145 return 1;
2146 return 0;
90e3cdf2
JJ
2147}
2148
699733f6 2149/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2150
699733f6 2151static asymbol *
9ad9b810
AM
2152sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2153 bfd_vma value)
90e3cdf2 2154{
9ad9b810 2155 size_t mid;
90e3cdf2 2156
7292b3ac 2157 if (id == (unsigned) -1)
699733f6
AM
2158 {
2159 while (lo < hi)
2160 {
2161 mid = (lo + hi) >> 1;
2162 if (syms[mid]->value + syms[mid]->section->vma < value)
2163 lo = mid + 1;
2164 else if (syms[mid]->value + syms[mid]->section->vma > value)
2165 hi = mid;
2166 else
2167 return syms[mid];
2168 }
2169 }
2170 else
2171 {
2172 while (lo < hi)
2173 {
2174 mid = (lo + hi) >> 1;
2175 if (syms[mid]->section->id < id)
2176 lo = mid + 1;
2177 else if (syms[mid]->section->id > id)
2178 hi = mid;
2179 else if (syms[mid]->value < value)
2180 lo = mid + 1;
2181 else if (syms[mid]->value > value)
2182 hi = mid;
2183 else
2184 return syms[mid];
2185 }
2186 }
2187 return NULL;
90e3cdf2
JJ
2188}
2189
468392fb
AM
2190static bfd_boolean
2191section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2192{
2193 bfd_vma vma = *(bfd_vma *) ptr;
2194 return ((section->flags & SEC_ALLOC) != 0
2195 && section->vma <= vma
2196 && vma < section->vma + section->size);
2197}
2198
699733f6 2199/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2200 entry syms. Also generate @plt symbols for the glink branch table.
2201 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2202
2203static long
a7535cf3
AM
2204ppc64_elf_get_synthetic_symtab (bfd *abfd,
2205 long static_count, asymbol **static_syms,
2206 long dyn_count, asymbol **dyn_syms,
c9727e01 2207 asymbol **ret)
90e3cdf2
JJ
2208{
2209 asymbol *s;
0ccf57bd 2210 size_t i, j, count;
90e3cdf2 2211 char *names;
0ccf57bd 2212 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2213 asection *opd = NULL;
90e3cdf2 2214 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2215 asymbol **syms;
ee67d69a 2216 int abi = abiversion (abfd);
90e3cdf2
JJ
2217
2218 *ret = NULL;
2219
ee67d69a
AM
2220 if (abi < 2)
2221 {
2222 opd = bfd_get_section_by_name (abfd, ".opd");
2223 if (opd == NULL && abi == 1)
2224 return 0;
2225 }
90e3cdf2 2226
a5259595
AM
2227 syms = NULL;
2228 codesecsym = 0;
2229 codesecsymend = 0;
2230 secsymend = 0;
2231 opdsymend = 0;
2232 symcount = 0;
2233 if (opd != NULL)
c9727e01 2234 {
a5259595
AM
2235 symcount = static_count;
2236 if (!relocatable)
2237 symcount += dyn_count;
2238 if (symcount == 0)
2239 return 0;
c9727e01 2240
a5259595
AM
2241 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2242 if (syms == NULL)
2243 return -1;
90e3cdf2 2244
a5259595
AM
2245 if (!relocatable && static_count != 0 && dyn_count != 0)
2246 {
2247 /* Use both symbol tables. */
2248 memcpy (syms, static_syms, static_count * sizeof (*syms));
2249 memcpy (syms + static_count, dyn_syms,
2250 (dyn_count + 1) * sizeof (*syms));
2251 }
2252 else if (!relocatable && static_count == 0)
2253 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2254 else
2255 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2256
0ccf57bd
AM
2257 /* Trim uninteresting symbols. Interesting symbols are section,
2258 function, and notype symbols. */
2259 for (i = 0, j = 0; i < symcount; ++i)
2260 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2261 | BSF_RELC | BSF_SRELC)) == 0)
2262 syms[j++] = syms[i];
2263 symcount = j;
2264
a5259595
AM
2265 synthetic_relocatable = relocatable;
2266 synthetic_opd = opd;
2267 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2268
a5259595
AM
2269 if (!relocatable && symcount > 1)
2270 {
bfa5bd2a
PA
2271 /* Trim duplicate syms, since we may have merged the normal
2272 and dynamic symbols. Actually, we only care about syms
2273 that have different values, so trim any with the same
2274 value. Don't consider ifunc and ifunc resolver symbols
2275 duplicates however, because GDB wants to know whether a
2276 text symbol is an ifunc resolver. */
a5259595 2277 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2278 {
2279 const asymbol *s0 = syms[i - 1];
2280 const asymbol *s1 = syms[i];
2281
2282 if ((s0->value + s0->section->vma
2283 != s1->value + s1->section->vma)
2284 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2285 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2286 syms[j++] = syms[i];
2287 }
a5259595
AM
2288 symcount = j;
2289 }
699733f6 2290
a5259595
AM
2291 i = 0;
2292 /* Note that here and in compare_symbols we can't compare opd and
2293 sym->section directly. With separate debug info files, the
2294 symbols will be extracted from the debug file while abfd passed
2295 to this function is the real binary. */
0ccf57bd 2296 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2297 ++i;
2298 codesecsym = i;
2299
2300 for (; i < symcount; ++i)
2301 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2302 | SEC_THREAD_LOCAL))
2303 != (SEC_CODE | SEC_ALLOC))
2304 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2305 break;
2306 codesecsymend = i;
2307
2308 for (; i < symcount; ++i)
2309 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2310 break;
2311 secsymend = i;
2312
2313 for (; i < symcount; ++i)
2314 if (strcmp (syms[i]->section->name, ".opd") != 0)
2315 break;
2316 opdsymend = i;
2317
2318 for (; i < symcount; ++i)
2cdcc330
AM
2319 if (((syms[i]->section->flags
2320 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2321 != (SEC_CODE | SEC_ALLOC))
2322 break;
2323 symcount = i;
2324 }
c9727e01 2325 count = 0;
90e3cdf2 2326
699733f6 2327 if (relocatable)
90e3cdf2 2328 {
699733f6
AM
2329 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2330 arelent *r;
2331 size_t size;
0ccf57bd 2332 size_t relcount;
90e3cdf2 2333
468392fb
AM
2334 if (opdsymend == secsymend)
2335 goto done;
2336
699733f6 2337 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2338 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2339 if (relcount == 0)
c9727e01 2340 goto done;
90e3cdf2 2341
7356fed5
AM
2342 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2343 {
2344 count = -1;
2345 goto done;
2346 }
2347
699733f6 2348 size = 0;
595da8c5 2349 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2350 {
2351 asymbol *sym;
90e3cdf2 2352
595da8c5 2353 while (r < opd->relocation + relcount
699733f6
AM
2354 && r->address < syms[i]->value + opd->vma)
2355 ++r;
90e3cdf2 2356
595da8c5 2357 if (r == opd->relocation + relcount)
699733f6 2358 break;
90e3cdf2 2359
699733f6
AM
2360 if (r->address != syms[i]->value + opd->vma)
2361 continue;
90e3cdf2 2362
699733f6
AM
2363 if (r->howto->type != R_PPC64_ADDR64)
2364 continue;
90e3cdf2 2365
699733f6
AM
2366 sym = *r->sym_ptr_ptr;
2367 if (!sym_exists_at (syms, opdsymend, symcount,
2368 sym->section->id, sym->value + r->addend))
2369 {
2370 ++count;
2371 size += sizeof (asymbol);
2372 size += strlen (syms[i]->name) + 2;
2373 }
2374 }
90e3cdf2 2375
c4b0b099
AM
2376 if (size == 0)
2377 goto done;
699733f6
AM
2378 s = *ret = bfd_malloc (size);
2379 if (s == NULL)
2380 {
7356fed5 2381 count = -1;
c9727e01 2382 goto done;
699733f6 2383 }
90e3cdf2 2384
699733f6 2385 names = (char *) (s + count);
90e3cdf2 2386
595da8c5 2387 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2388 {
699733f6 2389 asymbol *sym;
90e3cdf2 2390
595da8c5 2391 while (r < opd->relocation + relcount
699733f6
AM
2392 && r->address < syms[i]->value + opd->vma)
2393 ++r;
90e3cdf2 2394
595da8c5 2395 if (r == opd->relocation + relcount)
699733f6
AM
2396 break;
2397
2398 if (r->address != syms[i]->value + opd->vma)
2399 continue;
2400
2401 if (r->howto->type != R_PPC64_ADDR64)
2402 continue;
90e3cdf2 2403
699733f6
AM
2404 sym = *r->sym_ptr_ptr;
2405 if (!sym_exists_at (syms, opdsymend, symcount,
2406 sym->section->id, sym->value + r->addend))
2407 {
2408 size_t len;
2409
2410 *s = *syms[i];
6ba2a415 2411 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2412 s->section = sym->section;
2413 s->value = sym->value + r->addend;
2414 s->name = names;
2415 *names++ = '.';
2416 len = strlen (syms[i]->name);
2417 memcpy (names, syms[i]->name, len + 1);
2418 names += len + 1;
6f610d07
UW
2419 /* Have udata.p point back to the original symbol this
2420 synthetic symbol was derived from. */
2421 s->udata.p = syms[i];
699733f6
AM
2422 s++;
2423 }
2424 }
2425 }
2426 else
90e3cdf2 2427 {
468392fb 2428 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2429 bfd_byte *contents = NULL;
699733f6 2430 size_t size;
0ccf57bd 2431 size_t plt_count = 0;
468392fb
AM
2432 bfd_vma glink_vma = 0, resolv_vma = 0;
2433 asection *dynamic, *glink = NULL, *relplt = NULL;
2434 arelent *p;
90e3cdf2 2435
ee67d69a 2436 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2437 {
c4b0b099
AM
2438 free_contents_and_exit_err:
2439 count = -1;
ee67d69a 2440 free_contents_and_exit:
c9594989 2441 free (contents);
c9727e01 2442 goto done;
699733f6 2443 }
90e3cdf2 2444
699733f6
AM
2445 size = 0;
2446 for (i = secsymend; i < opdsymend; ++i)
2447 {
2448 bfd_vma ent;
90e3cdf2 2449
5ef11c02
AM
2450 /* Ignore bogus symbols. */
2451 if (syms[i]->value > opd->size - 8)
2452 continue;
2453
699733f6
AM
2454 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2455 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2456 {
2457 ++count;
2458 size += sizeof (asymbol);
2459 size += strlen (syms[i]->name) + 2;
2460 }
2461 }
90e3cdf2 2462
468392fb 2463 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2464 if (dyn_count != 0
2465 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2466 {
2467 bfd_byte *dynbuf, *extdyn, *extdynend;
2468 size_t extdynsize;
2469 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2470
2471 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2472 goto free_contents_and_exit_err;
468392fb
AM
2473
2474 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2475 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2476
2477 extdyn = dynbuf;
2478 extdynend = extdyn + dynamic->size;
2479 for (; extdyn < extdynend; extdyn += extdynsize)
2480 {
2481 Elf_Internal_Dyn dyn;
2482 (*swap_dyn_in) (abfd, extdyn, &dyn);
2483
2484 if (dyn.d_tag == DT_NULL)
2485 break;
2486
2487 if (dyn.d_tag == DT_PPC64_GLINK)
2488 {
9e390558
AM
2489 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2490 See comment in ppc64_elf_finish_dynamic_sections. */
2491 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2492 /* The .glink section usually does not survive the final
2493 link; search for the section (usually .text) where the
2494 glink stubs now reside. */
2495 glink = bfd_sections_find_if (abfd, section_covers_vma,
2496 &glink_vma);
2497 break;
2498 }
2499 }
2500
2501 free (dynbuf);
2502 }
2503
2504 if (glink != NULL)
2505 {
2506 /* Determine __glink trampoline by reading the relative branch
2507 from the first glink stub. */
2508 bfd_byte buf[4];
b9e5796b
AM
2509 unsigned int off = 0;
2510
2511 while (bfd_get_section_contents (abfd, glink, buf,
2512 glink_vma + off - glink->vma, 4))
468392fb
AM
2513 {
2514 unsigned int insn = bfd_get_32 (abfd, buf);
2515 insn ^= B_DOT;
2516 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2517 {
2cdcc330
AM
2518 resolv_vma
2519 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2520 break;
2521 }
2522 off += 4;
2523 if (off > 4)
2524 break;
468392fb
AM
2525 }
2526
2527 if (resolv_vma)
2528 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2529
066ee829
AM
2530 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2531 if (relplt != NULL)
2532 {
2533 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2534 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2535 goto free_contents_and_exit_err;
68ffbac6 2536
066ee829
AM
2537 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2538 size += plt_count * sizeof (asymbol);
468392fb 2539
066ee829
AM
2540 p = relplt->relocation;
2541 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2542 {
2543 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2544 if (p->addend != 0)
2545 size += sizeof ("+0x") - 1 + 16;
2546 }
066ee829 2547 }
468392fb
AM
2548 }
2549
c4b0b099
AM
2550 if (size == 0)
2551 goto free_contents_and_exit;
699733f6
AM
2552 s = *ret = bfd_malloc (size);
2553 if (s == NULL)
c4b0b099 2554 goto free_contents_and_exit_err;
90e3cdf2 2555
468392fb 2556 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2557
699733f6 2558 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2559 {
699733f6 2560 bfd_vma ent;
90e3cdf2 2561
5ef11c02
AM
2562 if (syms[i]->value > opd->size - 8)
2563 continue;
2564
699733f6
AM
2565 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2566 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2567 {
0ccf57bd 2568 size_t lo, hi;
699733f6 2569 size_t len;
c9727e01 2570 asection *sec = abfd->sections;
90e3cdf2 2571
699733f6
AM
2572 *s = *syms[i];
2573 lo = codesecsym;
2574 hi = codesecsymend;
2575 while (lo < hi)
2576 {
0ccf57bd 2577 size_t mid = (lo + hi) >> 1;
699733f6
AM
2578 if (syms[mid]->section->vma < ent)
2579 lo = mid + 1;
2580 else if (syms[mid]->section->vma > ent)
2581 hi = mid;
2582 else
c9727e01
AM
2583 {
2584 sec = syms[mid]->section;
2585 break;
2586 }
699733f6
AM
2587 }
2588
c9727e01 2589 if (lo >= hi && lo > codesecsym)
699733f6 2590 sec = syms[lo - 1]->section;
699733f6
AM
2591
2592 for (; sec != NULL; sec = sec->next)
2593 {
2594 if (sec->vma > ent)
2595 break;
63524580
JK
2596 /* SEC_LOAD may not be set if SEC is from a separate debug
2597 info file. */
2598 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2599 break;
2600 if ((sec->flags & SEC_CODE) != 0)
2601 s->section = sec;
2602 }
6ba2a415 2603 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2604 s->value = ent - s->section->vma;
2605 s->name = names;
2606 *names++ = '.';
2607 len = strlen (syms[i]->name);
2608 memcpy (names, syms[i]->name, len + 1);
2609 names += len + 1;
6f610d07
UW
2610 /* Have udata.p point back to the original symbol this
2611 synthetic symbol was derived from. */
2612 s->udata.p = syms[i];
699733f6 2613 s++;
90e3cdf2 2614 }
90e3cdf2 2615 }
699733f6 2616 free (contents);
468392fb
AM
2617
2618 if (glink != NULL && relplt != NULL)
2619 {
2620 if (resolv_vma)
2621 {
2622 /* Add a symbol for the main glink trampoline. */
86a4952b 2623 memset (s, 0, sizeof *s);
468392fb 2624 s->the_bfd = abfd;
6ba2a415 2625 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2626 s->section = glink;
2627 s->value = resolv_vma - glink->vma;
2628 s->name = names;
2cdcc330
AM
2629 memcpy (names, "__glink_PLTresolve",
2630 sizeof ("__glink_PLTresolve"));
468392fb
AM
2631 names += sizeof ("__glink_PLTresolve");
2632 s++;
2633 count++;
2634 }
2635
2636 /* FIXME: It would be very much nicer to put sym@plt on the
2637 stub rather than on the glink branch table entry. The
2638 objdump disassembler would then use a sensible symbol
2639 name on plt calls. The difficulty in doing so is
2640 a) finding the stubs, and,
2641 b) matching stubs against plt entries, and,
2642 c) there can be multiple stubs for a given plt entry.
2643
2644 Solving (a) could be done by code scanning, but older
2645 ppc64 binaries used different stubs to current code.
2646 (b) is the tricky one since you need to known the toc
2647 pointer for at least one function that uses a pic stub to
2648 be able to calculate the plt address referenced.
2649 (c) means gdb would need to set multiple breakpoints (or
2650 find the glink branch itself) when setting breakpoints
2651 for pending shared library loads. */
2652 p = relplt->relocation;
2653 for (i = 0; i < plt_count; i++, p++)
2654 {
2655 size_t len;
2656
2657 *s = **p->sym_ptr_ptr;
2658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2659 we are defining a symbol, ensure one of them is set. */
2660 if ((s->flags & BSF_LOCAL) == 0)
2661 s->flags |= BSF_GLOBAL;
6ba2a415 2662 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2663 s->section = glink;
2664 s->value = glink_vma - glink->vma;
2665 s->name = names;
2666 s->udata.p = NULL;
2667 len = strlen ((*p->sym_ptr_ptr)->name);
2668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2669 names += len;
e054468f
AM
2670 if (p->addend != 0)
2671 {
2672 memcpy (names, "+0x", sizeof ("+0x") - 1);
2673 names += sizeof ("+0x") - 1;
2674 bfd_sprintf_vma (abfd, names, p->addend);
2675 names += strlen (names);
2676 }
468392fb
AM
2677 memcpy (names, "@plt", sizeof ("@plt"));
2678 names += sizeof ("@plt");
2679 s++;
b9e5796b
AM
2680 if (abi < 2)
2681 {
2682 glink_vma += 8;
2683 if (i >= 0x8000)
2684 glink_vma += 4;
2685 }
2686 else
468392fb
AM
2687 glink_vma += 4;
2688 }
2689 count += plt_count;
2690 }
90e3cdf2
JJ
2691 }
2692
c9727e01 2693 done:
a7535cf3 2694 free (syms);
90e3cdf2
JJ
2695 return count;
2696}
5bd4f169 2697\f
65f38f15
AM
2698/* The following functions are specific to the ELF linker, while
2699 functions above are used generally. Those named ppc64_elf_* are
2700 called by the main ELF linker code. They appear in this file more
2701 or less in the order in which they are called. eg.
2702 ppc64_elf_check_relocs is called early in the link process,
2703 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2704 called.
2705
2706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2707 functions have both a function code symbol and a function descriptor
2708 symbol. A call to foo in a relocatable object file looks like:
2709
2710 . .text
2711 . x:
2712 . bl .foo
2713 . nop
2714
2715 The function definition in another object file might be:
2716
2717 . .section .opd
2718 . foo: .quad .foo
2719 . .quad .TOC.@tocbase
2720 . .quad 0
2721 .
2722 . .text
2723 . .foo: blr
2724
2725 When the linker resolves the call during a static link, the branch
2726 unsurprisingly just goes to .foo and the .opd information is unused.
2727 If the function definition is in a shared library, things are a little
2728 different: The call goes via a plt call stub, the opd information gets
2729 copied to the plt, and the linker patches the nop.
2730
2731 . x:
2732 . bl .foo_stub
2733 . ld 2,40(1)
2734 .
2735 .
2736 . .foo_stub:
71a39c98
AM
2737 . std 2,40(1) # in practice, the call stub
2738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2739 . addi 11,11,Lfoo@toc@l # this is the general idea
2740 . ld 12,0(11)
2741 . ld 2,8(11)
2742 . mtctr 12
2743 . ld 11,16(11)
e86ce104
AM
2744 . bctr
2745 .
2746 . .section .plt
2747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2748
2749 The "reloc ()" notation is supposed to indicate that the linker emits
2750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2751 copying.
2752
2753 What are the difficulties here? Well, firstly, the relocations
2754 examined by the linker in check_relocs are against the function code
2755 sym .foo, while the dynamic relocation in the plt is emitted against
2756 the function descriptor symbol, foo. Somewhere along the line, we need
2757 to carefully copy dynamic link information from one symbol to the other.
2758 Secondly, the generic part of the elf linker will make .foo a dynamic
2759 symbol as is normal for most other backends. We need foo dynamic
2760 instead, at least for an application final link. However, when
2761 creating a shared library containing foo, we need to have both symbols
2762 dynamic so that references to .foo are satisfied during the early
2763 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2764 definition from some other object, eg. a static library.
2765
2766 Update: As of August 2004, we support a new convention. Function
2767 calls may use the function descriptor symbol, ie. "bl foo". This
2768 behaves exactly as "bl .foo". */
65f38f15 2769
7c8bbca5
AM
2770/* Of those relocs that might be copied as dynamic relocs, this
2771 function selects those that must be copied when linking a shared
2772 library or PIE, even when the symbol is local. */
65f38f15 2773
1d483afe
AM
2774static int
2775must_be_dyn_reloc (struct bfd_link_info *info,
2776 enum elf_ppc64_reloc_type r_type)
2777{
2778 switch (r_type)
2779 {
2780 default:
7c8bbca5
AM
2781 /* Only relative relocs can be resolved when the object load
2782 address isn't fixed. DTPREL64 is excluded because the
2783 dynamic linker needs to differentiate global dynamic from
2784 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2785 return 1;
2786
2787 case R_PPC64_REL32:
2788 case R_PPC64_REL64:
2789 case R_PPC64_REL30:
1bdd8fac
AM
2790 case R_PPC64_TOC16:
2791 case R_PPC64_TOC16_DS:
2792 case R_PPC64_TOC16_LO:
2793 case R_PPC64_TOC16_HI:
2794 case R_PPC64_TOC16_HA:
2795 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2796 return 0;
2797
2798 case R_PPC64_TPREL16:
2799 case R_PPC64_TPREL16_LO:
2800 case R_PPC64_TPREL16_HI:
2801 case R_PPC64_TPREL16_HA:
2802 case R_PPC64_TPREL16_DS:
2803 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2804 case R_PPC64_TPREL16_HIGH:
2805 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2806 case R_PPC64_TPREL16_HIGHER:
2807 case R_PPC64_TPREL16_HIGHERA:
2808 case R_PPC64_TPREL16_HIGHEST:
2809 case R_PPC64_TPREL16_HIGHESTA:
2810 case R_PPC64_TPREL64:
c213164a 2811 case R_PPC64_TPREL34:
7c8bbca5
AM
2812 /* These relocations are relative but in a shared library the
2813 linker doesn't know the thread pointer base. */
2814 return bfd_link_dll (info);
1d483afe
AM
2815 }
2816}
65f38f15 2817
f4656909 2818/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2819 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2820 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2821 shared lib. With code that gcc generates it is vital that this be
2822 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2823 actually the address of a function descriptor which resides in the
2824 .opd section. gcc uses the descriptor directly rather than going
2825 via the GOT as some other ABIs do, which means that initialized
2826 function pointers reference the descriptor. Thus, a function
2827 pointer initialized to the address of a function in a shared
2828 library will either require a .dynbss copy and a copy reloc, or a
2829 dynamic reloc. Using a .dynbss copy redefines the function
2830 descriptor symbol to point to the copy. This presents a problem as
2831 a PLT entry for that function is also initialized from the function
2832 descriptor symbol and the copy may not be initialized first. */
a23b6845 2833#define ELIMINATE_COPY_RELOCS 1
f4656909 2834
721956f4 2835/* Section name for stubs is the associated section name plus this
29942be8
NC
2836 string. */
2837#define STUB_SUFFIX ".stub"
721956f4
AM
2838
2839/* Linker stubs.
2840 ppc_stub_long_branch:
2841 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2842 destination, but a 24 bit branch in a stub section will reach.
2843 . b dest
2844
2845 ppc_stub_plt_branch:
2846 Similar to the above, but a 24 bit branch in the stub section won't
2847 reach its destination.
6df4c9c2
AM
2848 . addis %r12,%r2,xxx@toc@ha
2849 . ld %r12,xxx@toc@l(%r12)
71a39c98 2850 . mtctr %r12
721956f4
AM
2851 . bctr
2852
2853 ppc_stub_plt_call:
2c66dc6c
AM
2854 Used to call a function in a shared library. If it so happens that
2855 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2856 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2857 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2858 . addis %r11,%r2,xxx@toc@ha
2859 . ld %r12,xxx+0@toc@l(%r11)
2860 . mtctr %r12
2861 . ld %r2,xxx+8@toc@l(%r11)
2862 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2863 . bctr
ad8e1ba5
AM
2864
2865 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2866 code to adjust the value and save r2 to support multiple toc sections.
2867 A ppc_stub_long_branch with an r2 offset looks like:
2868 . std %r2,40(%r1)
2869 . addis %r2,%r2,off@ha
2870 . addi %r2,%r2,off@l
2871 . b dest
2872
2873 A ppc_stub_plt_branch with an r2 offset looks like:
2874 . std %r2,40(%r1)
6df4c9c2
AM
2875 . addis %r12,%r2,xxx@toc@ha
2876 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2877 . addis %r2,%r2,off@ha
2878 . addi %r2,%r2,off@l
71a39c98 2879 . mtctr %r12
ad8e1ba5 2880 . bctr
ac2df442 2881
05d0e962
AM
2882 All of the above stubs are shown as their ELFv1 variants. ELFv2
2883 variants exist too, simpler for plt calls since a new toc pointer
2884 and static chain are not loaded by the stub. In addition, ELFv2
2885 has some more complex stubs to handle calls marked with NOTOC
2886 relocs from functions where r2 is not a valid toc pointer. These
2887 come in two flavours, the ones shown below, and _both variants that
2888 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2889 one call is from a function where r2 is used as the toc pointer but
2890 needs a toc adjusting stub for small-model multi-toc, and another
2891 call is from a function where r2 is not valid.
2892 ppc_stub_long_branch_notoc:
2893 . mflr %r12
2894 . bcl 20,31,1f
2895 . 1:
2896 . mflr %r11
2897 . mtlr %r12
2cdcc330
AM
2898 . addis %r12,%r11,dest-1b@ha
2899 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2900 . b dest
2901
2902 ppc_stub_plt_branch_notoc:
2903 . mflr %r12
2904 . bcl 20,31,1f
2905 . 1:
2906 . mflr %r11
2907 . mtlr %r12
2908 . lis %r12,xxx-1b@highest
f891966f 2909 . ori %r12,%r12,xxx-1b@higher
05d0e962 2910 . sldi %r12,%r12,32
f891966f 2911 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2912 . ori %r12,%r12,xxx-1b@l
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916
2917 ppc_stub_plt_call_notoc:
2918 . mflr %r12
2919 . bcl 20,31,1f
2920 . 1:
2921 . mflr %r11
2922 . mtlr %r12
2923 . lis %r12,xxx-1b@highest
f891966f 2924 . ori %r12,%r12,xxx-1b@higher
05d0e962 2925 . sldi %r12,%r12,32
f891966f 2926 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2927 . ori %r12,%r12,xxx-1b@l
2928 . ldx %r12,%r11,%r12
2929 . mtctr %r12
2930 . bctr
2931
7c1f4227 2932 There are also ELFv1 power10 variants of these stubs.
04bdff6a 2933 ppc_stub_long_branch_notoc:
d4b87b1e 2934 . pla %r12,dest@pcrel
04bdff6a
AM
2935 . b dest
2936 ppc_stub_plt_branch_notoc:
2937 . lis %r11,(dest-1f)@highesta34
2938 . ori %r11,%r11,(dest-1f)@highera34
2939 . sldi %r11,%r11,34
d4b87b1e 2940 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2941 . add %r12,%r11,%r12
2942 . mtctr %r12
2943 . bctr
2944 ppc_stub_plt_call_notoc:
2945 . lis %r11,(xxx-1f)@highesta34
2946 . ori %r11,%r11,(xxx-1f)@highera34
2947 . sldi %r11,%r11,34
d4b87b1e 2948 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2949 . ldx %r12,%r11,%r12
2950 . mtctr %r12
2951 . bctr
2952
05d0e962
AM
2953 In cases where the high instructions would add zero, they are
2954 omitted and following instructions modified in some cases.
7c1f4227 2955 For example, a power10 ppc_stub_plt_call_notoc might simplify down
04bdff6a
AM
2956 to
2957 . pld %r12,xxx@pcrel
2958 . mtctr %r12
2959 . bctr
05d0e962
AM
2960
2961 For a given stub group (a set of sections all using the same toc
2962 pointer value) there will be just one stub type used for any
2963 particular function symbol. For example, if printf is called from
2964 code with the tocsave optimization (ie. r2 saved in function
2965 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2966 and from other code without the tocsave optimization requiring a
2967 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2968 type will be created. Calls with the tocsave optimization will
2969 enter this stub after the instruction saving r2. A similar
2970 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2971 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2972 to call an external function like printf. If other calls to printf
2973 require a ppc_stub_plt_call linkage stub then a single
2974 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2975 call. If other calls to printf require a ppc_stub_plt_call_r2save
2976 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2977 be created and calls not requiring r2 to be saved will enter the
2978 stub after the r2 save instruction. There is an analogous
2979 hierarchy of long branch and plt branch stubs for local call
2980 linkage. */
721956f4 2981
2cdcc330
AM
2982enum ppc_stub_type
2983{
721956f4
AM
2984 ppc_stub_none,
2985 ppc_stub_long_branch,
ad8e1ba5 2986 ppc_stub_long_branch_r2off,
05d0e962
AM
2987 ppc_stub_long_branch_notoc,
2988 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2989 ppc_stub_plt_branch,
ad8e1ba5 2990 ppc_stub_plt_branch_r2off,
05d0e962
AM
2991 ppc_stub_plt_branch_notoc,
2992 ppc_stub_plt_branch_both,
794e51c0 2993 ppc_stub_plt_call,
7341d5e2 2994 ppc_stub_plt_call_r2save,
05d0e962
AM
2995 ppc_stub_plt_call_notoc,
2996 ppc_stub_plt_call_both,
a4b6fadd
AM
2997 ppc_stub_global_entry,
2998 ppc_stub_save_res
721956f4
AM
2999};
3000
6f20ed8a
AM
3001/* Information on stub grouping. */
3002struct map_stub
3003{
3004 /* The stub section. */
3005 asection *stub_sec;
3006 /* This is the section to which stubs in the group will be attached. */
3007 asection *link_sec;
a4b6fadd
AM
3008 /* Next group. */
3009 struct map_stub *next;
3010 /* Whether to emit a copy of register save/restore functions in this
3011 group. */
3012 int needs_save_res;
df136d64
AM
3013 /* Current offset within stubs after the insn restoring lr in a
3014 _notoc or _both stub using bcl for pc-relative addressing, or
3015 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3016 unsigned int lr_restore;
3017 /* Accumulated size of EH info emitted to describe return address
3018 if stubs modify lr. Does not include 17 byte FDE header. */
3019 unsigned int eh_size;
3020 /* Offset in glink_eh_frame to the start of EH info for this group. */
3021 unsigned int eh_base;
6f20ed8a
AM
3022};
3023
2cdcc330
AM
3024struct ppc_stub_hash_entry
3025{
721956f4
AM
3026 /* Base hash table entry structure. */
3027 struct bfd_hash_entry root;
3028
ad8e1ba5
AM
3029 enum ppc_stub_type stub_type;
3030
6f20ed8a
AM
3031 /* Group information. */
3032 struct map_stub *group;
721956f4
AM
3033
3034 /* Offset within stub_sec of the beginning of this stub. */
3035 bfd_vma stub_offset;
3036
3037 /* Given the symbol's value and its section we can determine its final
3038 value when building the stubs (so the stub knows where to jump. */
3039 bfd_vma target_value;
3040 asection *target_section;
3041
721956f4
AM
3042 /* The symbol table entry, if any, that this was derived from. */
3043 struct ppc_link_hash_entry *h;
e054468f 3044 struct plt_entry *plt_ent;
721956f4 3045
2d7ad24e
AM
3046 /* Symbol type. */
3047 unsigned char symtype;
3048
6911b7dc
AM
3049 /* Symbol st_other. */
3050 unsigned char other;
721956f4
AM
3051};
3052
2cdcc330
AM
3053struct ppc_branch_hash_entry
3054{
721956f4
AM
3055 /* Base hash table entry structure. */
3056 struct bfd_hash_entry root;
3057
c456f082 3058 /* Offset within branch lookup table. */
721956f4
AM
3059 unsigned int offset;
3060
3061 /* Generation marker. */
3062 unsigned int iter;
3063};
65f38f15 3064
19e08130
AM
3065/* Used to track dynamic relocations for local symbols. */
3066struct ppc_dyn_relocs
3067{
3068 struct ppc_dyn_relocs *next;
3069
3070 /* The input section of the reloc. */
3071 asection *sec;
3072
3073 /* Total number of relocs copied for the input section. */
3074 unsigned int count : 31;
3075
3076 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3077 unsigned int ifunc : 1;
3078};
3079
65f38f15
AM
3080struct ppc_link_hash_entry
3081{
3082 struct elf_link_hash_entry elf;
3083
2cdcc330
AM
3084 union
3085 {
b3fac117
AM
3086 /* A pointer to the most recently used stub hash entry against this
3087 symbol. */
3088 struct ppc_stub_hash_entry *stub_cache;
3089
3090 /* A pointer to the next symbol starting with a '.' */
3091 struct ppc_link_hash_entry *next_dot_sym;
3092 } u;
721956f4 3093
721956f4 3094 /* Link between function code and descriptor symbols. */
34814b9f 3095 struct ppc_link_hash_entry *oh;
721956f4 3096
e86ce104
AM
3097 /* Flag function code and descriptor symbols. */
3098 unsigned int is_func:1;
3099 unsigned int is_func_descriptor:1;
908b32fc 3100 unsigned int fake:1;
411e1bfb 3101
c5614fa4
AM
3102 /* Whether global opd/toc sym has been adjusted or not.
3103 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3104 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3105 unsigned int adjust_done:1;
3106
a4b6fadd
AM
3107 /* Set if this is an out-of-line register save/restore function,
3108 with non-standard calling convention. */
3109 unsigned int save_res:1;
3110
8b5f1ed8
AM
3111 /* Set if a duplicate symbol with non-zero localentry is detected,
3112 even when the duplicate symbol does not provide a definition. */
3113 unsigned int non_zero_localentry:1;
3114
411e1bfb 3115 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3116 Bits are or'd into the mask as the corresponding relocs are
3117 encountered during check_relocs, with TLS_TLS being set when any
3118 of the other TLS bits are set. tls_optimize clears bits when
3119 optimizing to indicate the corresponding GOT entry type is not
3120 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3121 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3122 These flags are also kept for local symbols. */
3123#define TLS_TLS 1 /* Any TLS reloc. */
3124#define TLS_GD 2 /* GD reloc. */
3125#define TLS_LD 4 /* LD reloc. */
3126#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3127#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3128#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3129#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3130#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3131 unsigned char tls_mask;
37da22e5
AM
3132
3133 /* The above field is also used to mark function symbols. In which
3134 case TLS_TLS will be 0. */
3135#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3136#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3137#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3138};
3139
ed7007c1
AM
3140static inline struct ppc_link_hash_entry *
3141ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3142{
3143 return (struct ppc_link_hash_entry *) ent;
3144}
3145
65f38f15
AM
3146/* ppc64 ELF linker hash table. */
3147
3148struct ppc_link_hash_table
3149{
3150 struct elf_link_hash_table elf;
3151
721956f4
AM
3152 /* The stub hash table. */
3153 struct bfd_hash_table stub_hash_table;
3154
3155 /* Another hash table for plt_branch stubs. */
3156 struct bfd_hash_table branch_hash_table;
3157
3b421ab3
AM
3158 /* Hash table for function prologue tocsave. */
3159 htab_t tocsave_htab;
3160
e7d1c40c
AM
3161 /* Various options and other info passed from the linker. */
3162 struct ppc64_elf_params *params;
721956f4 3163
6f20ed8a
AM
3164 /* The size of sec_info below. */
3165 unsigned int sec_info_arr_size;
3166
3167 /* Per-section array of extra section info. Done this way rather
3168 than as part of ppc64_elf_section_data so we have the info for
3169 non-ppc64 sections. */
3170 struct
3171 {
3172 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3173 bfd_vma toc_off;
6f20ed8a
AM
3174
3175 union
3176 {
3177 /* The section group that this section belongs to. */
3178 struct map_stub *group;
3179 /* A temp section list pointer. */
3180 asection *list;
3181 } u;
3182 } *sec_info;
721956f4 3183
a4b6fadd
AM
3184 /* Linked list of groups. */
3185 struct map_stub *group;
3186
ad8e1ba5
AM
3187 /* Temp used when calculating TOC pointers. */
3188 bfd_vma toc_curr;
bf102f86
AM
3189 bfd *toc_bfd;
3190 asection *toc_first_sec;
ad8e1ba5 3191
b3fac117
AM
3192 /* Used when adding symbols. */
3193 struct ppc_link_hash_entry *dot_syms;
3194
33e44f2e 3195 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3196 asection *glink;
9e390558 3197 asection *global_entry;
82bd7b59 3198 asection *sfpr;
2d7ad24e
AM
3199 asection *pltlocal;
3200 asection *relpltlocal;
4ce794b7
AM
3201 asection *brlt;
3202 asection *relbrlt;
58d180e8 3203 asection *glink_eh_frame;
ec338859 3204
8387904d
AM
3205 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3206 struct ppc_link_hash_entry *tls_get_addr;
3207 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3208 struct ppc_link_hash_entry *tga_desc;
3209 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3210 struct map_stub *tga_group;
411e1bfb 3211
927be08e
AM
3212 /* The size of reliplt used by got entry relocs. */
3213 bfd_size_type got_reli_size;
3214
9b5ecbd0 3215 /* Statistics. */
7341d5e2 3216 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3217
ee75fd95
AM
3218 /* Number of stubs against global syms. */
3219 unsigned long stub_globals;
3220
ee67d69a
AM
3221 /* Set if we're linking code with function descriptors. */
3222 unsigned int opd_abi:1;
3223
4c52953f 3224 /* Support for multiple toc sections. */
33c0ec9d 3225 unsigned int do_multi_toc:1;
4c52953f 3226 unsigned int multi_toc_needed:1;
927be08e 3227 unsigned int second_toc_pass:1;
67f0cbdb 3228 unsigned int do_toc_opt:1;
4c52953f 3229
9a23f96e
AM
3230 /* Set if tls optimization is enabled. */
3231 unsigned int do_tls_opt:1;
3232
3e04d765
AM
3233 /* Set if inline plt calls should be converted to direct calls. */
3234 unsigned int can_convert_all_inline_plt:1;
3235
5d1634d7 3236 /* Set on error. */
99877b66 3237 unsigned int stub_error:1;
721956f4 3238
8c5b4e52
AM
3239 /* Whether func_desc_adjust needs to be run over symbols. */
3240 unsigned int need_func_desc_adj:1;
721956f4 3241
f378ab09
AM
3242 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3243 unsigned int has_plt_localentry0:1;
3244
5663e321
AM
3245 /* Whether calls are made via the PLT from NOTOC functions. */
3246 unsigned int notoc_plt:1;
3247
e10a07b3
AM
3248 /* Whether any code linked seems to be Power10. */
3249 unsigned int has_power10_relocs:1;
3250
721956f4
AM
3251 /* Incremented every time we size stubs. */
3252 unsigned int stub_iteration;
65f38f15
AM
3253};
3254
4c52953f
AM
3255/* Rename some of the generic section flags to better document how they
3256 are used here. */
b0dddeec
AM
3257
3258/* Nonzero if this section has TLS related relocations. */
3259#define has_tls_reloc sec_flg0
3260
9737e8af
AM
3261/* Nonzero if this section has a call to __tls_get_addr lacking marker
3262 relocations. */
3263#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3264
3265/* Nonzero if this section has any toc or got relocs. */
3266#define has_toc_reloc sec_flg2
3267
3268/* Nonzero if this section has a call to another section that uses
3269 the toc or got. */
d77c8a4b 3270#define makes_toc_func_call sec_flg3
b0dddeec
AM
3271
3272/* Recursion protection when determining above flag. */
d77c8a4b 3273#define call_check_in_progress sec_flg4
70cc837d 3274#define call_check_done sec_flg5
4c52953f 3275
65f38f15
AM
3276/* Get the ppc64 ELF linker hash table from a link_info structure. */
3277
3278#define ppc_hash_table(p) \
4dfe6ac6
NC
3279 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3280 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3281
721956f4
AM
3282#define ppc_stub_hash_lookup(table, string, create, copy) \
3283 ((struct ppc_stub_hash_entry *) \
3284 bfd_hash_lookup ((table), (string), (create), (copy)))
3285
3286#define ppc_branch_hash_lookup(table, string, create, copy) \
3287 ((struct ppc_branch_hash_entry *) \
3288 bfd_hash_lookup ((table), (string), (create), (copy)))
3289
3290/* Create an entry in the stub hash table. */
3291
3292static struct bfd_hash_entry *
4ce794b7
AM
3293stub_hash_newfunc (struct bfd_hash_entry *entry,
3294 struct bfd_hash_table *table,
3295 const char *string)
721956f4
AM
3296{
3297 /* Allocate the structure if it has not already been allocated by a
3298 subclass. */
3299 if (entry == NULL)
3300 {
3301 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3302 if (entry == NULL)
3303 return entry;
3304 }
3305
3306 /* Call the allocation method of the superclass. */
3307 entry = bfd_hash_newfunc (entry, table, string);
3308 if (entry != NULL)
3309 {
3310 struct ppc_stub_hash_entry *eh;
3311
3312 /* Initialize the local fields. */
3313 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3314 eh->stub_type = ppc_stub_none;
6f20ed8a 3315 eh->group = NULL;
721956f4
AM
3316 eh->stub_offset = 0;
3317 eh->target_value = 0;
3318 eh->target_section = NULL;
721956f4 3319 eh->h = NULL;
6911b7dc 3320 eh->plt_ent = NULL;
6911b7dc 3321 eh->other = 0;
721956f4
AM
3322 }
3323
3324 return entry;
3325}
3326
3327/* Create an entry in the branch hash table. */
3328
3329static struct bfd_hash_entry *
4ce794b7
AM
3330branch_hash_newfunc (struct bfd_hash_entry *entry,
3331 struct bfd_hash_table *table,
3332 const char *string)
721956f4
AM
3333{
3334 /* Allocate the structure if it has not already been allocated by a
3335 subclass. */
3336 if (entry == NULL)
3337 {
3338 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3339 if (entry == NULL)
3340 return entry;
3341 }
3342
3343 /* Call the allocation method of the superclass. */
3344 entry = bfd_hash_newfunc (entry, table, string);
3345 if (entry != NULL)
3346 {
3347 struct ppc_branch_hash_entry *eh;
3348
3349 /* Initialize the local fields. */
3350 eh = (struct ppc_branch_hash_entry *) entry;
3351 eh->offset = 0;
3352 eh->iter = 0;
3353 }
3354
3355 return entry;
3356}
3357
65f38f15
AM
3358/* Create an entry in a ppc64 ELF linker hash table. */
3359
3360static struct bfd_hash_entry *
4ce794b7
AM
3361link_hash_newfunc (struct bfd_hash_entry *entry,
3362 struct bfd_hash_table *table,
3363 const char *string)
65f38f15
AM
3364{
3365 /* Allocate the structure if it has not already been allocated by a
3366 subclass. */
3367 if (entry == NULL)
3368 {
3369 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3370 if (entry == NULL)
3371 return entry;
3372 }
3373
3374 /* Call the allocation method of the superclass. */
3375 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3376 if (entry != NULL)
3377 {
3378 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3379
b3fac117 3380 memset (&eh->u.stub_cache, 0,
908b32fc 3381 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3382 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3383
3384 /* When making function calls, old ABI code references function entry
3385 points (dot symbols), while new ABI code references the function
3386 descriptor symbol. We need to make any combination of reference and
3387 definition work together, without breaking archive linking.
3388
3389 For a defined function "foo" and an undefined call to "bar":
3390 An old object defines "foo" and ".foo", references ".bar" (possibly
3391 "bar" too).
3392 A new object defines "foo" and references "bar".
3393
3394 A new object thus has no problem with its undefined symbols being
3395 satisfied by definitions in an old object. On the other hand, the
3396 old object won't have ".bar" satisfied by a new object.
3397
3398 Keep a list of newly added dot-symbols. */
3399
3400 if (string[0] == '.')
3401 {
3402 struct ppc_link_hash_table *htab;
3403
3404 htab = (struct ppc_link_hash_table *) table;
3405 eh->u.next_dot_sym = htab->dot_syms;
3406 htab->dot_syms = eh;
3407 }
65f38f15
AM
3408 }
3409
3410 return entry;
3411}
3412
2cdcc330
AM
3413struct tocsave_entry
3414{
3b421ab3
AM
3415 asection *sec;
3416 bfd_vma offset;
3417};
3418
3419static hashval_t
3420tocsave_htab_hash (const void *p)
3421{
3422 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3423 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3424}
3425
3426static int
3427tocsave_htab_eq (const void *p1, const void *p2)
3428{
3429 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3430 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3431 return e1->sec == e2->sec && e1->offset == e2->offset;
3432}
3433
68faa637
AM
3434/* Destroy a ppc64 ELF linker hash table. */
3435
3436static void
d495ab0d 3437ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3438{
d495ab0d 3439 struct ppc_link_hash_table *htab;
68faa637 3440
d495ab0d 3441 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3442 if (htab->tocsave_htab)
3443 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3444 bfd_hash_table_free (&htab->branch_hash_table);
3445 bfd_hash_table_free (&htab->stub_hash_table);
3446 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3447}
3448
65f38f15
AM
3449/* Create a ppc64 ELF linker hash table. */
3450
3451static struct bfd_link_hash_table *
4ce794b7 3452ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3453{
3454 struct ppc_link_hash_table *htab;
986f0783 3455 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3456
4ce794b7 3457 htab = bfd_zmalloc (amt);
65f38f15
AM
3458 if (htab == NULL)
3459 return NULL;
3460
66eb6687 3461 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3462 sizeof (struct ppc_link_hash_entry),
3463 PPC64_ELF_DATA))
65f38f15 3464 {
e2d34d7d 3465 free (htab);
65f38f15
AM
3466 return NULL;
3467 }
3468
721956f4 3469 /* Init the stub hash table too. */
66eb6687
AM
3470 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3471 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3472 {
d495ab0d 3473 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3474 return NULL;
3475 }
721956f4
AM
3476
3477 /* And the branch hash table. */
66eb6687
AM
3478 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3479 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3480 {
3481 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3482 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3483 return NULL;
3484 }
721956f4 3485
3b421ab3
AM
3486 htab->tocsave_htab = htab_try_create (1024,
3487 tocsave_htab_hash,
3488 tocsave_htab_eq,
3489 NULL);
3490 if (htab->tocsave_htab == NULL)
2915c55b 3491 {
d495ab0d 3492 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3493 return NULL;
3494 }
d495ab0d 3495 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3496
3254fd24
AM
3497 /* Initializing two fields of the union is just cosmetic. We really
3498 only care about glist, but when compiled on a 32-bit host the
3499 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3500 debugger inspection of these fields look nicer. */
a6aa5195
AM
3501 htab->elf.init_got_refcount.refcount = 0;
3502 htab->elf.init_got_refcount.glist = NULL;
3503 htab->elf.init_plt_refcount.refcount = 0;
3504 htab->elf.init_plt_refcount.glist = NULL;
3505 htab->elf.init_got_offset.offset = 0;
3506 htab->elf.init_got_offset.glist = NULL;
3507 htab->elf.init_plt_offset.offset = 0;
3508 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3509
65f38f15
AM
3510 return &htab->elf.root;
3511}
3512
bfeb4a28
AM
3513/* Create sections for linker generated code. */
3514
3515static bfd_boolean
3516create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3517{
3518 struct ppc_link_hash_table *htab;
3519 flagword flags;
3520
3521 htab = ppc_hash_table (info);
3522
bfeb4a28
AM
3523 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3524 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3525 if (htab->params->save_restore_funcs)
3526 {
3527 /* Create .sfpr for code to save and restore fp regs. */
3528 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3529 flags);
3530 if (htab->sfpr == NULL
fd361982 3531 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3532 return FALSE;
3533 }
3534
3535 if (bfd_link_relocatable (info))
3536 return TRUE;
bfeb4a28
AM
3537
3538 /* Create .glink for lazy dynamic linking support. */
3539 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3540 flags);
3541 if (htab->glink == NULL
fd361982 3542 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3543 return FALSE;
3544
9e390558
AM
3545 /* The part of .glink used by global entry stubs, separate so that
3546 it can be aligned appropriately without affecting htab->glink. */
3547 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3548 flags);
3549 if (htab->global_entry == NULL
fd361982 3550 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3551 return FALSE;
3552
bfeb4a28
AM
3553 if (!info->no_ld_generated_unwind_info)
3554 {
3555 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3556 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3557 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3558 ".eh_frame",
3559 flags);
3560 if (htab->glink_eh_frame == NULL
fd361982 3561 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3562 return FALSE;
3563 }
3564
3565 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3566 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3567 if (htab->elf.iplt == NULL
fd361982 3568 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3569 return FALSE;
3570
3571 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3572 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3573 htab->elf.irelplt
3574 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3575 if (htab->elf.irelplt == NULL
fd361982 3576 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3577 return FALSE;
3578
3579 /* Create branch lookup table for plt_branch stubs. */
3580 flags = (SEC_ALLOC | SEC_LOAD
3581 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3582 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3583 flags);
3584 if (htab->brlt == NULL
fd361982 3585 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3586 return FALSE;
3587
2d7ad24e
AM
3588 /* Local plt entries, put in .branch_lt but a separate section for
3589 convenience. */
3590 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3591 flags);
3592 if (htab->pltlocal == NULL
fd361982 3593 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3594 return FALSE;
3595
0e1862bb 3596 if (!bfd_link_pic (info))
bfeb4a28
AM
3597 return TRUE;
3598
3599 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3600 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3601 htab->relbrlt
3602 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3603 if (htab->relbrlt == NULL
fd361982 3604 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3605 return FALSE;
3606
2d7ad24e
AM
3607 htab->relpltlocal
3608 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3609 if (htab->relpltlocal == NULL
fd361982 3610 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3611 return FALSE;
3612
bfeb4a28
AM
3613 return TRUE;
3614}
3615
e717da7e
AM
3616/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3617
bfeb4a28 3618bfd_boolean
e7d1c40c
AM
3619ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3620 struct ppc64_elf_params *params)
e717da7e
AM
3621{
3622 struct ppc_link_hash_table *htab;
3623
e7d1c40c 3624 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3625
3626/* Always hook our dynamic sections into the first bfd, which is the
3627 linker created stub bfd. This ensures that the GOT header is at
3628 the start of the output TOC section. */
3629 htab = ppc_hash_table (info);
e7d1c40c
AM
3630 htab->elf.dynobj = params->stub_bfd;
3631 htab->params = params;
bfeb4a28 3632
bfeb4a28 3633 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3634}
3635
721956f4
AM
3636/* Build a name for an entry in the stub hash table. */
3637
3638static char *
4ce794b7
AM
3639ppc_stub_name (const asection *input_section,
3640 const asection *sym_sec,
3641 const struct ppc_link_hash_entry *h,
3642 const Elf_Internal_Rela *rel)
721956f4
AM
3643{
3644 char *stub_name;
bcaa2f82 3645 ssize_t len;
721956f4
AM
3646
3647 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3648 offsets from a sym as a branch target? In fact, we could
3649 probably assume the addend is always zero. */
3650 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3651
3652 if (h)
3653 {
3654 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3655 stub_name = bfd_malloc (len);
46de2a7c
AM
3656 if (stub_name == NULL)
3657 return stub_name;
3658
bcaa2f82
AM
3659 len = sprintf (stub_name, "%08x.%s+%x",
3660 input_section->id & 0xffffffff,
3661 h->elf.root.root.string,
3662 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3663 }
3664 else
3665 {
ad8e1ba5 3666 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3667 stub_name = bfd_malloc (len);
46de2a7c
AM
3668 if (stub_name == NULL)
3669 return stub_name;
3670
bcaa2f82
AM
3671 len = sprintf (stub_name, "%08x.%x:%x+%x",
3672 input_section->id & 0xffffffff,
3673 sym_sec->id & 0xffffffff,
3674 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3675 (int) rel->r_addend & 0xffffffff);
721956f4 3676 }
bcaa2f82 3677 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3678 stub_name[len - 2] = 0;
721956f4
AM
3679 return stub_name;
3680}
3681
e10a07b3
AM
3682/* If mixing power10 with non-power10 code and --power10-stubs is not
3683 specified (or is auto) then calls using @notoc relocations that
3684 need a stub will utilize power10 instructions in the stub, and
3685 calls without @notoc relocations will not use power10 instructions.
3686 The two classes of stubs are stored in separate stub_hash_table
3687 entries having the same key string. The two entries will always be
3688 adjacent on entry->root.next chain, even if hash table resizing
3689 occurs. This function selects the correct entry to use. */
3690
3691static struct ppc_stub_hash_entry *
3692select_alt_stub (struct ppc_stub_hash_entry *entry, bfd_boolean notoc)
3693{
3694 bfd_boolean have_notoc;
3695
3696 have_notoc = (entry->stub_type == ppc_stub_plt_call_notoc
3697 || entry->stub_type == ppc_stub_plt_branch_notoc
3698 || entry->stub_type == ppc_stub_long_branch_notoc);
3699
3700 if (have_notoc != notoc)
3701 {
3702 const char *stub_name = entry->root.string;
3703
3704 entry = (struct ppc_stub_hash_entry *) entry->root.next;
3705 if (entry != NULL
3706 && entry->root.string != stub_name)
3707 entry = NULL;
3708 }
3709
3710 return entry;
3711}
3712
721956f4
AM
3713/* Look up an entry in the stub hash. Stub entries are cached because
3714 creating the stub name takes a bit of time. */
3715
3716static struct ppc_stub_hash_entry *
4ce794b7
AM
3717ppc_get_stub_entry (const asection *input_section,
3718 const asection *sym_sec,
039b3fef 3719 struct ppc_link_hash_entry *h,
4ce794b7
AM
3720 const Elf_Internal_Rela *rel,
3721 struct ppc_link_hash_table *htab)
721956f4
AM
3722{
3723 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3724 struct map_stub *group;
721956f4
AM
3725
3726 /* If this input section is part of a group of sections sharing one
3727 stub section, then use the id of the first section in the group.
3728 Stub names need to include a section id, as there may well be
3729 more than one stub used to reach say, printf, and we need to
3730 distinguish between them. */
6f20ed8a 3731 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3732 if (group == NULL)
3733 return NULL;
721956f4 3734
b3fac117
AM
3735 if (h != NULL && h->u.stub_cache != NULL
3736 && h->u.stub_cache->h == h
6f20ed8a 3737 && h->u.stub_cache->group == group)
721956f4 3738 {
b3fac117 3739 stub_entry = h->u.stub_cache;
721956f4
AM
3740 }
3741 else
3742 {
3743 char *stub_name;
3744
6f20ed8a 3745 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3746 if (stub_name == NULL)
3747 return NULL;
3748
3749 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3750 stub_name, FALSE, FALSE);
721956f4 3751 if (h != NULL)
b3fac117 3752 h->u.stub_cache = stub_entry;
721956f4
AM
3753
3754 free (stub_name);
3755 }
3756
e10a07b3
AM
3757 if (stub_entry != NULL && htab->params->power10_stubs == -1)
3758 {
3759 bfd_boolean notoc = ELF64_R_TYPE (rel->r_info) == R_PPC64_REL24_NOTOC;
3760
3761 stub_entry = select_alt_stub (stub_entry, notoc);
3762 }
3763
721956f4
AM
3764 return stub_entry;
3765}
3766
3767/* Add a new stub entry to the stub hash. Not all fields of the new
3768 stub entry are initialised. */
3769
3770static struct ppc_stub_hash_entry *
4ce794b7
AM
3771ppc_add_stub (const char *stub_name,
3772 asection *section,
25f53a85 3773 struct bfd_link_info *info)
721956f4 3774{
25f53a85 3775 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3776 struct map_stub *group;
721956f4
AM
3777 asection *link_sec;
3778 asection *stub_sec;
3779 struct ppc_stub_hash_entry *stub_entry;
3780
6f20ed8a
AM
3781 group = htab->sec_info[section->id].u.group;
3782 link_sec = group->link_sec;
3783 stub_sec = group->stub_sec;
721956f4
AM
3784 if (stub_sec == NULL)
3785 {
6f20ed8a
AM
3786 size_t namelen;
3787 bfd_size_type len;
3788 char *s_name;
721956f4 3789
6f20ed8a
AM
3790 namelen = strlen (link_sec->name);
3791 len = namelen + sizeof (STUB_SUFFIX);
3792 s_name = bfd_alloc (htab->params->stub_bfd, len);
3793 if (s_name == NULL)
3794 return NULL;
721956f4 3795
6f20ed8a
AM
3796 memcpy (s_name, link_sec->name, namelen);
3797 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3798 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3799 if (stub_sec == NULL)
3800 return NULL;
3801 group->stub_sec = stub_sec;
721956f4
AM
3802 }
3803
3804 /* Enter this entry into the linker stub hash table. */
3805 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3806 TRUE, FALSE);
721956f4
AM
3807 if (stub_entry == NULL)
3808 {
695344c0 3809 /* xgettext:c-format */
cf97bcb0
AM
3810 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3811 section->owner, stub_name);
721956f4
AM
3812 return NULL;
3813 }
3814
6f20ed8a 3815 stub_entry->group = group;
721956f4 3816 stub_entry->stub_offset = 0;
721956f4
AM
3817 return stub_entry;
3818}
3819
e717da7e
AM
3820/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3821 not already done. */
65f38f15 3822
b34976b6 3823static bfd_boolean
e717da7e 3824create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3825{
e717da7e
AM
3826 asection *got, *relgot;
3827 flagword flags;
3828 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3829
0c8d6e5c 3830 if (!is_ppc64_elf (abfd))
0ffa91dd 3831 return FALSE;
4dfe6ac6
NC
3832 if (htab == NULL)
3833 return FALSE;
0ffa91dd 3834
33e44f2e
AM
3835 if (!htab->elf.sgot
3836 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3837 return FALSE;
e717da7e
AM
3838
3839 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3840 | SEC_LINKER_CREATED);
3841
c456f082 3842 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3843 if (!got
fd361982 3844 || !bfd_set_section_alignment (got, 3))
e717da7e 3845 return FALSE;
65f38f15 3846
c456f082
AM
3847 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3848 flags | SEC_READONLY);
e717da7e 3849 if (!relgot
fd361982 3850 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3851 return FALSE;
e717da7e
AM
3852
3853 ppc64_elf_tdata (abfd)->got = got;
3854 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3855 return TRUE;
65f38f15 3856}
5bd4f169 3857
b31867b6
AM
3858/* Follow indirect and warning symbol links. */
3859
3860static inline struct bfd_link_hash_entry *
3861follow_link (struct bfd_link_hash_entry *h)
3862{
3863 while (h->type == bfd_link_hash_indirect
3864 || h->type == bfd_link_hash_warning)
3865 h = h->u.i.link;
3866 return h;
3867}
3868
3869static inline struct elf_link_hash_entry *
3870elf_follow_link (struct elf_link_hash_entry *h)
3871{
3872 return (struct elf_link_hash_entry *) follow_link (&h->root);
3873}
3874
3875static inline struct ppc_link_hash_entry *
3876ppc_follow_link (struct ppc_link_hash_entry *h)
3877{
ed7007c1 3878 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3879}
3880
40d16e0b
AM
3881/* Merge PLT info on FROM with that on TO. */
3882
3883static void
3884move_plt_plist (struct ppc_link_hash_entry *from,
3885 struct ppc_link_hash_entry *to)
3886{
3887 if (from->elf.plt.plist != NULL)
3888 {
3889 if (to->elf.plt.plist != NULL)
3890 {
3891 struct plt_entry **entp;
3892 struct plt_entry *ent;
3893
3894 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3895 {
3896 struct plt_entry *dent;
3897
3898 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3899 if (dent->addend == ent->addend)
3900 {
3901 dent->plt.refcount += ent->plt.refcount;
3902 *entp = ent->next;
3903 break;
3904 }
3905 if (dent == NULL)
3906 entp = &ent->next;
3907 }
3908 *entp = to->elf.plt.plist;
3909 }
3910
3911 to->elf.plt.plist = from->elf.plt.plist;
3912 from->elf.plt.plist = NULL;
3913 }
3914}
3915
65f38f15
AM
3916/* Copy the extra info we tack onto an elf_link_hash_entry. */
3917
3918static void
fcfa13d2
AM
3919ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3920 struct elf_link_hash_entry *dir,
3921 struct elf_link_hash_entry *ind)
65f38f15
AM
3922{
3923 struct ppc_link_hash_entry *edir, *eind;
3924
ed7007c1
AM
3925 edir = ppc_elf_hash_entry (dir);
3926 eind = ppc_elf_hash_entry (ind);
65f38f15 3927
c79d6685
AM
3928 edir->is_func |= eind->is_func;
3929 edir->is_func_descriptor |= eind->is_func_descriptor;
3930 edir->tls_mask |= eind->tls_mask;
3931 if (eind->oh != NULL)
3932 edir->oh = ppc_follow_link (eind->oh);
3933
474436e6 3934 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3935 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3936 edir->elf.ref_regular |= eind->elf.ref_regular;
3937 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3938 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3939 edir->elf.needs_plt |= eind->elf.needs_plt;
3940 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3941
d311bc8b
AM
3942 /* If we were called to copy over info for a weak sym, don't copy
3943 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3944 in order to simplify readonly_dynrelocs and save a field in the
3945 symbol hash entry, but that means dyn_relocs can't be used in any
3946 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3947 are then tested. */
d311bc8b 3948 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3949 return;
d311bc8b 3950
411e1bfb 3951 /* Copy over any dynamic relocs we may have on the indirect sym. */
190eb1dd 3952 if (ind->dyn_relocs != NULL)
65f38f15 3953 {
190eb1dd 3954 if (dir->dyn_relocs != NULL)
bbd7ec4a 3955 {
6061a67d
AM
3956 struct elf_dyn_relocs **pp;
3957 struct elf_dyn_relocs *p;
bbd7ec4a 3958
fcfa13d2 3959 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 3960 list. Merge any entries against the same section. */
190eb1dd 3961 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
bbd7ec4a 3962 {
6061a67d 3963 struct elf_dyn_relocs *q;
bbd7ec4a 3964
190eb1dd 3965 for (q = dir->dyn_relocs; q != NULL; q = q->next)
bbd7ec4a
AM
3966 if (q->sec == p->sec)
3967 {
3968 q->pc_count += p->pc_count;
3969 q->count += p->count;
3970 *pp = p->next;
3971 break;
3972 }
3973 if (q == NULL)
3974 pp = &p->next;
3975 }
190eb1dd 3976 *pp = dir->dyn_relocs;
bbd7ec4a
AM
3977 }
3978
190eb1dd
L
3979 dir->dyn_relocs = ind->dyn_relocs;
3980 ind->dyn_relocs = NULL;
65f38f15 3981 }
65f38f15 3982
81848ca0
AM
3983 /* Copy over got entries that we may have already seen to the
3984 symbol which just became indirect. */
411e1bfb
AM
3985 if (eind->elf.got.glist != NULL)
3986 {
3987 if (edir->elf.got.glist != NULL)
3988 {
3989 struct got_entry **entp;
3990 struct got_entry *ent;
3991
3992 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3993 {
3994 struct got_entry *dent;
3995
3996 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
3997 if (dent->addend == ent->addend
e717da7e 3998 && dent->owner == ent->owner
411e1bfb
AM
3999 && dent->tls_type == ent->tls_type)
4000 {
4001 dent->got.refcount += ent->got.refcount;
4002 *entp = ent->next;
4003 break;
4004 }
4005 if (dent == NULL)
4006 entp = &ent->next;
4007 }
4008 *entp = edir->elf.got.glist;
4009 }
4010
4011 edir->elf.got.glist = eind->elf.got.glist;
4012 eind->elf.got.glist = NULL;
4013 }
4014
4015 /* And plt entries. */
40d16e0b 4016 move_plt_plist (eind, edir);
411e1bfb 4017
fcfa13d2 4018 if (eind->elf.dynindx != -1)
411e1bfb 4019 {
fcfa13d2
AM
4020 if (edir->elf.dynindx != -1)
4021 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4022 edir->elf.dynstr_index);
411e1bfb
AM
4023 edir->elf.dynindx = eind->elf.dynindx;
4024 edir->elf.dynstr_index = eind->elf.dynstr_index;
4025 eind->elf.dynindx = -1;
4026 eind->elf.dynstr_index = 0;
4027 }
411e1bfb
AM
4028}
4029
8387904d
AM
4030/* Find the function descriptor hash entry from the given function code
4031 hash entry FH. Link the entries via their OH fields. */
4032
4033static struct ppc_link_hash_entry *
b31867b6 4034lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4035{
4036 struct ppc_link_hash_entry *fdh = fh->oh;
4037
4038 if (fdh == NULL)
4039 {
4040 const char *fd_name = fh->elf.root.root.string + 1;
4041
ed7007c1
AM
4042 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4043 FALSE, FALSE, FALSE));
b31867b6
AM
4044 if (fdh == NULL)
4045 return fdh;
4046
4047 fdh->is_func_descriptor = 1;
4048 fdh->oh = fh;
4049 fh->is_func = 1;
4050 fh->oh = fdh;
8387904d
AM
4051 }
4052
8c5b4e52
AM
4053 fdh = ppc_follow_link (fdh);
4054 fdh->is_func_descriptor = 1;
4055 fdh->oh = fh;
4056 return fdh;
8387904d
AM
4057}
4058
8c5b4e52 4059/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4060
4061static struct ppc_link_hash_entry *
4062make_fdh (struct bfd_link_info *info,
908b32fc 4063 struct ppc_link_hash_entry *fh)
bb700d78 4064{
8c5b4e52
AM
4065 bfd *abfd = fh->elf.root.u.undef.abfd;
4066 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4067 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4068 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4069 ? BSF_WEAK
4070 : BSF_GLOBAL);
4071
4072 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4073 fh->elf.root.root.string + 1,
4074 flags, bfd_und_section_ptr, 0,
4075 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4076 return NULL;
4077
4078 fdh = (struct ppc_link_hash_entry *) bh;
4079 fdh->elf.non_elf = 0;
908b32fc
AM
4080 fdh->fake = 1;
4081 fdh->is_func_descriptor = 1;
4082 fdh->oh = fh;
4083 fh->is_func = 1;
4084 fh->oh = fdh;
bb700d78
AM
4085 return fdh;
4086}
4087
8387904d
AM
4088/* Fix function descriptor symbols defined in .opd sections to be
4089 function type. */
555cd476
AM
4090
4091static bfd_boolean
c16153ae 4092ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4093 struct bfd_link_info *info,
555cd476 4094 Elf_Internal_Sym *isym,
6911b7dc 4095 const char **name,
555cd476
AM
4096 flagword *flags ATTRIBUTE_UNUSED,
4097 asection **sec,
b53dfeb2 4098 bfd_vma *value)
555cd476 4099{
b53dfeb2 4100 if (*sec != NULL
f1885d1e 4101 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4102 {
4103 asection *code_sec;
4104
4105 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4106 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4107 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4108
4109 /* If the symbol is a function defined in .opd, and the function
4110 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4111 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4112 && (*sec)->reloc_count != 0
4113 && opd_entry_value (*sec, *value, &code_sec, NULL,
4114 FALSE) != (bfd_vma) -1
4115 && discarded_section (code_sec))
4116 {
4117 *sec = bfd_und_section_ptr;
4118 isym->st_shndx = SHN_UNDEF;
4119 }
4120 }
dbd1e97e
AM
4121 else if (*sec != NULL
4122 && strcmp ((*sec)->name, ".toc") == 0
4123 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4124 {
4125 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4126 if (htab != NULL)
4127 htab->params->object_in_toc = 1;
4128 }
433817dd 4129
6911b7dc
AM
4130 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4131 {
4132 if (abiversion (ibfd) == 0)
4133 set_abiversion (ibfd, 2);
4134 else if (abiversion (ibfd) == 1)
4135 {
cf97bcb0
AM
4136 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4137 " for ABI version 1"), *name);
6911b7dc
AM
4138 bfd_set_error (bfd_error_bad_value);
4139 return FALSE;
4140 }
4141 }
4142
555cd476
AM
4143 return TRUE;
4144}
4145
6911b7dc
AM
4146/* Merge non-visibility st_other attributes: local entry point. */
4147
4148static void
4149ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4150 const Elf_Internal_Sym *isym,
4151 bfd_boolean definition,
4152 bfd_boolean dynamic)
4153{
f378ab09 4154 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4155 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4156 | ELF_ST_VISIBILITY (h->other));
4157}
4158
8c5b4e52
AM
4159/* Hook called on merging a symbol. We use this to clear "fake" since
4160 we now have a real symbol. */
4161
4162static bfd_boolean
4163ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4164 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4165 asection **psec ATTRIBUTE_UNUSED,
4166 bfd_boolean newdef ATTRIBUTE_UNUSED,
4167 bfd_boolean olddef ATTRIBUTE_UNUSED,
4168 bfd *oldbfd ATTRIBUTE_UNUSED,
4169 const asection *oldsec ATTRIBUTE_UNUSED)
4170{
ed7007c1 4171 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4172 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4173 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4174 return TRUE;
4175}
4176
8387904d 4177/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4178 inclusion of a new ABI object archive that defines "bar".
4179 NAME is a symbol defined in an archive. Return a symbol in the hash
4180 table that might be satisfied by the archive symbols. */
8387904d
AM
4181
4182static struct elf_link_hash_entry *
4183ppc64_elf_archive_symbol_lookup (bfd *abfd,
4184 struct bfd_link_info *info,
4185 const char *name)
4186{
4187 struct elf_link_hash_entry *h;
4188 char *dot_name;
4189 size_t len;
4190
4191 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4192 if (h != NULL
4193 /* Don't return this sym if it is a fake function descriptor
4194 created by add_symbol_adjust. */
ed7007c1 4195 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4196 return h;
4197
4198 if (name[0] == '.')
4199 return h;
4200
4201 len = strlen (name);
4202 dot_name = bfd_alloc (abfd, len + 2);
4203 if (dot_name == NULL)
e99955cd 4204 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4205 dot_name[0] = '.';
4206 memcpy (dot_name + 1, name, len + 1);
4207 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4208 bfd_release (abfd, dot_name);
a804e476
AM
4209 if (h != NULL)
4210 return h;
4211
4212 if (strcmp (name, "__tls_get_addr_opt") == 0)
4213 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4214 return h;
4215}
4216
4217/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4218 new ABI object defines "bar". Well, at least, undefined dot symbols
4219 are made weak. This stops later archive searches from including an
4220 object if we already have a function descriptor definition. It also
35b0ce59
AM
4221 prevents the linker complaining about undefined symbols.
4222 We also check and correct mismatched symbol visibility here. The
4223 most restrictive visibility of the function descriptor and the
4224 function entry symbol is used. */
8387904d
AM
4225
4226static bfd_boolean
b3fac117 4227add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4228{
8387904d
AM
4229 struct ppc_link_hash_table *htab;
4230 struct ppc_link_hash_entry *fdh;
4231
b3fac117
AM
4232 if (eh->elf.root.type == bfd_link_hash_warning)
4233 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4234
8400d40d
AM
4235 if (eh->elf.root.type == bfd_link_hash_indirect)
4236 return TRUE;
4237
b3fac117
AM
4238 if (eh->elf.root.root.string[0] != '.')
4239 abort ();
8387904d 4240
b3fac117 4241 htab = ppc_hash_table (info);
4dfe6ac6
NC
4242 if (htab == NULL)
4243 return FALSE;
4244
b31867b6 4245 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4246 if (fdh == NULL
4247 && !bfd_link_relocatable (info)
4248 && (eh->elf.root.type == bfd_link_hash_undefined
4249 || eh->elf.root.type == bfd_link_hash_undefweak)
4250 && eh->elf.ref_regular)
4251 {
4252 /* Make an undefined function descriptor sym, in order to
4253 pull in an --as-needed shared lib. Archives are handled
4254 elsewhere. */
4255 fdh = make_fdh (info, eh);
4256 if (fdh == NULL)
4257 return FALSE;
bb700d78 4258 }
8c5b4e52
AM
4259
4260 if (fdh != NULL)
8387904d 4261 {
35b0ce59
AM
4262 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4263 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4264
4265 /* Make both descriptor and entry symbol have the most
4266 constraining visibility of either symbol. */
35b0ce59
AM
4267 if (entry_vis < descr_vis)
4268 fdh->elf.other += entry_vis - descr_vis;
4269 else if (entry_vis > descr_vis)
4270 eh->elf.other += descr_vis - entry_vis;
4271
8c5b4e52
AM
4272 /* Propagate reference flags from entry symbol to function
4273 descriptor symbol. */
bc4e12de 4274 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4275 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4276 fdh->elf.ref_regular |= eh->elf.ref_regular;
4277 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4278
4279 if (!fdh->elf.forced_local
4280 && fdh->elf.dynindx == -1
4281 && fdh->elf.versioned != versioned_hidden
4282 && (bfd_link_dll (info)
4283 || fdh->elf.def_dynamic
4284 || fdh->elf.ref_dynamic)
4285 && (eh->elf.ref_regular
4286 || eh->elf.def_regular))
4287 {
2cdcc330 4288 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4289 return FALSE;
35b0ce59 4290 }
8387904d 4291 }
99877b66 4292
8387904d
AM
4293 return TRUE;
4294}
4295
f6c7c3e8
AM
4296/* Set up opd section info and abiversion for IBFD, and process list
4297 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4298
8387904d 4299static bfd_boolean
f6c7c3e8 4300ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4301{
99877b66 4302 struct ppc_link_hash_table *htab;
b3fac117 4303 struct ppc_link_hash_entry **p, *eh;
459609d6 4304 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4305
459609d6 4306 if (opd != NULL && opd->size != 0)
b3fac117 4307 {
b9399fcf
AM
4308 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4309 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4310
459609d6
AM
4311 if (abiversion (ibfd) == 0)
4312 set_abiversion (ibfd, 1);
8a2058b5 4313 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4314 {
695344c0 4315 /* xgettext:c-format */
cf97bcb0
AM
4316 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4317 ibfd, abiversion (ibfd));
459609d6
AM
4318 bfd_set_error (bfd_error_bad_value);
4319 return FALSE;
f6c7c3e8 4320 }
b9399fcf 4321 }
f6c7c3e8 4322
b9399fcf
AM
4323 if (is_ppc64_elf (info->output_bfd))
4324 {
4325 /* For input files without an explicit abiversion in e_flags
4326 we should have flagged any with symbol st_other bits set
4327 as ELFv1 and above flagged those with .opd as ELFv2.
4328 Set the output abiversion if not yet set, and for any input
4329 still ambiguous, take its abiversion from the output.
4330 Differences in ABI are reported later. */
4331 if (abiversion (info->output_bfd) == 0)
4332 set_abiversion (info->output_bfd, abiversion (ibfd));
4333 else if (abiversion (ibfd) == 0)
4334 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4335 }
4336
459609d6
AM
4337 htab = ppc_hash_table (info);
4338 if (htab == NULL)
b9399fcf 4339 return TRUE;
459609d6 4340
b9399fcf
AM
4341 if (opd != NULL && opd->size != 0
4342 && (ibfd->flags & DYNAMIC) == 0
4343 && (opd->flags & SEC_RELOC) != 0
4344 && opd->reloc_count != 0
4345 && !bfd_is_abs_section (opd->output_section)
4346 && info->gc_sections)
4347 {
4348 /* Garbage collection needs some extra help with .opd sections.
4349 We don't want to necessarily keep everything referenced by
4350 relocs in .opd, as that would keep all functions. Instead,
4351 if we reference an .opd symbol (a function descriptor), we
4352 want to keep the function code symbol's section. This is
4353 easy for global symbols, but for local syms we need to keep
4354 information about the associated function section. */
4355 bfd_size_type amt;
4356 asection **opd_sym_map;
4357 Elf_Internal_Shdr *symtab_hdr;
4358 Elf_Internal_Rela *relocs, *rel_end, *rel;
4359
4360 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4361 opd_sym_map = bfd_zalloc (ibfd, amt);
4362 if (opd_sym_map == NULL)
4363 return FALSE;
4364 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4365 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4366 info->keep_memory);
4367 if (relocs == NULL)
4368 return FALSE;
4369 symtab_hdr = &elf_symtab_hdr (ibfd);
4370 rel_end = relocs + opd->reloc_count - 1;
4371 for (rel = relocs; rel < rel_end; rel++)
4372 {
4373 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4374 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4375
4376 if (r_type == R_PPC64_ADDR64
4377 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4378 && r_symndx < symtab_hdr->sh_info)
4379 {
4380 Elf_Internal_Sym *isym;
4381 asection *s;
4382
f1dfbfdb
L
4383 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, ibfd,
4384 r_symndx);
b9399fcf
AM
4385 if (isym == NULL)
4386 {
4387 if (elf_section_data (opd)->relocs != relocs)
4388 free (relocs);
4389 return FALSE;
4390 }
4391
4392 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4393 if (s != NULL && s != opd)
4394 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4395 }
4396 }
4397 if (elf_section_data (opd)->relocs != relocs)
4398 free (relocs);
4399 }
459609d6
AM
4400
4401 p = &htab->dot_syms;
4402 while ((eh = *p) != NULL)
4403 {
4404 *p = NULL;
4405 if (&eh->elf == htab->elf.hgot)
4406 ;
4407 else if (htab->elf.hgot == NULL
4408 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4409 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4410 else if (abiversion (ibfd) <= 1)
4411 {
4412 htab->need_func_desc_adj = 1;
4413 if (!add_symbol_adjust (eh, info))
4414 return FALSE;
4415 }
459609d6
AM
4416 p = &eh->u.next_dot_sym;
4417 }
b3fac117 4418 return TRUE;
8387904d
AM
4419}
4420
97fed1c9
JJ
4421/* Undo hash table changes when an --as-needed input file is determined
4422 not to be needed. */
4423
4424static bfd_boolean
e5034e59
AM
4425ppc64_elf_notice_as_needed (bfd *ibfd,
4426 struct bfd_link_info *info,
4427 enum notice_asneeded_action act)
97fed1c9 4428{
e5034e59
AM
4429 if (act == notice_not_needed)
4430 {
4431 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4432
e5034e59
AM
4433 if (htab == NULL)
4434 return FALSE;
4dfe6ac6 4435
e5034e59
AM
4436 htab->dot_syms = NULL;
4437 }
4438 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4439}
4440
aa374f67
AM
4441/* If --just-symbols against a final linked binary, then assume we need
4442 toc adjusting stubs when calling functions defined there. */
4443
4444static void
4445ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4446{
4447 if ((sec->flags & SEC_CODE) != 0
4448 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4449 && is_ppc64_elf (sec->owner))
4450 {
2c3f079f
AM
4451 if (abiversion (sec->owner) >= 2
4452 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4453 sec->has_toc_reloc = 1;
4454 }
4455 _bfd_elf_link_just_syms (sec, info);
4456}
4457
e054468f 4458static struct plt_entry **
4ce794b7
AM
4459update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4460 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4461{
4462 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4463 struct plt_entry **local_plt;
f961d9dd 4464 unsigned char *local_got_tls_masks;
411e1bfb
AM
4465
4466 if (local_got_ents == NULL)
4467 {
4468 bfd_size_type size = symtab_hdr->sh_info;
4469
e054468f
AM
4470 size *= (sizeof (*local_got_ents)
4471 + sizeof (*local_plt)
4472 + sizeof (*local_got_tls_masks));
4ce794b7 4473 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4474 if (local_got_ents == NULL)
e054468f 4475 return NULL;
411e1bfb
AM
4476 elf_local_got_ents (abfd) = local_got_ents;
4477 }
4478
37da22e5 4479 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4480 {
4481 struct got_entry *ent;
4482
4483 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4484 if (ent->addend == r_addend
4485 && ent->owner == abfd
4486 && ent->tls_type == tls_type)
411e1bfb
AM
4487 break;
4488 if (ent == NULL)
4489 {
986f0783 4490 size_t amt = sizeof (*ent);
4ce794b7 4491 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4492 if (ent == NULL)
4493 return FALSE;
4494 ent->next = local_got_ents[r_symndx];
4495 ent->addend = r_addend;
e717da7e 4496 ent->owner = abfd;
411e1bfb 4497 ent->tls_type = tls_type;
927be08e 4498 ent->is_indirect = FALSE;
411e1bfb
AM
4499 ent->got.refcount = 0;
4500 local_got_ents[r_symndx] = ent;
4501 }
4502 ent->got.refcount += 1;
4503 }
4504
e054468f 4505 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4506 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4507 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4508
4509 return local_plt + r_symndx;
65f38f15
AM
4510}
4511
411e1bfb 4512static bfd_boolean
e054468f 4513update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4514{
411e1bfb 4515 struct plt_entry *ent;
1e2f5b6e 4516
e054468f 4517 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4518 if (ent->addend == addend)
4519 break;
4520 if (ent == NULL)
1e2f5b6e 4521 {
986f0783 4522 size_t amt = sizeof (*ent);
4ce794b7 4523 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4524 if (ent == NULL)
4525 return FALSE;
e054468f 4526 ent->next = *plist;
411e1bfb
AM
4527 ent->addend = addend;
4528 ent->plt.refcount = 0;
e054468f 4529 *plist = ent;
1e2f5b6e 4530 }
411e1bfb 4531 ent->plt.refcount += 1;
b34976b6 4532 return TRUE;
1e2f5b6e
AM
4533}
4534
e054468f
AM
4535static bfd_boolean
4536is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4537{
4538 return (r_type == R_PPC64_REL24
05d0e962 4539 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4540 || r_type == R_PPC64_REL14
4541 || r_type == R_PPC64_REL14_BRTAKEN
4542 || r_type == R_PPC64_REL14_BRNTAKEN
4543 || r_type == R_PPC64_ADDR24
4544 || r_type == R_PPC64_ADDR14
4545 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4546 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4547 || r_type == R_PPC64_PLTCALL
4548 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4549}
4550
4551/* Relocs on inline plt call sequence insns prior to the call. */
4552
4553static bfd_boolean
4554is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4555{
4556 return (r_type == R_PPC64_PLT16_HA
4557 || r_type == R_PPC64_PLT16_HI
4558 || r_type == R_PPC64_PLT16_LO
4559 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4560 || r_type == R_PPC64_PLT_PCREL34
4561 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4562 || r_type == R_PPC64_PLTSEQ
4563 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4564}
4565
5bd4f169 4566/* Look through the relocs for a section during the first phase, and
65f38f15 4567 calculate needed space in the global offset table, procedure
5d1634d7 4568 linkage table, and dynamic reloc sections. */
5bd4f169 4569
b34976b6 4570static bfd_boolean
4ce794b7
AM
4571ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4572 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4573{
65f38f15 4574 struct ppc_link_hash_table *htab;
5bd4f169 4575 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4576 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4577 const Elf_Internal_Rela *rel;
4578 const Elf_Internal_Rela *rel_end;
5bd4f169 4579 asection *sreloc;
3a71aa26 4580 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4581 bfd_boolean is_opd;
5bd4f169 4582
0e1862bb 4583 if (bfd_link_relocatable (info))
b34976b6 4584 return TRUE;
5bd4f169 4585
0c8d6e5c 4586 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4587
65f38f15 4588 htab = ppc_hash_table (info);
4dfe6ac6
NC
4589 if (htab == NULL)
4590 return FALSE;
4591
3a71aa26
AM
4592 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4593 FALSE, FALSE, TRUE);
4594 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4595 FALSE, FALSE, TRUE);
0ffa91dd 4596 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4597 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4598 sreloc = NULL;
b9399fcf 4599 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4600 rel_end = relocs + sec->reloc_count;
4601 for (rel = relocs; rel < rel_end; rel++)
4602 {
4603 unsigned long r_symndx;
4604 struct elf_link_hash_entry *h;
04c9666a 4605 enum elf_ppc64_reloc_type r_type;
727fc41e 4606 int tls_type;
7c8fe5c4 4607 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4608 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4609
4610 r_symndx = ELF64_R_SYM (rel->r_info);
4611 if (r_symndx < symtab_hdr->sh_info)
4612 h = NULL;
4613 else
973a3492
L
4614 {
4615 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4616 h = elf_follow_link (h);
1c865ab2
AM
4617
4618 if (h == htab->elf.hgot)
4619 sec->has_toc_reloc = 1;
973a3492 4620 }
5bd4f169 4621
5663e321
AM
4622 r_type = ELF64_R_TYPE (rel->r_info);
4623 switch (r_type)
4624 {
04bdff6a
AM
4625 case R_PPC64_D34:
4626 case R_PPC64_D34_LO:
4627 case R_PPC64_D34_HI30:
4628 case R_PPC64_D34_HA30:
4629 case R_PPC64_D28:
c213164a
AM
4630 case R_PPC64_TPREL34:
4631 case R_PPC64_DTPREL34:
04bdff6a 4632 case R_PPC64_PCREL34:
5663e321 4633 case R_PPC64_GOT_PCREL34:
87c69f97
AM
4634 case R_PPC64_GOT_TLSGD_PCREL34:
4635 case R_PPC64_GOT_TLSLD_PCREL34:
4636 case R_PPC64_GOT_TPREL_PCREL34:
4637 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
4638 case R_PPC64_PLT_PCREL34:
4639 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a 4640 case R_PPC64_PCREL28:
e10a07b3 4641 htab->has_power10_relocs = 1;
133a1f60
AM
4642 break;
4643 default:
5663e321
AM
4644 break;
4645 }
903b777d
AM
4646
4647 switch (r_type)
4648 {
4649 case R_PPC64_PLT16_HA:
4650 case R_PPC64_GOT_TLSLD16_HA:
4651 case R_PPC64_GOT_TLSGD16_HA:
4652 case R_PPC64_GOT_TPREL16_HA:
4653 case R_PPC64_GOT_DTPREL16_HA:
4654 case R_PPC64_GOT16_HA:
4655 case R_PPC64_TOC16_HA:
4656 case R_PPC64_PLT16_LO:
4657 case R_PPC64_PLT16_LO_DS:
4658 case R_PPC64_GOT_TLSLD16_LO:
4659 case R_PPC64_GOT_TLSGD16_LO:
4660 case R_PPC64_GOT_TPREL16_LO_DS:
4661 case R_PPC64_GOT_DTPREL16_LO_DS:
4662 case R_PPC64_GOT16_LO:
4663 case R_PPC64_GOT16_LO_DS:
4664 case R_PPC64_TOC16_LO:
4665 case R_PPC64_TOC16_LO_DS:
4666 case R_PPC64_GOT_PCREL34:
4667 ppc64_elf_tdata (abfd)->has_optrel = 1;
4668 ppc64_elf_section_data (sec)->has_optrel = 1;
4669 break;
4670 default:
4671 break;
4672 }
4673
f749f26e 4674 ifunc = NULL;
25f23106
AM
4675 if (h != NULL)
4676 {
4677 if (h->type == STT_GNU_IFUNC)
4678 {
4679 h->needs_plt = 1;
4680 ifunc = &h->plt.plist;
4681 }
4682 }
4683 else
4684 {
f1dfbfdb 4685 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
25f23106
AM
4686 abfd, r_symndx);
4687 if (isym == NULL)
4688 return FALSE;
4689
4690 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4691 {
4692 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4693 rel->r_addend,
37da22e5 4694 NON_GOT | PLT_IFUNC);
25f23106
AM
4695 if (ifunc == NULL)
4696 return FALSE;
4697 }
4698 }
727fc41e 4699
f749f26e 4700 tls_type = 0;
a33d1f77 4701 switch (r_type)
5bd4f169 4702 {
727fc41e
AM
4703 case R_PPC64_TLSGD:
4704 case R_PPC64_TLSLD:
4705 /* These special tls relocs tie a call to __tls_get_addr with
4706 its parameter symbol. */
37da22e5 4707 if (h != NULL)
ed7007c1 4708 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4709 else
4710 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4711 rel->r_addend,
37da22e5
AM
4712 NON_GOT | TLS_TLS | TLS_MARK))
4713 return FALSE;
4714 sec->has_tls_reloc = 1;
727fc41e
AM
4715 break;
4716
411e1bfb
AM
4717 case R_PPC64_GOT_TLSLD16:
4718 case R_PPC64_GOT_TLSLD16_LO:
4719 case R_PPC64_GOT_TLSLD16_HI:
4720 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 4721 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 4722 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4723 goto dogottls;
4724
4725 case R_PPC64_GOT_TLSGD16:
4726 case R_PPC64_GOT_TLSGD16_LO:
4727 case R_PPC64_GOT_TLSGD16_HI:
4728 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 4729 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 4730 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4731 goto dogottls;
4732
4733 case R_PPC64_GOT_TPREL16_DS:
4734 case R_PPC64_GOT_TPREL16_LO_DS:
4735 case R_PPC64_GOT_TPREL16_HI:
4736 case R_PPC64_GOT_TPREL16_HA:
87c69f97 4737 case R_PPC64_GOT_TPREL_PCREL34:
7c8bbca5 4738 if (bfd_link_dll (info))
411e1bfb
AM
4739 info->flags |= DF_STATIC_TLS;
4740 tls_type = TLS_TLS | TLS_TPREL;
4741 goto dogottls;
4742
4743 case R_PPC64_GOT_DTPREL16_DS:
4744 case R_PPC64_GOT_DTPREL16_LO_DS:
4745 case R_PPC64_GOT_DTPREL16_HI:
4746 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 4747 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
4748 tls_type = TLS_TLS | TLS_DTPREL;
4749 dogottls:
4750 sec->has_tls_reloc = 1;
066f4018 4751 goto dogot;
411e1bfb 4752
903b777d
AM
4753 case R_PPC64_GOT16:
4754 case R_PPC64_GOT16_LO:
4755 case R_PPC64_GOT16_HI:
65f38f15 4756 case R_PPC64_GOT16_HA:
903b777d 4757 case R_PPC64_GOT16_DS:
066f4018 4758 case R_PPC64_GOT16_LO_DS:
4a421c53 4759 case R_PPC64_GOT_PCREL34:
066f4018 4760 dogot:
65f38f15 4761 /* This symbol requires a global offset table entry. */
4c52953f 4762 sec->has_toc_reloc = 1;
33c0ec9d
AM
4763 if (r_type == R_PPC64_GOT_TLSLD16
4764 || r_type == R_PPC64_GOT_TLSGD16
4765 || r_type == R_PPC64_GOT_TPREL16_DS
4766 || r_type == R_PPC64_GOT_DTPREL16_DS
4767 || r_type == R_PPC64_GOT16
4768 || r_type == R_PPC64_GOT16_DS)
4769 {
4770 htab->do_multi_toc = 1;
d77c8a4b 4771 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4772 }
4773
e717da7e
AM
4774 if (ppc64_elf_tdata (abfd)->got == NULL
4775 && !create_got_section (abfd, info))
b34976b6 4776 return FALSE;
5bd4f169
AM
4777
4778 if (h != NULL)
4779 {
411e1bfb
AM
4780 struct ppc_link_hash_entry *eh;
4781 struct got_entry *ent;
65f38f15 4782
ed7007c1 4783 eh = ppc_elf_hash_entry (h);
411e1bfb 4784 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4785 if (ent->addend == rel->r_addend
e717da7e 4786 && ent->owner == abfd
411e1bfb
AM
4787 && ent->tls_type == tls_type)
4788 break;
4789 if (ent == NULL)
5bd4f169 4790 {
986f0783 4791 size_t amt = sizeof (*ent);
4ce794b7 4792 ent = bfd_alloc (abfd, amt);
411e1bfb 4793 if (ent == NULL)
b34976b6 4794 return FALSE;
411e1bfb 4795 ent->next = eh->elf.got.glist;
133a1f60 4796 ent->addend = rel->r_addend;
e717da7e 4797 ent->owner = abfd;
411e1bfb 4798 ent->tls_type = tls_type;
927be08e 4799 ent->is_indirect = FALSE;
411e1bfb
AM
4800 ent->got.refcount = 0;
4801 eh->elf.got.glist = ent;
5bd4f169 4802 }
411e1bfb 4803 ent->got.refcount += 1;
e7b938ca 4804 eh->tls_mask |= tls_type;
5bd4f169 4805 }
411e1bfb
AM
4806 else
4807 /* This is a global offset table entry for a local symbol. */
4808 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4809 rel->r_addend, tls_type))
411e1bfb 4810 return FALSE;
5bd4f169
AM
4811 break;
4812
5bd4f169 4813 case R_PPC64_PLT16_HA:
65f38f15
AM
4814 case R_PPC64_PLT16_HI:
4815 case R_PPC64_PLT16_LO:
08be3224 4816 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4817 case R_PPC64_PLT_PCREL34:
4818 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4819 case R_PPC64_PLT32:
4820 case R_PPC64_PLT64:
cbf95972
AM
4821 /* This symbol requires a procedure linkage table entry. */
4822 plt_list = ifunc;
4823 if (h != NULL)
e054468f 4824 {
e054468f
AM
4825 h->needs_plt = 1;
4826 if (h->root.root.string[0] == '.'
4827 && h->root.root.string[1] != '\0')
ed7007c1
AM
4828 ppc_elf_hash_entry (h)->is_func = 1;
4829 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4830 plt_list = &h->plt.plist;
4831 }
4832 if (plt_list == NULL)
2d7ad24e 4833 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4834 rel->r_addend,
2d7ad24e 4835 NON_GOT | PLT_KEEP);
133a1f60 4836 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4837 return FALSE;
5bd4f169
AM
4838 break;
4839
4840 /* The following relocations don't need to propagate the
4841 relocation if linking a shared object since they are
4842 section relative. */
4843 case R_PPC64_SECTOFF:
4844 case R_PPC64_SECTOFF_LO:
4845 case R_PPC64_SECTOFF_HI:
4846 case R_PPC64_SECTOFF_HA:
4847 case R_PPC64_SECTOFF_DS:
4848 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4849 case R_PPC64_DTPREL16:
4850 case R_PPC64_DTPREL16_LO:
4851 case R_PPC64_DTPREL16_HI:
4852 case R_PPC64_DTPREL16_HA:
4853 case R_PPC64_DTPREL16_DS:
4854 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4855 case R_PPC64_DTPREL16_HIGH:
4856 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4857 case R_PPC64_DTPREL16_HIGHER:
4858 case R_PPC64_DTPREL16_HIGHERA:
4859 case R_PPC64_DTPREL16_HIGHEST:
4860 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4861 break;
4862
ad8e1ba5 4863 /* Nor do these. */
25f23106
AM
4864 case R_PPC64_REL16:
4865 case R_PPC64_REL16_LO:
4866 case R_PPC64_REL16_HI:
4867 case R_PPC64_REL16_HA:
4a969973
AM
4868 case R_PPC64_REL16_HIGH:
4869 case R_PPC64_REL16_HIGHA:
4870 case R_PPC64_REL16_HIGHER:
4871 case R_PPC64_REL16_HIGHERA:
4872 case R_PPC64_REL16_HIGHEST:
4873 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4874 case R_PPC64_REL16_HIGHER34:
4875 case R_PPC64_REL16_HIGHERA34:
4876 case R_PPC64_REL16_HIGHEST34:
4877 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4878 case R_PPC64_REL16DX_HA:
25f23106
AM
4879 break;
4880
45965137
AM
4881 /* Not supported as a dynamic relocation. */
4882 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4883 if (bfd_link_pic (info))
45965137
AM
4884 {
4885 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4886 ppc_howto_init ();
695344c0 4887 /* xgettext:c-format */
174d0a74 4888 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4889 "in shared libraries and PIEs\n"),
45965137
AM
4890 abfd, sec, rel->r_offset,
4891 ppc64_elf_howto_table[r_type]->name);
4892 bfd_set_error (bfd_error_bad_value);
4893 return FALSE;
4894 }
4895 break;
4896
ad8e1ba5 4897 case R_PPC64_TOC16:
33c0ec9d
AM
4898 case R_PPC64_TOC16_DS:
4899 htab->do_multi_toc = 1;
d77c8a4b 4900 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4901 /* Fall through. */
ad8e1ba5
AM
4902 case R_PPC64_TOC16_LO:
4903 case R_PPC64_TOC16_HI:
4904 case R_PPC64_TOC16_HA:
ad8e1ba5 4905 case R_PPC64_TOC16_LO_DS:
4c52953f 4906 sec->has_toc_reloc = 1;
ec73ddcd 4907 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4908 {
4909 /* We may need a copy reloc. */
4910 h->non_got_ref = 1;
4911 /* Strongly prefer a copy reloc over a dynamic reloc.
4912 glibc ld.so as of 2019-08 will error out if one of
4913 these relocations is emitted. */
4914 h->needs_copy = 1;
4915 goto dodyn;
4916 }
ad8e1ba5
AM
4917 break;
4918
006589cf
AM
4919 /* Marker reloc. */
4920 case R_PPC64_ENTRY:
4921 break;
4922
5bd4f169
AM
4923 /* This relocation describes the C++ object vtable hierarchy.
4924 Reconstruct it for later use during GC. */
4925 case R_PPC64_GNU_VTINHERIT:
c152c796 4926 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4927 return FALSE;
5bd4f169
AM
4928 break;
4929
4930 /* This relocation describes which C++ vtable entries are actually
4931 used. Record for later use during GC. */
4932 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4933 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4934 return FALSE;
5bd4f169
AM
4935 break;
4936
721956f4
AM
4937 case R_PPC64_REL14:
4938 case R_PPC64_REL14_BRTAKEN:
4939 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4940 {
4941 asection *dest = NULL;
4942
4943 /* Heuristic: If jumping outside our section, chances are
4944 we are going to need a stub. */
4945 if (h != NULL)
4946 {
4947 /* If the sym is weak it may be overridden later, so
4948 don't assume we know where a weak sym lives. */
4949 if (h->root.type == bfd_link_hash_defined)
4950 dest = h->root.u.def.section;
4951 }
4952 else
87d72d41
AM
4953 {
4954 Elf_Internal_Sym *isym;
4955
f1dfbfdb 4956 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
4957 abfd, r_symndx);
4958 if (isym == NULL)
4959 return FALSE;
4960
4961 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4962 }
4963
220c76dd 4964 if (dest != sec)
7c8fe5c4 4965 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4966 }
3e04d765
AM
4967 goto rel24;
4968
4969 case R_PPC64_PLTCALL:
5663e321 4970 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4971 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4972 /* Fall through. */
4973
5d1634d7 4974 case R_PPC64_REL24:
05d0e962 4975 case R_PPC64_REL24_NOTOC:
3e04d765 4976 rel24:
cbf95972
AM
4977 plt_list = ifunc;
4978 if (h != NULL)
5d1634d7 4979 {
e054468f
AM
4980 h->needs_plt = 1;
4981 if (h->root.root.string[0] == '.'
4982 && h->root.root.string[1] != '\0')
ed7007c1 4983 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4984
3a71aa26 4985 if (h == tga || h == dottga)
cbf95972
AM
4986 {
4987 sec->has_tls_reloc = 1;
4988 if (rel != relocs
4989 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4990 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4991 /* We have a new-style __tls_get_addr call with
4992 a marker reloc. */
4993 ;
4994 else
4995 /* Mark this section as having an old-style call. */
9737e8af 4996 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4997 }
4998 plt_list = &h->plt.plist;
411e1bfb 4999 }
cbf95972
AM
5000
5001 /* We may need a .plt entry if the function this reloc
5002 refers to is in a shared lib. */
5003 if (plt_list
133a1f60 5004 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 5005 return FALSE;
411e1bfb
AM
5006 break;
5007
cbf95972
AM
5008 case R_PPC64_ADDR14:
5009 case R_PPC64_ADDR14_BRNTAKEN:
5010 case R_PPC64_ADDR14_BRTAKEN:
5011 case R_PPC64_ADDR24:
5012 goto dodyn;
5013
411e1bfb
AM
5014 case R_PPC64_TPREL64:
5015 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 5016 if (bfd_link_dll (info))
411e1bfb
AM
5017 info->flags |= DF_STATIC_TLS;
5018 goto dotlstoc;
5019
5020 case R_PPC64_DTPMOD64:
5021 if (rel + 1 < rel_end
5022 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5023 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5024 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5025 else
951fd09b 5026 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5027 goto dotlstoc;
5028
5029 case R_PPC64_DTPREL64:
5030 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5031 if (rel != relocs
5032 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5033 && rel[-1].r_offset == rel->r_offset - 8)
5034 /* This is the second reloc of a dtpmod, dtprel pair.
5035 Don't mark with TLS_DTPREL. */
5036 goto dodyn;
5037
5038 dotlstoc:
5039 sec->has_tls_reloc = 1;
5040 if (h != NULL)
ed7007c1 5041 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5042 else
5043 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5044 rel->r_addend, tls_type))
411e1bfb
AM
5045 return FALSE;
5046
7c8fe5c4
AM
5047 ppc64_sec = ppc64_elf_section_data (sec);
5048 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5049 {
3a71aa26
AM
5050 bfd_size_type amt;
5051
e7b938ca 5052 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5053 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5054 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5055 if (ppc64_sec->u.toc.symndx == NULL)
5056 return FALSE;
5057 amt = sec->size * sizeof (bfd_vma) / 8;
5058 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5059 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5060 return FALSE;
7c8fe5c4
AM
5061 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5062 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5063 }
5064 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5065 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5066 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5067
5068 /* Mark the second slot of a GD or LD entry.
5069 -1 to indicate GD and -2 to indicate LD. */
5070 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5071 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5072 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5073 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5074 goto dodyn;
5075
5076 case R_PPC64_TPREL16:
5077 case R_PPC64_TPREL16_LO:
5078 case R_PPC64_TPREL16_HI:
5079 case R_PPC64_TPREL16_HA:
5080 case R_PPC64_TPREL16_DS:
5081 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5082 case R_PPC64_TPREL16_HIGH:
5083 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5084 case R_PPC64_TPREL16_HIGHER:
5085 case R_PPC64_TPREL16_HIGHERA:
5086 case R_PPC64_TPREL16_HIGHEST:
5087 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5088 case R_PPC64_TPREL34:
7c8bbca5
AM
5089 if (bfd_link_dll (info))
5090 info->flags |= DF_STATIC_TLS;
5091 goto dodyn;
5d1634d7 5092
e86ce104 5093 case R_PPC64_ADDR64:
b9399fcf 5094 if (is_opd
1e2f5b6e 5095 && rel + 1 < rel_end
4ce794b7 5096 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5097 {
8387904d 5098 if (h != NULL)
ed7007c1 5099 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5100 }
e86ce104
AM
5101 /* Fall through. */
5102
65f38f15
AM
5103 case R_PPC64_ADDR16:
5104 case R_PPC64_ADDR16_DS:
5105 case R_PPC64_ADDR16_HA:
5106 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5107 case R_PPC64_ADDR16_HIGH:
5108 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5109 case R_PPC64_ADDR16_HIGHER:
5110 case R_PPC64_ADDR16_HIGHERA:
5111 case R_PPC64_ADDR16_HIGHEST:
5112 case R_PPC64_ADDR16_HIGHESTA:
5113 case R_PPC64_ADDR16_LO:
5114 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5115 case R_PPC64_D34:
5116 case R_PPC64_D34_LO:
5117 case R_PPC64_D34_HI30:
5118 case R_PPC64_D34_HA30:
5119 case R_PPC64_ADDR16_HIGHER34:
5120 case R_PPC64_ADDR16_HIGHERA34:
5121 case R_PPC64_ADDR16_HIGHEST34:
5122 case R_PPC64_ADDR16_HIGHESTA34:
5123 case R_PPC64_D28:
0e1862bb 5124 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5125 && rel->r_addend == 0)
5126 {
5127 /* We may need a .plt entry if this reloc refers to a
5128 function in a shared lib. */
5663e321 5129 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5130 return FALSE;
5131 h->pointer_equality_needed = 1;
5132 }
5133 /* Fall through. */
5134
5135 case R_PPC64_REL30:
5136 case R_PPC64_REL32:
5137 case R_PPC64_REL64:
65f38f15 5138 case R_PPC64_ADDR32:
65f38f15
AM
5139 case R_PPC64_UADDR16:
5140 case R_PPC64_UADDR32:
5141 case R_PPC64_UADDR64:
5bd4f169 5142 case R_PPC64_TOC:
ec73ddcd 5143 if (h != NULL && bfd_link_executable (info))
81848ca0 5144 /* We may need a copy reloc. */
f5385ebf 5145 h->non_got_ref = 1;
81848ca0 5146
41bd81ab 5147 /* Don't propagate .opd relocs. */
b9399fcf 5148 if (NO_OPD_RELOCS && is_opd)
e86ce104 5149 break;
e86ce104 5150
65f38f15
AM
5151 /* If we are creating a shared library, and this is a reloc
5152 against a global symbol, or a non PC relative reloc
5153 against a local symbol, then we need to copy the reloc
5154 into the shared library. However, if we are linking with
5155 -Bsymbolic, we do not need to copy a reloc against a
5156 global symbol which is defined in an object we are
5157 including in the link (i.e., DEF_REGULAR is set). At
5158 this point we have not seen all the input files, so it is
5159 possible that DEF_REGULAR is not set now but will be set
5160 later (it is never cleared). In case of a weak definition,
5161 DEF_REGULAR may be cleared later by a strong definition in
5162 a shared library. We account for that possibility below by
f4656909 5163 storing information in the dyn_relocs field of the hash
65f38f15
AM
5164 table entry. A similar situation occurs when creating
5165 shared libraries and symbol visibility changes render the
5166 symbol local.
5167
5168 If on the other hand, we are creating an executable, we
5169 may need to keep relocations for symbols satisfied by a
5170 dynamic library if we manage to avoid copy relocs for the
5171 symbol. */
411e1bfb 5172 dodyn:
ec73ddcd
AM
5173 if ((h != NULL
5174 && (h->root.type == bfd_link_hash_defweak
5175 || !h->def_regular))
5176 || (h != NULL
5177 && !bfd_link_executable (info)
5178 && !SYMBOLIC_BIND (info, h))
5179 || (bfd_link_pic (info)
5180 && must_be_dyn_reloc (info, r_type))
0e1862bb 5181 || (!bfd_link_pic (info)
25f23106 5182 && ifunc != NULL))
5bd4f169 5183 {
65f38f15
AM
5184 /* We must copy these reloc types into the output file.
5185 Create a reloc section in dynobj and make room for
5186 this reloc. */
5bd4f169
AM
5187 if (sreloc == NULL)
5188 {
83bac4b0
NC
5189 sreloc = _bfd_elf_make_dynamic_reloc_section
5190 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5191
5bd4f169 5192 if (sreloc == NULL)
83bac4b0 5193 return FALSE;
5bd4f169
AM
5194 }
5195
65f38f15
AM
5196 /* If this is a global symbol, we count the number of
5197 relocations we need for this symbol. */
5198 if (h != NULL)
5199 {
19e08130
AM
5200 struct elf_dyn_relocs *p;
5201 struct elf_dyn_relocs **head;
5202
190eb1dd 5203 head = &h->dyn_relocs;
19e08130
AM
5204 p = *head;
5205 if (p == NULL || p->sec != sec)
5206 {
5207 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5208 if (p == NULL)
5209 return FALSE;
5210 p->next = *head;
5211 *head = p;
5212 p->sec = sec;
5213 p->count = 0;
5214 p->pc_count = 0;
5215 }
5216 p->count += 1;
5217 if (!must_be_dyn_reloc (info, r_type))
5218 p->pc_count += 1;
65f38f15
AM
5219 }
5220 else
5221 {
ec338859
AM
5222 /* Track dynamic relocs needed for local syms too.
5223 We really need local syms available to do this
5224 easily. Oh well. */
19e08130
AM
5225 struct ppc_dyn_relocs *p;
5226 struct ppc_dyn_relocs **head;
5227 bfd_boolean is_ifunc;
ec338859 5228 asection *s;
6edfbbad 5229 void *vpp;
87d72d41 5230 Elf_Internal_Sym *isym;
6edfbbad 5231
f1dfbfdb 5232 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
5233 abfd, r_symndx);
5234 if (isym == NULL)
b34976b6 5235 return FALSE;
ec338859 5236
87d72d41
AM
5237 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5238 if (s == NULL)
5239 s = sec;
5240
6edfbbad 5241 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5242 head = (struct ppc_dyn_relocs **) vpp;
5243 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5244 p = *head;
5245 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5246 p = p->next;
5247 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5248 {
5249 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5250 if (p == NULL)
5251 return FALSE;
5252 p->next = *head;
5253 *head = p;
5254 p->sec = sec;
5255 p->ifunc = is_ifunc;
5256 p->count = 0;
5257 }
5258 p->count += 1;
ec338859 5259 }
65f38f15 5260 }
5bd4f169 5261 break;
65f38f15
AM
5262
5263 default:
96e0dda4 5264 break;
5bd4f169
AM
5265 }
5266 }
5267
b34976b6 5268 return TRUE;
5bd4f169
AM
5269}
5270
ee67d69a
AM
5271/* Merge backend specific data from an object file to the output
5272 object file when linking. */
5273
5274static bfd_boolean
50e03d47 5275ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5276{
50e03d47 5277 bfd *obfd = info->output_bfd;
ee67d69a
AM
5278 unsigned long iflags, oflags;
5279
5280 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5281 return TRUE;
5282
5283 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5284 return TRUE;
5285
50e03d47 5286 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5287 return FALSE;
5288
5289 iflags = elf_elfheader (ibfd)->e_flags;
5290 oflags = elf_elfheader (obfd)->e_flags;
5291
f6c7c3e8 5292 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5293 {
4eca0228 5294 _bfd_error_handler
695344c0 5295 /* xgettext:c-format */
871b3ab2 5296 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5297 bfd_set_error (bfd_error_bad_value);
5298 return FALSE;
5299 }
f6c7c3e8 5300 else if (iflags != oflags && iflags != 0)
ee67d69a 5301 {
4eca0228 5302 _bfd_error_handler
695344c0 5303 /* xgettext:c-format */
871b3ab2 5304 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5305 ibfd, iflags, oflags);
5306 bfd_set_error (bfd_error_bad_value);
5307 return FALSE;
5308 }
5309
4a91d0ba
AM
5310 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5311 return FALSE;
005d79fd 5312
ee67d69a 5313 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5314 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5315}
5316
5317static bfd_boolean
5318ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5319{
5320 /* Print normal ELF private data. */
5321 _bfd_elf_print_private_bfd_data (abfd, ptr);
5322
5323 if (elf_elfheader (abfd)->e_flags != 0)
5324 {
5325 FILE *file = ptr;
5326
ee67d69a
AM
5327 fprintf (file, _("private flags = 0x%lx:"),
5328 elf_elfheader (abfd)->e_flags);
5329
5330 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5331 fprintf (file, _(" [abiv%ld]"),
5332 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5333 fputc ('\n', file);
5334 }
5335
5336 return TRUE;
5337}
5338
8387904d 5339/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5340 of the code entry point, and its section, which must be in the same
5341 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5342
5343static bfd_vma
5344opd_entry_value (asection *opd_sec,
5345 bfd_vma offset,
5346 asection **code_sec,
aef36ac1
AM
5347 bfd_vma *code_off,
5348 bfd_boolean in_code_sec)
8387904d
AM
5349{
5350 bfd *opd_bfd = opd_sec->owner;
8860955f 5351 Elf_Internal_Rela *relocs;
8387904d 5352 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5353 bfd_vma val;
8387904d 5354
9f296da3
AM
5355 /* No relocs implies we are linking a --just-symbols object, or looking
5356 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5357 if (opd_sec->reloc_count == 0)
5358 {
729eabd5 5359 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5360
729eabd5
AM
5361 if (contents == NULL)
5362 {
5363 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5364 return (bfd_vma) -1;
5365 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5366 }
ee1e4ede 5367
dbb3fbbb 5368 /* PR 17512: file: 64b9dfbb. */
451dfd38 5369 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5370 return (bfd_vma) -1;
5371
729eabd5 5372 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5373 if (code_sec != NULL)
5374 {
5375 asection *sec, *likely = NULL;
ee1e4ede 5376
aef36ac1 5377 if (in_code_sec)
4b85d634 5378 {
aef36ac1
AM
5379 sec = *code_sec;
5380 if (sec->vma <= val
5381 && val < sec->vma + sec->size)
5382 likely = sec;
5383 else
5384 val = -1;
5385 }
5386 else
5387 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5388 if (sec->vma <= val
5389 && (sec->flags & SEC_LOAD) != 0
5390 && (sec->flags & SEC_ALLOC) != 0)
5391 likely = sec;
5392 if (likely != NULL)
5393 {
5394 *code_sec = likely;
5395 if (code_off != NULL)
5396 *code_off = val - likely->vma;
4b85d634
AM
5397 }
5398 }
aef36ac1 5399 return val;
4b85d634
AM
5400 }
5401
0c8d6e5c 5402 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5403
729eabd5 5404 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5405 if (relocs == NULL)
5406 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5407 /* PR 17512: file: df8e1fd6. */
5408 if (relocs == NULL)
5409 return (bfd_vma) -1;
645ea6a9 5410
8387904d 5411 /* Go find the opd reloc at the sym address. */
8860955f 5412 lo = relocs;
8387904d 5413 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5414 val = (bfd_vma) -1;
8387904d
AM
5415 while (lo < hi)
5416 {
5417 look = lo + (hi - lo) / 2;
5418 if (look->r_offset < offset)
5419 lo = look + 1;
5420 else if (look->r_offset > offset)
5421 hi = look;
5422 else
5423 {
0ffa91dd
NC
5424 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5425
8387904d
AM
5426 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5427 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5428 {
5429 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5430 asection *sec = NULL;
8387904d 5431
b53dfeb2
AM
5432 if (symndx >= symtab_hdr->sh_info
5433 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5434 {
5435 struct elf_link_hash_entry **sym_hashes;
5436 struct elf_link_hash_entry *rh;
5437
5438 sym_hashes = elf_sym_hashes (opd_bfd);
5439 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5440 if (rh != NULL)
5441 {
5442 rh = elf_follow_link (rh);
bb854a36
AM
5443 if (rh->root.type != bfd_link_hash_defined
5444 && rh->root.type != bfd_link_hash_defweak)
5445 break;
5446 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5447 {
bb854a36
AM
5448 val = rh->root.u.def.value;
5449 sec = rh->root.u.def.section;
b53dfeb2
AM
5450 }
5451 }
5452 }
5453
5454 if (sec == NULL)
5455 {
5456 Elf_Internal_Sym *sym;
5457
5458 if (symndx < symtab_hdr->sh_info)
5459 {
5460 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5461 if (sym == NULL)
5462 {
5463 size_t symcnt = symtab_hdr->sh_info;
5464 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5465 symcnt, 0,
5466 NULL, NULL, NULL);
5467 if (sym == NULL)
5468 break;
5469 symtab_hdr->contents = (bfd_byte *) sym;
5470 }
5471 sym += symndx;
128205bb
AM
5472 }
5473 else
5474 {
b53dfeb2
AM
5475 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5476 1, symndx,
5477 NULL, NULL, NULL);
128205bb
AM
5478 if (sym == NULL)
5479 break;
128205bb 5480 }
b53dfeb2
AM
5481 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5482 if (sec == NULL)
5483 break;
5484 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5485 val = sym->st_value;
8387904d 5486 }
b53dfeb2 5487
8387904d
AM
5488 val += look->r_addend;
5489 if (code_off != NULL)
5490 *code_off = val;
5491 if (code_sec != NULL)
aef36ac1
AM
5492 {
5493 if (in_code_sec && *code_sec != sec)
5494 return -1;
5495 else
5496 *code_sec = sec;
5497 }
b53dfeb2 5498 if (sec->output_section != NULL)
8387904d 5499 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5500 }
5501 break;
5502 }
5503 }
645ea6a9 5504
645ea6a9 5505 return val;
8387904d
AM
5506}
5507
aef36ac1
AM
5508/* If the ELF symbol SYM might be a function in SEC, return the
5509 function size and set *CODE_OFF to the function's entry point,
5510 otherwise return zero. */
9f296da3 5511
aef36ac1
AM
5512static bfd_size_type
5513ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5514 bfd_vma *code_off)
9f296da3 5515{
aef36ac1
AM
5516 bfd_size_type size;
5517
5518 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5519 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5520 return 0;
5521
5522 size = 0;
5523 if (!(sym->flags & BSF_SYNTHETIC))
5524 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5525
5526 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5527 {
b07bca4e
AM
5528 struct _opd_sec_data *opd = get_opd_info (sym->section);
5529 bfd_vma symval = sym->value;
5530
5531 if (opd != NULL
5532 && opd->adjust != NULL
5533 && elf_section_data (sym->section)->relocs != NULL)
5534 {
5535 /* opd_entry_value will use cached relocs that have been
5536 adjusted, but with raw symbols. That means both local
5537 and global symbols need adjusting. */
5538 long adjust = opd->adjust[OPD_NDX (symval)];
5539 if (adjust == -1)
5540 return 0;
5541 symval += adjust;
5542 }
5543
5544 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5545 &sec, code_off, TRUE) == (bfd_vma) -1)
5546 return 0;
5547 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5548 symbol. This size has nothing to do with the code size of the
5549 function, which is what we're supposed to return, but the
5550 code size isn't available without looking up the dot-sym.
5551 However, doing that would be a waste of time particularly
5552 since elf_find_function will look at the dot-sym anyway.
5553 Now, elf_find_function will keep the largest size of any
5554 function sym found at the code address of interest, so return
5555 1 here to avoid it incorrectly caching a larger function size
5556 for a small function. This does mean we return the wrong
5557 size for a new-ABI function of size 24, but all that does is
5558 disable caching for such functions. */
5559 if (size == 24)
5560 size = 1;
9f296da3 5561 }
aef36ac1
AM
5562 else
5563 {
5564 if (sym->section != sec)
5565 return 0;
5566 *code_off = sym->value;
5567 }
5568 if (size == 0)
5569 size = 1;
5570 return size;
9f296da3
AM
5571}
5572
f378ab09
AM
5573/* Return true if symbol is a strong function defined in an ELFv2
5574 object with st_other localentry bits of zero, ie. its local entry
5575 point coincides with its global entry point. */
5576
5577static bfd_boolean
5578is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5579{
5580 return (h != NULL
5581 && h->type == STT_FUNC
5582 && h->root.type == bfd_link_hash_defined
5583 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5584 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5585 && is_ppc64_elf (h->root.u.def.section->owner)
5586 && abiversion (h->root.u.def.section->owner) >= 2);
5587}
5588
854b41e7
AM
5589/* Return true if symbol is defined in a regular object file. */
5590
5591static bfd_boolean
5592is_static_defined (struct elf_link_hash_entry *h)
5593{
5594 return ((h->root.type == bfd_link_hash_defined
5595 || h->root.type == bfd_link_hash_defweak)
5596 && h->root.u.def.section != NULL
5597 && h->root.u.def.section->output_section != NULL);
5598}
5599
b31867b6
AM
5600/* If FDH is a function descriptor symbol, return the associated code
5601 entry symbol if it is defined. Return NULL otherwise. */
5602
5603static struct ppc_link_hash_entry *
5604defined_code_entry (struct ppc_link_hash_entry *fdh)
5605{
5606 if (fdh->is_func_descriptor)
5607 {
5608 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5609 if (fh->elf.root.type == bfd_link_hash_defined
5610 || fh->elf.root.type == bfd_link_hash_defweak)
5611 return fh;
5612 }
5613 return NULL;
5614}
5615
5616/* If FH is a function code entry symbol, return the associated
5617 function descriptor symbol if it is defined. Return NULL otherwise. */
5618
5619static struct ppc_link_hash_entry *
5620defined_func_desc (struct ppc_link_hash_entry *fh)
5621{
5622 if (fh->oh != NULL
5623 && fh->oh->is_func_descriptor)
5624 {
5625 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5626 if (fdh->elf.root.type == bfd_link_hash_defined
5627 || fdh->elf.root.type == bfd_link_hash_defweak)
5628 return fdh;
5629 }
5630 return NULL;
5631}
5632
ed7007c1
AM
5633/* Given H is a symbol that satisfies is_static_defined, return the
5634 value in the output file. */
5635
5636static bfd_vma
5637defined_sym_val (struct elf_link_hash_entry *h)
5638{
5639 return (h->root.u.def.section->output_section->vma
5640 + h->root.u.def.section->output_offset
5641 + h->root.u.def.value);
5642}
5643
5644/* Return true if H matches __tls_get_addr or one of its variants. */
5645
5646static bfd_boolean
5647is_tls_get_addr (struct elf_link_hash_entry *h,
5648 struct ppc_link_hash_table *htab)
5649{
9e7028aa
AM
5650 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5651 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
ed7007c1
AM
5652}
5653
8c5b4e52
AM
5654static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5655
5656/* Garbage collect sections, after first dealing with dot-symbols. */
5657
5658static bfd_boolean
5659ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5660{
5661 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5662
5663 if (htab != NULL && htab->need_func_desc_adj)
5664 {
5665 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5666 htab->need_func_desc_adj = 0;
5667 }
5668 return bfd_elf_gc_sections (abfd, info);
5669}
5670
74f0fb50
AM
5671/* Mark all our entry sym sections, both opd and code section. */
5672
5673static void
5674ppc64_elf_gc_keep (struct bfd_link_info *info)
5675{
5676 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5677 struct bfd_sym_chain *sym;
5678
4dfe6ac6
NC
5679 if (htab == NULL)
5680 return;
5681
74f0fb50
AM
5682 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5683 {
b31867b6 5684 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5685 asection *sec;
5686
ed7007c1
AM
5687 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5688 FALSE, FALSE, TRUE));
74f0fb50
AM
5689 if (eh == NULL)
5690 continue;
5691 if (eh->elf.root.type != bfd_link_hash_defined
5692 && eh->elf.root.type != bfd_link_hash_defweak)
5693 continue;
5694
b31867b6
AM
5695 fh = defined_code_entry (eh);
5696 if (fh != NULL)
74f0fb50 5697 {
b31867b6 5698 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5699 sec->flags |= SEC_KEEP;
5700 }
5701 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5702 && opd_entry_value (eh->elf.root.u.def.section,
5703 eh->elf.root.u.def.value,
aef36ac1 5704 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5705 sec->flags |= SEC_KEEP;
5706
5707 sec = eh->elf.root.u.def.section;
5708 sec->flags |= SEC_KEEP;
5709 }
5710}
5711
64d03ab5
AM
5712/* Mark sections containing dynamically referenced symbols. When
5713 building shared libraries, we must assume that any visible symbol is
5714 referenced. */
5715
5716static bfd_boolean
5717ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5718{
5719 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5720 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5721 struct ppc_link_hash_entry *fdh;
b407645f 5722 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5723
64d03ab5 5724 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5725 fdh = defined_func_desc (eh);
5726 if (fdh != NULL)
5727 eh = fdh;
64d03ab5
AM
5728
5729 if ((eh->elf.root.type == bfd_link_hash_defined
5730 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5731 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5732 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5733 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5734 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5735 && (!bfd_link_executable (info)
e278ae05 5736 || info->gc_keep_exported
b407645f
AM
5737 || info->export_dynamic
5738 || (eh->elf.dynamic
5739 && d != NULL
2cdcc330
AM
5740 && (*d->match) (&d->head, NULL,
5741 eh->elf.root.root.string)))
e278ae05 5742 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5743 || !bfd_hide_sym_by_version (info->version_info,
5744 eh->elf.root.root.string)))))
64d03ab5
AM
5745 {
5746 asection *code_sec;
b31867b6 5747 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5748
5749 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5750
5751 /* Function descriptor syms cause the associated
5752 function code sym section to be marked. */
b31867b6
AM
5753 fh = defined_code_entry (eh);
5754 if (fh != NULL)
5755 {
5756 code_sec = fh->elf.root.u.def.section;
5757 code_sec->flags |= SEC_KEEP;
5758 }
64d03ab5
AM
5759 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5760 && opd_entry_value (eh->elf.root.u.def.section,
5761 eh->elf.root.u.def.value,
aef36ac1 5762 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5763 code_sec->flags |= SEC_KEEP;
5764 }
5765
5766 return TRUE;
5767}
5768
5bd4f169
AM
5769/* Return the section that should be marked against GC for a given
5770 relocation. */
5771
5772static asection *
4ce794b7 5773ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5774 struct bfd_link_info *info,
4ce794b7
AM
5775 Elf_Internal_Rela *rel,
5776 struct elf_link_hash_entry *h,
5777 Elf_Internal_Sym *sym)
5bd4f169 5778{
ccfa59ea
AM
5779 asection *rsec;
5780
ccfa59ea
AM
5781 /* Syms return NULL if we're marking .opd, so we avoid marking all
5782 function sections, as all functions are referenced in .opd. */
5783 rsec = NULL;
5784 if (get_opd_info (sec) != NULL)
5785 return rsec;
1e2f5b6e 5786
5bd4f169
AM
5787 if (h != NULL)
5788 {
04c9666a 5789 enum elf_ppc64_reloc_type r_type;
b31867b6 5790 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5791
4ce794b7 5792 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5793 switch (r_type)
5bd4f169
AM
5794 {
5795 case R_PPC64_GNU_VTINHERIT:
5796 case R_PPC64_GNU_VTENTRY:
5797 break;
5798
5799 default:
5800 switch (h->root.type)
5801 {
5802 case bfd_link_hash_defined:
5803 case bfd_link_hash_defweak:
ed7007c1 5804 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5805 fdh = defined_func_desc (eh);
5806 if (fdh != NULL)
8c5b4e52
AM
5807 {
5808 /* -mcall-aixdesc code references the dot-symbol on
5809 a call reloc. Mark the function descriptor too
5810 against garbage collection. */
5811 fdh->elf.mark = 1;
60d67dc8
AM
5812 if (fdh->elf.is_weakalias)
5813 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5814 eh = fdh;
5815 }
1e2f5b6e
AM
5816
5817 /* Function descriptor syms cause the associated
5818 function code sym section to be marked. */
b31867b6
AM
5819 fh = defined_code_entry (eh);
5820 if (fh != NULL)
ccfa59ea
AM
5821 {
5822 /* They also mark their opd section. */
74f0fb50 5823 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5824
b31867b6 5825 rsec = fh->elf.root.u.def.section;
ccfa59ea 5826 }
8387904d
AM
5827 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5828 && opd_entry_value (eh->elf.root.u.def.section,
5829 eh->elf.root.u.def.value,
aef36ac1 5830 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5831 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5832 else
1e2f5b6e
AM
5833 rsec = h->root.u.def.section;
5834 break;
5bd4f169
AM
5835
5836 case bfd_link_hash_common:
1e2f5b6e
AM
5837 rsec = h->root.u.c.p->section;
5838 break;
5bd4f169
AM
5839
5840 default:
fb34365b 5841 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5842 }
5843 }
5844 }
5845 else
5846 {
74f0fb50 5847 struct _opd_sec_data *opd;
1e2f5b6e
AM
5848
5849 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5850 opd = get_opd_info (rsec);
5851 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5852 {
74f0fb50 5853 rsec->gc_mark = 1;
ccfa59ea 5854
51aecdc5 5855 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5856 }
5bd4f169
AM
5857 }
5858
1e2f5b6e 5859 return rsec;
5bd4f169
AM
5860}
5861
deb0e272
AM
5862/* The maximum size of .sfpr. */
5863#define SFPR_MAX (218*4)
5864
5865struct sfpr_def_parms
5866{
699733f6
AM
5867 const char name[12];
5868 unsigned char lo, hi;
2cdcc330
AM
5869 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5870 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5871};
5872
a4b6fadd
AM
5873/* Auto-generate _save*, _rest* functions in .sfpr.
5874 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5875 instead. */
deb0e272 5876
4dfe6ac6 5877static bfd_boolean
a4b6fadd
AM
5878sfpr_define (struct bfd_link_info *info,
5879 const struct sfpr_def_parms *parm,
5880 asection *stub_sec)
deb0e272
AM
5881{
5882 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5883 unsigned int i;
5884 size_t len = strlen (parm->name);
5885 bfd_boolean writing = FALSE;
699733f6 5886 char sym[16];
deb0e272 5887
4dfe6ac6
NC
5888 if (htab == NULL)
5889 return FALSE;
5890
deb0e272
AM
5891 memcpy (sym, parm->name, len);
5892 sym[len + 2] = 0;
5893
5894 for (i = parm->lo; i <= parm->hi; i++)
5895 {
a4b6fadd 5896 struct ppc_link_hash_entry *h;
deb0e272
AM
5897
5898 sym[len + 0] = i / 10 + '0';
5899 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5900 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5901 writing, TRUE, TRUE));
a4b6fadd 5902 if (stub_sec != NULL)
deb0e272 5903 {
a4b6fadd
AM
5904 if (h != NULL
5905 && h->elf.root.type == bfd_link_hash_defined
5906 && h->elf.root.u.def.section == htab->sfpr)
5907 {
5908 struct elf_link_hash_entry *s;
5909 char buf[32];
5910 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5911 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5912 if (s == NULL)
5913 return FALSE;
779f2ae7 5914 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5915 {
5916 s->root.type = bfd_link_hash_defined;
5917 s->root.u.def.section = stub_sec;
7dda8d3c 5918 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5919 + h->elf.root.u.def.value);
5920 s->ref_regular = 1;
5921 s->def_regular = 1;
5922 s->ref_regular_nonweak = 1;
5923 s->forced_local = 1;
5924 s->non_elf = 0;
5925 s->root.linker_def = 1;
5926 }
5927 }
5928 continue;
5929 }
5930 if (h != NULL)
5931 {
5932 h->save_res = 1;
5933 if (!h->elf.def_regular)
deb0e272 5934 {
a4b6fadd
AM
5935 h->elf.root.type = bfd_link_hash_defined;
5936 h->elf.root.u.def.section = htab->sfpr;
5937 h->elf.root.u.def.value = htab->sfpr->size;
5938 h->elf.type = STT_FUNC;
5939 h->elf.def_regular = 1;
b32547cd 5940 h->elf.non_elf = 0;
a4b6fadd
AM
5941 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5942 writing = TRUE;
deb0e272 5943 if (htab->sfpr->contents == NULL)
a4b6fadd 5944 {
2cdcc330
AM
5945 htab->sfpr->contents
5946 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5947 if (htab->sfpr->contents == NULL)
5948 return FALSE;
5949 }
deb0e272
AM
5950 }
5951 }
5952 if (writing)
5953 {
5954 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5955 if (i != parm->hi)
5956 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5957 else
5958 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5959 htab->sfpr->size = p - htab->sfpr->contents;
5960 }
5961 }
5962
5963 return TRUE;
5964}
5965
5966static bfd_byte *
5967savegpr0 (bfd *abfd, bfd_byte *p, int r)
5968{
5969 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5970 return p + 4;
5971}
5972
5973static bfd_byte *
5974savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5975{
5976 p = savegpr0 (abfd, p, r);
a078d95a 5977 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5978 p = p + 4;
5979 bfd_put_32 (abfd, BLR, p);
5980 return p + 4;
5981}
5982
5983static bfd_byte *
5984restgpr0 (bfd *abfd, bfd_byte *p, int r)
5985{
5986 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5987 return p + 4;
5988}
5989
5990static bfd_byte *
5991restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5992{
a078d95a 5993 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5994 p = p + 4;
5995 p = restgpr0 (abfd, p, r);
5996 bfd_put_32 (abfd, MTLR_R0, p);
5997 p = p + 4;
5998 if (r == 29)
5999 {
6000 p = restgpr0 (abfd, p, 30);
6001 p = restgpr0 (abfd, p, 31);
6002 }
6003 bfd_put_32 (abfd, BLR, p);
6004 return p + 4;
6005}
6006
6007static bfd_byte *
6008savegpr1 (bfd *abfd, bfd_byte *p, int r)
6009{
6010 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6011 return p + 4;
6012}
6013
6014static bfd_byte *
6015savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6016{
6017 p = savegpr1 (abfd, p, r);
6018 bfd_put_32 (abfd, BLR, p);
6019 return p + 4;
6020}
6021
6022static bfd_byte *
6023restgpr1 (bfd *abfd, bfd_byte *p, int r)
6024{
6025 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6026 return p + 4;
6027}
6028
6029static bfd_byte *
6030restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6031{
6032 p = restgpr1 (abfd, p, r);
6033 bfd_put_32 (abfd, BLR, p);
6034 return p + 4;
6035}
6036
6037static bfd_byte *
6038savefpr (bfd *abfd, bfd_byte *p, int r)
6039{
6040 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6041 return p + 4;
6042}
6043
6044static bfd_byte *
6045savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6046{
6047 p = savefpr (abfd, p, r);
a078d95a 6048 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6049 p = p + 4;
6050 bfd_put_32 (abfd, BLR, p);
6051 return p + 4;
6052}
6053
6054static bfd_byte *
6055restfpr (bfd *abfd, bfd_byte *p, int r)
6056{
6057 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6058 return p + 4;
6059}
6060
6061static bfd_byte *
6062restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6063{
a078d95a 6064 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6065 p = p + 4;
6066 p = restfpr (abfd, p, r);
6067 bfd_put_32 (abfd, MTLR_R0, p);
6068 p = p + 4;
6069 if (r == 29)
6070 {
6071 p = restfpr (abfd, p, 30);
6072 p = restfpr (abfd, p, 31);
6073 }
6074 bfd_put_32 (abfd, BLR, p);
6075 return p + 4;
6076}
6077
6078static bfd_byte *
6079savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6080{
6081 p = savefpr (abfd, p, r);
6082 bfd_put_32 (abfd, BLR, p);
6083 return p + 4;
6084}
6085
6086static bfd_byte *
6087restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6088{
6089 p = restfpr (abfd, p, r);
6090 bfd_put_32 (abfd, BLR, p);
6091 return p + 4;
6092}
6093
6094static bfd_byte *
6095savevr (bfd *abfd, bfd_byte *p, int r)
6096{
6097 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6098 p = p + 4;
6099 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6100 return p + 4;
6101}
6102
6103static bfd_byte *
6104savevr_tail (bfd *abfd, bfd_byte *p, int r)
6105{
6106 p = savevr (abfd, p, r);
6107 bfd_put_32 (abfd, BLR, p);
6108 return p + 4;
6109}
6110
6111static bfd_byte *
6112restvr (bfd *abfd, bfd_byte *p, int r)
6113{
6114 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6115 p = p + 4;
6116 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6117 return p + 4;
6118}
6119
6120static bfd_byte *
6121restvr_tail (bfd *abfd, bfd_byte *p, int r)
6122{
6123 p = restvr (abfd, p, r);
6124 bfd_put_32 (abfd, BLR, p);
6125 return p + 4;
6126}
6127
9e7028aa
AM
6128#define STDU_R1_0R1 0xf8210001
6129#define ADDI_R1_R1 0x38210000
6130
6131/* Emit prologue of wrapper preserving regs around a call to
6132 __tls_get_addr_opt. */
6133
6134static bfd_byte *
6135tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6136{
6137 unsigned int i;
6138
6139 bfd_put_32 (obfd, MFLR_R0, p);
6140 p += 4;
6141 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6142 p += 4;
6143
6144 if (htab->opd_abi)
6145 {
6146 for (i = 4; i < 12; i++)
6147 {
6148 bfd_put_32 (obfd,
6149 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6150 p += 4;
6151 }
6152 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6153 p += 4;
6154 }
6155 else
6156 {
6157 for (i = 4; i < 12; i++)
6158 {
6159 bfd_put_32 (obfd,
6160 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6161 p += 4;
6162 }
6163 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6164 p += 4;
6165 }
6166 return p;
6167}
6168
6169/* Emit epilogue of wrapper preserving regs around a call to
6170 __tls_get_addr_opt. */
6171
6172static bfd_byte *
6173tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6174{
6175 unsigned int i;
6176
6177 if (htab->opd_abi)
6178 {
6179 for (i = 4; i < 12; i++)
6180 {
6181 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6182 p += 4;
6183 }
6184 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6185 p += 4;
6186 }
6187 else
6188 {
6189 for (i = 4; i < 12; i++)
6190 {
6191 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6192 p += 4;
6193 }
6194 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6195 p += 4;
6196 }
6197 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6198 p += 4;
6199 bfd_put_32 (obfd, MTLR_R0, p);
6200 p += 4;
6201 bfd_put_32 (obfd, BLR, p);
6202 p += 4;
6203 return p;
6204}
6205
e86ce104
AM
6206/* Called via elf_link_hash_traverse to transfer dynamic linking
6207 information on function code symbol entries to their corresponding
6208 function descriptor symbol entries. */
deb0e272 6209
b34976b6 6210static bfd_boolean
4ce794b7 6211func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6212{
e86ce104 6213 struct bfd_link_info *info;
65f38f15 6214 struct ppc_link_hash_table *htab;
50bc7936
AM
6215 struct ppc_link_hash_entry *fh;
6216 struct ppc_link_hash_entry *fdh;
6217 bfd_boolean force_local;
5bd4f169 6218
ed7007c1 6219 fh = ppc_elf_hash_entry (h);
50bc7936 6220 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6221 return TRUE;
e86ce104 6222
8c5b4e52
AM
6223 if (!fh->is_func)
6224 return TRUE;
6225
6226 if (fh->elf.root.root.string[0] != '.'
6227 || fh->elf.root.root.string[1] == '\0')
6228 return TRUE;
6229
4ce794b7 6230 info = inf;
65f38f15 6231 htab = ppc_hash_table (info);
4dfe6ac6
NC
6232 if (htab == NULL)
6233 return FALSE;
5bd4f169 6234
8c5b4e52
AM
6235 /* Find the corresponding function descriptor symbol. */
6236 fdh = lookup_fdh (fh, htab);
6237
c09bdfe5
AM
6238 /* Resolve undefined references to dot-symbols as the value
6239 in the function descriptor, if we have one in a regular object.
6240 This is to satisfy cases like ".quad .foo". Calls to functions
6241 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6242 if ((fh->elf.root.type == bfd_link_hash_undefined
6243 || fh->elf.root.type == bfd_link_hash_undefweak)
6244 && (fdh->elf.root.type == bfd_link_hash_defined
6245 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6246 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6247 && opd_entry_value (fdh->elf.root.u.def.section,
6248 fdh->elf.root.u.def.value,
c09bdfe5 6249 &fh->elf.root.u.def.section,
aef36ac1 6250 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6251 {
b31867b6 6252 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6253 fh->elf.forced_local = 1;
b31867b6
AM
6254 fh->elf.def_regular = fdh->elf.def_regular;
6255 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6256 }
6257
8c5b4e52
AM
6258 if (!fh->elf.dynamic)
6259 {
6260 struct plt_entry *ent;
5bd4f169 6261
8c5b4e52
AM
6262 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6263 if (ent->plt.refcount > 0)
6264 break;
6265 if (ent == NULL)
6266 return TRUE;
6267 }
5bd4f169 6268
8c5b4e52 6269 /* Create a descriptor as undefined if necessary. */
50bc7936 6270 if (fdh == NULL
0e1862bb 6271 && !bfd_link_executable (info)
50bc7936
AM
6272 && (fh->elf.root.type == bfd_link_hash_undefined
6273 || fh->elf.root.type == bfd_link_hash_undefweak))
6274 {
908b32fc 6275 fdh = make_fdh (info, fh);
bb700d78
AM
6276 if (fdh == NULL)
6277 return FALSE;
50bc7936 6278 }
648cca2c 6279
8c5b4e52 6280 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6281 if (fdh != NULL
6282 && fdh->fake
8c5b4e52
AM
6283 && (fh->elf.root.type == bfd_link_hash_defined
6284 || fh->elf.root.type == bfd_link_hash_defweak))
6285 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6286
8c5b4e52
AM
6287 /* Transfer dynamic linking information to the function descriptor. */
6288 if (fdh != NULL)
6289 {
f5385ebf
AM
6290 fdh->elf.ref_regular |= fh->elf.ref_regular;
6291 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6292 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6293 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6294 fdh->elf.dynamic |= fh->elf.dynamic;
6295 fdh->elf.needs_plt |= (fh->elf.needs_plt
6296 || fh->elf.type == STT_FUNC
6297 || fh->elf.type == STT_GNU_IFUNC);
6298 move_plt_plist (fh, fdh);
6299
6300 if (!fdh->elf.forced_local
6301 && fh->elf.dynindx != -1)
6302 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6303 return FALSE;
e86ce104
AM
6304 }
6305
50bc7936
AM
6306 /* Now that the info is on the function descriptor, clear the
6307 function code sym info. Any function code syms for which we
6308 don't have a definition in a regular file, we force local.
6309 This prevents a shared library from exporting syms that have
6310 been imported from another library. Function code syms that
6311 are really in the library we must leave global to prevent the
6312 linker dragging in a definition from a static library. */
93f3fa99
AM
6313 force_local = (!fh->elf.def_regular
6314 || fdh == NULL
6315 || !fdh->elf.def_regular
6316 || fdh->elf.forced_local);
50bc7936
AM
6317 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6318
b34976b6 6319 return TRUE;
e86ce104 6320}
40b8271b 6321
a4b6fadd
AM
6322static const struct sfpr_def_parms save_res_funcs[] =
6323 {
6324 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6325 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6326 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6327 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6328 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6329 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6330 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6331 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6332 { "._savef", 14, 31, savefpr, savefpr1_tail },
6333 { "._restf", 14, 31, restfpr, restfpr1_tail },
6334 { "_savevr_", 20, 31, savevr, savevr_tail },
6335 { "_restvr_", 20, 31, restvr, restvr_tail }
6336 };
6337
e86ce104 6338/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6339 this hook to a) provide some gcc support functions, and b) transfer
6340 dynamic linking information gathered so far on function code symbol
6341 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6342
b34976b6 6343static bfd_boolean
4ce794b7
AM
6344ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6345 struct bfd_link_info *info)
e86ce104
AM
6346{
6347 struct ppc_link_hash_table *htab;
6348
6349 htab = ppc_hash_table (info);
4dfe6ac6
NC
6350 if (htab == NULL)
6351 return FALSE;
6352
b32547cd
AM
6353 /* Provide any missing _save* and _rest* functions. */
6354 if (htab->sfpr != NULL)
6355 {
6356 unsigned int i;
6357
6358 htab->sfpr->size = 0;
6359 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6360 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6361 return FALSE;
6362 if (htab->sfpr->size == 0)
6363 htab->sfpr->flags |= SEC_EXCLUDE;
6364 }
6365
6366 if (bfd_link_relocatable (info))
6367 return TRUE;
6368
6369 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6370 {
6371 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6372 /* Make .TOC. defined so as to prevent it being made dynamic.
6373 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6374 if (!htab->elf.hgot->def_regular
6375 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6376 {
6377 htab->elf.hgot->root.type = bfd_link_hash_defined;
6378 htab->elf.hgot->root.u.def.value = 0;
6379 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6380 htab->elf.hgot->def_regular = 1;
6381 htab->elf.hgot->root.linker_def = 1;
6382 }
dba6fa9b 6383 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6384 htab->elf.hgot->other
6385 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6386 }
c66bb0ee 6387
8c5b4e52
AM
6388 if (htab->need_func_desc_adj)
6389 {
6390 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6391 htab->need_func_desc_adj = 0;
6392 }
805fc799 6393
b34976b6 6394 return TRUE;
e86ce104
AM
6395}
6396
d311bc8b 6397/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6398 aliases, that apply to read-only sections. Cannot be used after
6399 size_dynamic_sections. */
d311bc8b
AM
6400
6401static bfd_boolean
6402alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6403{
ed7007c1 6404 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6405 do
6406 {
5dbc8b37 6407 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
d311bc8b 6408 return TRUE;
ed7007c1 6409 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6410 }
6411 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6412
6413 return FALSE;
6414}
8a2058b5 6415
8a9e8e72
AM
6416/* Return whether EH has pc-relative dynamic relocs. */
6417
6418static bfd_boolean
6419pc_dynrelocs (struct ppc_link_hash_entry *eh)
6420{
6421 struct elf_dyn_relocs *p;
6422
190eb1dd 6423 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
8a9e8e72
AM
6424 if (p->pc_count != 0)
6425 return TRUE;
6426 return FALSE;
6427}
6428
8a2058b5
AM
6429/* Return true if a global entry stub will be created for H. Valid
6430 for ELFv2 before plt entries have been allocated. */
6431
6432static bfd_boolean
6433global_entry_stub (struct elf_link_hash_entry *h)
6434{
6435 struct plt_entry *pent;
6436
6437 if (!h->pointer_equality_needed
6438 || h->def_regular)
6439 return FALSE;
6440
6441 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6442 if (pent->plt.refcount > 0
6443 && pent->addend == 0)
6444 return TRUE;
6445
6446 return FALSE;
6447}
6448
e86ce104
AM
6449/* Adjust a symbol defined by a dynamic object and referenced by a
6450 regular object. The current definition is in some section of the
6451 dynamic object, but we're not including those sections. We have to
6452 change the definition to something the rest of the link can
6453 understand. */
6454
b34976b6 6455static bfd_boolean
4ce794b7
AM
6456ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6457 struct elf_link_hash_entry *h)
e86ce104
AM
6458{
6459 struct ppc_link_hash_table *htab;
5474d94f 6460 asection *s, *srel;
e86ce104
AM
6461
6462 htab = ppc_hash_table (info);
4dfe6ac6
NC
6463 if (htab == NULL)
6464 return FALSE;
e86ce104
AM
6465
6466 /* Deal with function syms. */
6467 if (h->type == STT_FUNC
e054468f 6468 || h->type == STT_GNU_IFUNC
f5385ebf 6469 || h->needs_plt)
e86ce104 6470 {
ed7007c1 6471 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6472 || SYMBOL_CALLS_LOCAL (info, h)
6473 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6474 /* Discard dyn_relocs when non-pic if we've decided that a
6475 function symbol is local and not an ifunc. We keep dynamic
6476 relocs for ifuncs when local rather than always emitting a
6477 plt call stub for them and defining the symbol on the call
6478 stub. We can't do that for ELFv1 anyway (a function symbol
6479 is defined on a descriptor, not code) and it can be faster at
6480 run-time due to not needing to bounce through a stub. The
6481 dyn_relocs for ifuncs will be applied even in a static
6482 executable. */
6483 if (!bfd_link_pic (info)
6484 && h->type != STT_GNU_IFUNC
6485 && local)
190eb1dd 6486 h->dyn_relocs = NULL;
529fe20e 6487
e86ce104
AM
6488 /* Clear procedure linkage table information for any symbol that
6489 won't need a .plt entry. */
411e1bfb
AM
6490 struct plt_entry *ent;
6491 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6492 if (ent->plt.refcount > 0)
6493 break;
8387904d 6494 if (ent == NULL
2d7ad24e
AM
6495 || (h->type != STT_GNU_IFUNC
6496 && local
3e04d765 6497 && (htab->can_convert_all_inline_plt
ed7007c1 6498 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6499 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6500 {
411e1bfb 6501 h->plt.plist = NULL;
f5385ebf 6502 h->needs_plt = 0;
d1eca1e4 6503 h->pointer_equality_needed = 0;
40b8271b 6504 }
8a2058b5 6505 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6506 {
d1eca1e4
AM
6507 /* Taking a function's address in a read/write section
6508 doesn't require us to define the function symbol in the
6509 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6510 be used instead. The reason we prefer a few more dynamic
6511 relocs is that calling via a global entry stub costs a
6512 few more instructions, and pointer_equality_needed causes
6513 extra work in ld.so when resolving these symbols. */
529fe20e 6514 if (global_entry_stub (h))
d1eca1e4 6515 {
5dbc8b37 6516 if (!_bfd_elf_readonly_dynrelocs (h))
529fe20e
AM
6517 {
6518 h->pointer_equality_needed = 0;
04383fd1
AM
6519 /* If we haven't seen a branch reloc and the symbol
6520 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6521 if (!h->needs_plt)
6522 h->plt.plist = NULL;
6523 }
6524 else if (!bfd_link_pic (info))
6525 /* We are going to be defining the function symbol on the
6526 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 6527 h->dyn_relocs = NULL;
d1eca1e4
AM
6528 }
6529
3988aed5
AM
6530 /* ELFv2 function symbols can't have copy relocs. */
6531 return TRUE;
6532 }
6533 else if (!h->needs_plt
5dbc8b37 6534 && !_bfd_elf_readonly_dynrelocs (h))
3988aed5 6535 {
04383fd1
AM
6536 /* If we haven't seen a branch reloc and the symbol isn't an
6537 ifunc then we don't need a plt entry. */
3988aed5
AM
6538 h->plt.plist = NULL;
6539 h->pointer_equality_needed = 0;
a345bc8d
AM
6540 return TRUE;
6541 }
5bd4f169 6542 }
bbd7ec4a 6543 else
411e1bfb 6544 h->plt.plist = NULL;
5bd4f169
AM
6545
6546 /* If this is a weak symbol, and there is a real definition, the
6547 processor independent code will have arranged for us to see the
6548 real definition first, and we can just use the same value. */
60d67dc8 6549 if (h->is_weakalias)
5bd4f169 6550 {
60d67dc8
AM
6551 struct elf_link_hash_entry *def = weakdef (h);
6552 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6553 h->root.u.def.section = def->root.u.def.section;
6554 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6555 if (def->root.u.def.section == htab->elf.sdynbss
6556 || def->root.u.def.section == htab->elf.sdynrelro)
190eb1dd 6557 h->dyn_relocs = NULL;
b34976b6 6558 return TRUE;
5bd4f169
AM
6559 }
6560
5bd4f169
AM
6561 /* If we are creating a shared library, we must presume that the
6562 only references to the symbol are via the global offset table.
6563 For such cases we need not do anything here; the relocations will
6564 be handled correctly by relocate_section. */
ec73ddcd 6565 if (!bfd_link_executable (info))
b34976b6 6566 return TRUE;
5bd4f169 6567
65f38f15
AM
6568 /* If there are no references to this symbol that do not use the
6569 GOT, we don't need to generate a copy reloc. */
f5385ebf 6570 if (!h->non_got_ref)
b34976b6 6571 return TRUE;
65f38f15 6572
b186458a 6573 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6574 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6575
d93d1c80
AM
6576 /* If -z nocopyreloc was given, don't generate them either. */
6577 || info->nocopyreloc
a127494f 6578
dce2246a 6579 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6580 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6581 || (ELIMINATE_COPY_RELOCS
6582 && !h->needs_copy
6583 && !alias_readonly_dynrelocs (h))
65f38f15 6584
d93d1c80
AM
6585 /* Protected variables do not work with .dynbss. The copy in
6586 .dynbss won't be used by the shared library with the protected
6587 definition for the variable. Text relocations are preferable
6588 to an incorrect program. */
6589 || h->protected_def)
529fe20e 6590 return TRUE;
a127494f 6591
e1c6cf61
AM
6592 if (h->type == STT_FUNC
6593 || h->type == STT_GNU_IFUNC)
97b639ba 6594 {
e1c6cf61
AM
6595 /* .dynbss copies of function symbols only work if we have
6596 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6597 use dot-symbols and set the function symbol size to the text
6598 size of the function rather than the size of the descriptor.
6599 That's wrong for copying a descriptor. */
ed7007c1 6600 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6601 || !(h->size == 24 || h->size == 16))
6602 return TRUE;
6603
6604 /* We should never get here, but unfortunately there are old
6605 versions of gcc (circa gcc-3.2) that improperly for the
6606 ELFv1 ABI put initialized function pointers, vtable refs and
6607 suchlike in read-only sections. Allow them to proceed, but
6608 warn that this might break at runtime. */
25f53a85 6609 info->callbacks->einfo
c1c8c1ef 6610 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6611 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6612 h->root.root.string);
6613 }
5d35169e
AM
6614
6615 /* This is a reference to a symbol defined by a dynamic object which
6616 is not a function. */
6617
5bd4f169
AM
6618 /* We must allocate the symbol in our .dynbss section, which will
6619 become part of the .bss section of the executable. There will be
6620 an entry for this symbol in the .dynsym section. The dynamic
6621 object will contain position independent code, so all references
6622 from the dynamic object to this symbol will go through the global
6623 offset table. The dynamic linker will use the .dynsym entry to
6624 determine the address it must put in the global offset table, so
6625 both the dynamic object and the regular object will refer to the
6626 same memory location for the variable. */
5474d94f
AM
6627 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6628 {
6629 s = htab->elf.sdynrelro;
6630 srel = htab->elf.sreldynrelro;
6631 }
6632 else
6633 {
6634 s = htab->elf.sdynbss;
6635 srel = htab->elf.srelbss;
6636 }
1d7e9d18 6637 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6638 {
4a7e5234
AM
6639 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6640 linker to copy the initial value out of the dynamic object
6641 and into the runtime process image. */
5474d94f 6642 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6643 h->needs_copy = 1;
5bd4f169
AM
6644 }
6645
529fe20e 6646 /* We no longer want dyn_relocs. */
190eb1dd 6647 h->dyn_relocs = NULL;
6cabe1ea 6648 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6649}
6650
e86ce104
AM
6651/* If given a function descriptor symbol, hide both the function code
6652 sym and the descriptor. */
6653static void
4ce794b7
AM
6654ppc64_elf_hide_symbol (struct bfd_link_info *info,
6655 struct elf_link_hash_entry *h,
6656 bfd_boolean force_local)
e86ce104 6657{
34814b9f 6658 struct ppc_link_hash_entry *eh;
e86ce104
AM
6659 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6660
87469ba2
AM
6661 if (ppc_hash_table (info) == NULL)
6662 return;
6663
ed7007c1 6664 eh = ppc_elf_hash_entry (h);
34814b9f 6665 if (eh->is_func_descriptor)
e86ce104 6666 {
34814b9f 6667 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6668
721956f4 6669 if (fh == NULL)
d1329ca3
AM
6670 {
6671 const char *p, *q;
b8ac2841 6672 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6673 char save;
6674
6675 /* We aren't supposed to use alloca in BFD because on
6676 systems which do not have alloca the version in libiberty
6677 calls xmalloc, which might cause the program to crash
6678 when it runs out of memory. This function doesn't have a
6679 return status, so there's no way to gracefully return an
6680 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6681 accessed; It's either a string in an ELF string table,
6682 or allocated in an objalloc structure. */
d1329ca3 6683
34814b9f 6684 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6685 save = *p;
6686 *(char *) p = '.';
ed7007c1
AM
6687 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6688 FALSE, FALSE));
d1329ca3
AM
6689 *(char *) p = save;
6690
6691 /* Unfortunately, if it so happens that the string we were
6692 looking for was allocated immediately before this string,
6693 then we overwrote the string terminator. That's the only
6694 reason the lookup should fail. */
6695 if (fh == NULL)
6696 {
34814b9f
AM
6697 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6698 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6699 --q, --p;
34814b9f 6700 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6701 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6702 FALSE, FALSE));
d1329ca3
AM
6703 }
6704 if (fh != NULL)
6705 {
34814b9f
AM
6706 eh->oh = fh;
6707 fh->oh = eh;
d1329ca3
AM
6708 }
6709 }
e86ce104 6710 if (fh != NULL)
34814b9f 6711 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6712 }
6713}
6714
411e1bfb 6715static bfd_boolean
8843416a
AM
6716get_sym_h (struct elf_link_hash_entry **hp,
6717 Elf_Internal_Sym **symp,
6718 asection **symsecp,
f961d9dd 6719 unsigned char **tls_maskp,
8843416a
AM
6720 Elf_Internal_Sym **locsymsp,
6721 unsigned long r_symndx,
6722 bfd *ibfd)
411e1bfb 6723{
0ffa91dd 6724 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6725
6726 if (r_symndx >= symtab_hdr->sh_info)
6727 {
6728 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6729 struct elf_link_hash_entry *h;
6730
6731 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6732 h = elf_follow_link (h);
411e1bfb
AM
6733
6734 if (hp != NULL)
6735 *hp = h;
6736
6737 if (symp != NULL)
6738 *symp = NULL;
6739
6740 if (symsecp != NULL)
6741 {
6742 asection *symsec = NULL;
6743 if (h->root.type == bfd_link_hash_defined
6744 || h->root.type == bfd_link_hash_defweak)
6745 symsec = h->root.u.def.section;
6746 *symsecp = symsec;
6747 }
6748
e7b938ca 6749 if (tls_maskp != NULL)
ed7007c1 6750 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6751 }
6752 else
6753 {
6754 Elf_Internal_Sym *sym;
6755 Elf_Internal_Sym *locsyms = *locsymsp;
6756
6757 if (locsyms == NULL)
6758 {
6759 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6760 if (locsyms == NULL)
6761 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6762 symtab_hdr->sh_info,
6763 0, NULL, NULL, NULL);
6764 if (locsyms == NULL)
6765 return FALSE;
6766 *locsymsp = locsyms;
6767 }
6768 sym = locsyms + r_symndx;
6769
6770 if (hp != NULL)
6771 *hp = NULL;
6772
6773 if (symp != NULL)
6774 *symp = sym;
6775
6776 if (symsecp != NULL)
cb33740c 6777 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6778
e7b938ca 6779 if (tls_maskp != NULL)
411e1bfb
AM
6780 {
6781 struct got_entry **lgot_ents;
f961d9dd 6782 unsigned char *tls_mask;
411e1bfb 6783
e7b938ca 6784 tls_mask = NULL;
411e1bfb
AM
6785 lgot_ents = elf_local_got_ents (ibfd);
6786 if (lgot_ents != NULL)
6787 {
e054468f
AM
6788 struct plt_entry **local_plt = (struct plt_entry **)
6789 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6790 unsigned char *lgot_masks = (unsigned char *)
e054468f 6791 (local_plt + symtab_hdr->sh_info);
e7b938ca 6792 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6793 }
e7b938ca 6794 *tls_maskp = tls_mask;
411e1bfb
AM
6795 }
6796 }
6797 return TRUE;
6798}
6799
e7b938ca 6800/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6801 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6802 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6803
6804static int
f961d9dd 6805get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6806 unsigned long *toc_symndx,
6807 bfd_vma *toc_addend,
0d4792f7 6808 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6809 const Elf_Internal_Rela *rel,
6810 bfd *ibfd)
411e1bfb
AM
6811{
6812 unsigned long r_symndx;
0d4792f7 6813 int next_r;
411e1bfb
AM
6814 struct elf_link_hash_entry *h;
6815 Elf_Internal_Sym *sym;
6816 asection *sec;
6817 bfd_vma off;
6818
6819 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6820 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6821 return 0;
411e1bfb 6822
37da22e5
AM
6823 if ((*tls_maskp != NULL
6824 && (**tls_maskp & TLS_TLS) != 0
6825 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6826 || sec == NULL
6bee8834 6827 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6828 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6829 return 1;
411e1bfb
AM
6830
6831 /* Look inside a TOC section too. */
6832 if (h != NULL)
6833 {
6834 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6835 off = h->root.u.def.value;
6836 }
6837 else
6838 off = sym->st_value;
6839 off += rel->r_addend;
6840 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6841 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6842 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6843 if (toc_symndx != NULL)
6844 *toc_symndx = r_symndx;
3a71aa26
AM
6845 if (toc_addend != NULL)
6846 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6847 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6848 return 0;
854b41e7 6849 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6850 && (next_r == -1 || next_r == -2))
6851 return 1 - next_r;
951fd09b 6852 return 1;
411e1bfb
AM
6853}
6854
3b421ab3
AM
6855/* Find (or create) an entry in the tocsave hash table. */
6856
6857static struct tocsave_entry *
6858tocsave_find (struct ppc_link_hash_table *htab,
6859 enum insert_option insert,
6860 Elf_Internal_Sym **local_syms,
6861 const Elf_Internal_Rela *irela,
6862 bfd *ibfd)
6863{
6864 unsigned long r_indx;
6865 struct elf_link_hash_entry *h;
6866 Elf_Internal_Sym *sym;
6867 struct tocsave_entry ent, *p;
6868 hashval_t hash;
6869 struct tocsave_entry **slot;
6870
6871 r_indx = ELF64_R_SYM (irela->r_info);
6872 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6873 return NULL;
6874 if (ent.sec == NULL || ent.sec->output_section == NULL)
6875 {
4eca0228 6876 _bfd_error_handler
871b3ab2 6877 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6878 return NULL;
6879 }
6880
6881 if (h != NULL)
6882 ent.offset = h->root.u.def.value;
6883 else
6884 ent.offset = sym->st_value;
6885 ent.offset += irela->r_addend;
6886
6887 hash = tocsave_htab_hash (&ent);
6888 slot = ((struct tocsave_entry **)
6889 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6890 if (slot == NULL)
6891 return NULL;
6892
6893 if (*slot == NULL)
6894 {
6895 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6896 if (p == NULL)
6897 return NULL;
6898 *p = ent;
6899 *slot = p;
6900 }
6901 return *slot;
6902}
6903
754021d0 6904/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6905 code for the old ABI, these will already have been done. */
754021d0
AM
6906
6907static bfd_boolean
6908adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6909{
6910 struct ppc_link_hash_entry *eh;
6911 asection *sym_sec;
74f0fb50 6912 struct _opd_sec_data *opd;
754021d0
AM
6913
6914 if (h->root.type == bfd_link_hash_indirect)
6915 return TRUE;
6916
754021d0
AM
6917 if (h->root.type != bfd_link_hash_defined
6918 && h->root.type != bfd_link_hash_defweak)
6919 return TRUE;
6920
ed7007c1 6921 eh = ppc_elf_hash_entry (h);
754021d0
AM
6922 if (eh->adjust_done)
6923 return TRUE;
6924
6925 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6926 opd = get_opd_info (sym_sec);
6927 if (opd != NULL && opd->adjust != NULL)
754021d0 6928 {
51aecdc5 6929 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6930 if (adjust == -1)
6931 {
6932 /* This entry has been deleted. */
b3fac117 6933 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6934 if (dsec == NULL)
6935 {
6936 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6937 if (discarded_section (dsec))
81688140 6938 {
b3fac117 6939 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6940 break;
6941 }
6942 }
4025353c 6943 eh->elf.root.u.def.value = 0;
81688140 6944 eh->elf.root.u.def.section = dsec;
4025353c
AM
6945 }
6946 else
6947 eh->elf.root.u.def.value += adjust;
754021d0
AM
6948 eh->adjust_done = 1;
6949 }
6950 return TRUE;
6951}
6952
8c1d1bb8 6953/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6954 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6955 have already been determined. */
6956
6957static bfd_boolean
6958dec_dynrel_count (bfd_vma r_info,
6959 asection *sec,
6960 struct bfd_link_info *info,
6961 Elf_Internal_Sym **local_syms,
6962 struct elf_link_hash_entry *h,
19e08130 6963 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6964{
6965 enum elf_ppc64_reloc_type r_type;
19e08130 6966 asection *sym_sec = NULL;
8c1d1bb8
AM
6967
6968 /* Can this reloc be dynamic? This switch, and later tests here
6969 should be kept in sync with the code in check_relocs. */
6970 r_type = ELF64_R_TYPE (r_info);
6971 switch (r_type)
6972 {
6973 default:
6974 return TRUE;
6975
1bdd8fac
AM
6976 case R_PPC64_TOC16:
6977 case R_PPC64_TOC16_DS:
6978 case R_PPC64_TOC16_LO:
6979 case R_PPC64_TOC16_HI:
6980 case R_PPC64_TOC16_HA:
6981 case R_PPC64_TOC16_LO_DS:
6982 if (h == NULL)
6983 return TRUE;
6984 break;
6985
8c1d1bb8
AM
6986 case R_PPC64_TPREL16:
6987 case R_PPC64_TPREL16_LO:
6988 case R_PPC64_TPREL16_HI:
6989 case R_PPC64_TPREL16_HA:
6990 case R_PPC64_TPREL16_DS:
6991 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6992 case R_PPC64_TPREL16_HIGH:
6993 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6994 case R_PPC64_TPREL16_HIGHER:
6995 case R_PPC64_TPREL16_HIGHERA:
6996 case R_PPC64_TPREL16_HIGHEST:
6997 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 6998 case R_PPC64_TPREL64:
c213164a 6999 case R_PPC64_TPREL34:
8c1d1bb8
AM
7000 case R_PPC64_DTPMOD64:
7001 case R_PPC64_DTPREL64:
7002 case R_PPC64_ADDR64:
7003 case R_PPC64_REL30:
7004 case R_PPC64_REL32:
7005 case R_PPC64_REL64:
7006 case R_PPC64_ADDR14:
7007 case R_PPC64_ADDR14_BRNTAKEN:
7008 case R_PPC64_ADDR14_BRTAKEN:
7009 case R_PPC64_ADDR16:
7010 case R_PPC64_ADDR16_DS:
7011 case R_PPC64_ADDR16_HA:
7012 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7013 case R_PPC64_ADDR16_HIGH:
7014 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7015 case R_PPC64_ADDR16_HIGHER:
7016 case R_PPC64_ADDR16_HIGHERA:
7017 case R_PPC64_ADDR16_HIGHEST:
7018 case R_PPC64_ADDR16_HIGHESTA:
7019 case R_PPC64_ADDR16_LO:
7020 case R_PPC64_ADDR16_LO_DS:
7021 case R_PPC64_ADDR24:
7022 case R_PPC64_ADDR32:
7023 case R_PPC64_UADDR16:
7024 case R_PPC64_UADDR32:
7025 case R_PPC64_UADDR64:
7026 case R_PPC64_TOC:
5663e321
AM
7027 case R_PPC64_D34:
7028 case R_PPC64_D34_LO:
7029 case R_PPC64_D34_HI30:
7030 case R_PPC64_D34_HA30:
7031 case R_PPC64_ADDR16_HIGHER34:
7032 case R_PPC64_ADDR16_HIGHERA34:
7033 case R_PPC64_ADDR16_HIGHEST34:
7034 case R_PPC64_ADDR16_HIGHESTA34:
7035 case R_PPC64_D28:
8c1d1bb8
AM
7036 break;
7037 }
7038
7039 if (local_syms != NULL)
7040 {
7041 unsigned long r_symndx;
8c1d1bb8
AM
7042 bfd *ibfd = sec->owner;
7043
7044 r_symndx = ELF64_R_SYM (r_info);
7045 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7046 return FALSE;
7047 }
7048
ec73ddcd
AM
7049 if ((h != NULL
7050 && (h->root.type == bfd_link_hash_defweak
7051 || !h->def_regular))
7052 || (h != NULL
7053 && !bfd_link_executable (info)
7054 && !SYMBOLIC_BIND (info, h))
7055 || (bfd_link_pic (info)
7056 && must_be_dyn_reloc (info, r_type))
7057 || (!bfd_link_pic (info)
7058 && (h != NULL
7059 ? h->type == STT_GNU_IFUNC
7060 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7061 ;
7062 else
7063 return TRUE;
7064
7065 if (h != NULL)
6edfbbad 7066 {
19e08130
AM
7067 struct elf_dyn_relocs *p;
7068 struct elf_dyn_relocs **pp;
190eb1dd 7069 pp = &h->dyn_relocs;
19e08130
AM
7070
7071 /* elf_gc_sweep may have already removed all dyn relocs associated
7072 with local syms for a given section. Also, symbol flags are
7073 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7074 report a dynreloc miscount. */
7075 if (*pp == NULL && info->gc_sections)
7076 return TRUE;
7077
7078 while ((p = *pp) != NULL)
60124e18 7079 {
19e08130
AM
7080 if (p->sec == sec)
7081 {
7082 if (!must_be_dyn_reloc (info, r_type))
7083 p->pc_count -= 1;
7084 p->count -= 1;
7085 if (p->count == 0)
7086 *pp = p->next;
7087 return TRUE;
7088 }
7089 pp = &p->next;
60124e18 7090 }
6edfbbad 7091 }
19e08130
AM
7092 else
7093 {
7094 struct ppc_dyn_relocs *p;
7095 struct ppc_dyn_relocs **pp;
7096 void *vpp;
7097 bfd_boolean is_ifunc;
8c1d1bb8 7098
19e08130
AM
7099 if (local_syms == NULL)
7100 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7101 if (sym_sec == NULL)
7102 sym_sec = sec;
c57da1a7 7103
19e08130
AM
7104 vpp = &elf_section_data (sym_sec)->local_dynrel;
7105 pp = (struct ppc_dyn_relocs **) vpp;
7106
7107 if (*pp == NULL && info->gc_sections)
7108 return TRUE;
7109
7110 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7111 while ((p = *pp) != NULL)
8c1d1bb8 7112 {
19e08130
AM
7113 if (p->sec == sec && p->ifunc == is_ifunc)
7114 {
7115 p->count -= 1;
7116 if (p->count == 0)
7117 *pp = p->next;
7118 return TRUE;
7119 }
7120 pp = &p->next;
8c1d1bb8 7121 }
8c1d1bb8
AM
7122 }
7123
695344c0 7124 /* xgettext:c-format */
cf97bcb0
AM
7125 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7126 sec->owner, sec);
8c1d1bb8
AM
7127 bfd_set_error (bfd_error_bad_value);
7128 return FALSE;
7129}
7130
754021d0
AM
7131/* Remove unused Official Procedure Descriptor entries. Currently we
7132 only remove those associated with functions in discarded link-once
7133 sections, or weakly defined functions that have been overridden. It
7134 would be possible to remove many more entries for statically linked
7135 applications. */
7136
b34976b6 7137bfd_boolean
e7d1c40c 7138ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7139{
7140 bfd *ibfd;
754021d0 7141 bfd_boolean some_edited = FALSE;
3f764659 7142 asection *need_pad = NULL;
e7d1c40c
AM
7143 struct ppc_link_hash_table *htab;
7144
7145 htab = ppc_hash_table (info);
7146 if (htab == NULL)
7147 return FALSE;
1e2f5b6e 7148
c72f2fb2 7149 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7150 {
7151 asection *sec;
7152 Elf_Internal_Rela *relstart, *rel, *relend;
7153 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7154 Elf_Internal_Sym *local_syms;
74f0fb50 7155 struct _opd_sec_data *opd;
51aecdc5 7156 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7157 bfd_size_type cnt_16b = 0;
1e2f5b6e 7158
854b41e7
AM
7159 if (!is_ppc64_elf (ibfd))
7160 continue;
7161
1e2f5b6e 7162 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7163 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7164 continue;
7165
dbaa2011 7166 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7167 continue;
7168
1e2f5b6e
AM
7169 if (sec->output_section == bfd_abs_section_ptr)
7170 continue;
7171
7172 /* Look through the section relocs. */
7173 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7174 continue;
7175
6cdc0ccc 7176 local_syms = NULL;
0ffa91dd 7177 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7178
7179 /* Read the relocations. */
4ce794b7 7180 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7181 info->keep_memory);
1e2f5b6e 7182 if (relstart == NULL)
b34976b6 7183 return FALSE;
1e2f5b6e
AM
7184
7185 /* First run through the relocs to check they are sane, and to
7186 determine whether we need to edit this opd section. */
b34976b6 7187 need_edit = FALSE;
51aecdc5 7188 broken = FALSE;
3f764659 7189 need_pad = sec;
1e2f5b6e 7190 relend = relstart + sec->reloc_count;
50bc7936 7191 for (rel = relstart; rel < relend; )
1e2f5b6e 7192 {
04c9666a 7193 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7194 unsigned long r_symndx;
7195 asection *sym_sec;
7196 struct elf_link_hash_entry *h;
7197 Elf_Internal_Sym *sym;
51aecdc5 7198 bfd_vma offset;
1e2f5b6e 7199
51aecdc5 7200 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7201 only interested in the reloc pointing to a function entry
7202 point. */
51aecdc5
AM
7203 offset = rel->r_offset;
7204 if (rel + 1 == relend
7205 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7206 {
7207 /* If someone messes with .opd alignment then after a
7208 "ld -r" we might have padding in the middle of .opd.
7209 Also, there's nothing to prevent someone putting
7210 something silly in .opd with the assembler. No .opd
b34976b6 7211 optimization for them! */
3f764659 7212 broken_opd:
4eca0228 7213 _bfd_error_handler
871b3ab2 7214 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7215 broken = TRUE;
1e2f5b6e
AM
7216 break;
7217 }
7218
50bc7936
AM
7219 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7220 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7221 {
4eca0228 7222 _bfd_error_handler
695344c0 7223 /* xgettext:c-format */
871b3ab2 7224 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7225 ibfd, r_type);
51aecdc5 7226 broken = TRUE;
50bc7936
AM
7227 break;
7228 }
7229
1e2f5b6e 7230 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7231 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7232 r_symndx, ibfd))
50bc7936 7233 goto error_ret;
1e2f5b6e
AM
7234
7235 if (sym_sec == NULL || sym_sec->owner == NULL)
7236 {
411e1bfb
AM
7237 const char *sym_name;
7238 if (h != NULL)
7239 sym_name = h->root.root.string;
7240 else
26c61ae5
L
7241 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7242 sym_sec);
411e1bfb 7243
4eca0228 7244 _bfd_error_handler
695344c0 7245 /* xgettext:c-format */
871b3ab2 7246 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7247 ibfd, sym_name);
51aecdc5 7248 broken = TRUE;
1e2f5b6e
AM
7249 break;
7250 }
7251
51020317
AM
7252 /* opd entries are always for functions defined in the
7253 current input bfd. If the symbol isn't defined in the
7254 input bfd, then we won't be using the function in this
7255 bfd; It must be defined in a linkonce section in another
7256 bfd, or is weak. It's also possible that we are
7257 discarding the function due to a linker script /DISCARD/,
7258 which we test for via the output_section. */
7259 if (sym_sec->owner != ibfd
7260 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7261 need_edit = TRUE;
1e2f5b6e 7262
50bc7936 7263 rel += 2;
51aecdc5
AM
7264 if (rel + 1 == relend
7265 || (rel + 2 < relend
7266 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7267 ++rel;
7268
7269 if (rel == relend)
3f764659
JJ
7270 {
7271 if (sec->size == offset + 24)
7272 {
7273 need_pad = NULL;
7274 break;
7275 }
51aecdc5 7276 if (sec->size == offset + 16)
3f764659
JJ
7277 {
7278 cnt_16b++;
7279 break;
7280 }
7281 goto broken_opd;
7282 }
3f764659
JJ
7283 else if (rel + 1 < relend
7284 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7285 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7286 {
51aecdc5
AM
7287 if (rel[0].r_offset == offset + 16)
7288 cnt_16b++;
7289 else if (rel[0].r_offset != offset + 24)
7290 goto broken_opd;
3f764659
JJ
7291 }
7292 else
7293 goto broken_opd;
1e2f5b6e
AM
7294 }
7295
e7d1c40c 7296 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7297
51aecdc5 7298 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7299 {
7300 Elf_Internal_Rela *write_rel;
d4730f92 7301 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7302 bfd_byte *rptr, *wptr;
983bddc8 7303 bfd_byte *new_contents;
74f0fb50
AM
7304 bfd_size_type amt;
7305
983bddc8 7306 new_contents = NULL;
51aecdc5 7307 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7308 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7309 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7310 if (opd->adjust == NULL)
7311 return FALSE;
1e2f5b6e
AM
7312
7313 /* This seems a waste of time as input .opd sections are all
7314 zeros as generated by gcc, but I suppose there's no reason
7315 this will always be so. We might start putting something in
7316 the third word of .opd entries. */
7317 if ((sec->flags & SEC_IN_MEMORY) == 0)
7318 {
eea6121a
AM
7319 bfd_byte *loc;
7320 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7321 {
c9594989 7322 free (loc);
50bc7936 7323 error_ret:
c9594989 7324 if (symtab_hdr->contents != (unsigned char *) local_syms)
6cdc0ccc 7325 free (local_syms);
6cdc0ccc
AM
7326 if (elf_section_data (sec)->relocs != relstart)
7327 free (relstart);
b34976b6 7328 return FALSE;
6cdc0ccc 7329 }
1e2f5b6e
AM
7330 sec->contents = loc;
7331 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7332 }
7333
7334 elf_section_data (sec)->relocs = relstart;
7335
3f764659 7336 new_contents = sec->contents;
3f764659
JJ
7337 if (add_aux_fields)
7338 {
7339 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7340 if (new_contents == NULL)
7341 return FALSE;
51aecdc5 7342 need_pad = NULL;
3f764659 7343 }
b4f4e59f
AM
7344 wptr = new_contents;
7345 rptr = sec->contents;
1e2f5b6e 7346 write_rel = relstart;
51aecdc5 7347 for (rel = relstart; rel < relend; )
1e2f5b6e 7348 {
50bc7936
AM
7349 unsigned long r_symndx;
7350 asection *sym_sec;
7351 struct elf_link_hash_entry *h;
51aecdc5 7352 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7353 Elf_Internal_Sym *sym;
51aecdc5
AM
7354 long opd_ent_size;
7355 Elf_Internal_Rela *next_rel;
7356 bfd_boolean skip;
50bc7936
AM
7357
7358 r_symndx = ELF64_R_SYM (rel->r_info);
7359 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7360 r_symndx, ibfd))
50bc7936
AM
7361 goto error_ret;
7362
51aecdc5
AM
7363 next_rel = rel + 2;
7364 if (next_rel + 1 == relend
7365 || (next_rel + 2 < relend
7366 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7367 ++next_rel;
7368
7369 /* See if the .opd entry is full 24 byte or
7370 16 byte (with fd_aux entry overlapped with next
7371 fd_func). */
7372 opd_ent_size = 24;
7373 if (next_rel == relend)
1e2f5b6e 7374 {
51aecdc5 7375 if (sec->size == rel->r_offset + 16)
3f764659 7376 opd_ent_size = 16;
51aecdc5
AM
7377 }
7378 else if (next_rel->r_offset == rel->r_offset + 16)
7379 opd_ent_size = 16;
3f764659 7380
51aecdc5
AM
7381 if (h != NULL
7382 && h->root.root.string[0] == '.')
7383 {
ed7007c1 7384 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7385 if (fdh != NULL)
7386 {
7387 fdh = ppc_follow_link (fdh);
7388 if (fdh->elf.root.type != bfd_link_hash_defined
7389 && fdh->elf.root.type != bfd_link_hash_defweak)
7390 fdh = NULL;
7391 }
51aecdc5 7392 }
1e2f5b6e 7393
51aecdc5
AM
7394 skip = (sym_sec->owner != ibfd
7395 || sym_sec->output_section == bfd_abs_section_ptr);
7396 if (skip)
7397 {
7398 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7399 {
51aecdc5
AM
7400 /* Arrange for the function descriptor sym
7401 to be dropped. */
7402 fdh->elf.root.u.def.value = 0;
7403 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7404 }
51aecdc5 7405 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7406
0e1862bb 7407 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7408 rel = next_rel;
7409 else
7410 while (1)
7411 {
7412 if (!dec_dynrel_count (rel->r_info, sec, info,
7413 NULL, h, sym))
7414 goto error_ret;
754021d0 7415
51aecdc5
AM
7416 if (++rel == next_rel)
7417 break;
1e2f5b6e 7418
51aecdc5
AM
7419 r_symndx = ELF64_R_SYM (rel->r_info);
7420 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7421 r_symndx, ibfd))
7422 goto error_ret;
7423 }
50bc7936
AM
7424 }
7425 else
1e2f5b6e 7426 {
51aecdc5
AM
7427 /* We'll be keeping this opd entry. */
7428 long adjust;
7429
7430 if (fdh != NULL)
7431 {
7432 /* Redefine the function descriptor symbol to
7433 this location in the opd section. It is
7434 necessary to update the value here rather
7435 than using an array of adjustments as we do
7436 for local symbols, because various places
7437 in the generic ELF code use the value
7438 stored in u.def.value. */
7439 fdh->elf.root.u.def.value = wptr - new_contents;
7440 fdh->adjust_done = 1;
7441 }
7442
7443 /* Local syms are a bit tricky. We could
7444 tweak them as they can be cached, but
7445 we'd need to look through the local syms
7446 for the function descriptor sym which we
7447 don't have at the moment. So keep an
7448 array of adjustments. */
7449 adjust = (wptr - new_contents) - (rptr - sec->contents);
7450 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7451
7452 if (wptr != rptr)
7453 memcpy (wptr, rptr, opd_ent_size);
7454 wptr += opd_ent_size;
7455 if (add_aux_fields && opd_ent_size == 16)
7456 {
7457 memset (wptr, '\0', 8);
7458 wptr += 8;
7459 }
7460
50bc7936 7461 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7462 new opd entries. */
7463 for ( ; rel != next_rel; ++rel)
7464 {
7465 rel->r_offset += adjust;
7466 if (write_rel != rel)
7467 memcpy (write_rel, rel, sizeof (*rel));
7468 ++write_rel;
7469 }
1e2f5b6e 7470 }
51aecdc5
AM
7471
7472 rptr += opd_ent_size;
1e2f5b6e
AM
7473 }
7474
3f764659 7475 sec->size = wptr - new_contents;
1e2f5b6e 7476 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7477 if (add_aux_fields)
7478 {
7479 free (sec->contents);
7480 sec->contents = new_contents;
7481 }
7482
05bf9422 7483 /* Fudge the header size too, as this is used later in
cdcf6e38 7484 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7485 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7486 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7487 some_edited = TRUE;
1e2f5b6e 7488 }
6cdc0ccc 7489 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7490 free (relstart);
6cdc0ccc 7491
411e1bfb
AM
7492 if (local_syms != NULL
7493 && symtab_hdr->contents != (unsigned char *) local_syms)
7494 {
7495 if (!info->keep_memory)
7496 free (local_syms);
7497 else
7498 symtab_hdr->contents = (unsigned char *) local_syms;
7499 }
7500 }
7501
754021d0
AM
7502 if (some_edited)
7503 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7504
3f764659
JJ
7505 /* If we are doing a final link and the last .opd entry is just 16 byte
7506 long, add a 8 byte padding after it. */
0e1862bb 7507 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7508 {
7509 bfd_byte *p;
7510
7511 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7512 {
7513 BFD_ASSERT (need_pad->size > 0);
7514
7515 p = bfd_malloc (need_pad->size + 8);
7516 if (p == NULL)
7517 return FALSE;
699733f6 7518
2cdcc330
AM
7519 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7520 p, 0, need_pad->size))
3f764659
JJ
7521 return FALSE;
7522
7523 need_pad->contents = p;
7524 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7525 }
7526 else
7527 {
7528 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7529 if (p == NULL)
7530 return FALSE;
7531
7532 need_pad->contents = p;
7533 }
7534
7535 memset (need_pad->contents + need_pad->size, 0, 8);
7536 need_pad->size += 8;
7537 }
7538
411e1bfb
AM
7539 return TRUE;
7540}
7541
3e04d765
AM
7542/* Analyze inline PLT call relocations to see whether calls to locally
7543 defined functions can be converted to direct calls. */
7544
7545bfd_boolean
7546ppc64_elf_inline_plt (struct bfd_link_info *info)
7547{
7548 struct ppc_link_hash_table *htab;
7549 bfd *ibfd;
7550 asection *sec;
7551 bfd_vma low_vma, high_vma, limit;
7552
7553 htab = ppc_hash_table (info);
7554 if (htab == NULL)
7555 return FALSE;
7556
7557 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7558 reduced somewhat to cater for possible stubs that might be added
7559 between the call and its destination. */
7560 if (htab->params->group_size < 0)
7561 {
7562 limit = -htab->params->group_size;
7563 if (limit == 1)
7564 limit = 0x1e00000;
7565 }
7566 else
7567 {
7568 limit = htab->params->group_size;
7569 if (limit == 1)
7570 limit = 0x1c00000;
7571 }
7572
7573 low_vma = -1;
7574 high_vma = 0;
7575 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7576 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7577 {
7578 if (low_vma > sec->vma)
7579 low_vma = sec->vma;
7580 if (high_vma < sec->vma + sec->size)
7581 high_vma = sec->vma + sec->size;
7582 }
7583
7584 /* If a "bl" can reach anywhere in local code sections, then we can
7585 convert all inline PLT sequences to direct calls when the symbol
7586 is local. */
7587 if (high_vma - low_vma < limit)
7588 {
7589 htab->can_convert_all_inline_plt = 1;
7590 return TRUE;
7591 }
7592
7593 /* Otherwise, go looking through relocs for cases where a direct
7594 call won't reach. Mark the symbol on any such reloc to disable
7595 the optimization and keep the PLT entry as it seems likely that
7596 this will be better than creating trampolines. Note that this
7597 will disable the optimization for all inline PLT calls to a
7598 particular symbol, not just those that won't reach. The
7599 difficulty in doing a more precise optimization is that the
7600 linker needs to make a decision depending on whether a
7601 particular R_PPC64_PLTCALL insn can be turned into a direct
7602 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7603 the sequence, and there is nothing that ties those relocs
7604 together except their symbol. */
7605
7606 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7607 {
7608 Elf_Internal_Shdr *symtab_hdr;
7609 Elf_Internal_Sym *local_syms;
7610
7611 if (!is_ppc64_elf (ibfd))
7612 continue;
7613
7614 local_syms = NULL;
7615 symtab_hdr = &elf_symtab_hdr (ibfd);
7616
7617 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7618 if (ppc64_elf_section_data (sec)->has_pltcall
7619 && !bfd_is_abs_section (sec->output_section))
7620 {
7621 Elf_Internal_Rela *relstart, *rel, *relend;
7622
7623 /* Read the relocations. */
7624 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7625 info->keep_memory);
7626 if (relstart == NULL)
7627 return FALSE;
7628
7629 relend = relstart + sec->reloc_count;
435edf0b 7630 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
7631 {
7632 enum elf_ppc64_reloc_type r_type;
7633 unsigned long r_symndx;
7634 asection *sym_sec;
7635 struct elf_link_hash_entry *h;
7636 Elf_Internal_Sym *sym;
7637 unsigned char *tls_maskp;
7638
7639 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7640 if (r_type != R_PPC64_PLTCALL
7641 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7642 continue;
7643
7644 r_symndx = ELF64_R_SYM (rel->r_info);
7645 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7646 r_symndx, ibfd))
7647 {
7648 if (elf_section_data (sec)->relocs != relstart)
7649 free (relstart);
c9594989 7650 if (symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7651 free (local_syms);
7652 return FALSE;
7653 }
7654
7655 if (sym_sec != NULL && sym_sec->output_section != NULL)
7656 {
7657 bfd_vma from, to;
7658 if (h != NULL)
7659 to = h->root.u.def.value;
7660 else
7661 to = sym->st_value;
7662 to += (rel->r_addend
7663 + sym_sec->output_offset
7664 + sym_sec->output_section->vma);
7665 from = (rel->r_offset
7666 + sec->output_offset
7667 + sec->output_section->vma);
5663e321
AM
7668 if (to - from + limit < 2 * limit
7669 && !(r_type == R_PPC64_PLTCALL_NOTOC
7670 && (((h ? h->other : sym->st_other)
7671 & STO_PPC64_LOCAL_MASK)
4a4e7361 7672 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7673 *tls_maskp &= ~PLT_KEEP;
7674 }
7675 }
7676 if (elf_section_data (sec)->relocs != relstart)
7677 free (relstart);
7678 }
7679
7680 if (local_syms != NULL
7681 && symtab_hdr->contents != (unsigned char *) local_syms)
7682 {
7683 if (!info->keep_memory)
7684 free (local_syms);
7685 else
7686 symtab_hdr->contents = (unsigned char *) local_syms;
7687 }
7688 }
7689
7690 return TRUE;
7691}
7692
e1918d23 7693/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7694
e1918d23 7695asection *
e7d1c40c 7696ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7697{
411e1bfb 7698 struct ppc_link_hash_table *htab;
9e7028aa 7699 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7700
411e1bfb 7701 htab = ppc_hash_table (info);
4dfe6ac6
NC
7702 if (htab == NULL)
7703 return NULL;
7704
ee67d69a
AM
7705 if (abiversion (info->output_bfd) == 1)
7706 htab->opd_abi = 1;
7707
e7d1c40c 7708 if (htab->params->no_multi_toc)
33c0ec9d
AM
7709 htab->do_multi_toc = 0;
7710 else if (!htab->do_multi_toc)
e7d1c40c 7711 htab->params->no_multi_toc = 1;
33c0ec9d 7712
8b5f1ed8
AM
7713 /* Default to --no-plt-localentry, as this option can cause problems
7714 with symbol interposition. For example, glibc libpthread.so and
7715 libc.so duplicate many pthread symbols, with a fallback
7716 implementation in libc.so. In some cases the fallback does more
7717 work than the pthread implementation. __pthread_condattr_destroy
7718 is one such symbol: the libpthread.so implementation is
7719 localentry:0 while the libc.so implementation is localentry:8.
7720 An app that "cleverly" uses dlopen to only load necessary
7721 libraries at runtime may omit loading libpthread.so when not
7722 running multi-threaded, which then results in the libc.so
7723 fallback symbols being used and ld.so complaining. Now there
7724 are workarounds in ld (see non_zero_localentry) to detect the
7725 pthread situation, but that may not be the only case where
7726 --plt-localentry can cause trouble. */
f378ab09 7727 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7728 htab->params->plt_localentry0 = 0;
d44c746a
AM
7729 if (htab->params->plt_localentry0
7730 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7731 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7732 _bfd_error_handler
7733 (_("warning: --plt-localentry is especially dangerous without "
7734 "ld.so support to detect ABI violations"));
f378ab09 7735
9e7028aa
AM
7736 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7737 FALSE, FALSE, TRUE);
7738 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7739
a7f2871e 7740 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7741 if (tga != NULL)
7742 func_desc_adjust (tga, info);
7743 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7744 FALSE, FALSE, TRUE);
7745 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7746
7747 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7748 FALSE, FALSE, TRUE);
7749 htab->tga_desc = ppc_elf_hash_entry (desc);
7750 if (desc != NULL)
7751 func_desc_adjust (desc, info);
7752 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7753 FALSE, FALSE, TRUE);
7754 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7755
7c9cf415 7756 if (htab->params->tls_get_addr_opt)
a7f2871e 7757 {
9e7028aa 7758 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7759
7760 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7761 FALSE, FALSE, TRUE);
7762 if (opt != NULL)
7763 func_desc_adjust (opt, info);
7764 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7765 FALSE, FALSE, TRUE);
7766 if (opt_fd != NULL
7767 && (opt_fd->root.type == bfd_link_hash_defined
7768 || opt_fd->root.type == bfd_link_hash_defweak))
7769 {
7770 /* If glibc supports an optimized __tls_get_addr call stub,
7771 signalled by the presence of __tls_get_addr_opt, and we'll
7772 be calling __tls_get_addr via a plt call stub, then
7773 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7774 if (!(htab->elf.dynamic_sections_created
7775 && tga_fd != NULL
7776 && (tga_fd->type == STT_FUNC
7777 || tga_fd->needs_plt)
7778 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7779 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7780 tga_fd = NULL;
7781 if (!(htab->elf.dynamic_sections_created
7782 && desc_fd != NULL
7783 && (desc_fd->type == STT_FUNC
7784 || desc_fd->needs_plt)
7785 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7786 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7787 desc_fd = NULL;
7788
7789 if (tga_fd != NULL || desc_fd != NULL)
7790 {
7791 struct plt_entry *ent = NULL;
7792
7793 if (tga_fd != NULL)
7794 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7795 if (ent->plt.refcount > 0)
7796 break;
7797 if (ent == NULL && desc_fd != NULL)
7798 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7799 if (ent->plt.refcount > 0)
7800 break;
a7f2871e
AM
7801 if (ent != NULL)
7802 {
9e7028aa
AM
7803 if (tga_fd != NULL)
7804 {
7805 tga_fd->root.type = bfd_link_hash_indirect;
7806 tga_fd->root.u.i.link = &opt_fd->root;
7807 tga_fd->root.u.i.warning = NULL;
7808 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7809 }
7810 if (desc_fd != NULL)
7811 {
7812 desc_fd->root.type = bfd_link_hash_indirect;
7813 desc_fd->root.u.i.link = &opt_fd->root;
7814 desc_fd->root.u.i.warning = NULL;
7815 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7816 }
b531344c 7817 opt_fd->mark = 1;
a7f2871e
AM
7818 if (opt_fd->dynindx != -1)
7819 {
7820 /* Use __tls_get_addr_opt in dynamic relocations. */
7821 opt_fd->dynindx = -1;
7822 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7823 opt_fd->dynstr_index);
7824 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7825 return NULL;
a7f2871e 7826 }
9e7028aa 7827 if (tga_fd != NULL)
a7f2871e 7828 {
9e7028aa
AM
7829 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7830 tga = &htab->tls_get_addr->elf;
7831 if (opt != NULL && tga != NULL)
7832 {
7833 tga->root.type = bfd_link_hash_indirect;
7834 tga->root.u.i.link = &opt->root;
7835 tga->root.u.i.warning = NULL;
7836 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7837 opt->mark = 1;
7838 _bfd_elf_link_hash_hide_symbol (info, opt,
7839 tga->forced_local);
7840 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7841 }
7842 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7843 htab->tls_get_addr_fd->is_func_descriptor = 1;
7844 if (htab->tls_get_addr != NULL)
7845 {
7846 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7847 htab->tls_get_addr->is_func = 1;
7848 }
a7f2871e 7849 }
9e7028aa 7850 if (desc_fd != NULL)
a7f2871e 7851 {
9e7028aa
AM
7852 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7853 if (opt != NULL && desc != NULL)
7854 {
7855 desc->root.type = bfd_link_hash_indirect;
7856 desc->root.u.i.link = &opt->root;
7857 desc->root.u.i.warning = NULL;
7858 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7859 opt->mark = 1;
7860 _bfd_elf_link_hash_hide_symbol (info, opt,
7861 desc->forced_local);
7862 htab->tga_desc = ppc_elf_hash_entry (opt);
7863 }
7864 htab->tga_desc_fd->oh = htab->tga_desc;
7865 htab->tga_desc_fd->is_func_descriptor = 1;
7866 if (htab->tga_desc != NULL)
7867 {
7868 htab->tga_desc->oh = htab->tga_desc_fd;
7869 htab->tga_desc->is_func = 1;
7870 }
a7f2871e
AM
7871 }
7872 }
7873 }
7874 }
7c9cf415
AM
7875 else if (htab->params->tls_get_addr_opt < 0)
7876 htab->params->tls_get_addr_opt = 0;
a7f2871e 7877 }
9e7028aa
AM
7878
7879 if (htab->tga_desc_fd != NULL
7880 && htab->params->tls_get_addr_opt
7881 && htab->params->no_tls_get_addr_regsave == -1)
7882 htab->params->no_tls_get_addr_regsave = 0;
7883
33c0ec9d 7884 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7885}
8387904d 7886
3a71aa26 7887/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7888 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7889
3a71aa26
AM
7890static bfd_boolean
7891branch_reloc_hash_match (const bfd *ibfd,
7892 const Elf_Internal_Rela *rel,
7893 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7894 const struct ppc_link_hash_entry *hash2,
7895 const struct ppc_link_hash_entry *hash3,
7896 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7897{
7898 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7899 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7900 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7901
e054468f 7902 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7903 {
3a71aa26
AM
7904 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7905 struct elf_link_hash_entry *h;
8387904d 7906
3a71aa26 7907 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7908 h = elf_follow_link (h);
9e7028aa
AM
7909 if (h == &hash1->elf || h == &hash2->elf
7910 || h == &hash3->elf || h == &hash4->elf)
3a71aa26 7911 return TRUE;
a48ebf4d 7912 }
3a71aa26 7913 return FALSE;
951fd09b 7914}
411e1bfb 7915
951fd09b
AM
7916/* Run through all the TLS relocs looking for optimization
7917 opportunities. The linker has been hacked (see ppc64elf.em) to do
7918 a preliminary section layout so that we know the TLS segment
7919 offsets. We can't optimize earlier because some optimizations need
7920 to know the tp offset, and we need to optimize before allocating
7921 dynamic relocations. */
7922
7923bfd_boolean
33c0ec9d 7924ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7925{
7926 bfd *ibfd;
7927 asection *sec;
7928 struct ppc_link_hash_table *htab;
663a1470 7929 unsigned char *toc_ref;
102890f0 7930 int pass;
951fd09b 7931
3cbc1e5e 7932 if (!bfd_link_executable (info))
411e1bfb
AM
7933 return TRUE;
7934
951fd09b 7935 htab = ppc_hash_table (info);
4dfe6ac6
NC
7936 if (htab == NULL)
7937 return FALSE;
7938
663a1470
AM
7939 /* Make two passes over the relocs. On the first pass, mark toc
7940 entries involved with tls relocs, and check that tls relocs
7941 involved in setting up a tls_get_addr call are indeed followed by
7942 such a call. If they are not, we can't do any tls optimization.
7943 On the second pass twiddle tls_mask flags to notify
7944 relocate_section that optimization can be done, and adjust got
7945 and plt refcounts. */
7946 toc_ref = NULL;
7947 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7948 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7949 {
7950 Elf_Internal_Sym *locsyms = NULL;
7951 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7952
102890f0
AM
7953 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7954 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7955 {
7956 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7957 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7958
102890f0
AM
7959 /* Read the relocations. */
7960 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7961 info->keep_memory);
7962 if (relstart == NULL)
2915c55b
JK
7963 {
7964 free (toc_ref);
7965 return FALSE;
7966 }
411e1bfb 7967
102890f0
AM
7968 relend = relstart + sec->reloc_count;
7969 for (rel = relstart; rel < relend; rel++)
7970 {
7971 enum elf_ppc64_reloc_type r_type;
7972 unsigned long r_symndx;
7973 struct elf_link_hash_entry *h;
7974 Elf_Internal_Sym *sym;
7975 asection *sym_sec;
f961d9dd 7976 unsigned char *tls_mask;
46e9995a 7977 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7978 bfd_vma value;
7979 bfd_boolean ok_tprel, is_local;
7980 long toc_ref_index = 0;
7981 int expecting_tls_get_addr = 0;
663a1470 7982 bfd_boolean ret = FALSE;
411e1bfb 7983
102890f0
AM
7984 r_symndx = ELF64_R_SYM (rel->r_info);
7985 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7986 r_symndx, ibfd))
7987 {
7988 err_free_rel:
7989 if (elf_section_data (sec)->relocs != relstart)
7990 free (relstart);
c9594989
AM
7991 free (toc_ref);
7992 if (elf_symtab_hdr (ibfd).contents
7993 != (unsigned char *) locsyms)
102890f0 7994 free (locsyms);
663a1470 7995 return ret;
102890f0 7996 }
411e1bfb 7997
102890f0
AM
7998 if (h != NULL)
7999 {
766bc656
AM
8000 if (h->root.type == bfd_link_hash_defined
8001 || h->root.type == bfd_link_hash_defweak)
8002 value = h->root.u.def.value;
8003 else if (h->root.type == bfd_link_hash_undefweak)
8004 value = 0;
8005 else
663a1470
AM
8006 {
8007 found_tls_get_addr_arg = 0;
8008 continue;
8009 }
102890f0
AM
8010 }
8011 else
8012 /* Symbols referenced by TLS relocs must be of type
8013 STT_TLS. So no need for .opd local sym adjust. */
8014 value = sym->st_value;
8015
8016 ok_tprel = FALSE;
f749f26e
AM
8017 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
8018 if (is_local)
102890f0 8019 {
766bc656
AM
8020 if (h != NULL
8021 && h->root.type == bfd_link_hash_undefweak)
8022 ok_tprel = TRUE;
c27b8c2a
AM
8023 else if (sym_sec != NULL
8024 && sym_sec->output_section != NULL)
766bc656
AM
8025 {
8026 value += sym_sec->output_offset;
8027 value += sym_sec->output_section->vma;
0b147428 8028 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
8029 /* Note that even though the prefix insns
8030 allow a 1<<33 offset we use the same test
8031 as for addis;addi. There may be a mix of
8032 pcrel and non-pcrel code and the decision
8033 to optimise is per symbol, not per TLS
8034 sequence. */
0b147428 8035 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 8036 }
102890f0 8037 }
951fd09b 8038
102890f0 8039 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8040 /* If this section has old-style __tls_get_addr calls
8041 without marker relocs, then check that each
8042 __tls_get_addr call reloc is preceded by a reloc
8043 that conceivably belongs to the __tls_get_addr arg
8044 setup insn. If we don't find matching arg setup
8045 relocs, don't do any tls optimization. */
8046 if (pass == 0
9737e8af 8047 && sec->nomark_tls_get_addr
663a1470 8048 && h != NULL
ed7007c1 8049 && is_tls_get_addr (h, htab)
663a1470
AM
8050 && !found_tls_get_addr_arg
8051 && is_branch_reloc (r_type))
8052 {
25f53a85 8053 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8054 "TLS optimization disabled\n"),
8055 ibfd, sec, rel->r_offset);
8056 ret = TRUE;
8057 goto err_free_rel;
8058 }
8059
8060 found_tls_get_addr_arg = 0;
102890f0
AM
8061 switch (r_type)
8062 {
8063 case R_PPC64_GOT_TLSLD16:
8064 case R_PPC64_GOT_TLSLD16_LO:
87c69f97 8065 case R_PPC64_GOT_TLSLD_PCREL34:
102890f0 8066 expecting_tls_get_addr = 1;
663a1470 8067 found_tls_get_addr_arg = 1;
1a0670f3 8068 /* Fall through. */
102890f0
AM
8069
8070 case R_PPC64_GOT_TLSLD16_HI:
8071 case R_PPC64_GOT_TLSLD16_HA:
8072 /* These relocs should never be against a symbol
8073 defined in a shared lib. Leave them alone if
8074 that turns out to be the case. */
8075 if (!is_local)
8076 continue;
411e1bfb 8077
102890f0 8078 /* LD -> LE */
411e1bfb 8079 tls_set = 0;
102890f0
AM
8080 tls_clear = TLS_LD;
8081 tls_type = TLS_TLS | TLS_LD;
8082 break;
411e1bfb 8083
102890f0
AM
8084 case R_PPC64_GOT_TLSGD16:
8085 case R_PPC64_GOT_TLSGD16_LO:
87c69f97 8086 case R_PPC64_GOT_TLSGD_PCREL34:
102890f0 8087 expecting_tls_get_addr = 1;
663a1470 8088 found_tls_get_addr_arg = 1;
1a0670f3 8089 /* Fall through. */
102890f0
AM
8090
8091 case R_PPC64_GOT_TLSGD16_HI:
8092 case R_PPC64_GOT_TLSGD16_HA:
8093 if (ok_tprel)
8094 /* GD -> LE */
411e1bfb 8095 tls_set = 0;
102890f0
AM
8096 else
8097 /* GD -> IE */
b00a0a86 8098 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8099 tls_clear = TLS_GD;
8100 tls_type = TLS_TLS | TLS_GD;
8101 break;
8102
87c69f97 8103 case R_PPC64_GOT_TPREL_PCREL34:
102890f0
AM
8104 case R_PPC64_GOT_TPREL16_DS:
8105 case R_PPC64_GOT_TPREL16_LO_DS:
8106 case R_PPC64_GOT_TPREL16_HI:
8107 case R_PPC64_GOT_TPREL16_HA:
8108 if (ok_tprel)
8109 {
8110 /* IE -> LE */
8111 tls_set = 0;
8112 tls_clear = TLS_TPREL;
8113 tls_type = TLS_TLS | TLS_TPREL;
8114 break;
8115 }
411e1bfb
AM
8116 continue;
8117
727fc41e 8118 case R_PPC64_TLSLD:
7d04a20a
AM
8119 if (!is_local)
8120 continue;
8121 /* Fall through. */
8122 case R_PPC64_TLSGD:
23cedd1d
AM
8123 if (rel + 1 < relend
8124 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8125 {
8126 if (pass != 0
2cdcc330 8127 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8128 != R_PPC64_PLTSEQ)
8129 && (ELF64_R_TYPE (rel[1].r_info)
8130 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8131 {
8132 r_symndx = ELF64_R_SYM (rel[1].r_info);
8133 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8134 r_symndx, ibfd))
23cedd1d
AM
8135 goto err_free_rel;
8136 if (h != NULL)
8137 {
8138 struct plt_entry *ent = NULL;
8139
8140 for (ent = h->plt.plist;
8141 ent != NULL;
8142 ent = ent->next)
8143 if (ent->addend == rel[1].r_addend)
8144 break;
8145
8146 if (ent != NULL
8147 && ent->plt.refcount > 0)
8148 ent->plt.refcount -= 1;
8149 }
8150 }
8151 continue;
8152 }
663a1470 8153 found_tls_get_addr_arg = 1;
1a0670f3 8154 /* Fall through. */
663a1470
AM
8155
8156 case R_PPC64_TLS:
8157 case R_PPC64_TOC16:
8158 case R_PPC64_TOC16_LO:
102890f0
AM
8159 if (sym_sec == NULL || sym_sec != toc)
8160 continue;
8161
8162 /* Mark this toc entry as referenced by a TLS
8163 code sequence. We can do that now in the
8164 case of R_PPC64_TLS, and after checking for
8165 tls_get_addr for the TOC16 relocs. */
8166 if (toc_ref == NULL)
2cdcc330
AM
8167 toc_ref
8168 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8169 if (toc_ref == NULL)
8170 goto err_free_rel;
8171
102890f0
AM
8172 if (h != NULL)
8173 value = h->root.u.def.value;
8174 else
8175 value = sym->st_value;
8176 value += rel->r_addend;
73242275
AM
8177 if (value % 8 != 0)
8178 continue;
8179 BFD_ASSERT (value < toc->size
8180 && toc->output_offset % 8 == 0);
663a1470 8181 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8182 if (r_type == R_PPC64_TLS
8183 || r_type == R_PPC64_TLSGD
8184 || r_type == R_PPC64_TLSLD)
102890f0
AM
8185 {
8186 toc_ref[toc_ref_index] = 1;
8187 continue;
8188 }
8189
8190 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8191 continue;
8192
8193 tls_set = 0;
8194 tls_clear = 0;
8195 expecting_tls_get_addr = 2;
8196 break;
8197
8198 case R_PPC64_TPREL64:
8199 if (pass == 0
8200 || sec != toc
8201 || toc_ref == NULL
663a1470 8202 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8203 continue;
8204 if (ok_tprel)
8205 {
8206 /* IE -> LE */
8207 tls_set = TLS_EXPLICIT;
8208 tls_clear = TLS_TPREL;
8209 break;
8210 }
8211 continue;
8212
8213 case R_PPC64_DTPMOD64:
8214 if (pass == 0
8215 || sec != toc
8216 || toc_ref == NULL
663a1470 8217 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8218 continue;
8219 if (rel + 1 < relend
8220 && (rel[1].r_info
8221 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8222 && rel[1].r_offset == rel->r_offset + 8)
8223 {
8224 if (ok_tprel)
8225 /* GD -> LE */
8226 tls_set = TLS_EXPLICIT | TLS_GD;
8227 else
8228 /* GD -> IE */
b00a0a86 8229 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8230 tls_clear = TLS_GD;
8231 }
8232 else
8233 {
8234 if (!is_local)
8235 continue;
8236
8237 /* LD -> LE */
8238 tls_set = TLS_EXPLICIT;
8239 tls_clear = TLS_LD;
8240 }
8241 break;
8242
8243 default:
8244 continue;
8245 }
8246
8247 if (pass == 0)
8248 {
727fc41e 8249 if (!expecting_tls_get_addr
9737e8af 8250 || !sec->nomark_tls_get_addr)
102890f0
AM
8251 continue;
8252
3a71aa26
AM
8253 if (rel + 1 < relend
8254 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8255 htab->tls_get_addr_fd,
8256 htab->tga_desc_fd,
3a71aa26 8257 htab->tls_get_addr,
9e7028aa 8258 htab->tga_desc))
102890f0 8259 {
3a71aa26 8260 if (expecting_tls_get_addr == 2)
102890f0 8261 {
3a71aa26 8262 /* Check for toc tls entries. */
f961d9dd 8263 unsigned char *toc_tls;
3a71aa26
AM
8264 int retval;
8265
8266 retval = get_tls_mask (&toc_tls, NULL, NULL,
8267 &locsyms,
8268 rel, ibfd);
8269 if (retval == 0)
8270 goto err_free_rel;
663a1470
AM
8271 if (toc_tls != NULL)
8272 {
37da22e5
AM
8273 if ((*toc_tls & TLS_TLS) != 0
8274 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8275 found_tls_get_addr_arg = 1;
8276 if (retval > 1)
8277 toc_ref[toc_ref_index] = 1;
8278 }
102890f0 8279 }
3a71aa26 8280 continue;
102890f0
AM
8281 }
8282
102890f0
AM
8283 /* Uh oh, we didn't find the expected call. We
8284 could just mark this symbol to exclude it
8285 from tls optimization but it's safer to skip
663a1470 8286 the entire optimization. */
695344c0 8287 /* xgettext:c-format */
25f53a85 8288 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8289 "TLS optimization disabled\n"),
8290 ibfd, sec, rel->r_offset);
8291 ret = TRUE;
8292 goto err_free_rel;
102890f0
AM
8293 }
8294
37da22e5
AM
8295 /* If we don't have old-style __tls_get_addr calls
8296 without TLSGD/TLSLD marker relocs, and we haven't
8297 found a new-style __tls_get_addr call with a
8298 marker for this symbol, then we either have a
8299 broken object file or an -mlongcall style
8300 indirect call to __tls_get_addr without a marker.
8301 Disable optimization in this case. */
8302 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8303 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8304 && !sec->nomark_tls_get_addr
37da22e5
AM
8305 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8306 != (TLS_TLS | TLS_MARK)))
8307 continue;
8308
7d04a20a 8309 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8310 {
23cedd1d
AM
8311 struct plt_entry *ent = NULL;
8312
9e7028aa
AM
8313 if (htab->tls_get_addr_fd != NULL)
8314 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8315 ent != NULL;
8316 ent = ent->next)
8317 if (ent->addend == 0)
8318 break;
8319
8320 if (ent == NULL && htab->tga_desc_fd != NULL)
8321 for (ent = htab->tga_desc_fd->elf.plt.plist;
8322 ent != NULL;
8323 ent = ent->next)
8324 if (ent->addend == 0)
8325 break;
8326
8327 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8328 for (ent = htab->tls_get_addr->elf.plt.plist;
8329 ent != NULL;
8330 ent = ent->next)
8331 if (ent->addend == 0)
102890f0 8332 break;
411e1bfb 8333
9e7028aa
AM
8334 if (ent == NULL && htab->tga_desc != NULL)
8335 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8336 ent != NULL;
8337 ent = ent->next)
8338 if (ent->addend == 0)
102890f0 8339 break;
23cedd1d
AM
8340
8341 if (ent != NULL
8342 && ent->plt.refcount > 0)
8343 ent->plt.refcount -= 1;
102890f0 8344 }
411e1bfb 8345
102890f0 8346 if (tls_clear == 0)
30038c59
AM
8347 continue;
8348
102890f0
AM
8349 if ((tls_set & TLS_EXPLICIT) == 0)
8350 {
8351 struct got_entry *ent;
411e1bfb 8352
102890f0
AM
8353 /* Adjust got entry for this reloc. */
8354 if (h != NULL)
8355 ent = h->got.glist;
8356 else
8357 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8358
102890f0
AM
8359 for (; ent != NULL; ent = ent->next)
8360 if (ent->addend == rel->r_addend
8361 && ent->owner == ibfd
8362 && ent->tls_type == tls_type)
8363 break;
8364 if (ent == NULL)
8365 abort ();
411e1bfb 8366
102890f0
AM
8367 if (tls_set == 0)
8368 {
8369 /* We managed to get rid of a got entry. */
8370 if (ent->got.refcount > 0)
8371 ent->got.refcount -= 1;
8372 }
8373 }
8374 else
8375 {
8376 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8377 we'll lose one or two dyn relocs. */
8378 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8379 NULL, h, sym))
102890f0 8380 return FALSE;
411e1bfb 8381
102890f0
AM
8382 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8383 {
8384 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8385 NULL, h, sym))
102890f0
AM
8386 return FALSE;
8387 }
8388 }
411e1bfb 8389
46e9995a 8390 *tls_mask |= tls_set & 0xff;
102890f0
AM
8391 *tls_mask &= ~tls_clear;
8392 }
8c1d1bb8 8393
102890f0
AM
8394 if (elf_section_data (sec)->relocs != relstart)
8395 free (relstart);
8396 }
411e1bfb 8397
663a1470
AM
8398 if (locsyms != NULL
8399 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8400 {
8401 if (!info->keep_memory)
8402 free (locsyms);
8403 else
8404 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8405 }
8406 }
411e1bfb 8407
c9594989 8408 free (toc_ref);
9a23f96e 8409 htab->do_tls_opt = 1;
b34976b6 8410 return TRUE;
1e2f5b6e 8411}
b34976b6 8412
c5614fa4
AM
8413/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8414 the values of any global symbols in a toc section that has been
8415 edited. Globals in toc sections should be a rarity, so this function
8416 sets a flag if any are found in toc sections other than the one just
de194d85 8417 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8418
8419struct adjust_toc_info
8420{
8421 asection *toc;
8422 unsigned long *skip;
8423 bfd_boolean global_toc_syms;
8424};
8425
ba761f19
AM
8426enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8427
c5614fa4
AM
8428static bfd_boolean
8429adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8430{
8431 struct ppc_link_hash_entry *eh;
8432 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8433 unsigned long i;
c5614fa4 8434
c5614fa4
AM
8435 if (h->root.type != bfd_link_hash_defined
8436 && h->root.type != bfd_link_hash_defweak)
8437 return TRUE;
8438
ed7007c1 8439 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8440 if (eh->adjust_done)
8441 return TRUE;
8442
8443 if (eh->elf.root.u.def.section == toc_inf->toc)
8444 {
854b41e7
AM
8445 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8446 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8447 else
854b41e7
AM
8448 i = eh->elf.root.u.def.value >> 3;
8449
ba761f19 8450 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8451 {
4eca0228 8452 _bfd_error_handler
854b41e7
AM
8453 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8454 do
8455 ++i;
ba761f19 8456 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8457 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8458 }
854b41e7
AM
8459
8460 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8461 eh->adjust_done = 1;
8462 }
8463 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8464 toc_inf->global_toc_syms = TRUE;
8465
8466 return TRUE;
8467}
8468
39eeab25
AM
8469/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8470 on a _LO variety toc/got reloc. */
560c8763
AM
8471
8472static bfd_boolean
39eeab25 8473ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8474{
2365f8d7
AM
8475 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8476 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8477 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8478 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8479 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8480 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8481 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8482 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8483 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8484 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8485 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8486 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8487 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8488 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8489 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8490 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8491 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8492 /* Exclude lfqu by testing reloc. If relocs are ever
8493 defined for the reduced D field in psq_lu then those
8494 will need testing too. */
8495 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8496 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8497 && (insn & 1) == 0)
2365f8d7
AM
8498 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8499 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8500 /* Exclude stfqu. psq_stu as above for psq_lu. */
8501 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8502 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8503 && (insn & 1) == 0));
560c8763
AM
8504}
8505
4a421c53
AM
8506/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8507 pld ra,symbol@got@pcrel
dd9b12c2 8508 load/store rt,off(ra)
4a421c53 8509 or
d4b87b1e 8510 pla ra,symbol@pcrel
dd9b12c2 8511 load/store rt,off(ra)
4a421c53 8512 may be translated to
dd9b12c2 8513 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8514 nop.
8515 This function returns true if the optimization is possible, placing
dd9b12c2 8516 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8517
8518 On entry to this function, the linker has already determined that
d4b87b1e 8519 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8520 while *PINSN2 is the second instruction. */
8521
8522static bfd_boolean
dd9b12c2 8523xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8524{
77486630
AM
8525 uint64_t insn1 = *pinsn1;
8526 uint64_t insn2 = *pinsn2;
dd9b12c2 8527 bfd_signed_vma off;
4a421c53 8528
77486630
AM
8529 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8530 {
8531 /* Check that regs match. */
8532 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8533 return FALSE;
8534
8535 /* P8LS or PMLS form, non-pcrel. */
8536 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8537 return FALSE;
8538
8539 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8540 *pinsn2 = PNOP;
8541 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8542 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8543 return TRUE;
8544 }
8545
8546 insn2 >>= 32;
8547
4a421c53 8548 /* Check that regs match. */
77486630 8549 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8550 return FALSE;
8551
8552 switch ((insn2 >> 26) & 63)
8553 {
8554 default:
8555 return FALSE;
8556
8557 case 32: /* lwz */
8558 case 34: /* lbz */
8559 case 36: /* stw */
8560 case 38: /* stb */
8561 case 40: /* lhz */
8562 case 42: /* lha */
8563 case 44: /* sth */
8564 case 48: /* lfs */
8565 case 50: /* lfd */
8566 case 52: /* stfs */
8567 case 54: /* stfd */
8568 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8569 on the insn. */
77486630 8570 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8571 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8572 off = insn2 & 0xffff;
4a421c53
AM
8573 break;
8574
8575 case 58: /* lwa, ld */
dd9b12c2 8576 if ((insn2 & 1) != 0)
4a421c53 8577 return FALSE;
77486630 8578 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8579 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8580 | (insn2 & (31ULL << 21)));
dd9b12c2 8581 off = insn2 & 0xfffc;
4a421c53
AM
8582 break;
8583
8584 case 57: /* lxsd, lxssp */
dd9b12c2 8585 if ((insn2 & 3) < 2)
4a421c53 8586 return FALSE;
77486630 8587 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8588 | ((40ULL | (insn2 & 3)) << 26)
8589 | (insn2 & (31ULL << 21)));
dd9b12c2 8590 off = insn2 & 0xfffc;
4a421c53
AM
8591 break;
8592
8593 case 61: /* stxsd, stxssp, lxv, stxv */
8594 if ((insn2 & 3) == 0)
8595 return FALSE;
8596 else if ((insn2 & 3) >= 2)
8597 {
77486630 8598 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8599 | ((44ULL | (insn2 & 3)) << 26)
8600 | (insn2 & (31ULL << 21)));
dd9b12c2 8601 off = insn2 & 0xfffc;
4a421c53
AM
8602 }
8603 else
8604 {
77486630 8605 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8606 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8607 | (insn2 & (31ULL << 21)));
dd9b12c2 8608 off = insn2 & 0xfff0;
4a421c53
AM
8609 }
8610 break;
8611
8612 case 56: /* lq */
77486630 8613 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8614 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8615 off = insn2 & 0xffff;
4a421c53
AM
8616 break;
8617
94ba9882
AM
8618 case 6: /* lxvp, stxvp */
8619 if ((insn2 & 0xe) != 0)
8620 return FALSE;
8621 insn1 = ((1ULL << 58) | (1ULL << 52)
8622 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8623 | (insn2 & (31ULL << 21)));
8624 off = insn2 & 0xfff0;
8625 break;
8626
4a421c53 8627 case 62: /* std, stq */
dd9b12c2 8628 if ((insn2 & 1) != 0)
4a421c53 8629 return FALSE;
77486630 8630 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8631 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8632 | (insn2 & (31ULL << 21)));
dd9b12c2 8633 off = insn2 & 0xfffc;
4a421c53
AM
8634 break;
8635 }
8636
77486630 8637 *pinsn1 = insn1;
4a421c53 8638 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8639 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8640 return TRUE;
8641}
8642
c5614fa4
AM
8643/* Examine all relocs referencing .toc sections in order to remove
8644 unused .toc entries. */
8645
8646bfd_boolean
33c0ec9d 8647ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8648{
8649 bfd *ibfd;
8650 struct adjust_toc_info toc_inf;
67f0cbdb 8651 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8652
67f0cbdb 8653 htab->do_toc_opt = 1;
c5614fa4 8654 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8655 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8656 {
8657 asection *toc, *sec;
8658 Elf_Internal_Shdr *symtab_hdr;
8659 Elf_Internal_Sym *local_syms;
425b145b 8660 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8661 unsigned long *skip, *drop;
8662 unsigned char *used;
8663 unsigned char *keep, last, some_unused;
8664
854b41e7
AM
8665 if (!is_ppc64_elf (ibfd))
8666 continue;
8667
c5614fa4
AM
8668 toc = bfd_get_section_by_name (ibfd, ".toc");
8669 if (toc == NULL
92b7a70f 8670 || toc->size == 0
dbaa2011
AM
8671 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8672 || discarded_section (toc))
c5614fa4
AM
8673 continue;
8674
425b145b 8675 toc_relocs = NULL;
c5614fa4 8676 local_syms = NULL;
0ffa91dd 8677 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8678
8679 /* Look at sections dropped from the final link. */
8680 skip = NULL;
8681 relstart = NULL;
8682 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8683 {
8684 if (sec->reloc_count == 0
dbaa2011 8685 || !discarded_section (sec)
c5614fa4
AM
8686 || get_opd_info (sec)
8687 || (sec->flags & SEC_ALLOC) == 0
8688 || (sec->flags & SEC_DEBUGGING) != 0)
8689 continue;
8690
8691 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8692 if (relstart == NULL)
8693 goto error_ret;
8694
8695 /* Run through the relocs to see which toc entries might be
8696 unused. */
8697 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8698 {
8699 enum elf_ppc64_reloc_type r_type;
8700 unsigned long r_symndx;
8701 asection *sym_sec;
8702 struct elf_link_hash_entry *h;
8703 Elf_Internal_Sym *sym;
8704 bfd_vma val;
8705
8706 r_type = ELF64_R_TYPE (rel->r_info);
8707 switch (r_type)
8708 {
8709 default:
8710 continue;
8711
8712 case R_PPC64_TOC16:
8713 case R_PPC64_TOC16_LO:
8714 case R_PPC64_TOC16_HI:
8715 case R_PPC64_TOC16_HA:
8716 case R_PPC64_TOC16_DS:
8717 case R_PPC64_TOC16_LO_DS:
8718 break;
8719 }
8720
8721 r_symndx = ELF64_R_SYM (rel->r_info);
8722 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8723 r_symndx, ibfd))
8724 goto error_ret;
8725
8726 if (sym_sec != toc)
8727 continue;
8728
8729 if (h != NULL)
8730 val = h->root.u.def.value;
8731 else
8732 val = sym->st_value;
8733 val += rel->r_addend;
8734
8735 if (val >= toc->size)
8736 continue;
8737
8738 /* Anything in the toc ought to be aligned to 8 bytes.
8739 If not, don't mark as unused. */
8740 if (val & 7)
8741 continue;
8742
8743 if (skip == NULL)
8744 {
854b41e7 8745 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8746 if (skip == NULL)
8747 goto error_ret;
8748 }
8749
ba761f19 8750 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8751 }
8752
8753 if (elf_section_data (sec)->relocs != relstart)
8754 free (relstart);
8755 }
8756
ba761f19
AM
8757 /* For largetoc loads of address constants, we can convert
8758 . addis rx,2,addr@got@ha
8759 . ld ry,addr@got@l(rx)
8760 to
8761 . addis rx,2,addr@toc@ha
8762 . addi ry,rx,addr@toc@l
8763 when addr is within 2G of the toc pointer. This then means
8764 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8765
ba761f19
AM
8766 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8767 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8768 && toc->reloc_count != 0)
8769 {
8770 /* Read toc relocs. */
425b145b
AM
8771 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8772 info->keep_memory);
8773 if (toc_relocs == NULL)
ba761f19
AM
8774 goto error_ret;
8775
425b145b 8776 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8777 {
8778 enum elf_ppc64_reloc_type r_type;
8779 unsigned long r_symndx;
8780 asection *sym_sec;
8781 struct elf_link_hash_entry *h;
8782 Elf_Internal_Sym *sym;
8783 bfd_vma val, addr;
8784
8785 r_type = ELF64_R_TYPE (rel->r_info);
8786 if (r_type != R_PPC64_ADDR64)
8787 continue;
8788
8789 r_symndx = ELF64_R_SYM (rel->r_info);
8790 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8791 r_symndx, ibfd))
8792 goto error_ret;
8793
425b145b 8794 if (sym_sec == NULL
c27b8c2a 8795 || sym_sec->output_section == NULL
dbaa2011 8796 || discarded_section (sym_sec))
425b145b
AM
8797 continue;
8798
afe397ea 8799 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8800 continue;
8801
8802 if (h != NULL)
bddc25c9
AM
8803 {
8804 if (h->type == STT_GNU_IFUNC)
8805 continue;
8806 val = h->root.u.def.value;
8807 }
ba761f19 8808 else
bddc25c9
AM
8809 {
8810 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8811 continue;
8812 val = sym->st_value;
8813 }
ba761f19
AM
8814 val += rel->r_addend;
8815 val += sym_sec->output_section->vma + sym_sec->output_offset;
8816
8817 /* We don't yet know the exact toc pointer value, but we
8818 know it will be somewhere in the toc section. Don't
8819 optimize if the difference from any possible toc
8820 pointer is outside [ff..f80008000, 7fff7fff]. */
8821 addr = toc->output_section->vma + TOC_BASE_OFF;
8822 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8823 continue;
8824
8825 addr = toc->output_section->vma + toc->output_section->rawsize;
8826 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8827 continue;
8828
8829 if (skip == NULL)
8830 {
8831 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8832 if (skip == NULL)
8833 goto error_ret;
8834 }
8835
8836 skip[rel->r_offset >> 3]
425b145b 8837 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8838 }
ba761f19
AM
8839 }
8840
c5614fa4
AM
8841 if (skip == NULL)
8842 continue;
8843
8844 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8845 if (used == NULL)
8846 {
8847 error_ret:
c9594989 8848 if (symtab_hdr->contents != (unsigned char *) local_syms)
c5614fa4
AM
8849 free (local_syms);
8850 if (sec != NULL
c5614fa4
AM
8851 && elf_section_data (sec)->relocs != relstart)
8852 free (relstart);
c9594989 8853 if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 8854 free (toc_relocs);
c9594989 8855 free (skip);
c5614fa4
AM
8856 return FALSE;
8857 }
8858
30038c59
AM
8859 /* Now check all kept sections that might reference the toc.
8860 Check the toc itself last. */
8861 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8862 : ibfd->sections);
c5614fa4 8863 sec != NULL;
c5614fa4 8864 sec = (sec == toc ? NULL
c5614fa4 8865 : sec->next == NULL ? toc
30038c59 8866 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8867 : sec->next))
8868 {
8869 int repeat;
8870
8871 if (sec->reloc_count == 0
dbaa2011 8872 || discarded_section (sec)
c5614fa4
AM
8873 || get_opd_info (sec)
8874 || (sec->flags & SEC_ALLOC) == 0
8875 || (sec->flags & SEC_DEBUGGING) != 0)
8876 continue;
8877
854b41e7
AM
8878 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8879 info->keep_memory);
c5614fa4 8880 if (relstart == NULL)
2915c55b
JK
8881 {
8882 free (used);
8883 goto error_ret;
8884 }
c5614fa4
AM
8885
8886 /* Mark toc entries referenced as used. */
c5614fa4 8887 do
d4f1ee75
AM
8888 {
8889 repeat = 0;
8890 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8891 {
8892 enum elf_ppc64_reloc_type r_type;
8893 unsigned long r_symndx;
8894 asection *sym_sec;
8895 struct elf_link_hash_entry *h;
8896 Elf_Internal_Sym *sym;
8897 bfd_vma val;
98528052 8898
d4f1ee75 8899 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8900 switch (r_type)
8901 {
8902 case R_PPC64_TOC16:
8903 case R_PPC64_TOC16_LO:
8904 case R_PPC64_TOC16_HI:
8905 case R_PPC64_TOC16_HA:
8906 case R_PPC64_TOC16_DS:
8907 case R_PPC64_TOC16_LO_DS:
8908 /* In case we're taking addresses of toc entries. */
8909 case R_PPC64_ADDR64:
8910 break;
c5614fa4 8911
d4f1ee75
AM
8912 default:
8913 continue;
8914 }
c5614fa4 8915
d4f1ee75
AM
8916 r_symndx = ELF64_R_SYM (rel->r_info);
8917 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8918 r_symndx, ibfd))
8919 {
8920 free (used);
8921 goto error_ret;
8922 }
c5614fa4 8923
d4f1ee75
AM
8924 if (sym_sec != toc)
8925 continue;
c5614fa4 8926
d4f1ee75
AM
8927 if (h != NULL)
8928 val = h->root.u.def.value;
8929 else
8930 val = sym->st_value;
8931 val += rel->r_addend;
ba761f19 8932
d4f1ee75
AM
8933 if (val >= toc->size)
8934 continue;
ba761f19 8935
d4f1ee75
AM
8936 if ((skip[val >> 3] & can_optimize) != 0)
8937 {
8938 bfd_vma off;
8939 unsigned char opc;
8940
8941 switch (r_type)
8942 {
8943 case R_PPC64_TOC16_HA:
ba761f19 8944 break;
ba761f19 8945
d4f1ee75
AM
8946 case R_PPC64_TOC16_LO_DS:
8947 off = rel->r_offset;
8948 off += (bfd_big_endian (ibfd) ? -2 : 3);
8949 if (!bfd_get_section_contents (ibfd, sec, &opc,
8950 off, 1))
8951 {
8952 free (used);
8953 goto error_ret;
8954 }
8955 if ((opc & (0x3f << 2)) == (58u << 2))
8956 break;
1a0670f3 8957 /* Fall through. */
ba761f19 8958
d4f1ee75
AM
8959 default:
8960 /* Wrong sort of reloc, or not a ld. We may
8961 as well clear ref_from_discarded too. */
8962 skip[val >> 3] = 0;
8963 }
8964 }
8965
8966 if (sec != toc)
8967 used[val >> 3] = 1;
8968 /* For the toc section, we only mark as used if this
8969 entry itself isn't unused. */
8970 else if ((used[rel->r_offset >> 3]
8971 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8972 && !used[val >> 3])
8973 {
8974 /* Do all the relocs again, to catch reference
8975 chains. */
8976 repeat = 1;
8977 used[val >> 3] = 1;
8978 }
8979 }
8980 }
c5614fa4 8981 while (repeat);
854b41e7
AM
8982
8983 if (elf_section_data (sec)->relocs != relstart)
8984 free (relstart);
c5614fa4
AM
8985 }
8986
8987 /* Merge the used and skip arrays. Assume that TOC
8988 doublewords not appearing as either used or unused belong
de194d85 8989 to an entry more than one doubleword in size. */
c5614fa4
AM
8990 for (drop = skip, keep = used, last = 0, some_unused = 0;
8991 drop < skip + (toc->size + 7) / 8;
8992 ++drop, ++keep)
8993 {
8994 if (*keep)
8995 {
ba761f19
AM
8996 *drop &= ~ref_from_discarded;
8997 if ((*drop & can_optimize) != 0)
8998 some_unused = 1;
c5614fa4
AM
8999 last = 0;
9000 }
b140b010 9001 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9002 {
9003 some_unused = 1;
ba761f19 9004 last = ref_from_discarded;
c5614fa4
AM
9005 }
9006 else
9007 *drop = last;
9008 }
9009
9010 free (used);
9011
9012 if (some_unused)
9013 {
9014 bfd_byte *contents, *src;
9015 unsigned long off;
d62b3684 9016 Elf_Internal_Sym *sym;
ba761f19 9017 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9018
9019 /* Shuffle the toc contents, and at the same time convert the
9020 skip array from booleans into offsets. */
9021 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9022 goto error_ret;
9023
9024 elf_section_data (toc)->this_hdr.contents = contents;
9025
9026 for (src = contents, off = 0, drop = skip;
9027 src < contents + toc->size;
9028 src += 8, ++drop)
9029 {
ba761f19
AM
9030 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9031 off += 8;
c5614fa4
AM
9032 else if (off != 0)
9033 {
9034 *drop = off;
9035 memcpy (src - off, src, 8);
9036 }
9037 }
854b41e7 9038 *drop = off;
c5614fa4
AM
9039 toc->rawsize = toc->size;
9040 toc->size = src - contents - off;
9041
ba761f19
AM
9042 /* Adjust addends for relocs against the toc section sym,
9043 and optimize any accesses we can. */
c5614fa4
AM
9044 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9045 {
9046 if (sec->reloc_count == 0
dbaa2011 9047 || discarded_section (sec))
c5614fa4
AM
9048 continue;
9049
9050 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9051 info->keep_memory);
c5614fa4
AM
9052 if (relstart == NULL)
9053 goto error_ret;
9054
9055 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9056 {
9057 enum elf_ppc64_reloc_type r_type;
9058 unsigned long r_symndx;
9059 asection *sym_sec;
9060 struct elf_link_hash_entry *h;
854b41e7 9061 bfd_vma val;
c5614fa4
AM
9062
9063 r_type = ELF64_R_TYPE (rel->r_info);
9064 switch (r_type)
9065 {
9066 default:
9067 continue;
9068
9069 case R_PPC64_TOC16:
9070 case R_PPC64_TOC16_LO:
9071 case R_PPC64_TOC16_HI:
9072 case R_PPC64_TOC16_HA:
9073 case R_PPC64_TOC16_DS:
9074 case R_PPC64_TOC16_LO_DS:
9075 case R_PPC64_ADDR64:
9076 break;
9077 }
9078
9079 r_symndx = ELF64_R_SYM (rel->r_info);
9080 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9081 r_symndx, ibfd))
9082 goto error_ret;
9083
ba761f19 9084 if (sym_sec != toc)
c5614fa4
AM
9085 continue;
9086
ba761f19
AM
9087 if (h != NULL)
9088 val = h->root.u.def.value;
9089 else
9090 {
9091 val = sym->st_value;
9092 if (val != 0)
9093 local_toc_syms = TRUE;
9094 }
9095
9096 val += rel->r_addend;
854b41e7
AM
9097
9098 if (val > toc->rawsize)
9099 val = toc->rawsize;
ba761f19
AM
9100 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9101 continue;
9102 else if ((skip[val >> 3] & can_optimize) != 0)
9103 {
9104 Elf_Internal_Rela *tocrel
425b145b 9105 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9106 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9107
9108 switch (r_type)
9109 {
9110 case R_PPC64_TOC16_HA:
9111 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9112 break;
9113
9114 case R_PPC64_TOC16_LO_DS:
9115 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9116 break;
9117
9118 default:
28942f62
AM
9119 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9120 ppc_howto_init ();
b140b010 9121 info->callbacks->einfo
695344c0 9122 /* xgettext:c-format */
174d0a74 9123 (_("%H: %s references "
b140b010
AM
9124 "optimized away TOC entry\n"),
9125 ibfd, sec, rel->r_offset,
9126 ppc64_elf_howto_table[r_type]->name);
9127 bfd_set_error (bfd_error_bad_value);
9128 goto error_ret;
ba761f19
AM
9129 }
9130 rel->r_addend = tocrel->r_addend;
9131 elf_section_data (sec)->relocs = relstart;
9132 continue;
9133 }
9134
9135 if (h != NULL || sym->st_value != 0)
9136 continue;
854b41e7
AM
9137
9138 rel->r_addend -= skip[val >> 3];
9139 elf_section_data (sec)->relocs = relstart;
c5614fa4 9140 }
854b41e7
AM
9141
9142 if (elf_section_data (sec)->relocs != relstart)
9143 free (relstart);
c5614fa4
AM
9144 }
9145
9146 /* We shouldn't have local or global symbols defined in the TOC,
9147 but handle them anyway. */
df22d223
AM
9148 if (local_syms != NULL)
9149 for (sym = local_syms;
9150 sym < local_syms + symtab_hdr->sh_info;
9151 ++sym)
9152 if (sym->st_value != 0
9153 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9154 {
9155 unsigned long i;
854b41e7 9156
df22d223
AM
9157 if (sym->st_value > toc->rawsize)
9158 i = toc->rawsize >> 3;
9159 else
9160 i = sym->st_value >> 3;
854b41e7 9161
df22d223
AM
9162 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9163 {
9164 if (local_toc_syms)
4eca0228 9165 _bfd_error_handler
df22d223
AM
9166 (_("%s defined on removed toc entry"),
9167 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9168 do
9169 ++i;
9170 while ((skip[i] & (ref_from_discarded | can_optimize)));
9171 sym->st_value = (bfd_vma) i << 3;
9172 }
d62b3684 9173
df22d223
AM
9174 sym->st_value -= skip[i];
9175 symtab_hdr->contents = (unsigned char *) local_syms;
9176 }
c5614fa4 9177
854b41e7 9178 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9179 if (toc_inf.global_toc_syms)
9180 {
9181 toc_inf.toc = toc;
9182 toc_inf.skip = skip;
9183 toc_inf.global_toc_syms = FALSE;
9184 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9185 &toc_inf);
9186 }
854b41e7
AM
9187
9188 if (toc->reloc_count != 0)
9189 {
d4730f92 9190 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9191 Elf_Internal_Rela *wrel;
9192 bfd_size_type sz;
9193
854b41e7 9194 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9195 if (toc_relocs == NULL)
9196 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9197 info->keep_memory);
9198 if (toc_relocs == NULL)
9199 goto error_ret;
9200
425b145b
AM
9201 wrel = toc_relocs;
9202 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9203 if ((skip[rel->r_offset >> 3]
9204 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9205 {
9206 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9207 wrel->r_info = rel->r_info;
9208 wrel->r_addend = rel->r_addend;
9209 ++wrel;
9210 }
9211 else if (!dec_dynrel_count (rel->r_info, toc, info,
9212 &local_syms, NULL, NULL))
9213 goto error_ret;
9214
425b145b
AM
9215 elf_section_data (toc)->relocs = toc_relocs;
9216 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9217 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9218 sz = rel_hdr->sh_entsize;
9219 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9220 }
c5614fa4 9221 }
c9594989 9222 else if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 9223 free (toc_relocs);
c5614fa4
AM
9224
9225 if (local_syms != NULL
9226 && symtab_hdr->contents != (unsigned char *) local_syms)
9227 {
9228 if (!info->keep_memory)
9229 free (local_syms);
9230 else
9231 symtab_hdr->contents = (unsigned char *) local_syms;
9232 }
9233 free (skip);
9234 }
9235
066f4018 9236 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9237 a GOT relative or PC relative access, possibly reducing the
9238 number of GOT entries. */
066f4018
AM
9239 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9240 {
9241 asection *sec;
9242 Elf_Internal_Shdr *symtab_hdr;
9243 Elf_Internal_Sym *local_syms;
9244 Elf_Internal_Rela *relstart, *rel;
9245 bfd_vma got;
9246
9247 if (!is_ppc64_elf (ibfd))
9248 continue;
9249
903b777d 9250 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9251 continue;
9252
9253 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9254 got = 0;
9255 if (sec != NULL)
9256 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9257
9258 local_syms = NULL;
9259 symtab_hdr = &elf_symtab_hdr (ibfd);
9260
9261 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9262 {
9263 if (sec->reloc_count == 0
903b777d 9264 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9265 || discarded_section (sec))
9266 continue;
9267
9268 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9269 info->keep_memory);
9270 if (relstart == NULL)
9271 {
9272 got_error_ret:
c9594989 9273 if (symtab_hdr->contents != (unsigned char *) local_syms)
066f4018
AM
9274 free (local_syms);
9275 if (sec != NULL
066f4018
AM
9276 && elf_section_data (sec)->relocs != relstart)
9277 free (relstart);
9278 return FALSE;
9279 }
9280
9281 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9282 {
9283 enum elf_ppc64_reloc_type r_type;
9284 unsigned long r_symndx;
9285 Elf_Internal_Sym *sym;
9286 asection *sym_sec;
9287 struct elf_link_hash_entry *h;
9288 struct got_entry *ent;
133a1f60 9289 bfd_vma val, pc;
4a421c53 9290 unsigned char buf[8];
066f4018 9291 unsigned int insn;
903b777d 9292 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9293
9294 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9295 switch (r_type)
9296 {
9297 default:
9298 insn_check = no_check;
9299 break;
9300
9301 case R_PPC64_PLT16_HA:
9302 case R_PPC64_GOT_TLSLD16_HA:
9303 case R_PPC64_GOT_TLSGD16_HA:
9304 case R_PPC64_GOT_TPREL16_HA:
9305 case R_PPC64_GOT_DTPREL16_HA:
9306 case R_PPC64_GOT16_HA:
9307 case R_PPC64_TOC16_HA:
9308 insn_check = check_ha;
9309 break;
9310
9311 case R_PPC64_PLT16_LO:
9312 case R_PPC64_PLT16_LO_DS:
9313 case R_PPC64_GOT_TLSLD16_LO:
9314 case R_PPC64_GOT_TLSGD16_LO:
9315 case R_PPC64_GOT_TPREL16_LO_DS:
9316 case R_PPC64_GOT_DTPREL16_LO_DS:
9317 case R_PPC64_GOT16_LO:
9318 case R_PPC64_GOT16_LO_DS:
9319 case R_PPC64_TOC16_LO:
9320 case R_PPC64_TOC16_LO_DS:
9321 insn_check = check_lo;
9322 break;
9323 }
9324
9325 if (insn_check != no_check)
9326 {
9327 bfd_vma off = rel->r_offset & ~3;
9328
9329 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9330 goto got_error_ret;
9331
9332 insn = bfd_get_32 (ibfd, buf);
9333 if (insn_check == check_lo
9334 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9335 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9336 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9337 {
9338 char str[12];
9339
9340 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9341 sprintf (str, "%#08x", insn);
9342 info->callbacks->einfo
9343 /* xgettext:c-format */
9344 (_("%H: got/toc optimization is not supported for"
9345 " %s instruction\n"),
9346 ibfd, sec, rel->r_offset & ~3, str);
9347 continue;
9348 }
9349 }
9350
066f4018
AM
9351 switch (r_type)
9352 {
bb22a418
AM
9353 /* Note that we don't delete GOT entries for
9354 R_PPC64_GOT16_DS since we'd need a lot more
9355 analysis. For starters, the preliminary layout is
9356 before the GOT, PLT, dynamic sections and stubs are
9357 laid out. Then we'd need to allow for changes in
9358 distance between sections caused by alignment. */
066f4018
AM
9359 default:
9360 continue;
9361
066f4018
AM
9362 case R_PPC64_GOT16_HA:
9363 case R_PPC64_GOT16_LO_DS:
4a421c53 9364 case R_PPC64_GOT_PCREL34:
066f4018
AM
9365 break;
9366 }
9367
9368 r_symndx = ELF64_R_SYM (rel->r_info);
9369 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9370 r_symndx, ibfd))
9371 goto got_error_ret;
9372
6d5554a6
AM
9373 if (sym_sec == NULL
9374 || sym_sec->output_section == NULL
9375 || discarded_section (sym_sec))
9376 continue;
9377
06507dab
AM
9378 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9379 continue;
9380
066f4018
AM
9381 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9382 continue;
9383
9384 if (h != NULL)
9385 val = h->root.u.def.value;
9386 else
9387 val = sym->st_value;
133a1f60 9388 val += rel->r_addend;
066f4018
AM
9389 val += sym_sec->output_section->vma + sym_sec->output_offset;
9390
bb22a418
AM
9391/* Fudge factor to allow for the fact that the preliminary layout
9392 isn't exact. Reduce limits by this factor. */
9393#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9394
066f4018
AM
9395 switch (r_type)
9396 {
9397 default:
9398 continue;
9399
066f4018 9400 case R_PPC64_GOT16_HA:
bb22a418
AM
9401 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9402 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9403 continue;
9404
9405 if (!bfd_get_section_contents (ibfd, sec, buf,
9406 rel->r_offset & ~3, 4))
9407 goto got_error_ret;
9408 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9409 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9410 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9411 continue;
9412 break;
9413
9414 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9415 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9416 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9417 continue;
9418 if (!bfd_get_section_contents (ibfd, sec, buf,
9419 rel->r_offset & ~3, 4))
9420 goto got_error_ret;
9421 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9422 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9423 continue;
9424 break;
4a421c53
AM
9425
9426 case R_PPC64_GOT_PCREL34:
9427 pc = rel->r_offset;
9428 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9429 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9430 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9431 continue;
9432 if (!bfd_get_section_contents (ibfd, sec, buf,
9433 rel->r_offset & ~3, 8))
9434 goto got_error_ret;
9435 insn = bfd_get_32 (ibfd, buf);
9436 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9437 continue;
9438 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9439 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9440 continue;
9441 break;
066f4018 9442 }
bb22a418 9443#undef LIMIT_ADJUST
066f4018
AM
9444
9445 if (h != NULL)
9446 ent = h->got.glist;
9447 else
9448 {
9449 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9450 ent = local_got_ents[r_symndx];
9451 }
9452 for (; ent != NULL; ent = ent->next)
133a1f60 9453 if (ent->addend == rel->r_addend
066f4018
AM
9454 && ent->owner == ibfd
9455 && ent->tls_type == 0)
9456 break;
9457 BFD_ASSERT (ent && ent->got.refcount > 0);
9458 ent->got.refcount -= 1;
9459 }
9460
9461 if (elf_section_data (sec)->relocs != relstart)
9462 free (relstart);
9463 }
9464
9465 if (local_syms != NULL
9466 && symtab_hdr->contents != (unsigned char *) local_syms)
9467 {
9468 if (!info->keep_memory)
9469 free (local_syms);
9470 else
9471 symtab_hdr->contents = (unsigned char *) local_syms;
9472 }
9473 }
9474
c5614fa4
AM
9475 return TRUE;
9476}
9477
1bbe0902
AM
9478/* Return true iff input section I references the TOC using
9479 instructions limited to +/-32k offsets. */
9480
9481bfd_boolean
9482ppc64_elf_has_small_toc_reloc (asection *i)
9483{
9484 return (is_ppc64_elf (i->owner)
9485 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9486}
9487
927be08e
AM
9488/* Allocate space for one GOT entry. */
9489
9490static void
9491allocate_got (struct elf_link_hash_entry *h,
9492 struct bfd_link_info *info,
9493 struct got_entry *gent)
9494{
9495 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9496 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9497 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9498 ? 16 : 8);
9499 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9500 ? 2 : 1) * sizeof (Elf64_External_Rela);
9501 asection *got = ppc64_elf_tdata (gent->owner)->got;
9502
9503 gent->got.offset = got->size;
9504 got->size += entsize;
9505
19e08130 9506 if (h->type == STT_GNU_IFUNC)
927be08e 9507 {
33e44f2e 9508 htab->elf.irelplt->size += rentsize;
19e08130 9509 htab->got_reli_size += rentsize;
927be08e 9510 }
f15d0b54 9511 else if (((bfd_link_pic (info)
f749f26e 9512 && !(gent->tls_type != 0
f15d0b54
AM
9513 && bfd_link_executable (info)
9514 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9515 || (htab->elf.dynamic_sections_created
9516 && h->dynindx != -1
9517 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9518 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9519 {
19e08130 9520 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9521 relgot->size += rentsize;
927be08e
AM
9522 }
9523}
9524
7865406b
AM
9525/* This function merges got entries in the same toc group. */
9526
9527static void
9528merge_got_entries (struct got_entry **pent)
9529{
9530 struct got_entry *ent, *ent2;
9531
9532 for (ent = *pent; ent != NULL; ent = ent->next)
9533 if (!ent->is_indirect)
9534 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9535 if (!ent2->is_indirect
9536 && ent2->addend == ent->addend
9537 && ent2->tls_type == ent->tls_type
9538 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9539 {
9540 ent2->is_indirect = TRUE;
9541 ent2->got.ent = ent;
9542 }
9543}
9544
46434633 9545/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9546
9547static bfd_boolean
46434633
AM
9548ensure_undef_dynamic (struct bfd_link_info *info,
9549 struct elf_link_hash_entry *h)
f0158f44
AM
9550{
9551 struct elf_link_hash_table *htab = elf_hash_table (info);
9552
9553 if (htab->dynamic_sections_created
46434633
AM
9554 && ((info->dynamic_undefined_weak != 0
9555 && h->root.type == bfd_link_hash_undefweak)
9556 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9557 && h->dynindx == -1
9558 && !h->forced_local
9559 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9560 return bfd_elf_link_record_dynamic_symbol (info, h);
9561 return TRUE;
9562}
9563
65f38f15
AM
9564/* Allocate space in .plt, .got and associated reloc sections for
9565 dynamic relocs. */
5bd4f169 9566
b34976b6 9567static bfd_boolean
4ce794b7 9568allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9569{
65f38f15
AM
9570 struct bfd_link_info *info;
9571 struct ppc_link_hash_table *htab;
5bd4f169 9572 asection *s;
65f38f15 9573 struct ppc_link_hash_entry *eh;
0b8bcf0d 9574 struct got_entry **pgent, *gent;
5bd4f169 9575
e92d460e 9576 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9577 return TRUE;
5bd4f169 9578
65f38f15
AM
9579 info = (struct bfd_link_info *) inf;
9580 htab = ppc_hash_table (info);
4dfe6ac6
NC
9581 if (htab == NULL)
9582 return FALSE;
5bd4f169 9583
ed7007c1 9584 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9585 /* Run through the TLS GD got entries first if we're changing them
9586 to TPREL. */
b00a0a86 9587 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9588 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9589 if (gent->got.refcount > 0
9590 && (gent->tls_type & TLS_GD) != 0)
9591 {
9592 /* This was a GD entry that has been converted to TPREL. If
9593 there happens to be a TPREL entry we can use that one. */
9594 struct got_entry *ent;
9595 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9596 if (ent->got.refcount > 0
9597 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9598 && ent->addend == gent->addend
9599 && ent->owner == gent->owner)
951fd09b
AM
9600 {
9601 gent->got.refcount = 0;
9602 break;
9603 }
9604
9605 /* If not, then we'll be using our own TPREL entry. */
9606 if (gent->got.refcount != 0)
9607 gent->tls_type = TLS_TLS | TLS_TPREL;
9608 }
9609
7865406b
AM
9610 /* Remove any list entry that won't generate a word in the GOT before
9611 we call merge_got_entries. Otherwise we risk merging to empty
9612 entries. */
0b8bcf0d
AM
9613 pgent = &h->got.glist;
9614 while ((gent = *pgent) != NULL)
411e1bfb 9615 if (gent->got.refcount > 0)
7865406b
AM
9616 {
9617 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9618 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9619 {
9620 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9621 *pgent = gent->next;
9622 }
9623 else
9624 pgent = &gent->next;
9625 }
9626 else
9627 *pgent = gent->next;
9628
9629 if (!htab->do_multi_toc)
9630 merge_got_entries (&h->got.glist);
9631
9632 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9633 if (!gent->is_indirect)
411e1bfb 9634 {
ec73ddcd
AM
9635 /* Ensure we catch all the cases where this symbol should
9636 be made dynamic. */
46434633 9637 if (!ensure_undef_dynamic (info, h))
f0158f44 9638 return FALSE;
65f38f15 9639
0c8d6e5c 9640 if (!is_ppc64_elf (gent->owner))
927be08e 9641 abort ();
0ffa91dd 9642
927be08e 9643 allocate_got (h, info, gent);
411e1bfb 9644 }
65f38f15 9645
954b63d4
AM
9646 /* If no dynamic sections we can't have dynamic relocs, except for
9647 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9648 if (!htab->elf.dynamic_sections_created
9649 && h->type != STT_GNU_IFUNC)
190eb1dd 9650 h->dyn_relocs = NULL;
8a2058b5 9651
529fe20e
AM
9652 /* Discard relocs on undefined symbols that must be local. */
9653 else if (h->root.type == bfd_link_hash_undefined
9654 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 9655 h->dyn_relocs = NULL;
529fe20e 9656
954b63d4
AM
9657 /* Also discard relocs on undefined weak syms with non-default
9658 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9659 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 9660 h->dyn_relocs = NULL;
954b63d4 9661
190eb1dd 9662 if (h->dyn_relocs != NULL)
65f38f15 9663 {
8a2058b5
AM
9664 struct elf_dyn_relocs *p, **pp;
9665
57e7d118
AM
9666 /* In the shared -Bsymbolic case, discard space allocated for
9667 dynamic pc-relative relocs against symbols which turn out to
9668 be defined in regular objects. For the normal shared case,
9669 discard space for relocs that have become local due to symbol
9670 visibility changes. */
57e7d118 9671 if (bfd_link_pic (info))
65f38f15 9672 {
57e7d118
AM
9673 /* Relocs that use pc_count are those that appear on a call
9674 insn, or certain REL relocs (see must_be_dyn_reloc) that
9675 can be generated via assembly. We want calls to
9676 protected symbols to resolve directly to the function
9677 rather than going via the plt. If people want function
9678 pointer comparisons to work as expected then they should
9679 avoid writing weird assembly. */
9680 if (SYMBOL_CALLS_LOCAL (info, h))
9681 {
190eb1dd 9682 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
57e7d118
AM
9683 {
9684 p->count -= p->pc_count;
9685 p->pc_count = 0;
9686 if (p->count == 0)
9687 *pp = p->next;
9688 else
9689 pp = &p->next;
9690 }
9691 }
65f38f15 9692
190eb1dd 9693 if (h->dyn_relocs != NULL)
5bd4f169 9694 {
ec73ddcd
AM
9695 /* Ensure we catch all the cases where this symbol
9696 should be made dynamic. */
46434633 9697 if (!ensure_undef_dynamic (info, h))
f0158f44 9698 return FALSE;
5bd4f169 9699 }
65f38f15 9700 }
ec73ddcd
AM
9701
9702 /* For a fixed position executable, discard space for
9703 relocs against symbols which are not dynamic. */
9704 else if (h->type != STT_GNU_IFUNC)
57e7d118 9705 {
529fe20e
AM
9706 if (h->dynamic_adjusted
9707 && !h->def_regular
9708 && !ELF_COMMON_DEF_P (h))
f0158f44 9709 {
ec73ddcd
AM
9710 /* Ensure we catch all the cases where this symbol
9711 should be made dynamic. */
46434633 9712 if (!ensure_undef_dynamic (info, h))
f0158f44 9713 return FALSE;
dfbb6ac9 9714
ec73ddcd 9715 /* But if that didn't work out, discard dynamic relocs. */
f0158f44 9716 if (h->dynindx == -1)
190eb1dd 9717 h->dyn_relocs = NULL;
f0158f44
AM
9718 }
9719 else
190eb1dd 9720 h->dyn_relocs = NULL;
57e7d118
AM
9721 }
9722
9723 /* Finally, allocate space. */
190eb1dd 9724 for (p = h->dyn_relocs; p != NULL; p = p->next)
57e7d118
AM
9725 {
9726 asection *sreloc = elf_section_data (p->sec)->sreloc;
9727 if (eh->elf.type == STT_GNU_IFUNC)
9728 sreloc = htab->elf.irelplt;
9729 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9730 }
65f38f15 9731 }
57e7d118 9732
2d7ad24e
AM
9733 /* We might need a PLT entry when the symbol
9734 a) is dynamic, or
9735 b) is an ifunc, or
9736 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9737 d) has plt16 relocs and we are linking statically. */
9738 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9739 || h->type == STT_GNU_IFUNC
9740 || (h->needs_plt && h->dynamic_adjusted)
9741 || (h->needs_plt
9742 && h->def_regular
9743 && !htab->elf.dynamic_sections_created
3e04d765 9744 && !htab->can_convert_all_inline_plt
ed7007c1 9745 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9746 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9747 {
57e7d118
AM
9748 struct plt_entry *pent;
9749 bfd_boolean doneone = FALSE;
9750 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9751 if (pent->plt.refcount > 0)
9752 {
9753 if (!htab->elf.dynamic_sections_created
9754 || h->dynindx == -1)
9755 {
2d7ad24e
AM
9756 if (h->type == STT_GNU_IFUNC)
9757 {
9758 s = htab->elf.iplt;
9759 pent->plt.offset = s->size;
9760 s->size += PLT_ENTRY_SIZE (htab);
9761 s = htab->elf.irelplt;
9762 }
9763 else
9764 {
9765 s = htab->pltlocal;
9766 pent->plt.offset = s->size;
9767 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9768 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9769 }
57e7d118
AM
9770 }
9771 else
9772 {
9773 /* If this is the first .plt entry, make room for the special
9774 first entry. */
9775 s = htab->elf.splt;
9776 if (s->size == 0)
9777 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9778
57e7d118 9779 pent->plt.offset = s->size;
65f38f15 9780
57e7d118
AM
9781 /* Make room for this entry. */
9782 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9783
57e7d118
AM
9784 /* Make room for the .glink code. */
9785 s = htab->glink;
9786 if (s->size == 0)
9e390558 9787 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9788 if (htab->opd_abi)
9789 {
9790 /* We need bigger stubs past index 32767. */
9e390558 9791 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9792 s->size += 4;
9793 s->size += 2*4;
9794 }
9795 else
9796 s->size += 4;
65f38f15 9797
57e7d118
AM
9798 /* We also need to make an entry in the .rela.plt section. */
9799 s = htab->elf.srelplt;
9800 }
2d7ad24e
AM
9801 if (s != NULL)
9802 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9803 doneone = TRUE;
9804 }
9805 else
9806 pent->plt.offset = (bfd_vma) -1;
9807 if (!doneone)
9808 {
9809 h->plt.plist = NULL;
9810 h->needs_plt = 0;
9811 }
65f38f15 9812 }
57e7d118 9813 else
65f38f15 9814 {
57e7d118
AM
9815 h->plt.plist = NULL;
9816 h->needs_plt = 0;
65f38f15
AM
9817 }
9818
b34976b6 9819 return TRUE;
65f38f15
AM
9820}
9821
9e390558
AM
9822#define PPC_LO(v) ((v) & 0xffff)
9823#define PPC_HI(v) (((v) >> 16) & 0xffff)
9824#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9825#define D34(v) \
9826 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9827#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9828
a345bc8d
AM
9829/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9830 to set up space for global entry stubs. These are put in glink,
9831 after the branch table. */
65f38f15 9832
b34976b6 9833static bfd_boolean
a345bc8d 9834size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9835{
a345bc8d
AM
9836 struct bfd_link_info *info;
9837 struct ppc_link_hash_table *htab;
9838 struct plt_entry *pent;
9e390558 9839 asection *s, *plt;
65f38f15 9840
a345bc8d
AM
9841 if (h->root.type == bfd_link_hash_indirect)
9842 return TRUE;
65f38f15 9843
a345bc8d
AM
9844 if (!h->pointer_equality_needed)
9845 return TRUE;
65f38f15 9846
a345bc8d
AM
9847 if (h->def_regular)
9848 return TRUE;
65f38f15 9849
a345bc8d
AM
9850 info = inf;
9851 htab = ppc_hash_table (info);
9852 if (htab == NULL)
9853 return FALSE;
9854
9e390558
AM
9855 s = htab->global_entry;
9856 plt = htab->elf.splt;
a345bc8d
AM
9857 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9858 if (pent->plt.offset != (bfd_vma) -1
9859 && pent->addend == 0)
9860 {
afe397ea
AM
9861 /* For ELFv2, if this symbol is not defined in a regular file
9862 and we are not generating a shared library or pie, then we
9863 need to define the symbol in the executable on a call stub.
9864 This is to avoid text relocations. */
9e390558
AM
9865 bfd_vma off, stub_align, stub_off, stub_size;
9866 unsigned int align_power;
9867
9868 stub_size = 16;
9869 stub_off = s->size;
9870 if (htab->params->plt_stub_align >= 0)
9871 align_power = htab->params->plt_stub_align;
9872 else
9873 align_power = -htab->params->plt_stub_align;
9874 /* Setting section alignment is delayed until we know it is
9875 non-empty. Otherwise the .text output section will be
9876 aligned at least to plt_stub_align even when no global
9877 entry stubs are needed. */
9878 if (s->alignment_power < align_power)
9879 s->alignment_power = align_power;
9880 stub_align = (bfd_vma) 1 << align_power;
9881 if (htab->params->plt_stub_align >= 0
9882 || ((((stub_off + stub_size - 1) & -stub_align)
9883 - (stub_off & -stub_align))
9884 > ((stub_size - 1) & -stub_align)))
9885 stub_off = (stub_off + stub_align - 1) & -stub_align;
9886 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9887 off -= stub_off + s->output_offset + s->output_section->vma;
9888 /* Note that for --plt-stub-align negative we have a possible
9889 dependency between stub offset and size. Break that
9890 dependency by assuming the max stub size when calculating
9891 the stub offset. */
9892 if (PPC_HA (off) == 0)
9893 stub_size -= 4;
8a2058b5 9894 h->root.type = bfd_link_hash_defined;
afe397ea 9895 h->root.u.def.section = s;
9e390558
AM
9896 h->root.u.def.value = stub_off;
9897 s->size = stub_off + stub_size;
a345bc8d
AM
9898 break;
9899 }
9900 return TRUE;
9901}
9902
65f38f15
AM
9903/* Set the sizes of the dynamic sections. */
9904
b34976b6 9905static bfd_boolean
ee67d69a 9906ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9907 struct bfd_link_info *info)
65f38f15
AM
9908{
9909 struct ppc_link_hash_table *htab;
9910 bfd *dynobj;
9911 asection *s;
b34976b6 9912 bfd_boolean relocs;
65f38f15 9913 bfd *ibfd;
7865406b 9914 struct got_entry *first_tlsld;
65f38f15
AM
9915
9916 htab = ppc_hash_table (info);
4dfe6ac6
NC
9917 if (htab == NULL)
9918 return FALSE;
9919
65f38f15
AM
9920 dynobj = htab->elf.dynobj;
9921 if (dynobj == NULL)
9922 abort ();
9923
9924 if (htab->elf.dynamic_sections_created)
9925 {
9926 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9927 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9928 {
3d4d4302 9929 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9930 if (s == NULL)
9931 abort ();
eea6121a 9932 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9933 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9934 }
9935 }
9936
9937 /* Set up .got offsets for local syms, and space for local dynamic
9938 relocs. */
c72f2fb2 9939 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9940 {
411e1bfb
AM
9941 struct got_entry **lgot_ents;
9942 struct got_entry **end_lgot_ents;
e054468f
AM
9943 struct plt_entry **local_plt;
9944 struct plt_entry **end_local_plt;
f961d9dd 9945 unsigned char *lgot_masks;
65f38f15
AM
9946 bfd_size_type locsymcount;
9947 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9948
0c8d6e5c 9949 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9950 continue;
9951
9952 for (s = ibfd->sections; s != NULL; s = s->next)
9953 {
19e08130 9954 struct ppc_dyn_relocs *p;
65f38f15 9955
6edfbbad 9956 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9957 {
ec338859
AM
9958 if (!bfd_is_abs_section (p->sec)
9959 && bfd_is_abs_section (p->sec->output_section))
9960 {
9961 /* Input section has been discarded, either because
9962 it is a copy of a linkonce section or due to
9963 linker script /DISCARD/, so we'll be discarding
9964 the relocs too. */
9965 }
248866a8 9966 else if (p->count != 0)
ec338859 9967 {
19e08130
AM
9968 asection *srel = elf_section_data (p->sec)->sreloc;
9969 if (p->ifunc)
33e44f2e 9970 srel = htab->elf.irelplt;
eea6121a 9971 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9972 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9973 info->flags |= DF_TEXTREL;
ec338859 9974 }
65f38f15
AM
9975 }
9976 }
9977
411e1bfb
AM
9978 lgot_ents = elf_local_got_ents (ibfd);
9979 if (!lgot_ents)
65f38f15
AM
9980 continue;
9981
0ffa91dd 9982 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9983 locsymcount = symtab_hdr->sh_info;
411e1bfb 9984 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9985 local_plt = (struct plt_entry **) end_lgot_ents;
9986 end_local_plt = local_plt + locsymcount;
f961d9dd 9987 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9988 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9989 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9990 {
0b8bcf0d 9991 struct got_entry **pent, *ent;
411e1bfb 9992
0b8bcf0d
AM
9993 pent = lgot_ents;
9994 while ((ent = *pent) != NULL)
411e1bfb
AM
9995 if (ent->got.refcount > 0)
9996 {
e7b938ca 9997 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 9998 {
927be08e 9999 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10000 *pent = ent->next;
411e1bfb
AM
10001 }
10002 else
10003 {
19e08130
AM
10004 unsigned int ent_size = 8;
10005 unsigned int rel_size = sizeof (Elf64_External_Rela);
10006
eea6121a 10007 ent->got.offset = s->size;
e7b938ca 10008 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10009 {
19e08130
AM
10010 ent_size *= 2;
10011 rel_size *= 2;
10012 }
10013 s->size += ent_size;
37da22e5 10014 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10015 {
33e44f2e 10016 htab->elf.irelplt->size += rel_size;
19e08130
AM
10017 htab->got_reli_size += rel_size;
10018 }
93370e8e
AM
10019 else if (bfd_link_pic (info)
10020 && !(ent->tls_type != 0
10021 && bfd_link_executable (info)))
19e08130
AM
10022 {
10023 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10024 srel->size += rel_size;
927be08e 10025 }
0b8bcf0d 10026 pent = &ent->next;
411e1bfb
AM
10027 }
10028 }
10029 else
0b8bcf0d 10030 *pent = ent->next;
65f38f15 10031 }
e054468f 10032
2d7ad24e
AM
10033 /* Allocate space for plt calls to local syms. */
10034 lgot_masks = (unsigned char *) end_local_plt;
10035 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10036 {
10037 struct plt_entry *ent;
10038
10039 for (ent = *local_plt; ent != NULL; ent = ent->next)
10040 if (ent->plt.refcount > 0)
10041 {
2d7ad24e
AM
10042 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10043 {
10044 s = htab->elf.iplt;
10045 ent->plt.offset = s->size;
10046 s->size += PLT_ENTRY_SIZE (htab);
10047 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10048 }
3e04d765
AM
10049 else if (htab->can_convert_all_inline_plt
10050 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10051 ent->plt.offset = (bfd_vma) -1;
10052 else
10053 {
10054 s = htab->pltlocal;
10055 ent->plt.offset = s->size;
10056 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10057 if (bfd_link_pic (info))
10058 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10059 }
e054468f
AM
10060 }
10061 else
10062 ent->plt.offset = (bfd_vma) -1;
10063 }
65f38f15
AM
10064 }
10065
10066 /* Allocate global sym .plt and .got entries, and space for global
10067 sym dynamic relocs. */
4ce794b7 10068 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10069
0e1862bb 10070 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10071 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10072
7865406b 10073 first_tlsld = NULL;
c72f2fb2 10074 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10075 {
7865406b
AM
10076 struct got_entry *ent;
10077
0c8d6e5c 10078 if (!is_ppc64_elf (ibfd))
102890f0
AM
10079 continue;
10080
7865406b
AM
10081 ent = ppc64_tlsld_got (ibfd);
10082 if (ent->got.refcount > 0)
102890f0 10083 {
7865406b 10084 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10085 {
7865406b
AM
10086 ent->is_indirect = TRUE;
10087 ent->got.ent = first_tlsld;
10088 }
10089 else
10090 {
10091 if (first_tlsld == NULL)
10092 first_tlsld = ent;
10093 s = ppc64_elf_tdata (ibfd)->got;
10094 ent->got.offset = s->size;
10095 ent->owner = ibfd;
10096 s->size += 16;
f749f26e 10097 if (bfd_link_dll (info))
7865406b
AM
10098 {
10099 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10100 srel->size += sizeof (Elf64_External_Rela);
10101 }
102890f0
AM
10102 }
10103 }
10104 else
7865406b 10105 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10106 }
10107
65f38f15
AM
10108 /* We now have determined the sizes of the various dynamic sections.
10109 Allocate memory for them. */
b34976b6 10110 relocs = FALSE;
65f38f15
AM
10111 for (s = dynobj->sections; s != NULL; s = s->next)
10112 {
10113 if ((s->flags & SEC_LINKER_CREATED) == 0)
10114 continue;
10115
4ce794b7 10116 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10117 /* These haven't been allocated yet; don't strip. */
10118 continue;
33e44f2e
AM
10119 else if (s == htab->elf.sgot
10120 || s == htab->elf.splt
10121 || s == htab->elf.iplt
2d7ad24e 10122 || s == htab->pltlocal
c456f082 10123 || s == htab->glink
9e390558 10124 || s == htab->global_entry
5474d94f
AM
10125 || s == htab->elf.sdynbss
10126 || s == htab->elf.sdynrelro)
65f38f15
AM
10127 {
10128 /* Strip this section if we don't need it; see the
10129 comment below. */
5bd4f169 10130 }
58d180e8
AM
10131 else if (s == htab->glink_eh_frame)
10132 {
10133 if (!bfd_is_abs_section (s->output_section))
10134 /* Not sized yet. */
10135 continue;
10136 }
70cc837d 10137 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10138 {
c456f082 10139 if (s->size != 0)
5bd4f169 10140 {
33e44f2e 10141 if (s != htab->elf.srelplt)
b34976b6 10142 relocs = TRUE;
5bd4f169
AM
10143
10144 /* We use the reloc_count field as a counter if we need
10145 to copy relocs into the output file. */
10146 s->reloc_count = 0;
10147 }
10148 }
65f38f15 10149 else
5bd4f169
AM
10150 {
10151 /* It's not one of our sections, so don't allocate space. */
10152 continue;
10153 }
10154
eea6121a 10155 if (s->size == 0)
5bd4f169 10156 {
c456f082
AM
10157 /* If we don't need this section, strip it from the
10158 output file. This is mostly to handle .rela.bss and
10159 .rela.plt. We must create both sections in
10160 create_dynamic_sections, because they must be created
10161 before the linker maps input sections to output
10162 sections. The linker does that before
10163 adjust_dynamic_symbol is called, and it is that
10164 function which decides whether anything needs to go
10165 into these sections. */
8423293d 10166 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10167 continue;
10168 }
10169
06bcf541
AM
10170 if (bfd_is_abs_section (s->output_section))
10171 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10172 s->name);
10173
c456f082 10174 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10175 continue;
10176
65f38f15
AM
10177 /* Allocate memory for the section contents. We use bfd_zalloc
10178 here in case unused entries are not reclaimed before the
10179 section's contents are written out. This should not happen,
411e1bfb
AM
10180 but this way if it does we get a R_PPC64_NONE reloc in .rela
10181 sections instead of garbage.
10182 We also rely on the section contents being zero when writing
5474d94f 10183 the GOT and .dynrelro. */
eea6121a 10184 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10185 if (s->contents == NULL)
b34976b6 10186 return FALSE;
5bd4f169
AM
10187 }
10188
c72f2fb2 10189 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10190 {
0c8d6e5c 10191 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10192 continue;
10193
e717da7e 10194 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10195 if (s != NULL && s != htab->elf.sgot)
e717da7e 10196 {
eea6121a 10197 if (s->size == 0)
8423293d 10198 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10199 else
10200 {
eea6121a 10201 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10202 if (s->contents == NULL)
10203 return FALSE;
10204 }
10205 }
10206 s = ppc64_elf_tdata (ibfd)->relgot;
10207 if (s != NULL)
10208 {
eea6121a 10209 if (s->size == 0)
8423293d 10210 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10211 else
10212 {
eea6121a 10213 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10214 if (s->contents == NULL)
10215 return FALSE;
10216 relocs = TRUE;
10217 s->reloc_count = 0;
10218 }
10219 }
10220 }
10221
e86ce104 10222 if (htab->elf.dynamic_sections_created)
5bd4f169 10223 {
e8910a83
AM
10224 bfd_boolean tls_opt;
10225
5bd4f169
AM
10226 /* Add some entries to the .dynamic section. We fill in the
10227 values later, in ppc64_elf_finish_dynamic_sections, but we
10228 must add the entries now so that we get the correct size for
10229 the .dynamic section. The DT_DEBUG entry is filled in by the
10230 dynamic linker and used by the debugger. */
dc810e39 10231#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10232 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10233
0e1862bb 10234 if (bfd_link_executable (info))
5bd4f169 10235 {
dc810e39 10236 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10237 return FALSE;
5bd4f169
AM
10238 }
10239
33e44f2e 10240 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10241 {
dc810e39
AM
10242 if (!add_dynamic_entry (DT_PLTGOT, 0)
10243 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10244 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10245 || !add_dynamic_entry (DT_JMPREL, 0)
10246 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10247 return FALSE;
5bd4f169
AM
10248 }
10249
ee67d69a 10250 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10251 {
10252 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10253 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10254 return FALSE;
19397422
AM
10255 }
10256
7c9cf415 10257 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10258 && ((htab->tls_get_addr_fd != NULL
10259 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10260 || (htab->tga_desc_fd != NULL
10261 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10262 if (tls_opt || !htab->opd_abi)
10263 {
10264 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10265 return FALSE;
10266 }
a7f2871e 10267
5bd4f169
AM
10268 if (relocs)
10269 {
dc810e39
AM
10270 if (!add_dynamic_entry (DT_RELA, 0)
10271 || !add_dynamic_entry (DT_RELASZ, 0)
10272 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10273 return FALSE;
5bd4f169 10274
65f38f15
AM
10275 /* If any dynamic relocs apply to a read-only section,
10276 then we need a DT_TEXTREL entry. */
248866a8 10277 if ((info->flags & DF_TEXTREL) == 0)
d49e5065
L
10278 elf_link_hash_traverse (&htab->elf,
10279 _bfd_elf_maybe_set_textrel, info);
5bd4f169 10280
65f38f15 10281 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10282 {
65f38f15 10283 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10284 return FALSE;
5bd4f169 10285 }
5bd4f169 10286 }
5bd4f169 10287 }
65f38f15 10288#undef add_dynamic_entry
5bd4f169 10289
b34976b6 10290 return TRUE;
5bd4f169
AM
10291}
10292
a345bc8d
AM
10293/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10294
10295static bfd_boolean
10296ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10297{
10298 if (h->plt.plist != NULL
10299 && !h->def_regular
10300 && !h->pointer_equality_needed)
10301 return FALSE;
10302
10303 return _bfd_elf_hash_symbol (h);
10304}
10305
721956f4 10306/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10307
4ce794b7
AM
10308static inline enum ppc_stub_type
10309ppc_type_of_stub (asection *input_sec,
10310 const Elf_Internal_Rela *rel,
10311 struct ppc_link_hash_entry **hash,
e054468f 10312 struct plt_entry **plt_ent,
6911b7dc
AM
10313 bfd_vma destination,
10314 unsigned long local_off)
5bd4f169 10315{
721956f4
AM
10316 struct ppc_link_hash_entry *h = *hash;
10317 bfd_vma location;
10318 bfd_vma branch_offset;
10319 bfd_vma max_branch_offset;
4ce794b7 10320 enum elf_ppc64_reloc_type r_type;
5bd4f169 10321
721956f4
AM
10322 if (h != NULL)
10323 {
e054468f 10324 struct plt_entry *ent;
7fe2b9a6 10325 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10326 if (h->oh != NULL
10327 && h->oh->is_func_descriptor)
7b8f6675
AM
10328 {
10329 fdh = ppc_follow_link (h->oh);
10330 *hash = fdh;
10331 }
8387904d 10332
e054468f
AM
10333 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10334 if (ent->addend == rel->r_addend
10335 && ent->plt.offset != (bfd_vma) -1)
10336 {
e054468f
AM
10337 *plt_ent = ent;
10338 return ppc_stub_plt_call;
10339 }
5bd4f169 10340
7fe2b9a6
AM
10341 /* Here, we know we don't have a plt entry. If we don't have a
10342 either a defined function descriptor or a defined entry symbol
10343 in a regular object file, then it is pointless trying to make
10344 any other type of stub. */
854b41e7
AM
10345 if (!is_static_defined (&fdh->elf)
10346 && !is_static_defined (&h->elf))
721956f4 10347 return ppc_stub_none;
5d1634d7 10348 }
e054468f
AM
10349 else if (elf_local_got_ents (input_sec->owner) != NULL)
10350 {
10351 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10352 struct plt_entry **local_plt = (struct plt_entry **)
10353 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10354 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10355
10356 if (local_plt[r_symndx] != NULL)
10357 {
10358 struct plt_entry *ent;
10359
10360 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10361 if (ent->addend == rel->r_addend
10362 && ent->plt.offset != (bfd_vma) -1)
10363 {
10364 *plt_ent = ent;
10365 return ppc_stub_plt_call;
10366 }
10367 }
10368 }
5d1634d7 10369
721956f4
AM
10370 /* Determine where the call point is. */
10371 location = (input_sec->output_offset
10372 + input_sec->output_section->vma
10373 + rel->r_offset);
5d1634d7 10374
721956f4
AM
10375 branch_offset = destination - location;
10376 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10377
721956f4
AM
10378 /* Determine if a long branch stub is needed. */
10379 max_branch_offset = 1 << 25;
23cedd1d
AM
10380 if (r_type == R_PPC64_REL14
10381 || r_type == R_PPC64_REL14_BRTAKEN
10382 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10383 max_branch_offset = 1 << 15;
5d1634d7 10384
6911b7dc 10385 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10386 /* We need a stub. Figure out whether a long_branch or plt_branch
10387 is needed later. */
10388 return ppc_stub_long_branch;
5d1634d7 10389
721956f4 10390 return ppc_stub_none;
5d1634d7
AM
10391}
10392
f891966f
AM
10393/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10394 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10395 . mflr %r12
10396 . bcl 20,31,1f
10397 .1: mflr %r11
10398 . mtlr %r12
05d0e962 10399 . lis %r12,xxx-1b@highest
f891966f 10400 . ori %r12,%r12,xxx-1b@higher
05d0e962 10401 . sldi %r12,%r12,32
f891966f 10402 . oris %r12,%r12,xxx-1b@high
05d0e962 10403 . ori %r12,%r12,xxx-1b@l
f891966f 10404 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10405
10406static bfd_byte *
10407build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10408{
f891966f
AM
10409 bfd_put_32 (abfd, MFLR_R12, p);
10410 p += 4;
10411 bfd_put_32 (abfd, BCL_20_31, p);
10412 p += 4;
10413 bfd_put_32 (abfd, MFLR_R11, p);
10414 p += 4;
10415 bfd_put_32 (abfd, MTLR_R12, p);
10416 p += 4;
05d0e962
AM
10417 if (off + 0x8000 < 0x10000)
10418 {
10419 if (load)
10420 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10421 else
10422 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10423 p += 4;
10424 }
10425 else if (off + 0x80008000ULL < 0x100000000ULL)
10426 {
10427 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10428 p += 4;
10429 if (load)
10430 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10431 else
10432 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10433 p += 4;
10434 }
10435 else
10436 {
10437 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10438 {
10439 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10440 p += 4;
10441 }
10442 else
10443 {
10444 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10445 p += 4;
10446 if (((off >> 32) & 0xffff) != 0)
10447 {
10448 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10449 p += 4;
10450 }
10451 }
10452 if (((off >> 32) & 0xffffffffULL) != 0)
10453 {
10454 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10455 p += 4;
10456 }
10457 if (PPC_HI (off) != 0)
10458 {
10459 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10460 p += 4;
10461 }
10462 if (PPC_LO (off) != 0)
10463 {
10464 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10465 p += 4;
10466 }
10467 if (load)
10468 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10469 else
10470 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10471 p += 4;
10472 }
10473 return p;
10474}
10475
10476static unsigned int
10477size_offset (bfd_vma off)
10478{
10479 unsigned int size;
10480 if (off + 0x8000 < 0x10000)
10481 size = 4;
10482 else if (off + 0x80008000ULL < 0x100000000ULL)
10483 size = 8;
10484 else
10485 {
10486 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10487 size = 4;
10488 else
10489 {
10490 size = 4;
10491 if (((off >> 32) & 0xffff) != 0)
10492 size += 4;
10493 }
10494 if (((off >> 32) & 0xffffffffULL) != 0)
10495 size += 4;
10496 if (PPC_HI (off) != 0)
10497 size += 4;
10498 if (PPC_LO (off) != 0)
10499 size += 4;
10500 size += 4;
10501 }
f891966f 10502 return size + 16;
05d0e962
AM
10503}
10504
3d58e1fc
AM
10505static unsigned int
10506num_relocs_for_offset (bfd_vma off)
10507{
10508 unsigned int num_rel;
10509 if (off + 0x8000 < 0x10000)
10510 num_rel = 1;
10511 else if (off + 0x80008000ULL < 0x100000000ULL)
10512 num_rel = 2;
10513 else
10514 {
10515 num_rel = 1;
10516 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10517 && ((off >> 32) & 0xffff) != 0)
10518 num_rel += 1;
10519 if (PPC_HI (off) != 0)
10520 num_rel += 1;
10521 if (PPC_LO (off) != 0)
10522 num_rel += 1;
10523 }
10524 return num_rel;
10525}
10526
10527static Elf_Internal_Rela *
10528emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10529 bfd_vma roff, bfd_vma targ, bfd_vma off)
10530{
10531 bfd_vma relative_targ = targ - (roff - 8);
10532 if (bfd_big_endian (info->output_bfd))
10533 roff += 2;
10534 r->r_offset = roff;
10535 r->r_addend = relative_targ + roff;
10536 if (off + 0x8000 < 0x10000)
10537 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10538 else if (off + 0x80008000ULL < 0x100000000ULL)
10539 {
10540 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10541 ++r;
10542 roff += 4;
10543 r->r_offset = roff;
10544 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10545 r->r_addend = relative_targ + roff;
10546 }
10547 else
10548 {
10549 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10550 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10551 else
10552 {
10553 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10554 if (((off >> 32) & 0xffff) != 0)
10555 {
10556 ++r;
10557 roff += 4;
10558 r->r_offset = roff;
10559 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10560 r->r_addend = relative_targ + roff;
10561 }
10562 }
10563 if (((off >> 32) & 0xffffffffULL) != 0)
10564 roff += 4;
10565 if (PPC_HI (off) != 0)
10566 {
10567 ++r;
10568 roff += 4;
10569 r->r_offset = roff;
10570 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10571 r->r_addend = relative_targ + roff;
10572 }
10573 if (PPC_LO (off) != 0)
10574 {
10575 ++r;
10576 roff += 4;
10577 r->r_offset = roff;
10578 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10579 r->r_addend = relative_targ + roff;
10580 }
10581 }
10582 return r;
10583}
10584
04bdff6a 10585static bfd_byte *
7c1f4227 10586build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
04bdff6a
AM
10587 bfd_boolean load)
10588{
10589 uint64_t insn;
10590 if (off - odd + (1ULL << 33) < 1ULL << 34)
10591 {
10592 off -= odd;
10593 if (odd)
10594 {
10595 bfd_put_32 (abfd, NOP, p);
10596 p += 4;
10597 }
10598 if (load)
10599 insn = PLD_R12_PC;
10600 else
10601 insn = PADDI_R12_PC;
10602 insn |= D34 (off);
10603 bfd_put_32 (abfd, insn >> 32, p);
10604 p += 4;
10605 bfd_put_32 (abfd, insn, p);
10606 }
10607 /* The minimum value for paddi is -0x200000000. The minimum value
10608 for li is -0x8000, which when shifted by 34 and added gives a
10609 minimum value of -0x2000200000000. The maximum value is
10610 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10611 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10612 {
10613 off -= 8 - odd;
10614 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10615 p += 4;
10616 if (!odd)
10617 {
10618 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10619 p += 4;
10620 }
10621 insn = PADDI_R12_PC | D34 (off);
10622 bfd_put_32 (abfd, insn >> 32, p);
10623 p += 4;
10624 bfd_put_32 (abfd, insn, p);
10625 p += 4;
10626 if (odd)
10627 {
10628 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10629 p += 4;
10630 }
10631 if (load)
10632 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10633 else
10634 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10635 }
10636 else
10637 {
10638 off -= odd + 8;
10639 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10640 p += 4;
10641 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10642 p += 4;
10643 if (odd)
10644 {
10645 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10646 p += 4;
10647 }
10648 insn = PADDI_R12_PC | D34 (off);
10649 bfd_put_32 (abfd, insn >> 32, p);
10650 p += 4;
10651 bfd_put_32 (abfd, insn, p);
10652 p += 4;
10653 if (!odd)
10654 {
10655 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10656 p += 4;
10657 }
10658 if (load)
10659 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10660 else
10661 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10662 }
10663 p += 4;
10664 return p;
10665}
10666
10667static unsigned int
7c1f4227 10668size_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10669{
10670 if (off - odd + (1ULL << 33) < 1ULL << 34)
10671 return odd + 8;
10672 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10673 return 20;
10674 else
10675 return 24;
10676}
10677
10678static unsigned int
7c1f4227 10679num_relocs_for_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10680{
10681 if (off - odd + (1ULL << 33) < 1ULL << 34)
10682 return 1;
10683 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10684 return 2;
10685 else
10686 return 3;
10687}
10688
10689static Elf_Internal_Rela *
7c1f4227 10690emit_relocs_for_power10_offset (struct bfd_link_info *info,
04bdff6a
AM
10691 Elf_Internal_Rela *r, bfd_vma roff,
10692 bfd_vma targ, bfd_vma off, int odd)
10693{
10694 if (off - odd + (1ULL << 33) < 1ULL << 34)
10695 roff += odd;
10696 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10697 {
10698 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10699 r->r_offset = roff + d_offset;
10700 r->r_addend = targ + 8 - odd - d_offset;
10701 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10702 ++r;
10703 roff += 8 - odd;
10704 }
10705 else
10706 {
10707 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10708 r->r_offset = roff + d_offset;
10709 r->r_addend = targ + 8 + odd - d_offset;
10710 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10711 ++r;
10712 roff += 4;
10713 r->r_offset = roff + d_offset;
10714 r->r_addend = targ + 4 + odd - d_offset;
10715 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10716 ++r;
10717 roff += 4 + odd;
10718 }
10719 r->r_offset = roff;
10720 r->r_addend = targ;
10721 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10722 return r;
10723}
10724
df136d64
AM
10725/* Emit .eh_frame opcode to advance pc by DELTA. */
10726
10727static bfd_byte *
10728eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10729{
10730 delta /= 4;
10731 if (delta < 64)
10732 *eh++ = DW_CFA_advance_loc + delta;
10733 else if (delta < 256)
10734 {
10735 *eh++ = DW_CFA_advance_loc1;
10736 *eh++ = delta;
10737 }
10738 else if (delta < 65536)
10739 {
10740 *eh++ = DW_CFA_advance_loc2;
10741 bfd_put_16 (abfd, delta, eh);
10742 eh += 2;
10743 }
10744 else
10745 {
10746 *eh++ = DW_CFA_advance_loc4;
10747 bfd_put_32 (abfd, delta, eh);
10748 eh += 4;
10749 }
10750 return eh;
10751}
10752
10753/* Size of required .eh_frame opcode to advance pc by DELTA. */
10754
10755static unsigned int
10756eh_advance_size (unsigned int delta)
10757{
10758 if (delta < 64 * 4)
10759 /* DW_CFA_advance_loc+[1..63]. */
10760 return 1;
10761 if (delta < 256 * 4)
10762 /* DW_CFA_advance_loc1, byte. */
10763 return 2;
10764 if (delta < 65536 * 4)
10765 /* DW_CFA_advance_loc2, 2 bytes. */
10766 return 3;
10767 /* DW_CFA_advance_loc4, 4 bytes. */
10768 return 5;
10769}
10770
794e51c0
AM
10771/* With power7 weakly ordered memory model, it is possible for ld.so
10772 to update a plt entry in one thread and have another thread see a
10773 stale zero toc entry. To avoid this we need some sort of acquire
10774 barrier in the call stub. One solution is to make the load of the
10775 toc word seem to appear to depend on the load of the function entry
10776 word. Another solution is to test for r2 being zero, and branch to
10777 the appropriate glink entry if so.
10778
10779 . fake dep barrier compare
71a39c98
AM
10780 . ld 12,xxx(2) ld 12,xxx(2)
10781 . mtctr 12 mtctr 12
10782 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10783 . add 2,2,11 cmpldi 2,0
10784 . ld 2,xxx+8(2) bnectr+
10785 . bctr b <glink_entry>
10786
10787 The solution involving the compare turns out to be faster, so
10788 that's what we use unless the branch won't reach. */
10789
10790#define ALWAYS_USE_FAKE_DEP 0
10791#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10792
794e51c0
AM
10793static inline unsigned int
10794plt_stub_size (struct ppc_link_hash_table *htab,
10795 struct ppc_stub_hash_entry *stub_entry,
10796 bfd_vma off)
10797{
05d0e962 10798 unsigned size;
b9e5796b 10799
05d0e962
AM
10800 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10801 {
e10a07b3 10802 if (htab->params->power10_stubs != 0)
04bdff6a
AM
10803 {
10804 bfd_vma start = (stub_entry->stub_offset
10805 + stub_entry->group->stub_sec->output_offset
10806 + stub_entry->group->stub_sec->output_section->vma);
10807 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10808 start += 4;
7c1f4227 10809 size = 8 + size_power10_offset (off, start & 4);
04bdff6a
AM
10810 }
10811 else
10812 size = 8 + size_offset (off - 8);
05d0e962
AM
10813 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10814 size += 4;
10815 return size;
10816 }
10817
10818 size = 12;
b9e5796b
AM
10819 if (ALWAYS_EMIT_R2SAVE
10820 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10821 size += 4;
10822 if (PPC_HA (off) != 0)
794e51c0 10823 size += 4;
b9e5796b
AM
10824 if (htab->opd_abi)
10825 {
10826 size += 4;
e7d1c40c 10827 if (htab->params->plt_static_chain)
b9e5796b 10828 size += 4;
bd4d2eaa
AM
10829 if (htab->params->plt_thread_safe
10830 && htab->elf.dynamic_sections_created
10831 && stub_entry->h != NULL
10832 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10833 size += 8;
e7d1c40c 10834 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10835 size += 4;
10836 }
794e51c0 10837 if (stub_entry->h != NULL
ed7007c1 10838 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10839 && htab->params->tls_get_addr_opt)
f378ab09 10840 {
9e7028aa
AM
10841 if (htab->params->no_tls_get_addr_regsave)
10842 {
10843 size += 7 * 4;
10844 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10845 size += 6 * 4;
10846 }
10847 else
10848 {
10849 size += 30 * 4;
10850 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10851 size += 4;
10852 }
f378ab09 10853 }
794e51c0
AM
10854 return size;
10855}
10856
2420fff6
AM
10857/* Depending on the sign of plt_stub_align:
10858 If positive, return the padding to align to a 2**plt_stub_align
10859 boundary.
10860 If negative, if this stub would cross fewer 2**plt_stub_align
10861 boundaries if we align, then return the padding needed to do so. */
10862
794e51c0
AM
10863static inline unsigned int
10864plt_stub_pad (struct ppc_link_hash_table *htab,
10865 struct ppc_stub_hash_entry *stub_entry,
10866 bfd_vma plt_off)
10867{
2420fff6 10868 int stub_align;
1aa42141 10869 unsigned stub_size;
6f20ed8a 10870 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10871
2420fff6
AM
10872 if (htab->params->plt_stub_align >= 0)
10873 {
10874 stub_align = 1 << htab->params->plt_stub_align;
10875 if ((stub_off & (stub_align - 1)) != 0)
10876 return stub_align - (stub_off & (stub_align - 1));
10877 return 0;
10878 }
10879
10880 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10881 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10882 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10883 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10884 return stub_align - (stub_off & (stub_align - 1));
10885 return 0;
10886}
10887
10888/* Build a .plt call stub. */
10889
10890static inline bfd_byte *
10891build_plt_stub (struct ppc_link_hash_table *htab,
10892 struct ppc_stub_hash_entry *stub_entry,
10893 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10894{
e7d1c40c 10895 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10896 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10897 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10898 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10899 && htab->elf.dynamic_sections_created
10900 && stub_entry->h != NULL
10901 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10902 bfd_boolean use_fake_dep = plt_thread_safe;
10903 bfd_vma cmp_branch_off = 0;
10904
10905 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10906 && plt_load_toc
794e51c0 10907 && plt_thread_safe
ed7007c1 10908 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10909 && htab->params->tls_get_addr_opt))
794e51c0
AM
10910 {
10911 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10912 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10913 / PLT_ENTRY_SIZE (htab));
9e390558 10914 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10915 bfd_vma to, from;
10916
68d62958
AM
10917 if (pltindex > 32768)
10918 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10919 to = (glinkoff
10920 + htab->glink->output_offset
10921 + htab->glink->output_section->vma);
6f20ed8a 10922 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10923 + 4 * (ALWAYS_EMIT_R2SAVE
10924 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10925 + 4 * (PPC_HA (offset) != 0)
10926 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10927 != PPC_HA (offset))
10928 + 4 * (plt_static_chain != 0)
10929 + 20
6f20ed8a
AM
10930 + stub_entry->group->stub_sec->output_offset
10931 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10932 cmp_branch_off = to - from;
10933 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10934 }
10935
ac2df442
AM
10936 if (PPC_HA (offset) != 0)
10937 {
176a0d42
AM
10938 if (r != NULL)
10939 {
794e51c0
AM
10940 if (ALWAYS_EMIT_R2SAVE
10941 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10942 r[0].r_offset += 4;
176a0d42 10943 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10944 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10945 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10946 r[1].r_addend = r[0].r_addend;
b9e5796b 10947 if (plt_load_toc)
176a0d42 10948 {
b9e5796b 10949 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10950 {
b9e5796b
AM
10951 r[2].r_offset = r[1].r_offset + 4;
10952 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10953 r[2].r_addend = r[0].r_addend;
10954 }
10955 else
10956 {
10957 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10958 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10959 r[2].r_addend = r[0].r_addend + 8;
10960 if (plt_static_chain)
10961 {
10962 r[3].r_offset = r[2].r_offset + 4;
10963 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10964 r[3].r_addend = r[0].r_addend + 16;
10965 }
c7131b65 10966 }
176a0d42
AM
10967 }
10968 }
794e51c0
AM
10969 if (ALWAYS_EMIT_R2SAVE
10970 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10971 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10972 if (plt_load_toc)
10973 {
10974 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10975 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10976 }
10977 else
10978 {
10979 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10980 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10981 }
b9e5796b
AM
10982 if (plt_load_toc
10983 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10984 {
71a39c98 10985 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10986 offset = 0;
10987 }
71a39c98 10988 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10989 if (plt_load_toc)
794e51c0 10990 {
b9e5796b
AM
10991 if (use_fake_dep)
10992 {
10993 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10994 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10995 }
10996 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10997 if (plt_static_chain)
10998 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 10999 }
ac2df442
AM
11000 }
11001 else
11002 {
176a0d42
AM
11003 if (r != NULL)
11004 {
794e51c0
AM
11005 if (ALWAYS_EMIT_R2SAVE
11006 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11007 r[0].r_offset += 4;
176a0d42 11008 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 11009 if (plt_load_toc)
176a0d42 11010 {
b9e5796b 11011 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 11012 {
b9e5796b
AM
11013 r[1].r_offset = r[0].r_offset + 4;
11014 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11015 r[1].r_addend = r[0].r_addend;
11016 }
11017 else
11018 {
11019 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11020 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11021 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11022 if (plt_static_chain)
11023 {
11024 r[2].r_offset = r[1].r_offset + 4;
11025 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11026 r[2].r_addend = r[0].r_addend + 8;
11027 }
c7131b65 11028 }
176a0d42
AM
11029 }
11030 }
794e51c0
AM
11031 if (ALWAYS_EMIT_R2SAVE
11032 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11033 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 11034 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
11035 if (plt_load_toc
11036 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
11037 {
11038 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11039 offset = 0;
11040 }
71a39c98 11041 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11042 if (plt_load_toc)
794e51c0 11043 {
b9e5796b
AM
11044 if (use_fake_dep)
11045 {
11046 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11047 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11048 }
11049 if (plt_static_chain)
11050 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11051 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11052 }
ac2df442 11053 }
b9e5796b 11054 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11055 {
11056 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11057 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11058 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11059 }
11060 else
407aa07c 11061 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11062 return p;
11063}
11064
a7f2871e
AM
11065/* Build a special .plt call stub for __tls_get_addr. */
11066
b9ca1af6 11067#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11068#define LD_R12_0R3 0xe9830000
11069#define MR_R0_R3 0x7c601b78
b9ca1af6 11070#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11071#define ADD_R3_R12_R13 0x7c6c6a14
11072#define BEQLR 0x4d820020
11073#define MR_R3_R0 0x7c030378
a7f2871e 11074#define BCTRL 0x4e800421
a7f2871e
AM
11075
11076static inline bfd_byte *
794e51c0
AM
11077build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11078 struct ppc_stub_hash_entry *stub_entry,
11079 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11080{
e7d1c40c 11081 bfd *obfd = htab->params->stub_bfd;
df136d64 11082 bfd_byte *loc = p;
9e7028aa 11083 unsigned int i;
794e51c0 11084
b9ca1af6 11085 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11086 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11087 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11088 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11089 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11090 bfd_put_32 (obfd, BEQLR, p), p += 4;
11091 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa
AM
11092 if (htab->params->no_tls_get_addr_regsave)
11093 {
11094 if (r != NULL)
11095 r[0].r_offset += 7 * 4;
11096 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11097 return build_plt_stub (htab, stub_entry, p, offset, r);
11098
11099 bfd_put_32 (obfd, MFLR_R0, p);
11100 p += 4;
11101 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11102 p += 4;
11103
11104 if (r != NULL)
11105 r[0].r_offset += 2 * 4;
11106 p = build_plt_stub (htab, stub_entry, p, offset, r);
11107 bfd_put_32 (obfd, BCTRL, p - 4);
11108
11109 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11110 p += 4;
11111 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11112 p += 4;
11113 bfd_put_32 (obfd, MTLR_R0, p);
11114 p += 4;
11115 bfd_put_32 (obfd, BLR, p);
11116 p += 4;
11117 }
11118 else
11119 {
11120 p = tls_get_addr_prologue (obfd, p, htab);
f378ab09 11121
9e7028aa
AM
11122 if (r != NULL)
11123 r[0].r_offset += 18 * 4;
a7f2871e 11124
9e7028aa
AM
11125 p = build_plt_stub (htab, stub_entry, p, offset, r);
11126 bfd_put_32 (obfd, BCTRL, p - 4);
11127
11128 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11129 {
11130 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11131 p += 4;
11132 }
a7f2871e 11133
9e7028aa
AM
11134 p = tls_get_addr_epilogue (obfd, p, htab);
11135 }
a7f2871e 11136
df136d64
AM
11137 if (htab->glink_eh_frame != NULL
11138 && htab->glink_eh_frame->size != 0)
11139 {
11140 bfd_byte *base, *eh;
df136d64
AM
11141
11142 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11143 eh = base + stub_entry->group->eh_size;
9e7028aa
AM
11144 if (htab->params->no_tls_get_addr_regsave)
11145 {
11146 unsigned int lr_used, delta;
11147 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11148 delta = lr_used - stub_entry->group->lr_restore;
11149 stub_entry->group->lr_restore = lr_used + 16;
11150 eh = eh_advance (htab->elf.dynobj, eh, delta);
11151 *eh++ = DW_CFA_offset_extended_sf;
11152 *eh++ = 65;
11153 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11154 *eh++ = DW_CFA_advance_loc + 4;
11155 }
11156 else
11157 {
11158 unsigned int cfa_updt, delta;
11159 /* After the bctrl, lr has been modified so we need to emit
11160 .eh_frame info saying the return address is on the stack. In
11161 fact we must put the EH info at or before the call rather
11162 than after it, because the EH info for a call needs to be
11163 specified by that point.
11164 See libgcc/unwind-dw2.c execute_cfa_program.
11165 Any stack pointer update must be described immediately after
11166 the instruction making the change, and since the stdu occurs
11167 after saving regs we put all the reg saves and the cfa
11168 change there. */
11169 cfa_updt = stub_entry->stub_offset + 18 * 4;
11170 delta = cfa_updt - stub_entry->group->lr_restore;
11171 stub_entry->group->lr_restore
11172 = stub_entry->stub_offset + (p - loc) - 4;
11173 eh = eh_advance (htab->elf.dynobj, eh, delta);
11174 *eh++ = DW_CFA_def_cfa_offset;
11175 if (htab->opd_abi)
11176 {
11177 *eh++ = 128;
11178 *eh++ = 1;
11179 }
11180 else
11181 *eh++ = 96;
11182 *eh++ = DW_CFA_offset_extended_sf;
11183 *eh++ = 65;
11184 *eh++ = (-16 / 8) & 0x7f;
11185 for (i = 4; i < 12; i++)
11186 {
11187 *eh++ = DW_CFA_offset + i;
11188 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11189 }
11190 *eh++ = (DW_CFA_advance_loc
11191 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11192 *eh++ = DW_CFA_def_cfa_offset;
11193 *eh++ = 0;
11194 for (i = 4; i < 12; i++)
11195 *eh++ = DW_CFA_restore + i;
11196 *eh++ = DW_CFA_advance_loc + 2;
11197 }
df136d64
AM
11198 *eh++ = DW_CFA_restore_extended;
11199 *eh++ = 65;
11200 stub_entry->group->eh_size = eh - base;
11201 }
a7f2871e
AM
11202 return p;
11203}
11204
176a0d42
AM
11205static Elf_Internal_Rela *
11206get_relocs (asection *sec, int count)
11207{
11208 Elf_Internal_Rela *relocs;
11209 struct bfd_elf_section_data *elfsec_data;
11210
11211 elfsec_data = elf_section_data (sec);
11212 relocs = elfsec_data->relocs;
11213 if (relocs == NULL)
11214 {
11215 bfd_size_type relsize;
11216 relsize = sec->reloc_count * sizeof (*relocs);
11217 relocs = bfd_alloc (sec->owner, relsize);
11218 if (relocs == NULL)
11219 return NULL;
11220 elfsec_data->relocs = relocs;
d4730f92
BS
11221 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11222 sizeof (Elf_Internal_Shdr));
11223 if (elfsec_data->rela.hdr == NULL)
11224 return NULL;
11225 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11226 * sizeof (Elf64_External_Rela));
11227 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11228 sec->reloc_count = 0;
11229 }
11230 relocs += sec->reloc_count;
11231 sec->reloc_count += count;
11232 return relocs;
11233}
11234
3d58e1fc
AM
11235/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11236 forms, to the equivalent relocs against the global symbol given by
11237 STUB_ENTRY->H. */
11238
11239static bfd_boolean
11240use_global_in_relocs (struct ppc_link_hash_table *htab,
11241 struct ppc_stub_hash_entry *stub_entry,
11242 Elf_Internal_Rela *r, unsigned int num_rel)
11243{
11244 struct elf_link_hash_entry **hashes;
11245 unsigned long symndx;
11246 struct ppc_link_hash_entry *h;
11247 bfd_vma symval;
11248
11249 /* Relocs are always against symbols in their own object file. Fake
11250 up global sym hashes for the stub bfd (which has no symbols). */
11251 hashes = elf_sym_hashes (htab->params->stub_bfd);
11252 if (hashes == NULL)
11253 {
11254 bfd_size_type hsize;
11255
11256 /* When called the first time, stub_globals will contain the
11257 total number of symbols seen during stub sizing. After
11258 allocating, stub_globals is used as an index to fill the
11259 hashes array. */
11260 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11261 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11262 if (hashes == NULL)
11263 return FALSE;
11264 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11265 htab->stub_globals = 1;
11266 }
11267 symndx = htab->stub_globals++;
11268 h = stub_entry->h;
11269 hashes[symndx] = &h->elf;
11270 if (h->oh != NULL && h->oh->is_func)
11271 h = ppc_follow_link (h->oh);
11272 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11273 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11274 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11275 while (num_rel-- != 0)
11276 {
11277 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11278 if (h->elf.root.u.def.section != stub_entry->target_section)
11279 {
11280 /* H is an opd symbol. The addend must be zero, and the
11281 branch reloc is the only one we can convert. */
11282 r->r_addend = 0;
11283 break;
11284 }
11285 else
11286 r->r_addend -= symval;
11287 --r;
11288 }
11289 return TRUE;
11290}
11291
aa374f67 11292static bfd_vma
25f53a85 11293get_r2off (struct bfd_link_info *info,
aa374f67
AM
11294 struct ppc_stub_hash_entry *stub_entry)
11295{
25f53a85 11296 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11297 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11298
11299 if (r2off == 0)
11300 {
11301 /* Support linking -R objects. Get the toc pointer from the
11302 opd entry. */
11303 char buf[8];
b9e5796b
AM
11304 if (!htab->opd_abi)
11305 return r2off;
aa374f67
AM
11306 asection *opd = stub_entry->h->elf.root.u.def.section;
11307 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11308
11309 if (strcmp (opd->name, ".opd") != 0
11310 || opd->reloc_count != 0)
11311 {
2cdcc330
AM
11312 info->callbacks->einfo
11313 (_("%P: cannot find opd entry toc for `%pT'\n"),
11314 stub_entry->h->elf.root.root.string);
aa374f67 11315 bfd_set_error (bfd_error_bad_value);
a7c49797 11316 return (bfd_vma) -1;
aa374f67
AM
11317 }
11318 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11319 return (bfd_vma) -1;
aa374f67 11320 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11321 r2off -= elf_gp (info->output_bfd);
aa374f67 11322 }
6f20ed8a 11323 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11324 return r2off;
11325}
11326
b34976b6 11327static bfd_boolean
4ce794b7 11328ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11329{
721956f4
AM
11330 struct ppc_stub_hash_entry *stub_entry;
11331 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11332 struct bfd_link_info *info;
11333 struct ppc_link_hash_table *htab;
721956f4 11334 bfd_byte *loc;
3d58e1fc 11335 bfd_byte *p, *relp;
1aa42141 11336 bfd_vma targ, off;
176a0d42 11337 Elf_Internal_Rela *r;
e054468f 11338 asection *plt;
3d58e1fc 11339 int num_rel;
04bdff6a 11340 int odd;
5d1634d7 11341
721956f4
AM
11342 /* Massage our args to the form they really have. */
11343 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11344 info = in_arg;
5d1634d7 11345
abf874aa
CL
11346 /* Fail if the target section could not be assigned to an output
11347 section. The user should fix his linker script. */
11348 if (stub_entry->target_section != NULL
11349 && stub_entry->target_section->output_section == NULL
11350 && info->non_contiguous_regions)
53215f21
CL
11351 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11352 "Retry without --enable-non-contiguous-regions.\n"),
11353 stub_entry->target_section);
abf874aa
CL
11354
11355 /* Same for the group. */
11356 if (stub_entry->group->stub_sec != NULL
11357 && stub_entry->group->stub_sec->output_section == NULL
11358 && info->non_contiguous_regions)
53215f21
CL
11359 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11360 "output section. Retry without "
11361 "--enable-non-contiguous-regions.\n"),
11362 stub_entry->group->stub_sec,
11363 stub_entry->target_section);
abf874aa 11364
5d1634d7 11365 htab = ppc_hash_table (info);
4dfe6ac6
NC
11366 if (htab == NULL)
11367 return FALSE;
5d1634d7 11368
1aa42141 11369 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11370 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11371
4ce794b7 11372 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11373 switch (stub_entry->stub_type)
5d1634d7 11374 {
721956f4 11375 case ppc_stub_long_branch:
ad8e1ba5 11376 case ppc_stub_long_branch_r2off:
721956f4 11377 /* Branches are relative. This is where we are going to. */
1aa42141 11378 targ = (stub_entry->target_value
6911b7dc
AM
11379 + stub_entry->target_section->output_offset
11380 + stub_entry->target_section->output_section->vma);
1aa42141 11381 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11382
721956f4 11383 /* And this is where we are coming from. */
1aa42141
AM
11384 off = (stub_entry->stub_offset
11385 + stub_entry->group->stub_sec->output_offset
11386 + stub_entry->group->stub_sec->output_section->vma);
11387 off = targ - off;
e86ce104 11388
9e390558 11389 p = loc;
ac2df442 11390 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11391 {
25f53a85 11392 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11393
a7c49797 11394 if (r2off == (bfd_vma) -1)
aa374f67
AM
11395 {
11396 htab->stub_error = TRUE;
11397 return FALSE;
11398 }
9e390558
AM
11399 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11400 p += 4;
ac2df442
AM
11401 if (PPC_HA (r2off) != 0)
11402 {
e7d1c40c 11403 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11404 ADDIS_R2_R2 | PPC_HA (r2off), p);
11405 p += 4;
a7c49797
AM
11406 }
11407 if (PPC_LO (r2off) != 0)
11408 {
11409 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11410 ADDI_R2_R2 | PPC_LO (r2off), p);
11411 p += 4;
ac2df442 11412 }
9e390558 11413 off -= p - loc;
ad8e1ba5 11414 }
9e390558
AM
11415 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11416 p += 4;
ad8e1ba5 11417
5c3dead3
AM
11418 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11419 {
cf97bcb0
AM
11420 _bfd_error_handler
11421 (_("long branch stub `%s' offset overflow"),
bc30df16 11422 stub_entry->root.string);
5c3dead3
AM
11423 htab->stub_error = TRUE;
11424 return FALSE;
11425 }
ee75fd95
AM
11426
11427 if (info->emitrelocations)
11428 {
6f20ed8a 11429 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11430 if (r == NULL)
11431 return FALSE;
9e390558 11432 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11433 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11434 r->r_addend = targ;
3d58e1fc
AM
11435 if (stub_entry->h != NULL
11436 && !use_global_in_relocs (htab, stub_entry, r, 1))
11437 return FALSE;
ee75fd95 11438 }
721956f4 11439 break;
e86ce104 11440
721956f4 11441 case ppc_stub_plt_branch:
ad8e1ba5 11442 case ppc_stub_plt_branch_r2off:
721956f4
AM
11443 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11444 stub_entry->root.string + 9,
b34976b6 11445 FALSE, FALSE);
721956f4
AM
11446 if (br_entry == NULL)
11447 {
cf97bcb0
AM
11448 _bfd_error_handler (_("can't find branch stub `%s'"),
11449 stub_entry->root.string);
b34976b6
AM
11450 htab->stub_error = TRUE;
11451 return FALSE;
721956f4
AM
11452 }
11453
1aa42141 11454 targ = (stub_entry->target_value
176a0d42
AM
11455 + stub_entry->target_section->output_offset
11456 + stub_entry->target_section->output_section->vma);
6911b7dc 11457 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11458 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11459
1aa42141 11460 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11461 htab->brlt->contents + br_entry->offset);
721956f4 11462
f94498ff 11463 if (br_entry->iter == htab->stub_iteration)
721956f4 11464 {
f94498ff 11465 br_entry->iter = 0;
84f5d08e 11466
f94498ff 11467 if (htab->relbrlt != NULL)
84f5d08e 11468 {
f94498ff
AM
11469 /* Create a reloc for the branch lookup table entry. */
11470 Elf_Internal_Rela rela;
11471 bfd_byte *rl;
11472
11473 rela.r_offset = (br_entry->offset
11474 + htab->brlt->output_offset
11475 + htab->brlt->output_section->vma);
11476 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11477 rela.r_addend = targ;
f94498ff
AM
11478
11479 rl = htab->relbrlt->contents;
11480 rl += (htab->relbrlt->reloc_count++
11481 * sizeof (Elf64_External_Rela));
11482 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11483 }
11484 else if (info->emitrelocations)
11485 {
176a0d42
AM
11486 r = get_relocs (htab->brlt, 1);
11487 if (r == NULL)
11488 return FALSE;
11489 /* brlt, being SEC_LINKER_CREATED does not go through the
11490 normal reloc processing. Symbols and offsets are not
11491 translated from input file to output file form, so
11492 set up the offset per the output file. */
f94498ff
AM
11493 r->r_offset = (br_entry->offset
11494 + htab->brlt->output_offset
11495 + htab->brlt->output_section->vma);
11496 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11497 r->r_addend = targ;
84f5d08e 11498 }
84f5d08e 11499 }
721956f4 11500
1aa42141 11501 targ = (br_entry->offset
176a0d42
AM
11502 + htab->brlt->output_offset
11503 + htab->brlt->output_section->vma);
11504
1aa42141
AM
11505 off = (elf_gp (info->output_bfd)
11506 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11507 off = targ - off;
721956f4 11508
ad8e1ba5 11509 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11510 {
25f53a85 11511 info->callbacks->einfo
c1c8c1ef 11512 (_("%P: linkage table error against `%pT'\n"),
721956f4 11513 stub_entry->root.string);
5d1634d7 11514 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11515 htab->stub_error = TRUE;
11516 return FALSE;
5d1634d7 11517 }
41bd81ab 11518
176a0d42
AM
11519 if (info->emitrelocations)
11520 {
6f20ed8a 11521 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11522 if (r == NULL)
11523 return FALSE;
6f20ed8a 11524 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11525 if (bfd_big_endian (info->output_bfd))
11526 r[0].r_offset += 2;
00f412ee 11527 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11528 r[0].r_offset += 4;
11529 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11530 r[0].r_addend = targ;
176a0d42
AM
11531 if (PPC_HA (off) != 0)
11532 {
11533 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11534 r[1].r_offset = r[0].r_offset + 4;
11535 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11536 r[1].r_addend = r[0].r_addend;
11537 }
11538 }
11539
9e390558 11540 p = loc;
00f412ee 11541 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11542 {
176a0d42 11543 if (PPC_HA (off) != 0)
ac2df442 11544 {
e7d1c40c 11545 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11546 ADDIS_R12_R2 | PPC_HA (off), p);
11547 p += 4;
e7d1c40c 11548 bfd_put_32 (htab->params->stub_bfd,
9e390558 11549 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11550 }
11551 else
9e390558
AM
11552 bfd_put_32 (htab->params->stub_bfd,
11553 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11554 }
11555 else
11556 {
25f53a85 11557 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11558
a7c49797 11559 if (r2off == (bfd_vma) -1)
aa374f67
AM
11560 {
11561 htab->stub_error = TRUE;
11562 return FALSE;
11563 }
ad8e1ba5 11564
9e390558
AM
11565 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11566 p += 4;
176a0d42 11567 if (PPC_HA (off) != 0)
ac2df442 11568 {
e7d1c40c 11569 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11570 ADDIS_R12_R2 | PPC_HA (off), p);
11571 p += 4;
e7d1c40c 11572 bfd_put_32 (htab->params->stub_bfd,
9e390558 11573 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11574 }
11575 else
9e390558 11576 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11577
11578 if (PPC_HA (r2off) != 0)
11579 {
9e390558 11580 p += 4;
e7d1c40c 11581 bfd_put_32 (htab->params->stub_bfd,
9e390558 11582 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11583 }
11584 if (PPC_LO (r2off) != 0)
11585 {
9e390558 11586 p += 4;
e7d1c40c 11587 bfd_put_32 (htab->params->stub_bfd,
9e390558 11588 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11589 }
ad8e1ba5 11590 }
9e390558
AM
11591 p += 4;
11592 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11593 p += 4;
407aa07c
AM
11594 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11595 p += 4;
721956f4 11596 break;
5d1634d7 11597
05d0e962
AM
11598 case ppc_stub_long_branch_notoc:
11599 case ppc_stub_long_branch_both:
11600 case ppc_stub_plt_branch_notoc:
11601 case ppc_stub_plt_branch_both:
11602 case ppc_stub_plt_call_notoc:
11603 case ppc_stub_plt_call_both:
11604 p = loc;
f891966f 11605 off = (stub_entry->stub_offset
05d0e962
AM
11606 + stub_entry->group->stub_sec->output_offset
11607 + stub_entry->group->stub_sec->output_section->vma);
11608 if (stub_entry->stub_type == ppc_stub_long_branch_both
11609 || stub_entry->stub_type == ppc_stub_plt_branch_both
11610 || stub_entry->stub_type == ppc_stub_plt_call_both)
11611 {
11612 off += 4;
11613 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11614 p += 4;
11615 }
11616 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11617 {
11618 targ = stub_entry->plt_ent->plt.offset & ~1;
11619 if (targ >= (bfd_vma) -2)
11620 abort ();
11621
11622 plt = htab->elf.splt;
11623 if (!htab->elf.dynamic_sections_created
11624 || stub_entry->h == NULL
11625 || stub_entry->h->elf.dynindx == -1)
11626 {
11627 if (stub_entry->symtype == STT_GNU_IFUNC)
11628 plt = htab->elf.iplt;
11629 else
11630 plt = htab->pltlocal;
11631 }
11632 targ += plt->output_offset + plt->output_section->vma;
11633 }
11634 else
11635 targ = (stub_entry->target_value
11636 + stub_entry->target_section->output_offset
11637 + stub_entry->target_section->output_section->vma);
04bdff6a 11638 odd = off & 4;
05d0e962 11639 off = targ - off;
f891966f 11640
3d58e1fc
AM
11641 relp = p;
11642 num_rel = 0;
e10a07b3 11643 if (htab->params->power10_stubs != 0)
04bdff6a
AM
11644 {
11645 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
7c1f4227 11646 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
04bdff6a
AM
11647 }
11648 else
11649 {
11650 /* The notoc stubs calculate their target (either a PLT entry or
11651 the global entry point of a function) relative to the PC
11652 returned by the "bcl" two instructions past the start of the
11653 sequence emitted by build_offset. The offset is therefore 8
11654 less than calculated from the start of the sequence. */
11655 off -= 8;
11656 p = build_offset (htab->params->stub_bfd, p, off,
11657 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11658 }
11659
f891966f 11660 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11661 {
f891966f 11662 bfd_vma from;
3d58e1fc 11663 num_rel = 1;
f891966f
AM
11664 from = (stub_entry->stub_offset
11665 + stub_entry->group->stub_sec->output_offset
11666 + stub_entry->group->stub_sec->output_section->vma
11667 + (p - loc));
05d0e962 11668 bfd_put_32 (htab->params->stub_bfd,
f891966f 11669 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11670 }
11671 else
11672 {
11673 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11674 p += 4;
11675 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11676 }
11677 p += 4;
df136d64 11678
3d58e1fc
AM
11679 if (info->emitrelocations)
11680 {
04bdff6a 11681 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
e10a07b3 11682 if (htab->params->power10_stubs != 0)
7c1f4227 11683 num_rel += num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
11684 else
11685 {
11686 num_rel += num_relocs_for_offset (off);
11687 roff += 16;
11688 }
3d58e1fc
AM
11689 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11690 if (r == NULL)
11691 return FALSE;
e10a07b3 11692 if (htab->params->power10_stubs != 0)
7c1f4227 11693 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
04bdff6a
AM
11694 else
11695 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11696 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11697 || stub_entry->stub_type == ppc_stub_long_branch_both)
11698 {
11699 ++r;
11700 roff = p - 4 - stub_entry->group->stub_sec->contents;
11701 r->r_offset = roff;
11702 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11703 r->r_addend = targ;
11704 if (stub_entry->h != NULL
11705 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11706 return FALSE;
11707 }
11708 }
11709
e10a07b3 11710 if (htab->params->power10_stubs == 0
04bdff6a
AM
11711 && htab->glink_eh_frame != NULL
11712 && htab->glink_eh_frame->size != 0)
df136d64
AM
11713 {
11714 bfd_byte *base, *eh;
11715 unsigned int lr_used, delta;
11716
11717 base = (htab->glink_eh_frame->contents
11718 + stub_entry->group->eh_base + 17);
11719 eh = base + stub_entry->group->eh_size;
11720 lr_used = stub_entry->stub_offset + 8;
11721 if (stub_entry->stub_type == ppc_stub_long_branch_both
11722 || stub_entry->stub_type == ppc_stub_plt_branch_both
11723 || stub_entry->stub_type == ppc_stub_plt_call_both)
11724 lr_used += 4;
11725 delta = lr_used - stub_entry->group->lr_restore;
11726 stub_entry->group->lr_restore = lr_used + 8;
11727 eh = eh_advance (htab->elf.dynobj, eh, delta);
11728 *eh++ = DW_CFA_register;
11729 *eh++ = 65;
11730 *eh++ = 12;
11731 *eh++ = DW_CFA_advance_loc + 2;
11732 *eh++ = DW_CFA_restore_extended;
11733 *eh++ = 65;
11734 stub_entry->group->eh_size = eh - base;
11735 }
05d0e962
AM
11736 break;
11737
721956f4 11738 case ppc_stub_plt_call:
794e51c0 11739 case ppc_stub_plt_call_r2save:
e054468f 11740 if (stub_entry->h != NULL
b31867b6
AM
11741 && stub_entry->h->is_func_descriptor
11742 && stub_entry->h->oh != NULL)
c862ae31 11743 {
b31867b6
AM
11744 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11745
11746 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11747 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11748 if (fh->elf.root.type == bfd_link_hash_undefined
11749 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11750 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11751 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11752 }
11753
721956f4 11754 /* Now build the stub. */
1aa42141
AM
11755 targ = stub_entry->plt_ent->plt.offset & ~1;
11756 if (targ >= (bfd_vma) -2)
721956f4
AM
11757 abort ();
11758
33e44f2e 11759 plt = htab->elf.splt;
25f23106
AM
11760 if (!htab->elf.dynamic_sections_created
11761 || stub_entry->h == NULL
11762 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11763 {
11764 if (stub_entry->symtype == STT_GNU_IFUNC)
11765 plt = htab->elf.iplt;
11766 else
11767 plt = htab->pltlocal;
11768 }
1aa42141 11769 targ += plt->output_offset + plt->output_section->vma;
e054468f 11770
1aa42141
AM
11771 off = (elf_gp (info->output_bfd)
11772 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11773 off = targ - off;
721956f4 11774
ad8e1ba5 11775 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11776 {
25f53a85 11777 info->callbacks->einfo
695344c0 11778 /* xgettext:c-format */
c1c8c1ef 11779 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11780 stub_entry->h != NULL
11781 ? stub_entry->h->elf.root.root.string
11782 : "<local sym>");
721956f4 11783 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11784 htab->stub_error = TRUE;
11785 return FALSE;
721956f4
AM
11786 }
11787
176a0d42
AM
11788 r = NULL;
11789 if (info->emitrelocations)
11790 {
6f20ed8a 11791 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11792 ((PPC_HA (off) != 0)
11793 + (htab->opd_abi
e7d1c40c 11794 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11795 && PPC_HA (off + 16) == PPC_HA (off))
11796 : 1)));
176a0d42
AM
11797 if (r == NULL)
11798 return FALSE;
6f20ed8a 11799 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11800 if (bfd_big_endian (info->output_bfd))
11801 r[0].r_offset += 2;
1aa42141 11802 r[0].r_addend = targ;
176a0d42 11803 }
a7f2871e 11804 if (stub_entry->h != NULL
ed7007c1 11805 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 11806 && htab->params->tls_get_addr_opt)
794e51c0 11807 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11808 else
794e51c0 11809 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11810 break;
11811
a4b6fadd
AM
11812 case ppc_stub_save_res:
11813 return TRUE;
11814
721956f4
AM
11815 default:
11816 BFD_FAIL ();
b34976b6 11817 return FALSE;
721956f4
AM
11818 }
11819
1aa42141 11820 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11821
e7d1c40c 11822 if (htab->params->emit_stub_syms)
97b639ba
AM
11823 {
11824 struct elf_link_hash_entry *h;
ee75fd95
AM
11825 size_t len1, len2;
11826 char *name;
11827 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11828 "long_branch",
11829 "long_branch",
3f6ff479
AM
11830 "long_branch",
11831 "plt_branch",
ee75fd95 11832 "plt_branch",
05d0e962
AM
11833 "plt_branch",
11834 "plt_branch",
11835 "plt_call",
11836 "plt_call",
794e51c0 11837 "plt_call",
ee75fd95
AM
11838 "plt_call" };
11839
11840 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11841 len2 = strlen (stub_entry->root.string);
11842 name = bfd_malloc (len1 + len2 + 2);
11843 if (name == NULL)
11844 return FALSE;
11845 memcpy (name, stub_entry->root.string, 9);
11846 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11847 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11848 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11849 if (h == NULL)
11850 return FALSE;
11851 if (h->root.type == bfd_link_hash_new)
11852 {
11853 h->root.type = bfd_link_hash_defined;
6f20ed8a 11854 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11855 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11856 h->ref_regular = 1;
11857 h->def_regular = 1;
11858 h->ref_regular_nonweak = 1;
11859 h->forced_local = 1;
11860 h->non_elf = 0;
2ec55de3 11861 h->root.linker_def = 1;
97b639ba
AM
11862 }
11863 }
11864
b34976b6 11865 return TRUE;
721956f4
AM
11866}
11867
11868/* As above, but don't actually build the stub. Just bump offset so
11869 we know stub section sizes, and select plt_branch stubs where
11870 long_branch stubs won't do. */
11871
b34976b6 11872static bfd_boolean
4ce794b7 11873ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11874{
11875 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11876 struct bfd_link_info *info;
721956f4 11877 struct ppc_link_hash_table *htab;
f891966f
AM
11878 asection *plt;
11879 bfd_vma targ, off, r2off;
04bdff6a 11880 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11881
11882 /* Massage our args to the form they really have. */
11883 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11884 info = in_arg;
11885
11886 htab = ppc_hash_table (info);
4dfe6ac6
NC
11887 if (htab == NULL)
11888 return FALSE;
721956f4 11889
abf874aa
CL
11890 /* Fail if the target section could not be assigned to an output
11891 section. The user should fix his linker script. */
11892 if (stub_entry->target_section != NULL
11893 && stub_entry->target_section->output_section == NULL
11894 && info->non_contiguous_regions)
53215f21
CL
11895 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11896 "Retry without --enable-non-contiguous-regions.\n"),
11897 stub_entry->target_section);
abf874aa
CL
11898
11899 /* Same for the group. */
11900 if (stub_entry->group->stub_sec != NULL
11901 && stub_entry->group->stub_sec->output_section == NULL
11902 && info->non_contiguous_regions)
53215f21
CL
11903 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11904 "output section. Retry without "
11905 "--enable-non-contiguous-regions.\n"),
11906 stub_entry->group->stub_sec,
11907 stub_entry->target_section);
abf874aa 11908
1aa42141
AM
11909 /* Make a note of the offset within the stubs for this entry. */
11910 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11911
a4b6fadd
AM
11912 if (stub_entry->h != NULL
11913 && stub_entry->h->save_res
11914 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11915 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11916 {
11917 /* Don't make stubs to out-of-line register save/restore
11918 functions. Instead, emit copies of the functions. */
11919 stub_entry->group->needs_save_res = 1;
11920 stub_entry->stub_type = ppc_stub_save_res;
11921 return TRUE;
11922 }
11923
f891966f 11924 switch (stub_entry->stub_type)
721956f4 11925 {
f891966f
AM
11926 case ppc_stub_plt_branch:
11927 case ppc_stub_plt_branch_r2off:
11928 /* Reset the stub type from the plt branch variant in case we now
11929 can reach with a shorter stub. */
11930 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11931 /* Fall through. */
11932 case ppc_stub_long_branch:
11933 case ppc_stub_long_branch_r2off:
1aa42141
AM
11934 targ = (stub_entry->target_value
11935 + stub_entry->target_section->output_offset
11936 + stub_entry->target_section->output_section->vma);
f891966f 11937 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11938 off = (stub_entry->stub_offset
11939 + stub_entry->group->stub_sec->output_offset
11940 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11941
ad8e1ba5 11942 size = 4;
f891966f 11943 r2off = 0;
ad8e1ba5
AM
11944 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11945 {
25f53a85 11946 r2off = get_r2off (info, stub_entry);
a7c49797 11947 if (r2off == (bfd_vma) -1)
aa374f67
AM
11948 {
11949 htab->stub_error = TRUE;
11950 return FALSE;
11951 }
a7c49797 11952 size = 8;
ac2df442 11953 if (PPC_HA (r2off) != 0)
a7c49797
AM
11954 size += 4;
11955 if (PPC_LO (r2off) != 0)
11956 size += 4;
1aa42141 11957 off += size - 4;
ad8e1ba5 11958 }
1aa42141 11959 off = targ - off;
ad8e1ba5 11960
f891966f
AM
11961 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11962 Do the same for -R objects without function descriptors. */
11963 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11964 && r2off == 0
11965 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11966 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11967 {
f891966f 11968 struct ppc_branch_hash_entry *br_entry;
df136d64 11969
f891966f
AM
11970 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11971 stub_entry->root.string + 9,
11972 TRUE, FALSE);
11973 if (br_entry == NULL)
721956f4 11974 {
f891966f
AM
11975 _bfd_error_handler (_("can't build branch stub `%s'"),
11976 stub_entry->root.string);
11977 htab->stub_error = TRUE;
11978 return FALSE;
721956f4
AM
11979 }
11980
f891966f 11981 if (br_entry->iter != htab->stub_iteration)
721956f4 11982 {
f891966f
AM
11983 br_entry->iter = htab->stub_iteration;
11984 br_entry->offset = htab->brlt->size;
11985 htab->brlt->size += 8;
63bc6f6c 11986
f891966f
AM
11987 if (htab->relbrlt != NULL)
11988 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11989 else if (info->emitrelocations)
84f5d08e 11990 {
f891966f
AM
11991 htab->brlt->reloc_count += 1;
11992 htab->brlt->flags |= SEC_RELOC;
05d0e962 11993 }
f891966f 11994 }
ac2df442 11995
f891966f
AM
11996 targ = (br_entry->offset
11997 + htab->brlt->output_offset
11998 + htab->brlt->output_section->vma);
11999 off = (elf_gp (info->output_bfd)
12000 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12001 off = targ - off;
176a0d42 12002
f891966f
AM
12003 if (info->emitrelocations)
12004 {
12005 stub_entry->group->stub_sec->reloc_count
12006 += 1 + (PPC_HA (off) != 0);
12007 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12008 }
05d0e962 12009
f891966f
AM
12010 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
12011 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12012 {
12013 size = 12;
12014 if (PPC_HA (off) != 0)
12015 size = 16;
ac2df442 12016 }
f891966f 12017 else
ac2df442 12018 {
f891966f
AM
12019 size = 16;
12020 if (PPC_HA (off) != 0)
12021 size += 4;
12022
12023 if (PPC_HA (r2off) != 0)
12024 size += 4;
12025 if (PPC_LO (r2off) != 0)
12026 size += 4;
ac2df442 12027 }
721956f4 12028 }
f891966f
AM
12029 else if (info->emitrelocations)
12030 {
12031 stub_entry->group->stub_sec->reloc_count += 1;
12032 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12033 }
12034 break;
12035
12036 case ppc_stub_plt_branch_notoc:
12037 case ppc_stub_plt_branch_both:
12038 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12039 /* Fall through. */
12040 case ppc_stub_long_branch_notoc:
12041 case ppc_stub_long_branch_both:
12042 off = (stub_entry->stub_offset
12043 + stub_entry->group->stub_sec->output_offset
12044 + stub_entry->group->stub_sec->output_section->vma);
12045 size = 0;
12046 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12047 size = 4;
12048 off += size;
12049 targ = (stub_entry->target_value
12050 + stub_entry->target_section->output_offset
12051 + stub_entry->target_section->output_section->vma);
04bdff6a 12052 odd = off & 4;
f891966f
AM
12053 off = targ - off;
12054
3d58e1fc
AM
12055 if (info->emitrelocations)
12056 {
04bdff6a 12057 unsigned int num_rel;
e10a07b3 12058 if (htab->params->power10_stubs != 0)
7c1f4227 12059 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12060 else
12061 num_rel = num_relocs_for_offset (off - 8);
12062 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12063 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12064 }
12065
e10a07b3 12066 if (htab->params->power10_stubs != 0)
7c1f4227 12067 extra = size_power10_offset (off, odd);
04bdff6a
AM
12068 else
12069 extra = size_offset (off - 8);
f891966f
AM
12070 /* Include branch insn plus those in the offset sequence. */
12071 size += 4 + extra;
12072 /* The branch insn is at the end, or "extra" bytes along. So
12073 its offset will be "extra" bytes less that that already
12074 calculated. */
12075 off -= extra;
12076
e10a07b3 12077 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12078 {
12079 /* After the bcl, lr has been modified so we need to emit
12080 .eh_frame info saying the return address is in r12. */
12081 lr_used = stub_entry->stub_offset + 8;
12082 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12083 lr_used += 4;
12084 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12085 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12086 DW_CFA_restore_extended 65. */
12087 delta = lr_used - stub_entry->group->lr_restore;
12088 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12089 stub_entry->group->lr_restore = lr_used + 8;
12090 }
f891966f
AM
12091
12092 /* If the branch can't reach, use a plt_branch. */
12093 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12094 {
12095 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12096 - ppc_stub_long_branch_notoc);
12097 size += 4;
12098 }
3d58e1fc
AM
12099 else if (info->emitrelocations)
12100 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12101 break;
12102
12103 case ppc_stub_plt_call_notoc:
12104 case ppc_stub_plt_call_both:
12105 off = (stub_entry->stub_offset
12106 + stub_entry->group->stub_sec->output_offset
12107 + stub_entry->group->stub_sec->output_section->vma);
12108 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12109 off += 4;
12110 targ = stub_entry->plt_ent->plt.offset & ~1;
12111 if (targ >= (bfd_vma) -2)
12112 abort ();
12113
12114 plt = htab->elf.splt;
12115 if (!htab->elf.dynamic_sections_created
12116 || stub_entry->h == NULL
12117 || stub_entry->h->elf.dynindx == -1)
12118 {
12119 if (stub_entry->symtype == STT_GNU_IFUNC)
12120 plt = htab->elf.iplt;
12121 else
12122 plt = htab->pltlocal;
12123 }
12124 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 12125 odd = off & 4;
f891966f
AM
12126 off = targ - off;
12127
12128 if (htab->params->plt_stub_align != 0)
12129 {
12130 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12131
12132 stub_entry->group->stub_sec->size += pad;
12133 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12134 off -= pad;
12135 }
12136
3d58e1fc
AM
12137 if (info->emitrelocations)
12138 {
04bdff6a 12139 unsigned int num_rel;
e10a07b3 12140 if (htab->params->power10_stubs != 0)
7c1f4227 12141 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12142 else
12143 num_rel = num_relocs_for_offset (off - 8);
12144 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12145 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12146 }
12147
f891966f
AM
12148 size = plt_stub_size (htab, stub_entry, off);
12149
e10a07b3 12150 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12151 {
12152 /* After the bcl, lr has been modified so we need to emit
12153 .eh_frame info saying the return address is in r12. */
12154 lr_used = stub_entry->stub_offset + 8;
12155 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12156 lr_used += 4;
12157 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12158 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12159 DW_CFA_restore_extended 65. */
12160 delta = lr_used - stub_entry->group->lr_restore;
12161 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12162 stub_entry->group->lr_restore = lr_used + 8;
12163 }
f891966f
AM
12164 break;
12165
12166 case ppc_stub_plt_call:
12167 case ppc_stub_plt_call_r2save:
12168 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12169 if (targ >= (bfd_vma) -2)
12170 abort ();
12171 plt = htab->elf.splt;
12172 if (!htab->elf.dynamic_sections_created
12173 || stub_entry->h == NULL
12174 || stub_entry->h->elf.dynindx == -1)
12175 {
12176 if (stub_entry->symtype == STT_GNU_IFUNC)
12177 plt = htab->elf.iplt;
12178 else
12179 plt = htab->pltlocal;
12180 }
12181 targ += plt->output_offset + plt->output_section->vma;
12182
12183 off = (elf_gp (info->output_bfd)
12184 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12185 off = targ - off;
12186
12187 if (htab->params->plt_stub_align != 0)
12188 {
12189 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12190
12191 stub_entry->group->stub_sec->size += pad;
12192 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12193 }
12194
12195 if (info->emitrelocations)
12196 {
12197 stub_entry->group->stub_sec->reloc_count
12198 += ((PPC_HA (off) != 0)
12199 + (htab->opd_abi
12200 ? 2 + (htab->params->plt_static_chain
12201 && PPC_HA (off + 16) == PPC_HA (off))
12202 : 1));
12203 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12204 }
12205
12206 size = plt_stub_size (htab, stub_entry, off);
12207
12208 if (stub_entry->h != NULL
ed7007c1 12209 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12210 && htab->params->tls_get_addr_opt
12211 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12212 {
9e7028aa
AM
12213 if (htab->params->no_tls_get_addr_regsave)
12214 {
12215 lr_used = stub_entry->stub_offset + size - 20;
12216 /* The eh_frame info will consist of a DW_CFA_advance_loc
12217 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12218 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12219 delta = lr_used - stub_entry->group->lr_restore;
12220 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12221 }
12222 else
12223 {
12224 /* Adjustments to r1 need to be described. */
12225 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12226 delta = cfa_updt - stub_entry->group->lr_restore;
12227 stub_entry->group->eh_size += eh_advance_size (delta);
12228 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12229 }
f891966f
AM
12230 stub_entry->group->lr_restore = size - 4;
12231 }
12232 break;
12233
12234 default:
12235 BFD_FAIL ();
12236 return FALSE;
721956f4
AM
12237 }
12238
6f20ed8a 12239 stub_entry->group->stub_sec->size += size;
b34976b6 12240 return TRUE;
721956f4
AM
12241}
12242
12243/* Set up various things so that we can make a list of input sections
12244 for each output section included in the link. Returns -1 on error,
cedb70c5 12245 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12246
12247int
e7d1c40c 12248ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12249{
6f20ed8a 12250 unsigned int id;
986f0783 12251 size_t amt;
721956f4
AM
12252 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12253
4dfe6ac6
NC
12254 if (htab == NULL)
12255 return -1;
4c52953f 12256
7cf7fcc8 12257 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12258 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12259 htab->sec_info = bfd_zmalloc (amt);
12260 if (htab->sec_info == NULL)
721956f4
AM
12261 return -1;
12262
3d6f9012
AM
12263 /* Set toc_off for com, und, abs and ind sections. */
12264 for (id = 0; id < 3; id++)
6f20ed8a 12265 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12266
721956f4
AM
12267 return 1;
12268}
12269
927be08e
AM
12270/* Set up for first pass at multitoc partitioning. */
12271
12272void
12273ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12274{
12275 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12276
1c865ab2 12277 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12278 htab->toc_bfd = NULL;
12279 htab->toc_first_sec = NULL;
12280}
12281
e717da7e
AM
12282/* The linker repeatedly calls this function for each TOC input section
12283 and linker generated GOT section. Group input bfds such that the toc
927be08e 12284 within a group is less than 64k in size. */
ad8e1ba5 12285
927be08e 12286bfd_boolean
4ce794b7 12287ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12288{
12289 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12290 bfd_vma addr, off, limit;
ad8e1ba5 12291
4dfe6ac6
NC
12292 if (htab == NULL)
12293 return FALSE;
12294
927be08e 12295 if (!htab->second_toc_pass)
4c52953f 12296 {
927be08e 12297 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12298 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12299
12300 if (new_bfd)
bf102f86
AM
12301 {
12302 htab->toc_bfd = isec->owner;
12303 htab->toc_first_sec = isec;
12304 }
927be08e 12305
bf102f86
AM
12306 addr = isec->output_offset + isec->output_section->vma;
12307 off = addr - htab->toc_curr;
d77c8a4b
AM
12308 limit = 0x80008000;
12309 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12310 limit = 0x10000;
12311 if (off + isec->size > limit)
bf102f86
AM
12312 {
12313 addr = (htab->toc_first_sec->output_offset
12314 + htab->toc_first_sec->output_section->vma);
12315 htab->toc_curr = addr;
a27e685f 12316 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12317 }
99877b66 12318
927be08e
AM
12319 /* toc_curr is the base address of this toc group. Set elf_gp
12320 for the input section to be the offset relative to the
12321 output toc base plus 0x8000. Making the input elf_gp an
12322 offset allows us to move the toc as a whole without
12323 recalculating input elf_gp. */
06bcf541 12324 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12325 off += TOC_BASE_OFF;
12326
12327 /* Die if someone uses a linker script that doesn't keep input
12328 file .toc and .got together. */
a4fd3de5
AM
12329 if (new_bfd
12330 && elf_gp (isec->owner) != 0
927be08e
AM
12331 && elf_gp (isec->owner) != off)
12332 return FALSE;
12333
12334 elf_gp (isec->owner) = off;
12335 return TRUE;
4c52953f 12336 }
927be08e
AM
12337
12338 /* During the second pass toc_first_sec points to the start of
12339 a toc group, and toc_curr is used to track the old elf_gp.
12340 We use toc_bfd to ensure we only look at each bfd once. */
12341 if (htab->toc_bfd == isec->owner)
12342 return TRUE;
12343 htab->toc_bfd = isec->owner;
12344
12345 if (htab->toc_first_sec == NULL
12346 || htab->toc_curr != elf_gp (isec->owner))
12347 {
12348 htab->toc_curr = elf_gp (isec->owner);
12349 htab->toc_first_sec = isec;
12350 }
12351 addr = (htab->toc_first_sec->output_offset
12352 + htab->toc_first_sec->output_section->vma);
06bcf541 12353 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12354 elf_gp (isec->owner) = off;
12355
12356 return TRUE;
ad8e1ba5
AM
12357}
12358
927be08e
AM
12359/* Called via elf_link_hash_traverse to merge GOT entries for global
12360 symbol H. */
12361
12362static bfd_boolean
12363merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12364{
12365 if (h->root.type == bfd_link_hash_indirect)
12366 return TRUE;
12367
927be08e
AM
12368 merge_got_entries (&h->got.glist);
12369
12370 return TRUE;
12371}
12372
12373/* Called via elf_link_hash_traverse to allocate GOT entries for global
12374 symbol H. */
12375
12376static bfd_boolean
12377reallocate_got (struct elf_link_hash_entry *h, void *inf)
12378{
12379 struct got_entry *gent;
12380
12381 if (h->root.type == bfd_link_hash_indirect)
12382 return TRUE;
12383
927be08e
AM
12384 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12385 if (!gent->is_indirect)
12386 allocate_got (h, (struct bfd_link_info *) inf, gent);
12387 return TRUE;
12388}
12389
12390/* Called on the first multitoc pass after the last call to
12391 ppc64_elf_next_toc_section. This function removes duplicate GOT
12392 entries. */
12393
12394bfd_boolean
12395ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12396{
12397 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12398 struct bfd *ibfd, *ibfd2;
12399 bfd_boolean done_something;
12400
12401 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12402
7865406b
AM
12403 if (!htab->do_multi_toc)
12404 return FALSE;
12405
d0fae19d 12406 /* Merge global sym got entries within a toc group. */
927be08e
AM
12407 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12408
12409 /* And tlsld_got. */
c72f2fb2 12410 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12411 {
12412 struct got_entry *ent, *ent2;
12413
12414 if (!is_ppc64_elf (ibfd))
12415 continue;
12416
12417 ent = ppc64_tlsld_got (ibfd);
12418 if (!ent->is_indirect
12419 && ent->got.offset != (bfd_vma) -1)
12420 {
c72f2fb2 12421 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12422 {
12423 if (!is_ppc64_elf (ibfd2))
12424 continue;
12425
12426 ent2 = ppc64_tlsld_got (ibfd2);
12427 if (!ent2->is_indirect
12428 && ent2->got.offset != (bfd_vma) -1
12429 && elf_gp (ibfd2) == elf_gp (ibfd))
12430 {
12431 ent2->is_indirect = TRUE;
12432 ent2->got.ent = ent;
12433 }
12434 }
12435 }
12436 }
12437
12438 /* Zap sizes of got sections. */
33e44f2e
AM
12439 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12440 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12441 htab->got_reli_size = 0;
12442
c72f2fb2 12443 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12444 {
12445 asection *got, *relgot;
12446
12447 if (!is_ppc64_elf (ibfd))
12448 continue;
12449
12450 got = ppc64_elf_tdata (ibfd)->got;
12451 if (got != NULL)
12452 {
12453 got->rawsize = got->size;
12454 got->size = 0;
12455 relgot = ppc64_elf_tdata (ibfd)->relgot;
12456 relgot->rawsize = relgot->size;
12457 relgot->size = 0;
12458 }
12459 }
12460
12461 /* Now reallocate the got, local syms first. We don't need to
12462 allocate section contents again since we never increase size. */
c72f2fb2 12463 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12464 {
12465 struct got_entry **lgot_ents;
12466 struct got_entry **end_lgot_ents;
12467 struct plt_entry **local_plt;
12468 struct plt_entry **end_local_plt;
f961d9dd 12469 unsigned char *lgot_masks;
927be08e
AM
12470 bfd_size_type locsymcount;
12471 Elf_Internal_Shdr *symtab_hdr;
19e08130 12472 asection *s;
927be08e
AM
12473
12474 if (!is_ppc64_elf (ibfd))
12475 continue;
12476
12477 lgot_ents = elf_local_got_ents (ibfd);
12478 if (!lgot_ents)
12479 continue;
12480
12481 symtab_hdr = &elf_symtab_hdr (ibfd);
12482 locsymcount = symtab_hdr->sh_info;
12483 end_lgot_ents = lgot_ents + locsymcount;
12484 local_plt = (struct plt_entry **) end_lgot_ents;
12485 end_local_plt = local_plt + locsymcount;
f961d9dd 12486 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12487 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12488 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12489 {
12490 struct got_entry *ent;
12491
12492 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12493 {
19e08130
AM
12494 unsigned int ent_size = 8;
12495 unsigned int rel_size = sizeof (Elf64_External_Rela);
12496
d0fae19d
AM
12497 ent->got.offset = s->size;
12498 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12499 {
19e08130
AM
12500 ent_size *= 2;
12501 rel_size *= 2;
12502 }
12503 s->size += ent_size;
37da22e5 12504 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12505 {
33e44f2e 12506 htab->elf.irelplt->size += rel_size;
19e08130
AM
12507 htab->got_reli_size += rel_size;
12508 }
6a3858a6 12509 else if (bfd_link_pic (info)
f749f26e 12510 && !(ent->tls_type != 0
6a3858a6 12511 && bfd_link_executable (info)))
19e08130
AM
12512 {
12513 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12514 srel->size += rel_size;
d0fae19d
AM
12515 }
12516 }
927be08e
AM
12517 }
12518 }
12519
12520 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12521
c72f2fb2 12522 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12523 {
12524 struct got_entry *ent;
12525
12526 if (!is_ppc64_elf (ibfd))
12527 continue;
12528
12529 ent = ppc64_tlsld_got (ibfd);
12530 if (!ent->is_indirect
12531 && ent->got.offset != (bfd_vma) -1)
12532 {
12533 asection *s = ppc64_elf_tdata (ibfd)->got;
12534 ent->got.offset = s->size;
12535 s->size += 16;
f749f26e 12536 if (bfd_link_dll (info))
927be08e
AM
12537 {
12538 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12539 srel->size += sizeof (Elf64_External_Rela);
12540 }
12541 }
12542 }
12543
33e44f2e 12544 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12545 if (!done_something)
c72f2fb2 12546 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12547 {
12548 asection *got;
12549
12550 if (!is_ppc64_elf (ibfd))
12551 continue;
12552
12553 got = ppc64_elf_tdata (ibfd)->got;
12554 if (got != NULL)
12555 {
12556 done_something = got->rawsize != got->size;
12557 if (done_something)
12558 break;
12559 }
12560 }
12561
12562 if (done_something)
e7d1c40c 12563 (*htab->params->layout_sections_again) ();
927be08e
AM
12564
12565 /* Set up for second pass over toc sections to recalculate elf_gp
12566 on input sections. */
12567 htab->toc_bfd = NULL;
12568 htab->toc_first_sec = NULL;
12569 htab->second_toc_pass = TRUE;
12570 return done_something;
12571}
12572
12573/* Called after second pass of multitoc partitioning. */
12574
12575void
12576ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12577{
12578 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12579
12580 /* After the second pass, toc_curr tracks the TOC offset used
12581 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12582 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12583}
12584
9b5ecbd0
AM
12585/* No toc references were found in ISEC. If the code in ISEC makes no
12586 calls, then there's no need to use toc adjusting stubs when branching
12587 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12588 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12589 needed, and 2 if a cyclical call-graph was found but no other reason
12590 for a stub was detected. If called from the top level, a return of
12591 2 means the same as a return of 0. */
9b5ecbd0
AM
12592
12593static int
4ce794b7 12594toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12595{
9b5ecbd0 12596 int ret;
70cc837d
AM
12597
12598 /* Mark this section as checked. */
12599 isec->call_check_done = 1;
9b5ecbd0 12600
772119ce
AM
12601 /* We know none of our code bearing sections will need toc stubs. */
12602 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12603 return 0;
12604
eea6121a 12605 if (isec->size == 0)
082c50f8
AM
12606 return 0;
12607
4c52953f
AM
12608 if (isec->output_section == NULL)
12609 return 0;
12610
4c52953f 12611 ret = 0;
70cc837d 12612 if (isec->reloc_count != 0)
9b5ecbd0 12613 {
70cc837d
AM
12614 Elf_Internal_Rela *relstart, *rel;
12615 Elf_Internal_Sym *local_syms;
12616 struct ppc_link_hash_table *htab;
2917689a 12617
70cc837d
AM
12618 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12619 info->keep_memory);
12620 if (relstart == NULL)
12621 return -1;
90aecf7a 12622
70cc837d
AM
12623 /* Look for branches to outside of this section. */
12624 local_syms = NULL;
12625 htab = ppc_hash_table (info);
12626 if (htab == NULL)
12627 return -1;
4c52953f 12628
70cc837d 12629 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12630 {
70cc837d
AM
12631 enum elf_ppc64_reloc_type r_type;
12632 unsigned long r_symndx;
12633 struct elf_link_hash_entry *h;
12634 struct ppc_link_hash_entry *eh;
12635 Elf_Internal_Sym *sym;
12636 asection *sym_sec;
12637 struct _opd_sec_data *opd;
12638 bfd_vma sym_value;
12639 bfd_vma dest;
12640
12641 r_type = ELF64_R_TYPE (rel->r_info);
12642 if (r_type != R_PPC64_REL24
05d0e962 12643 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12644 && r_type != R_PPC64_REL14
12645 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12646 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12647 && r_type != R_PPC64_PLTCALL
12648 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12649 continue;
4c52953f 12650
70cc837d
AM
12651 r_symndx = ELF64_R_SYM (rel->r_info);
12652 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12653 isec->owner))
4c52953f 12654 {
70cc837d
AM
12655 ret = -1;
12656 break;
12657 }
4c52953f 12658
70cc837d
AM
12659 /* Calls to dynamic lib functions go through a plt call stub
12660 that uses r2. */
ed7007c1 12661 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12662 if (eh != NULL
12663 && (eh->elf.plt.plist != NULL
12664 || (eh->oh != NULL
12665 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12666 {
12667 ret = 1;
12668 break;
4c52953f
AM
12669 }
12670
70cc837d
AM
12671 if (sym_sec == NULL)
12672 /* Ignore other undefined symbols. */
4c52953f 12673 continue;
4c52953f 12674
70cc837d
AM
12675 /* Assume branches to other sections not included in the
12676 link need stubs too, to cover -R and absolute syms. */
12677 if (sym_sec->output_section == NULL)
12678 {
12679 ret = 1;
12680 break;
12681 }
4c52953f 12682
70cc837d
AM
12683 if (h == NULL)
12684 sym_value = sym->st_value;
12685 else
12686 {
12687 if (h->root.type != bfd_link_hash_defined
12688 && h->root.type != bfd_link_hash_defweak)
12689 abort ();
12690 sym_value = h->root.u.def.value;
12691 }
12692 sym_value += rel->r_addend;
4c52953f 12693
70cc837d
AM
12694 /* If this branch reloc uses an opd sym, find the code section. */
12695 opd = get_opd_info (sym_sec);
12696 if (opd != NULL)
12697 {
12698 if (h == NULL && opd->adjust != NULL)
12699 {
12700 long adjust;
4c52953f 12701
92a9c616 12702 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12703 if (adjust == -1)
12704 /* Assume deleted functions won't ever be called. */
12705 continue;
12706 sym_value += adjust;
12707 }
4c52953f 12708
aef36ac1
AM
12709 dest = opd_entry_value (sym_sec, sym_value,
12710 &sym_sec, NULL, FALSE);
70cc837d
AM
12711 if (dest == (bfd_vma) -1)
12712 continue;
12713 }
12714 else
12715 dest = (sym_value
12716 + sym_sec->output_offset
12717 + sym_sec->output_section->vma);
4c52953f 12718
70cc837d
AM
12719 /* Ignore branch to self. */
12720 if (sym_sec == isec)
12721 continue;
4c52953f 12722
70cc837d
AM
12723 /* If the called function uses the toc, we need a stub. */
12724 if (sym_sec->has_toc_reloc
12725 || sym_sec->makes_toc_func_call)
4c52953f 12726 {
70cc837d 12727 ret = 1;
4c52953f
AM
12728 break;
12729 }
70cc837d
AM
12730
12731 /* Assume any branch that needs a long branch stub might in fact
12732 need a plt_branch stub. A plt_branch stub uses r2. */
12733 else if (dest - (isec->output_offset
12734 + isec->output_section->vma
6911b7dc
AM
12735 + rel->r_offset) + (1 << 25)
12736 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12737 ? h->other
12738 : sym->st_other))
4c52953f 12739 {
70cc837d
AM
12740 ret = 1;
12741 break;
12742 }
12743
12744 /* If calling back to a section in the process of being
12745 tested, we can't say for sure that no toc adjusting stubs
12746 are needed, so don't return zero. */
12747 else if (sym_sec->call_check_in_progress)
12748 ret = 2;
12749
12750 /* Branches to another section that itself doesn't have any TOC
12751 references are OK. Recursively call ourselves to check. */
12752 else if (!sym_sec->call_check_done)
12753 {
12754 int recur;
12755
12756 /* Mark current section as indeterminate, so that other
12757 sections that call back to current won't be marked as
12758 known. */
12759 isec->call_check_in_progress = 1;
12760 recur = toc_adjusting_stub_needed (info, sym_sec);
12761 isec->call_check_in_progress = 0;
12762
4c52953f
AM
12763 if (recur != 0)
12764 {
70cc837d
AM
12765 ret = recur;
12766 if (recur != 2)
12767 break;
4c52953f
AM
12768 }
12769 }
4c52953f 12770 }
70cc837d 12771
c9594989
AM
12772 if (elf_symtab_hdr (isec->owner).contents
12773 != (unsigned char *) local_syms)
70cc837d
AM
12774 free (local_syms);
12775 if (elf_section_data (isec)->relocs != relstart)
12776 free (relstart);
9b5ecbd0
AM
12777 }
12778
70cc837d
AM
12779 if ((ret & 1) == 0
12780 && isec->map_head.s != NULL
12781 && (strcmp (isec->output_section->name, ".init") == 0
12782 || strcmp (isec->output_section->name, ".fini") == 0))
12783 {
12784 if (isec->map_head.s->has_toc_reloc
12785 || isec->map_head.s->makes_toc_func_call)
12786 ret = 1;
12787 else if (!isec->map_head.s->call_check_done)
12788 {
12789 int recur;
12790 isec->call_check_in_progress = 1;
12791 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12792 isec->call_check_in_progress = 0;
12793 if (recur != 0)
12794 ret = recur;
12795 }
12796 }
12797
12798 if (ret == 1)
12799 isec->makes_toc_func_call = 1;
4c52953f 12800
9b5ecbd0
AM
12801 return ret;
12802}
12803
721956f4
AM
12804/* The linker repeatedly calls this function for each input section,
12805 in the order that input sections are linked into output sections.
12806 Build lists of input sections to determine groupings between which
12807 we may insert linker stubs. */
12808
9b5ecbd0 12809bfd_boolean
4ce794b7 12810ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12811{
12812 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12813
4dfe6ac6
NC
12814 if (htab == NULL)
12815 return FALSE;
12816
734b6cf9 12817 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12818 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12819 {
3d6f9012
AM
12820 /* This happens to make the list in reverse order,
12821 which is what we want. */
6f20ed8a
AM
12822 htab->sec_info[isec->id].u.list
12823 = htab->sec_info[isec->output_section->id].u.list;
12824 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12825 }
ad8e1ba5 12826
4c52953f 12827 if (htab->multi_toc_needed)
9b5ecbd0 12828 {
8b974ba3
AM
12829 /* Analyse sections that aren't already flagged as needing a
12830 valid toc pointer. Exclude .fixup for the linux kernel.
12831 .fixup contains branches, but only back to the function that
12832 hit an exception. */
12833 if (!(isec->has_toc_reloc
12834 || (isec->flags & SEC_CODE) == 0
12835 || strcmp (isec->name, ".fixup") == 0
12836 || isec->call_check_done))
12837 {
12838 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12839 return FALSE;
8b974ba3
AM
12840 }
12841 /* Make all sections use the TOC assigned for this object file.
12842 This will be wrong for pasted sections; We fix that in
12843 check_pasted_section(). */
12844 if (elf_gp (isec->owner) != 0)
12845 htab->toc_curr = elf_gp (isec->owner);
12846 }
12847
6f20ed8a 12848 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12849 return TRUE;
721956f4
AM
12850}
12851
70cc837d
AM
12852/* Check that all .init and .fini sections use the same toc, if they
12853 have toc relocs. */
12854
12855static bfd_boolean
12856check_pasted_section (struct bfd_link_info *info, const char *name)
12857{
12858 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12859
12860 if (o != NULL)
12861 {
12862 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12863 bfd_vma toc_off = 0;
12864 asection *i;
12865
12866 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12867 if (i->has_toc_reloc)
12868 {
12869 if (toc_off == 0)
6f20ed8a
AM
12870 toc_off = htab->sec_info[i->id].toc_off;
12871 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12872 return FALSE;
12873 }
6683a28d
AM
12874
12875 if (toc_off == 0)
12876 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12877 if (i->makes_toc_func_call)
12878 {
6f20ed8a 12879 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12880 break;
12881 }
12882
70cc837d
AM
12883 /* Make sure the whole pasted function uses the same toc offset. */
12884 if (toc_off != 0)
12885 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12886 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12887 }
12888 return TRUE;
12889}
12890
12891bfd_boolean
12892ppc64_elf_check_init_fini (struct bfd_link_info *info)
12893{
12894 return (check_pasted_section (info, ".init")
12895 & check_pasted_section (info, ".fini"));
12896}
12897
721956f4
AM
12898/* See whether we can group stub sections together. Grouping stub
12899 sections may result in fewer stubs. More importantly, we need to
12900 put all .init* and .fini* stubs at the beginning of the .init or
12901 .fini output sections respectively, because glibc splits the
12902 _init and _fini functions into multiple parts. Putting a stub in
12903 the middle of a function is not a good idea. */
12904
6f20ed8a
AM
12905static bfd_boolean
12906group_sections (struct bfd_link_info *info,
4ce794b7
AM
12907 bfd_size_type stub_group_size,
12908 bfd_boolean stubs_always_before_branch)
721956f4 12909{
6f20ed8a
AM
12910 struct ppc_link_hash_table *htab;
12911 asection *osec;
7c8fe5c4
AM
12912 bfd_boolean suppress_size_errors;
12913
6f20ed8a
AM
12914 htab = ppc_hash_table (info);
12915 if (htab == NULL)
12916 return FALSE;
12917
7c8fe5c4 12918 suppress_size_errors = FALSE;
7c8fe5c4
AM
12919 if (stub_group_size == 1)
12920 {
12921 /* Default values. */
12922 if (stubs_always_before_branch)
09f92717 12923 stub_group_size = 0x1e00000;
7c8fe5c4 12924 else
09f92717 12925 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12926 suppress_size_errors = TRUE;
12927 }
12928
6f20ed8a 12929 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12930 {
6f20ed8a
AM
12931 asection *tail;
12932
12933 if (osec->id >= htab->sec_info_arr_size)
12934 continue;
12935
12936 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12937 while (tail != NULL)
721956f4 12938 {
734b6cf9
AM
12939 asection *curr;
12940 asection *prev;
12941 bfd_size_type total;
12942 bfd_boolean big_sec;
12943 bfd_vma curr_toc;
6f20ed8a 12944 struct map_stub *group;
09f92717 12945 bfd_size_type group_size;
734b6cf9
AM
12946
12947 curr = tail;
eea6121a 12948 total = tail->size;
09f92717
AM
12949 group_size = (ppc64_elf_section_data (tail) != NULL
12950 && ppc64_elf_section_data (tail)->has_14bit_branch
12951 ? stub_group_size >> 10 : stub_group_size);
12952
12953 big_sec = total > group_size;
7c8fe5c4 12954 if (big_sec && !suppress_size_errors)
695344c0 12955 /* xgettext:c-format */
871b3ab2 12956 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12957 tail->owner, tail);
6f20ed8a 12958 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12959
6f20ed8a 12960 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12961 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12962 < (ppc64_elf_section_data (prev) != NULL
12963 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12964 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12965 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12966 curr = prev;
12967
12968 /* OK, the size from the start of CURR to the end is less
09f92717 12969 than group_size and thus can be handled by one stub
734b6cf9 12970 section. (or the tail section is itself larger than
09f92717
AM
12971 group_size, in which case we may be toast.) We should
12972 really be keeping track of the total size of stubs added
12973 here, as stubs contribute to the final output section
12974 size. That's a little tricky, and this way will only
12975 break if stubs added make the total size more than 2^25,
12976 ie. for the default stub_group_size, if stubs total more
12977 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12978 group = bfd_alloc (curr->owner, sizeof (*group));
12979 if (group == NULL)
12980 return FALSE;
12981 group->link_sec = curr;
12982 group->stub_sec = NULL;
a4b6fadd 12983 group->needs_save_res = 0;
df136d64
AM
12984 group->lr_restore = 0;
12985 group->eh_size = 0;
12986 group->eh_base = 0;
a4b6fadd
AM
12987 group->next = htab->group;
12988 htab->group = group;
734b6cf9 12989 do
721956f4 12990 {
6f20ed8a 12991 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12992 /* Set up this stub group. */
6f20ed8a 12993 htab->sec_info[tail->id].u.group = group;
721956f4 12994 }
734b6cf9
AM
12995 while (tail != curr && (tail = prev) != NULL);
12996
09f92717 12997 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
12998 bytes before the stub section can be handled by it too.
12999 Don't do this if we have a really large section after the
13000 stubs, as adding more stubs increases the chance that
13001 branches may not reach into the stub section. */
13002 if (!stubs_always_before_branch && !big_sec)
13003 {
13004 total = 0;
13005 while (prev != NULL
13006 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
13007 < (ppc64_elf_section_data (prev) != NULL
13008 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
13009 ? (group_size = stub_group_size >> 10)
13010 : group_size))
6f20ed8a 13011 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
13012 {
13013 tail = prev;
6f20ed8a
AM
13014 prev = htab->sec_info[tail->id].u.list;
13015 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
13016 }
13017 }
13018 tail = prev;
721956f4
AM
13019 }
13020 }
6f20ed8a 13021 return TRUE;
721956f4
AM
13022}
13023
58d180e8
AM
13024static const unsigned char glink_eh_frame_cie[] =
13025{
13026 0, 0, 0, 16, /* length. */
13027 0, 0, 0, 0, /* id. */
13028 1, /* CIE version. */
13029 'z', 'R', 0, /* Augmentation string. */
13030 4, /* Code alignment. */
13031 0x78, /* Data alignment. */
13032 65, /* RA reg. */
13033 1, /* Augmentation size. */
13034 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 13035 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
13036};
13037
d969d15f
AM
13038/* Stripping output sections is normally done before dynamic section
13039 symbols have been allocated. This function is called later, and
13040 handles cases like htab->brlt which is mapped to its own output
13041 section. */
13042
13043static void
13044maybe_strip_output (struct bfd_link_info *info, asection *isec)
13045{
13046 if (isec->size == 0
13047 && isec->output_section->size == 0
53d8967a 13048 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13049 && !bfd_section_removed_from_list (info->output_bfd,
13050 isec->output_section)
13051 && elf_section_data (isec->output_section)->dynindx == 0)
13052 {
13053 isec->output_section->flags |= SEC_EXCLUDE;
13054 bfd_section_list_remove (info->output_bfd, isec->output_section);
13055 info->output_bfd->section_count--;
13056 }
13057}
13058
721956f4
AM
13059/* Determine and set the size of the stub section for a final link.
13060
13061 The basic idea here is to examine all the relocations looking for
13062 PC-relative calls to a target that is unreachable with a "bl"
13063 instruction. */
13064
b34976b6 13065bfd_boolean
e7d1c40c 13066ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13067{
13068 bfd_size_type stub_group_size;
b34976b6 13069 bfd_boolean stubs_always_before_branch;
721956f4
AM
13070 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13071
4dfe6ac6
NC
13072 if (htab == NULL)
13073 return FALSE;
13074
e10a07b3
AM
13075 if (htab->params->power10_stubs == -1 && !htab->has_power10_relocs)
13076 htab->params->power10_stubs = 0;
13077
0e1862bb 13078 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13079 htab->params->plt_thread_safe = 1;
b9e5796b 13080 if (!htab->opd_abi)
e7d1c40c
AM
13081 htab->params->plt_thread_safe = 0;
13082 else if (htab->params->plt_thread_safe == -1)
794e51c0 13083 {
e2458743 13084 static const char *const thread_starter[] =
794e51c0
AM
13085 {
13086 "pthread_create",
13087 /* libstdc++ */
13088 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13089 /* librt */
13090 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13091 "mq_notify", "create_timer",
13092 /* libanl */
13093 "getaddrinfo_a",
13094 /* libgomp */
2300b5a1 13095 "GOMP_parallel",
794e51c0 13096 "GOMP_parallel_start",
2300b5a1 13097 "GOMP_parallel_loop_static",
794e51c0 13098 "GOMP_parallel_loop_static_start",
2300b5a1 13099 "GOMP_parallel_loop_dynamic",
794e51c0 13100 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13101 "GOMP_parallel_loop_guided",
794e51c0 13102 "GOMP_parallel_loop_guided_start",
2300b5a1 13103 "GOMP_parallel_loop_runtime",
794e51c0 13104 "GOMP_parallel_loop_runtime_start",
2300b5a1 13105 "GOMP_parallel_sections",
68ffbac6 13106 "GOMP_parallel_sections_start",
f9dffbf0
AM
13107 /* libgo */
13108 "__go_go",
794e51c0
AM
13109 };
13110 unsigned i;
13111
a4b6fadd 13112 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13113 {
13114 struct elf_link_hash_entry *h;
13115 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13116 FALSE, FALSE, TRUE);
e7d1c40c
AM
13117 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13118 if (htab->params->plt_thread_safe)
794e51c0
AM
13119 break;
13120 }
13121 }
e7d1c40c
AM
13122 stubs_always_before_branch = htab->params->group_size < 0;
13123 if (htab->params->group_size < 0)
13124 stub_group_size = -htab->params->group_size;
721956f4 13125 else
e7d1c40c 13126 stub_group_size = htab->params->group_size;
721956f4 13127
6f20ed8a
AM
13128 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13129 return FALSE;
721956f4 13130
a804e476
AM
13131 htab->tga_group = NULL;
13132 if (!htab->params->no_tls_get_addr_regsave
13133 && htab->tga_desc_fd != NULL
13134 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13135 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13136 && htab->tls_get_addr_fd != NULL
13137 && is_static_defined (&htab->tls_get_addr_fd->elf))
13138 {
13139 asection *sym_sec, *code_sec, *stub_sec;
13140 bfd_vma sym_value;
13141 struct _opd_sec_data *opd;
13142
13143 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13144 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13145 code_sec = sym_sec;
13146 opd = get_opd_info (sym_sec);
13147 if (opd != NULL)
13148 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13149 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13150 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13151 htab->tga_group->link_sec);
13152 if (stub_sec == NULL)
13153 return FALSE;
13154 htab->tga_group->stub_sec = stub_sec;
13155
13156 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13157 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13158 htab->tga_desc_fd->elf.root.u.def.value = 0;
13159 htab->tga_desc_fd->elf.type = STT_FUNC;
13160 htab->tga_desc_fd->elf.def_regular = 1;
13161 htab->tga_desc_fd->elf.non_elf = 0;
13162 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13163 }
13164
c9301e31
AM
13165#define STUB_SHRINK_ITER 20
13166 /* Loop until no stubs added. After iteration 20 of this loop we may
13167 exit on a stub section shrinking. This is to break out of a
13168 pathological case where adding stubs on one iteration decreases
13169 section gaps (perhaps due to alignment), which then requires
13170 fewer or smaller stubs on the next iteration. */
13171
721956f4
AM
13172 while (1)
13173 {
13174 bfd *input_bfd;
13175 unsigned int bfd_indx;
a4b6fadd 13176 struct map_stub *group;
721956f4
AM
13177
13178 htab->stub_iteration += 1;
721956f4
AM
13179
13180 for (input_bfd = info->input_bfds, bfd_indx = 0;
13181 input_bfd != NULL;
c72f2fb2 13182 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13183 {
13184 Elf_Internal_Shdr *symtab_hdr;
13185 asection *section;
6cdc0ccc 13186 Elf_Internal_Sym *local_syms = NULL;
721956f4 13187
0c8d6e5c 13188 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13189 continue;
13190
721956f4 13191 /* We'll need the symbol table in a second. */
0ffa91dd 13192 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13193 if (symtab_hdr->sh_info == 0)
13194 continue;
13195
721956f4
AM
13196 /* Walk over each section attached to the input bfd. */
13197 for (section = input_bfd->sections;
13198 section != NULL;
13199 section = section->next)
13200 {
721956f4 13201 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13202
13203 /* If there aren't any relocs, then there's nothing more
13204 to do. */
13205 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13206 || (section->flags & SEC_ALLOC) == 0
13207 || (section->flags & SEC_LOAD) == 0
13208 || (section->flags & SEC_CODE) == 0
721956f4
AM
13209 || section->reloc_count == 0)
13210 continue;
13211
13212 /* If this section is a link-once section that will be
13213 discarded, then don't create any stubs. */
13214 if (section->output_section == NULL
927be08e 13215 || section->output_section->owner != info->output_bfd)
721956f4
AM
13216 continue;
13217
1e2f5b6e
AM
13218 /* Get the relocs. */
13219 internal_relocs
4ce794b7 13220 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13221 info->keep_memory);
721956f4 13222 if (internal_relocs == NULL)
1e2f5b6e 13223 goto error_ret_free_local;
721956f4
AM
13224
13225 /* Now examine each relocation. */
13226 irela = internal_relocs;
13227 irelaend = irela + section->reloc_count;
13228 for (; irela < irelaend; irela++)
13229 {
4ce794b7
AM
13230 enum elf_ppc64_reloc_type r_type;
13231 unsigned int r_indx;
721956f4
AM
13232 enum ppc_stub_type stub_type;
13233 struct ppc_stub_hash_entry *stub_entry;
8387904d 13234 asection *sym_sec, *code_sec;
e054468f 13235 bfd_vma sym_value, code_value;
721956f4 13236 bfd_vma destination;
6911b7dc 13237 unsigned long local_off;
8843416a 13238 bfd_boolean ok_dest;
721956f4 13239 struct ppc_link_hash_entry *hash;
8387904d 13240 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13241 struct elf_link_hash_entry *h;
13242 Elf_Internal_Sym *sym;
721956f4
AM
13243 char *stub_name;
13244 const asection *id_sec;
74f0fb50 13245 struct _opd_sec_data *opd;
e054468f 13246 struct plt_entry *plt_ent;
721956f4
AM
13247
13248 r_type = ELF64_R_TYPE (irela->r_info);
13249 r_indx = ELF64_R_SYM (irela->r_info);
13250
4ce794b7 13251 if (r_type >= R_PPC64_max)
721956f4
AM
13252 {
13253 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13254 goto error_ret_free_internal;
721956f4
AM
13255 }
13256
13257 /* Only look for stubs on branch instructions. */
4ce794b7 13258 if (r_type != R_PPC64_REL24
05d0e962 13259 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13260 && r_type != R_PPC64_REL14
13261 && r_type != R_PPC64_REL14_BRTAKEN
13262 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13263 continue;
13264
13265 /* Now determine the call target, its name, value,
13266 section. */
411e1bfb
AM
13267 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13268 r_indx, input_bfd))
13269 goto error_ret_free_internal;
ed7007c1 13270 hash = ppc_elf_hash_entry (h);
411e1bfb 13271
8843416a 13272 ok_dest = FALSE;
8387904d 13273 fdh = NULL;
7fe2b9a6 13274 sym_value = 0;
411e1bfb 13275 if (hash == NULL)
721956f4 13276 {
411e1bfb 13277 sym_value = sym->st_value;
c27b8c2a
AM
13278 if (sym_sec != NULL
13279 && sym_sec->output_section != NULL)
13280 ok_dest = TRUE;
721956f4 13281 }
7fe2b9a6
AM
13282 else if (hash->elf.root.type == bfd_link_hash_defined
13283 || hash->elf.root.type == bfd_link_hash_defweak)
13284 {
13285 sym_value = hash->elf.root.u.def.value;
13286 if (sym_sec->output_section != NULL)
13287 ok_dest = TRUE;
13288 }
13289 else if (hash->elf.root.type == bfd_link_hash_undefweak
13290 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13291 {
99877b66 13292 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13293 use the func descriptor sym instead if it is
13294 defined. */
ceb1f1ef 13295 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13296 && hash->oh != NULL)
8387904d 13297 {
8c5b4e52 13298 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13299 if (fdh->elf.root.type == bfd_link_hash_defined
13300 || fdh->elf.root.type == bfd_link_hash_defweak)
13301 {
13302 sym_sec = fdh->elf.root.u.def.section;
13303 sym_value = fdh->elf.root.u.def.value;
13304 if (sym_sec->output_section != NULL)
13305 ok_dest = TRUE;
13306 }
99877b66
AM
13307 else
13308 fdh = NULL;
8387904d 13309 }
7fe2b9a6
AM
13310 }
13311 else
13312 {
13313 bfd_set_error (bfd_error_bad_value);
13314 goto error_ret_free_internal;
721956f4
AM
13315 }
13316
8843416a 13317 destination = 0;
6911b7dc 13318 local_off = 0;
8843416a
AM
13319 if (ok_dest)
13320 {
13321 sym_value += irela->r_addend;
13322 destination = (sym_value
13323 + sym_sec->output_offset
13324 + sym_sec->output_section->vma);
6911b7dc
AM
13325 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13326 ? hash->elf.other
13327 : sym->st_other);
8843416a
AM
13328 }
13329
8387904d 13330 code_sec = sym_sec;
e054468f 13331 code_value = sym_value;
74f0fb50
AM
13332 opd = get_opd_info (sym_sec);
13333 if (opd != NULL)
8387904d
AM
13334 {
13335 bfd_vma dest;
13336
74f0fb50 13337 if (hash == NULL && opd->adjust != NULL)
8387904d 13338 {
51aecdc5 13339 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13340 if (adjust == -1)
13341 continue;
e054468f 13342 code_value += adjust;
8387904d
AM
13343 sym_value += adjust;
13344 }
13345 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13346 &code_sec, &code_value, FALSE);
8387904d
AM
13347 if (dest != (bfd_vma) -1)
13348 {
13349 destination = dest;
13350 if (fdh != NULL)
13351 {
13352 /* Fixup old ABI sym to point at code
13353 entry. */
99877b66 13354 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13355 hash->elf.root.u.def.section = code_sec;
e054468f 13356 hash->elf.root.u.def.value = code_value;
8387904d
AM
13357 }
13358 }
13359 }
13360
721956f4 13361 /* Determine what (if any) linker stub is needed. */
e054468f 13362 plt_ent = NULL;
721956f4 13363 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13364 &plt_ent, destination,
13365 local_off);
ad8e1ba5 13366
05d0e962
AM
13367 if (r_type == R_PPC64_REL24_NOTOC)
13368 {
13369 if (stub_type == ppc_stub_plt_call)
13370 stub_type = ppc_stub_plt_call_notoc;
13371 else if (stub_type == ppc_stub_long_branch
13372 || (code_sec != NULL
13373 && code_sec->output_section != NULL
13374 && (((hash ? hash->elf.other : sym->st_other)
13375 & STO_PPC64_LOCAL_MASK)
4a4e7361 13376 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13377 stub_type = ppc_stub_long_branch_notoc;
13378 }
13379 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13380 {
13381 /* Check whether we need a TOC adjusting stub.
13382 Since the linker pastes together pieces from
13383 different object files when creating the
13384 _init and _fini functions, it may be that a
13385 call to what looks like a local sym is in
13386 fact a call needing a TOC adjustment. */
33cb30a1
AM
13387 if ((code_sec != NULL
13388 && code_sec->output_section != NULL
13389 && (htab->sec_info[code_sec->id].toc_off
13390 != htab->sec_info[section->id].toc_off)
13391 && (code_sec->has_toc_reloc
13392 || code_sec->makes_toc_func_call))
13393 || (((hash ? hash->elf.other : sym->st_other)
13394 & STO_PPC64_LOCAL_MASK)
13395 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13396 stub_type = ppc_stub_long_branch_r2off;
13397 }
13398
721956f4
AM
13399 if (stub_type == ppc_stub_none)
13400 continue;
13401
411e1bfb
AM
13402 /* __tls_get_addr calls might be eliminated. */
13403 if (stub_type != ppc_stub_plt_call
05d0e962 13404 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13405 && hash != NULL
ed7007c1 13406 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13407 && section->has_tls_reloc
13408 && irela != internal_relocs)
13409 {
13410 /* Get tls info. */
f961d9dd 13411 unsigned char *tls_mask;
411e1bfb 13412
3a71aa26 13413 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13414 irela - 1, input_bfd))
13415 goto error_ret_free_internal;
abc489c6
AM
13416 if ((*tls_mask & TLS_TLS) != 0
13417 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13418 continue;
13419 }
13420
f378ab09 13421 if (stub_type == ppc_stub_plt_call)
794e51c0 13422 {
6e1816be
AM
13423 if (!htab->opd_abi
13424 && htab->params->plt_localentry0 != 0
13425 && is_elfv2_localentry0 (&hash->elf))
13426 htab->has_plt_localentry0 = 1;
13427 else if (irela + 1 < irelaend
13428 && irela[1].r_offset == irela->r_offset + 4
13429 && (ELF64_R_TYPE (irela[1].r_info)
13430 == R_PPC64_TOCSAVE))
f378ab09
AM
13431 {
13432 if (!tocsave_find (htab, INSERT,
13433 &local_syms, irela + 1, input_bfd))
13434 goto error_ret_free_internal;
13435 }
f378ab09
AM
13436 else
13437 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13438 }
3b421ab3 13439
721956f4 13440 /* Support for grouping stub sections. */
6f20ed8a 13441 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13442
13443 /* Get the name of this stub. */
13444 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13445 if (!stub_name)
13446 goto error_ret_free_internal;
13447
13448 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13449 stub_name, FALSE, FALSE);
721956f4
AM
13450 if (stub_entry != NULL)
13451 {
05d0e962 13452 enum ppc_stub_type old_type;
e10a07b3 13453
05d0e962
AM
13454 /* A stub has already been created, but it may
13455 not be the required type. We shouldn't be
13456 transitioning from plt_call to long_branch
13457 stubs or vice versa, but we might be
13458 upgrading from plt_call to plt_call_r2save or
13459 from long_branch to long_branch_r2off. */
721956f4 13460 free (stub_name);
e10a07b3
AM
13461 if (htab->params->power10_stubs == -1)
13462 {
13463 /* For --power10-stubs=auto, don't merge _notoc
13464 and other varieties of stubs. (The _both
13465 variety won't be created.) */
13466 bfd_boolean notoc = r_type == R_PPC64_REL24_NOTOC;
13467 struct ppc_stub_hash_entry *alt_stub
13468 = select_alt_stub (stub_entry, notoc);
13469
13470 if (alt_stub == NULL)
13471 {
13472 alt_stub = (struct ppc_stub_hash_entry *)
13473 stub_hash_newfunc (NULL,
13474 &htab->stub_hash_table,
13475 stub_entry->root.string);
13476 if (alt_stub == NULL)
13477 {
13478 /* xgettext:c-format */
13479 _bfd_error_handler
13480 (_("%pB: cannot create stub entry %s"),
13481 section->owner, stub_entry->root.string);
13482 goto error_ret_free_internal;
13483 }
13484 *alt_stub = *stub_entry;
13485 stub_entry->root.next = &alt_stub->root;
13486 if (notoc)
13487 /* Sort notoc stubs first, for no good
13488 reason. */
13489 alt_stub = stub_entry;
13490 alt_stub->stub_type = stub_type;
13491 }
13492 stub_entry = alt_stub;
13493 }
05d0e962
AM
13494 old_type = stub_entry->stub_type;
13495 switch (old_type)
13496 {
13497 default:
13498 abort ();
13499
13500 case ppc_stub_save_res:
13501 continue;
13502
13503 case ppc_stub_plt_call:
13504 case ppc_stub_plt_call_r2save:
13505 case ppc_stub_plt_call_notoc:
13506 case ppc_stub_plt_call_both:
13507 if (stub_type == ppc_stub_plt_call)
13508 continue;
13509 else if (stub_type == ppc_stub_plt_call_r2save)
13510 {
13511 if (old_type == ppc_stub_plt_call_notoc)
13512 stub_type = ppc_stub_plt_call_both;
13513 }
13514 else if (stub_type == ppc_stub_plt_call_notoc)
13515 {
13516 if (old_type == ppc_stub_plt_call_r2save)
13517 stub_type = ppc_stub_plt_call_both;
13518 }
13519 else
13520 abort ();
13521 break;
13522
13523 case ppc_stub_plt_branch:
13524 case ppc_stub_plt_branch_r2off:
13525 case ppc_stub_plt_branch_notoc:
13526 case ppc_stub_plt_branch_both:
13527 old_type += (ppc_stub_long_branch
13528 - ppc_stub_plt_branch);
13529 /* Fall through. */
13530 case ppc_stub_long_branch:
13531 case ppc_stub_long_branch_r2off:
13532 case ppc_stub_long_branch_notoc:
13533 case ppc_stub_long_branch_both:
13534 if (stub_type == ppc_stub_long_branch)
13535 continue;
13536 else if (stub_type == ppc_stub_long_branch_r2off)
13537 {
13538 if (old_type == ppc_stub_long_branch_notoc)
13539 stub_type = ppc_stub_long_branch_both;
13540 }
13541 else if (stub_type == ppc_stub_long_branch_notoc)
13542 {
13543 if (old_type == ppc_stub_long_branch_r2off)
13544 stub_type = ppc_stub_long_branch_both;
13545 }
13546 else
13547 abort ();
13548 break;
13549 }
13550 if (old_type < stub_type)
794e51c0 13551 stub_entry->stub_type = stub_type;
721956f4
AM
13552 continue;
13553 }
13554
25f53a85 13555 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13556 if (stub_entry == NULL)
13557 {
13558 free (stub_name);
6cdc0ccc
AM
13559 error_ret_free_internal:
13560 if (elf_section_data (section)->relocs == NULL)
13561 free (internal_relocs);
13562 error_ret_free_local:
c9594989
AM
13563 if (symtab_hdr->contents
13564 != (unsigned char *) local_syms)
6cdc0ccc 13565 free (local_syms);
b34976b6 13566 return FALSE;
721956f4
AM
13567 }
13568
ad8e1ba5 13569 stub_entry->stub_type = stub_type;
05d0e962
AM
13570 if (stub_type >= ppc_stub_plt_call
13571 && stub_type <= ppc_stub_plt_call_both)
e054468f 13572 {
05d0e962
AM
13573 stub_entry->target_value = sym_value;
13574 stub_entry->target_section = sym_sec;
e054468f
AM
13575 }
13576 else
13577 {
05d0e962
AM
13578 stub_entry->target_value = code_value;
13579 stub_entry->target_section = code_sec;
e054468f 13580 }
721956f4 13581 stub_entry->h = hash;
e054468f 13582 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13583 stub_entry->symtype
13584 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13585 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13586
3d58e1fc
AM
13587 if (hash != NULL
13588 && (hash->elf.root.type == bfd_link_hash_defined
13589 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13590 htab->stub_globals += 1;
721956f4
AM
13591 }
13592
13593 /* We're done with the internal relocs, free them. */
6cdc0ccc 13594 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13595 free (internal_relocs);
721956f4 13596 }
6cdc0ccc
AM
13597
13598 if (local_syms != NULL
13599 && symtab_hdr->contents != (unsigned char *) local_syms)
13600 {
13601 if (!info->keep_memory)
13602 free (local_syms);
13603 else
13604 symtab_hdr->contents = (unsigned char *) local_syms;
13605 }
721956f4
AM
13606 }
13607
5c3dead3 13608 /* We may have added some stubs. Find out the new size of the
721956f4 13609 stub sections. */
d4aaa2a0 13610 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13611 {
13612 group->lr_restore = 0;
13613 group->eh_size = 0;
13614 if (group->stub_sec != NULL)
13615 {
13616 asection *stub_sec = group->stub_sec;
13617
13618 if (htab->stub_iteration <= STUB_SHRINK_ITER
13619 || stub_sec->rawsize < stub_sec->size)
13620 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13621 stub_sec->rawsize = stub_sec->size;
13622 stub_sec->size = 0;
13623 stub_sec->reloc_count = 0;
13624 stub_sec->flags &= ~SEC_RELOC;
13625 }
13626 }
a804e476
AM
13627 if (htab->tga_group != NULL)
13628 {
13629 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13630 htab->tga_group->eh_size
13631 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13632 htab->tga_group->lr_restore = 23 * 4;
13633 htab->tga_group->stub_sec->size = 24 * 4;
13634 }
eea6121a 13635
ba21f564
AM
13636 if (htab->stub_iteration <= STUB_SHRINK_ITER
13637 || htab->brlt->rawsize < htab->brlt->size)
13638 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13639 htab->brlt->size = 0;
84f5d08e
AM
13640 htab->brlt->reloc_count = 0;
13641 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13642 if (htab->relbrlt != NULL)
eea6121a 13643 htab->relbrlt->size = 0;
721956f4 13644
63bc6f6c 13645 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13646
a4b6fadd
AM
13647 for (group = htab->group; group != NULL; group = group->next)
13648 if (group->needs_save_res)
13649 group->stub_sec->size += htab->sfpr->size;
13650
176a0d42
AM
13651 if (info->emitrelocations
13652 && htab->glink != NULL && htab->glink->size != 0)
13653 {
13654 htab->glink->reloc_count = 1;
13655 htab->glink->flags |= SEC_RELOC;
13656 }
13657
58d180e8
AM
13658 if (htab->glink_eh_frame != NULL
13659 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13660 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13661 {
2e0ce1c8 13662 size_t size = 0, align = 4;
58d180e8 13663
d4aaa2a0 13664 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13665 if (group->eh_size != 0)
13666 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13667 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13668 size += (24 + align - 1) & -align;
58d180e8 13669 if (size != 0)
2e0ce1c8
AM
13670 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13671 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13672 size = (size + align - 1) & -align;
58d180e8
AM
13673 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13674 htab->glink_eh_frame->size = size;
13675 }
13676
e7d1c40c 13677 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13678 for (group = htab->group; group != NULL; group = group->next)
13679 if (group->stub_sec != NULL)
691d2e9a
AM
13680 {
13681 int align = abs (htab->params->plt_stub_align);
13682 group->stub_sec->size
13683 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13684 }
d4aaa2a0
AM
13685
13686 for (group = htab->group; group != NULL; group = group->next)
13687 if (group->stub_sec != NULL
13688 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13689 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13690 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13691 break;
13692
d4aaa2a0 13693 if (group == NULL
ba21f564
AM
13694 && (htab->brlt->rawsize == htab->brlt->size
13695 || (htab->stub_iteration > STUB_SHRINK_ITER
13696 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13697 && (htab->glink_eh_frame == NULL
a804e476
AM
13698 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13699 && (htab->tga_group == NULL
13700 || htab->stub_iteration > 1))
5c3dead3
AM
13701 break;
13702
721956f4 13703 /* Ask the linker to do its stuff. */
e7d1c40c 13704 (*htab->params->layout_sections_again) ();
721956f4
AM
13705 }
13706
da44f4e5
AM
13707 if (htab->glink_eh_frame != NULL
13708 && htab->glink_eh_frame->size != 0)
13709 {
13710 bfd_vma val;
13711 bfd_byte *p, *last_fde;
13712 size_t last_fde_len, size, align, pad;
d4aaa2a0 13713 struct map_stub *group;
da44f4e5 13714
df136d64
AM
13715 /* It is necessary to at least have a rough outline of the
13716 linker generated CIEs and FDEs written before
13717 bfd_elf_discard_info is run, in order for these FDEs to be
13718 indexed in .eh_frame_hdr. */
da44f4e5
AM
13719 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13720 if (p == NULL)
13721 return FALSE;
13722 htab->glink_eh_frame->contents = p;
13723 last_fde = p;
2e0ce1c8 13724 align = 4;
da44f4e5
AM
13725
13726 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13727 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13728 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13729 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13730 p += last_fde_len + 4;
da44f4e5 13731
d4aaa2a0 13732 for (group = htab->group; group != NULL; group = group->next)
df136d64 13733 if (group->eh_size != 0)
da44f4e5 13734 {
df136d64 13735 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13736 last_fde = p;
df136d64 13737 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13738 /* FDE length. */
2e0ce1c8 13739 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13740 p += 4;
13741 /* CIE pointer. */
13742 val = p - htab->glink_eh_frame->contents;
13743 bfd_put_32 (htab->elf.dynobj, val, p);
13744 p += 4;
13745 /* Offset to stub section, written later. */
13746 p += 4;
13747 /* stub section size. */
d4aaa2a0 13748 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13749 p += 4;
13750 /* Augmentation. */
13751 p += 1;
df136d64
AM
13752 /* Make sure we don't have all nops. This is enough for
13753 elf-eh-frame.c to detect the last non-nop opcode. */
13754 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13755 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13756 }
13757 if (htab->glink != NULL && htab->glink->size != 0)
13758 {
13759 last_fde = p;
2e0ce1c8 13760 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13761 /* FDE length. */
2e0ce1c8 13762 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13763 p += 4;
13764 /* CIE pointer. */
13765 val = p - htab->glink_eh_frame->contents;
13766 bfd_put_32 (htab->elf.dynobj, val, p);
13767 p += 4;
13768 /* Offset to .glink, written later. */
13769 p += 4;
13770 /* .glink size. */
13771 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13772 p += 4;
13773 /* Augmentation. */
13774 p += 1;
13775
13776 *p++ = DW_CFA_advance_loc + 1;
13777 *p++ = DW_CFA_register;
13778 *p++ = 65;
9f08fa5c 13779 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13780 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13781 *p++ = DW_CFA_restore_extended;
13782 *p++ = 65;
2e0ce1c8 13783 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13784 }
13785 /* Subsume any padding into the last FDE if user .eh_frame
13786 sections are aligned more than glink_eh_frame. Otherwise any
13787 zero padding will be seen as a terminator. */
2e0ce1c8 13788 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13789 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13790 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13791 htab->glink_eh_frame->size = size + pad;
13792 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13793 }
13794
d969d15f 13795 maybe_strip_output (info, htab->brlt);
2efec98b
AM
13796 if (htab->relbrlt != NULL)
13797 maybe_strip_output (info, htab->relbrlt);
d969d15f
AM
13798 if (htab->glink_eh_frame != NULL)
13799 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13800
b34976b6 13801 return TRUE;
721956f4
AM
13802}
13803
13804/* Called after we have determined section placement. If sections
805fc799 13805 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13806
805fc799 13807bfd_vma
1c865ab2 13808ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13809{
805fc799 13810 asection *s;
a27e685f 13811 bfd_vma TOCstart, adjust;
721956f4 13812
43417696
AM
13813 if (info != NULL)
13814 {
13815 struct elf_link_hash_entry *h;
13816 struct elf_link_hash_table *htab = elf_hash_table (info);
13817
13818 if (is_elf_hash_table (htab)
13819 && htab->hgot != NULL)
13820 h = htab->hgot;
13821 else
13822 {
13823 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13824 if (is_elf_hash_table (htab))
13825 htab->hgot = h;
13826 }
13827 if (h != NULL
13828 && h->root.type == bfd_link_hash_defined
13829 && !h->root.linker_def
13830 && (!is_elf_hash_table (htab)
13831 || h->def_regular))
13832 {
ed7007c1 13833 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13834 _bfd_set_gp_value (obfd, TOCstart);
13835 return TOCstart;
13836 }
13837 }
13838
805fc799
AM
13839 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13840 order. The TOC starts where the first of these sections starts. */
13841 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13842 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13843 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13844 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13845 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13846 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13847 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13848 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13849 {
13850 /* This may happen for
13851 o references to TOC base (SYM@toc / TOC[tc0]) without a
13852 .toc directive
13853 o bad linker script
13854 o --gc-sections and empty TOC sections
13855
13856 FIXME: Warn user? */
13857
13858 /* Look for a likely section. We probably won't even be
13859 using TOCstart. */
13860 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13861 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13862 | SEC_EXCLUDE))
805fc799
AM
13863 == (SEC_ALLOC | SEC_SMALL_DATA))
13864 break;
721956f4 13865 if (s == NULL)
805fc799 13866 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13867 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13868 == (SEC_ALLOC | SEC_SMALL_DATA))
13869 break;
721956f4 13870 if (s == NULL)
805fc799 13871 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13872 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13873 == SEC_ALLOC)
805fc799 13874 break;
721956f4 13875 if (s == NULL)
805fc799 13876 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13877 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13878 break;
13879 }
721956f4 13880
805fc799
AM
13881 TOCstart = 0;
13882 if (s != NULL)
13883 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13884
a27e685f
AM
13885 /* Force alignment. */
13886 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13887 TOCstart -= adjust;
1c865ab2
AM
13888 _bfd_set_gp_value (obfd, TOCstart);
13889
810d4e75 13890 if (info != NULL && s != NULL)
1c865ab2
AM
13891 {
13892 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13893
810d4e75
AM
13894 if (htab != NULL)
13895 {
13896 if (htab->elf.hgot != NULL)
13897 {
a27e685f 13898 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13899 htab->elf.hgot->root.u.def.section = s;
13900 }
13901 }
13902 else
1c865ab2 13903 {
810d4e75
AM
13904 struct bfd_link_hash_entry *bh = NULL;
13905 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13906 s, TOC_BASE_OFF - adjust,
13907 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13908 }
13909 }
805fc799 13910 return TOCstart;
721956f4
AM
13911}
13912
a345bc8d 13913/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13914 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13915
13916static bfd_boolean
49c09209 13917build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13918{
13919 struct bfd_link_info *info;
13920 struct ppc_link_hash_table *htab;
49c09209 13921 struct plt_entry *ent;
a345bc8d
AM
13922 asection *s;
13923
13924 if (h->root.type == bfd_link_hash_indirect)
13925 return TRUE;
13926
49c09209
AM
13927 info = inf;
13928 htab = ppc_hash_table (info);
13929 if (htab == NULL)
13930 return FALSE;
13931
13932 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13933 if (ent->plt.offset != (bfd_vma) -1)
13934 {
13935 /* This symbol has an entry in the procedure linkage
13936 table. Set it up. */
13937 Elf_Internal_Rela rela;
2d7ad24e 13938 asection *plt, *relplt;
49c09209
AM
13939 bfd_byte *loc;
13940
13941 if (!htab->elf.dynamic_sections_created
13942 || h->dynindx == -1)
13943 {
13944 if (!(h->def_regular
13945 && (h->root.type == bfd_link_hash_defined
13946 || h->root.type == bfd_link_hash_defweak)))
13947 continue;
2d7ad24e
AM
13948 if (h->type == STT_GNU_IFUNC)
13949 {
13950 plt = htab->elf.iplt;
13951 relplt = htab->elf.irelplt;
cebd6b8a 13952 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
13953 if (htab->opd_abi)
13954 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13955 else
13956 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13957 }
49c09209 13958 else
2d7ad24e
AM
13959 {
13960 plt = htab->pltlocal;
13961 if (bfd_link_pic (info))
13962 {
13963 relplt = htab->relpltlocal;
13964 if (htab->opd_abi)
13965 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13966 else
13967 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13968 }
13969 else
13970 relplt = NULL;
13971 }
ed7007c1 13972 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
13973
13974 if (relplt == NULL)
13975 {
13976 loc = plt->contents + ent->plt.offset;
13977 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13978 if (htab->opd_abi)
13979 {
13980 bfd_vma toc = elf_gp (info->output_bfd);
13981 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13982 bfd_put_64 (info->output_bfd, toc, loc + 8);
13983 }
13984 }
13985 else
13986 {
13987 rela.r_offset = (plt->output_section->vma
13988 + plt->output_offset
13989 + ent->plt.offset);
13990 loc = relplt->contents + (relplt->reloc_count++
13991 * sizeof (Elf64_External_Rela));
13992 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13993 }
49c09209
AM
13994 }
13995 else
13996 {
13997 rela.r_offset = (htab->elf.splt->output_section->vma
13998 + htab->elf.splt->output_offset
13999 + ent->plt.offset);
14000 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
14001 rela.r_addend = ent->addend;
14002 loc = (htab->elf.srelplt->contents
14003 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
14004 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
14005 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
cebd6b8a 14006 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e 14007 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 14008 }
49c09209
AM
14009 }
14010
a345bc8d
AM
14011 if (!h->pointer_equality_needed)
14012 return TRUE;
14013
14014 if (h->def_regular)
14015 return TRUE;
14016
9e390558 14017 s = htab->global_entry;
49c09209
AM
14018 if (s == NULL || s->size == 0)
14019 return TRUE;
14020
14021 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
14022 if (ent->plt.offset != (bfd_vma) -1
14023 && ent->addend == 0)
a345bc8d
AM
14024 {
14025 bfd_byte *p;
14026 asection *plt;
14027 bfd_vma off;
14028
a345bc8d 14029 p = s->contents + h->root.u.def.value;
33e44f2e 14030 plt = htab->elf.splt;
a345bc8d
AM
14031 if (!htab->elf.dynamic_sections_created
14032 || h->dynindx == -1)
2d7ad24e
AM
14033 {
14034 if (h->type == STT_GNU_IFUNC)
14035 plt = htab->elf.iplt;
14036 else
14037 plt = htab->pltlocal;
14038 }
49c09209 14039 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
14040 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
14041
14042 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
14043 {
14044 info->callbacks->einfo
c1c8c1ef 14045 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
14046 h->root.root.string);
14047 bfd_set_error (bfd_error_bad_value);
14048 htab->stub_error = TRUE;
14049 }
14050
7341d5e2
AM
14051 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14052 if (htab->params->emit_stub_syms)
14053 {
14054 size_t len = strlen (h->root.root.string);
14055 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14056
14057 if (name == NULL)
14058 return FALSE;
14059
14060 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14061 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14062 if (h == NULL)
14063 return FALSE;
14064 if (h->root.type == bfd_link_hash_new)
14065 {
14066 h->root.type = bfd_link_hash_defined;
14067 h->root.u.def.section = s;
14068 h->root.u.def.value = p - s->contents;
14069 h->ref_regular = 1;
14070 h->def_regular = 1;
14071 h->ref_regular_nonweak = 1;
14072 h->forced_local = 1;
14073 h->non_elf = 0;
2ec55de3 14074 h->root.linker_def = 1;
7341d5e2
AM
14075 }
14076 }
14077
a345bc8d
AM
14078 if (PPC_HA (off) != 0)
14079 {
14080 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14081 p += 4;
14082 }
14083 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14084 p += 4;
14085 bfd_put_32 (s->owner, MTCTR_R12, p);
14086 p += 4;
407aa07c 14087 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14088 break;
14089 }
14090 return TRUE;
14091}
14092
49c09209
AM
14093/* Write PLT relocs for locals. */
14094
14095static bfd_boolean
14096write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14097{
14098 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14099 bfd *ibfd;
14100
14101 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14102 {
14103 struct got_entry **lgot_ents, **end_lgot_ents;
14104 struct plt_entry **local_plt, **lplt, **end_local_plt;
14105 Elf_Internal_Shdr *symtab_hdr;
14106 bfd_size_type locsymcount;
14107 Elf_Internal_Sym *local_syms = NULL;
14108 struct plt_entry *ent;
14109
14110 if (!is_ppc64_elf (ibfd))
14111 continue;
14112
14113 lgot_ents = elf_local_got_ents (ibfd);
14114 if (!lgot_ents)
14115 continue;
14116
14117 symtab_hdr = &elf_symtab_hdr (ibfd);
14118 locsymcount = symtab_hdr->sh_info;
14119 end_lgot_ents = lgot_ents + locsymcount;
14120 local_plt = (struct plt_entry **) end_lgot_ents;
14121 end_local_plt = local_plt + locsymcount;
14122 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14123 for (ent = *lplt; ent != NULL; ent = ent->next)
14124 if (ent->plt.offset != (bfd_vma) -1)
14125 {
14126 Elf_Internal_Sym *sym;
14127 asection *sym_sec;
14128 asection *plt, *relplt;
14129 bfd_byte *loc;
14130 bfd_vma val;
49c09209
AM
14131
14132 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14133 lplt - local_plt, ibfd))
14134 {
c9594989 14135 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
14136 free (local_syms);
14137 return FALSE;
14138 }
14139
14140 val = sym->st_value + ent->addend;
ba85c15d
AM
14141 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14142 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14143 if (sym_sec != NULL && sym_sec->output_section != NULL)
14144 val += sym_sec->output_offset + sym_sec->output_section->vma;
14145
2d7ad24e
AM
14146 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14147 {
cebd6b8a 14148 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
14149 plt = htab->elf.iplt;
14150 relplt = htab->elf.irelplt;
14151 }
14152 else
14153 {
14154 plt = htab->pltlocal;
14155 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14156 }
49c09209 14157
2d7ad24e
AM
14158 if (relplt == NULL)
14159 {
14160 loc = plt->contents + ent->plt.offset;
14161 bfd_put_64 (info->output_bfd, val, loc);
14162 if (htab->opd_abi)
14163 {
14164 bfd_vma toc = elf_gp (ibfd);
14165 bfd_put_64 (info->output_bfd, toc, loc + 8);
14166 }
14167 }
49c09209 14168 else
2d7ad24e
AM
14169 {
14170 Elf_Internal_Rela rela;
14171 rela.r_offset = (ent->plt.offset
14172 + plt->output_offset
14173 + plt->output_section->vma);
14174 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14175 {
14176 if (htab->opd_abi)
14177 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14178 else
14179 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14180 }
14181 else
14182 {
14183 if (htab->opd_abi)
14184 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14185 else
14186 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14187 }
14188 rela.r_addend = val;
14189 loc = relplt->contents + (relplt->reloc_count++
14190 * sizeof (Elf64_External_Rela));
14191 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14192 }
49c09209
AM
14193 }
14194
14195 if (local_syms != NULL
14196 && symtab_hdr->contents != (unsigned char *) local_syms)
14197 {
14198 if (!info->keep_memory)
14199 free (local_syms);
14200 else
14201 symtab_hdr->contents = (unsigned char *) local_syms;
14202 }
14203 }
14204 return TRUE;
14205}
14206
a804e476
AM
14207/* Emit the static wrapper function preserving registers around a
14208 __tls_get_addr_opt call. */
14209
14210static bfd_boolean
14211emit_tga_desc (struct ppc_link_hash_table *htab)
14212{
14213 asection *stub_sec = htab->tga_group->stub_sec;
14214 unsigned int cfa_updt = 11 * 4;
14215 bfd_byte *p;
14216 bfd_vma to, from, delta;
14217
14218 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14219 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14220 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14221 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14222 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14223 delta = to - from;
14224 if (delta + (1 << 25) >= 1 << 26)
14225 {
14226 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14227 htab->stub_error = TRUE;
14228 return FALSE;
14229 }
14230
14231 p = stub_sec->contents;
14232 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14233 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14234 p += 4;
14235 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14236 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14237}
14238
14239/* Emit eh_frame describing the static wrapper function. */
14240
14241static bfd_byte *
14242emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14243{
14244 unsigned int cfa_updt = 11 * 4;
14245 unsigned int i;
14246
14247 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14248 *p++ = DW_CFA_def_cfa_offset;
14249 if (htab->opd_abi)
14250 {
14251 *p++ = 128;
14252 *p++ = 1;
14253 }
14254 else
14255 *p++ = 96;
14256 *p++ = DW_CFA_offset_extended_sf;
14257 *p++ = 65;
14258 *p++ = (-16 / 8) & 0x7f;
14259 for (i = 4; i < 12; i++)
14260 {
14261 *p++ = DW_CFA_offset + i;
14262 *p++ = (htab->opd_abi ? 13 : 12) - i;
14263 }
14264 *p++ = DW_CFA_advance_loc + 10;
14265 *p++ = DW_CFA_def_cfa_offset;
14266 *p++ = 0;
14267 for (i = 4; i < 12; i++)
14268 *p++ = DW_CFA_restore + i;
14269 *p++ = DW_CFA_advance_loc + 2;
14270 *p++ = DW_CFA_restore_extended;
14271 *p++ = 65;
14272 return p;
14273}
14274
721956f4
AM
14275/* Build all the stubs associated with the current output file.
14276 The stubs are kept in a hash table attached to the main linker
14277 hash table. This function is called via gldelf64ppc_finish. */
14278
b34976b6 14279bfd_boolean
e7d1c40c 14280ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14281 char **stats)
5d1634d7
AM
14282{
14283 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14284 struct map_stub *group;
721956f4 14285 asection *stub_sec;
5d1634d7 14286 bfd_byte *p;
e717da7e 14287 int stub_sec_count = 0;
5d1634d7 14288
4dfe6ac6
NC
14289 if (htab == NULL)
14290 return FALSE;
14291
eea6121a 14292 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14293 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14294 {
14295 group->eh_size = 0;
14296 group->lr_restore = 0;
14297 if ((stub_sec = group->stub_sec) != NULL
14298 && stub_sec->size != 0)
14299 {
14300 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14301 stub_sec->size);
14302 if (stub_sec->contents == NULL)
14303 return FALSE;
14304 stub_sec->size = 0;
14305 }
14306 }
5d1634d7 14307
23eb7e01 14308 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14309 {
9f951329 14310 unsigned int indx;
ad8e1ba5 14311 bfd_vma plt0;
9f951329 14312
721956f4 14313 /* Build the .glink plt call stub. */
e7d1c40c 14314 if (htab->params->emit_stub_syms)
97b639ba
AM
14315 {
14316 struct elf_link_hash_entry *h;
468392fb
AM
14317 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14318 TRUE, FALSE, FALSE);
97b639ba
AM
14319 if (h == NULL)
14320 return FALSE;
14321 if (h->root.type == bfd_link_hash_new)
14322 {
14323 h->root.type = bfd_link_hash_defined;
14324 h->root.u.def.section = htab->glink;
ee4bf8d2 14325 h->root.u.def.value = 8;
f5385ebf
AM
14326 h->ref_regular = 1;
14327 h->def_regular = 1;
14328 h->ref_regular_nonweak = 1;
14329 h->forced_local = 1;
14330 h->non_elf = 0;
2ec55de3 14331 h->root.linker_def = 1;
97b639ba
AM
14332 }
14333 }
33e44f2e
AM
14334 plt0 = (htab->elf.splt->output_section->vma
14335 + htab->elf.splt->output_offset
14336 - 16);
176a0d42
AM
14337 if (info->emitrelocations)
14338 {
14339 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14340 if (r == NULL)
14341 return FALSE;
14342 r->r_offset = (htab->glink->output_offset
14343 + htab->glink->output_section->vma);
14344 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14345 r->r_addend = plt0;
14346 }
4ce794b7 14347 p = htab->glink->contents;
176a0d42 14348 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14349 bfd_put_64 (htab->glink->owner, plt0, p);
14350 p += 8;
b9e5796b
AM
14351 if (htab->opd_abi)
14352 {
14353 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14354 p += 4;
14355 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14356 p += 4;
14357 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14358 p += 4;
14359 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14360 p += 4;
14361 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14362 p += 4;
14363 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14364 p += 4;
14365 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14366 p += 4;
14367 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14368 p += 4;
14369 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14370 p += 4;
14371 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14372 p += 4;
14373 }
14374 else
14375 {
14376 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14377 p += 4;
14378 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14379 p += 4;
14380 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14381 p += 4;
f378ab09
AM
14382 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14383 p += 4;
b9e5796b
AM
14384 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14385 p += 4;
14386 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14387 p += 4;
14388 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14389 p += 4;
14390 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14391 p += 4;
14392 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14393 p += 4;
14394 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14395 p += 4;
14396 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14397 p += 4;
14398 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14399 p += 4;
14400 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14401 p += 4;
14402 }
407aa07c
AM
14403 bfd_put_32 (htab->glink->owner, BCTR, p);
14404 p += 4;
c75bc4f7 14405 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14406
9f951329
AM
14407 /* Build the .glink lazy link call stubs. */
14408 indx = 0;
9e390558 14409 while (p < htab->glink->contents + htab->glink->size)
9f951329 14410 {
b9e5796b 14411 if (htab->opd_abi)
9f951329 14412 {
b9e5796b
AM
14413 if (indx < 0x8000)
14414 {
14415 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14416 p += 4;
14417 }
14418 else
14419 {
14420 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14421 p += 4;
14422 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14423 p);
14424 p += 4;
14425 }
9f951329 14426 }
4ce794b7 14427 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14428 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14429 indx++;
9f951329
AM
14430 p += 4;
14431 }
5d1634d7 14432 }
5d1634d7 14433
a804e476
AM
14434 if (htab->tga_group != NULL)
14435 {
14436 htab->tga_group->lr_restore = 23 * 4;
14437 htab->tga_group->stub_sec->size = 24 * 4;
14438 if (!emit_tga_desc (htab))
14439 return FALSE;
14440 if (htab->glink_eh_frame != NULL
14441 && htab->glink_eh_frame->size != 0)
14442 {
14443 size_t align = 4;
14444
14445 p = htab->glink_eh_frame->contents;
14446 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14447 p += 17;
14448 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14449 }
14450 }
14451
49c09209
AM
14452 /* Build .glink global entry stubs, and PLT relocs for globals. */
14453 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14454
14455 if (!write_plt_relocs_for_local_syms (info))
14456 return FALSE;
9e390558 14457
7341d5e2 14458 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14459 {
4ce794b7 14460 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14461 htab->brlt->size);
4ce794b7 14462 if (htab->brlt->contents == NULL)
b34976b6 14463 return FALSE;
721956f4 14464 }
ee75fd95 14465 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14466 {
14467 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14468 htab->relbrlt->size);
63bc6f6c
AM
14469 if (htab->relbrlt->contents == NULL)
14470 return FALSE;
14471 }
5d1634d7 14472
721956f4
AM
14473 /* Build the stubs as directed by the stub hash table. */
14474 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14475
a4b6fadd
AM
14476 for (group = htab->group; group != NULL; group = group->next)
14477 if (group->needs_save_res)
7dda8d3c 14478 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14479
aa8a7074
AM
14480 if (htab->relbrlt != NULL)
14481 htab->relbrlt->reloc_count = 0;
14482
e7d1c40c 14483 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14484 for (group = htab->group; group != NULL; group = group->next)
14485 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14486 {
14487 int align = abs (htab->params->plt_stub_align);
14488 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14489 }
794e51c0 14490
7dda8d3c
AM
14491 for (group = htab->group; group != NULL; group = group->next)
14492 if (group->needs_save_res)
14493 {
14494 stub_sec = group->stub_sec;
14495 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14496 htab->sfpr->contents, htab->sfpr->size);
14497 if (htab->params->emit_stub_syms)
14498 {
14499 unsigned int i;
14500
14501 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14502 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14503 return FALSE;
14504 }
14505 }
14506
df136d64
AM
14507 if (htab->glink_eh_frame != NULL
14508 && htab->glink_eh_frame->size != 0)
14509 {
14510 bfd_vma val;
14511 size_t align = 4;
14512
14513 p = htab->glink_eh_frame->contents;
14514 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14515
14516 for (group = htab->group; group != NULL; group = group->next)
14517 if (group->eh_size != 0)
14518 {
14519 /* Offset to stub section. */
14520 val = (group->stub_sec->output_section->vma
14521 + group->stub_sec->output_offset);
14522 val -= (htab->glink_eh_frame->output_section->vma
14523 + htab->glink_eh_frame->output_offset
14524 + (p + 8 - htab->glink_eh_frame->contents));
14525 if (val + 0x80000000 > 0xffffffff)
14526 {
14527 _bfd_error_handler
14528 (_("%s offset too large for .eh_frame sdata4 encoding"),
14529 group->stub_sec->name);
14530 return FALSE;
14531 }
14532 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14533 p += (group->eh_size + 17 + 3) & -4;
14534 }
14535 if (htab->glink != NULL && htab->glink->size != 0)
14536 {
14537 /* Offset to .glink. */
14538 val = (htab->glink->output_section->vma
14539 + htab->glink->output_offset
14540 + 8);
14541 val -= (htab->glink_eh_frame->output_section->vma
14542 + htab->glink_eh_frame->output_offset
14543 + (p + 8 - htab->glink_eh_frame->contents));
14544 if (val + 0x80000000 > 0xffffffff)
14545 {
14546 _bfd_error_handler
14547 (_("%s offset too large for .eh_frame sdata4 encoding"),
14548 htab->glink->name);
14549 return FALSE;
14550 }
14551 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14552 p += (24 + align - 1) & -align;
14553 }
14554 }
14555
d4aaa2a0
AM
14556 for (group = htab->group; group != NULL; group = group->next)
14557 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14558 {
14559 stub_sec_count += 1;
c9301e31
AM
14560 if (stub_sec->rawsize != stub_sec->size
14561 && (htab->stub_iteration <= STUB_SHRINK_ITER
14562 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14563 break;
14564 }
5d1634d7 14565
25516cc5 14566 if (group != NULL)
5d1634d7 14567 {
b34976b6 14568 htab->stub_error = TRUE;
cf97bcb0 14569 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14570 }
721956f4 14571
d2a300cf
AM
14572 if (htab->stub_error)
14573 return FALSE;
14574
14575 if (stats != NULL)
14576 {
988b7300
AM
14577 char *groupmsg;
14578 if (asprintf (&groupmsg,
14579 ngettext ("linker stubs in %u group\n",
14580 "linker stubs in %u groups\n",
14581 stub_sec_count),
14582 stub_sec_count) < 0)
14583 *stats = NULL;
14584 else
14585 {
14586 if (asprintf (stats, _("%s"
14587 " branch %lu\n"
14588 " branch toc adj %lu\n"
14589 " branch notoc %lu\n"
14590 " branch both %lu\n"
14591 " long branch %lu\n"
14592 " long toc adj %lu\n"
14593 " long notoc %lu\n"
14594 " long both %lu\n"
14595 " plt call %lu\n"
14596 " plt call save %lu\n"
14597 " plt call notoc %lu\n"
14598 " plt call both %lu\n"
14599 " global entry %lu"),
14600 groupmsg,
14601 htab->stub_count[ppc_stub_long_branch - 1],
14602 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14603 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14604 htab->stub_count[ppc_stub_long_branch_both - 1],
14605 htab->stub_count[ppc_stub_plt_branch - 1],
14606 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14607 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14608 htab->stub_count[ppc_stub_plt_branch_both - 1],
14609 htab->stub_count[ppc_stub_plt_call - 1],
14610 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14611 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14612 htab->stub_count[ppc_stub_plt_call_both - 1],
14613 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14614 *stats = NULL;
14615 free (groupmsg);
14616 }
d2a300cf
AM
14617 }
14618 return TRUE;
5bd4f169
AM
14619}
14620
60124e18
AM
14621/* What to do when ld finds relocations against symbols defined in
14622 discarded sections. */
14623
14624static unsigned int
14625ppc64_elf_action_discarded (asection *sec)
14626{
14627 if (strcmp (".opd", sec->name) == 0)
14628 return 0;
14629
14630 if (strcmp (".toc", sec->name) == 0)
14631 return 0;
14632
bce50a28
JJ
14633 if (strcmp (".toc1", sec->name) == 0)
14634 return 0;
14635
60124e18
AM
14636 return _bfd_elf_default_action_discarded (sec);
14637}
14638
e59a1001
AM
14639/* These are the dynamic relocations supported by glibc. */
14640
14641static bfd_boolean
14642ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14643{
14644 switch (r_type)
14645 {
14646 case R_PPC64_RELATIVE:
14647 case R_PPC64_NONE:
14648 case R_PPC64_ADDR64:
14649 case R_PPC64_GLOB_DAT:
14650 case R_PPC64_IRELATIVE:
14651 case R_PPC64_JMP_IREL:
14652 case R_PPC64_JMP_SLOT:
14653 case R_PPC64_DTPMOD64:
14654 case R_PPC64_DTPREL64:
14655 case R_PPC64_TPREL64:
14656 case R_PPC64_TPREL16_LO_DS:
14657 case R_PPC64_TPREL16_DS:
14658 case R_PPC64_TPREL16:
14659 case R_PPC64_TPREL16_LO:
14660 case R_PPC64_TPREL16_HI:
14661 case R_PPC64_TPREL16_HIGH:
14662 case R_PPC64_TPREL16_HA:
14663 case R_PPC64_TPREL16_HIGHA:
14664 case R_PPC64_TPREL16_HIGHER:
14665 case R_PPC64_TPREL16_HIGHEST:
14666 case R_PPC64_TPREL16_HIGHERA:
14667 case R_PPC64_TPREL16_HIGHESTA:
14668 case R_PPC64_ADDR16_LO_DS:
14669 case R_PPC64_ADDR16_LO:
14670 case R_PPC64_ADDR16_HI:
14671 case R_PPC64_ADDR16_HIGH:
14672 case R_PPC64_ADDR16_HA:
14673 case R_PPC64_ADDR16_HIGHA:
14674 case R_PPC64_REL30:
14675 case R_PPC64_COPY:
14676 case R_PPC64_UADDR64:
14677 case R_PPC64_UADDR32:
14678 case R_PPC64_ADDR32:
14679 case R_PPC64_ADDR24:
14680 case R_PPC64_ADDR16:
14681 case R_PPC64_UADDR16:
14682 case R_PPC64_ADDR16_DS:
14683 case R_PPC64_ADDR16_HIGHER:
14684 case R_PPC64_ADDR16_HIGHEST:
14685 case R_PPC64_ADDR16_HIGHERA:
14686 case R_PPC64_ADDR16_HIGHESTA:
14687 case R_PPC64_ADDR14:
14688 case R_PPC64_ADDR14_BRTAKEN:
14689 case R_PPC64_ADDR14_BRNTAKEN:
14690 case R_PPC64_REL32:
14691 case R_PPC64_REL64:
14692 return TRUE;
14693
14694 default:
14695 return FALSE;
14696 }
14697}
14698
5bd4f169
AM
14699/* The RELOCATE_SECTION function is called by the ELF backend linker
14700 to handle the relocations for a section.
14701
14702 The relocs are always passed as Rela structures; if the section
14703 actually uses Rel structures, the r_addend field will always be
14704 zero.
14705
14706 This function is responsible for adjust the section contents as
14707 necessary, and (if using Rela relocs and generating a
1049f94e 14708 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14709 necessary.
14710
14711 This function does not have to worry about setting the reloc
14712 address or the reloc symbol index.
14713
14714 LOCAL_SYMS is a pointer to the swapped in local symbols.
14715
14716 LOCAL_SECTIONS is an array giving the section in the input file
14717 corresponding to the st_shndx field of each local symbol.
14718
14719 The global hash table entry for the global symbols can be found
14720 via elf_sym_hashes (input_bfd).
14721
1049f94e 14722 When generating relocatable output, this function must handle
5bd4f169
AM
14723 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14724 going to be the section symbol corresponding to the output
14725 section, which means that the addend must be adjusted
14726 accordingly. */
14727
b34976b6 14728static bfd_boolean
4ce794b7
AM
14729ppc64_elf_relocate_section (bfd *output_bfd,
14730 struct bfd_link_info *info,
14731 bfd *input_bfd,
14732 asection *input_section,
14733 bfd_byte *contents,
14734 Elf_Internal_Rela *relocs,
14735 Elf_Internal_Sym *local_syms,
14736 asection **local_sections)
5bd4f169 14737{
65f38f15 14738 struct ppc_link_hash_table *htab;
5bd4f169
AM
14739 Elf_Internal_Shdr *symtab_hdr;
14740 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14741 Elf_Internal_Rela *rel;
c316a17c 14742 Elf_Internal_Rela *wrel;
5bd4f169 14743 Elf_Internal_Rela *relend;
411e1bfb
AM
14744 Elf_Internal_Rela outrel;
14745 bfd_byte *loc;
411e1bfb 14746 struct got_entry **local_got_ents;
5bd4f169 14747 bfd_vma TOCstart;
b34976b6
AM
14748 bfd_boolean ret = TRUE;
14749 bfd_boolean is_opd;
794e51c0
AM
14750 /* Assume 'at' branch hints. */
14751 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14752 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14753 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14754
65f38f15 14755 /* Initialize howto table if needed. */
5bd4f169 14756 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14757 ppc_howto_init ();
14758
65f38f15 14759 htab = ppc_hash_table (info);
4dfe6ac6
NC
14760 if (htab == NULL)
14761 return FALSE;
ee75fd95
AM
14762
14763 /* Don't relocate stub sections. */
e7d1c40c 14764 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14765 return TRUE;
14766
7af5d5c4
AM
14767 if (!is_ppc64_elf (input_bfd))
14768 {
14769 bfd_set_error (bfd_error_wrong_format);
14770 return FALSE;
14771 }
0ffa91dd 14772
411e1bfb 14773 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14774 TOCstart = elf_gp (output_bfd);
0ffa91dd 14775 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14776 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14777 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14778
c316a17c 14779 rel = wrel = relocs;
5bd4f169 14780 relend = relocs + input_section->reloc_count;
c316a17c 14781 for (; rel < relend; wrel++, rel++)
5bd4f169 14782 {
04c9666a 14783 enum elf_ppc64_reloc_type r_type;
31c76678 14784 bfd_vma addend;
5bd4f169
AM
14785 bfd_reloc_status_type r;
14786 Elf_Internal_Sym *sym;
14787 asection *sec;
039b3fef
AM
14788 struct elf_link_hash_entry *h_elf;
14789 struct ppc_link_hash_entry *h;
14790 struct ppc_link_hash_entry *fdh;
5bd4f169 14791 const char *sym_name;
0d4792f7 14792 unsigned long r_symndx, toc_symndx;
3a71aa26 14793 bfd_vma toc_addend;
f961d9dd
AM
14794 unsigned char tls_mask, tls_gd, tls_type;
14795 unsigned char sym_type;
5bd4f169 14796 bfd_vma relocation;
23cedd1d 14797 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14798 bfd_boolean warned;
bc30df16 14799 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14800 unsigned int insn;
e11840f9 14801 unsigned int mask;
721956f4
AM
14802 struct ppc_stub_hash_entry *stub_entry;
14803 bfd_vma max_br_offset;
14804 bfd_vma from;
c316a17c 14805 Elf_Internal_Rela orig_rel;
b80eed39
AM
14806 reloc_howto_type *howto;
14807 struct reloc_howto_struct alt_howto;
4a421c53
AM
14808 uint64_t pinsn;
14809 bfd_vma offset;
5bd4f169 14810
c316a17c
AM
14811 again:
14812 orig_rel = *rel;
14813
4ce794b7 14814 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14815 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14816
14817 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14818 symbol of the previous ADDR64 reloc. The symbol gives us the
14819 proper TOC base to use. */
14820 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14821 && wrel != relocs
14822 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14823 && is_opd)
c316a17c 14824 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14825
4ce794b7
AM
14826 sym = NULL;
14827 sec = NULL;
039b3fef 14828 h_elf = NULL;
4ce794b7 14829 sym_name = NULL;
b34976b6
AM
14830 unresolved_reloc = FALSE;
14831 warned = FALSE;
65f38f15 14832
0b13192e 14833 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14834 {
14835 /* It's a local symbol. */
74f0fb50 14836 struct _opd_sec_data *opd;
4025353c 14837
5bd4f169
AM
14838 sym = local_syms + r_symndx;
14839 sec = local_sections[r_symndx];
26c61ae5 14840 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14841 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14842 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14843 opd = get_opd_info (sec);
14844 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14845 {
51aecdc5
AM
14846 long adjust = opd->adjust[OPD_NDX (sym->st_value
14847 + rel->r_addend)];
4025353c
AM
14848 if (adjust == -1)
14849 relocation = 0;
14850 else
4cc603a5
AM
14851 {
14852 /* If this is a relocation against the opd section sym
14853 and we have edited .opd, adjust the reloc addend so
14854 that ld -r and ld --emit-relocs output is correct.
14855 If it is a reloc against some other .opd symbol,
14856 then the symbol value will be adjusted later. */
14857 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14858 rel->r_addend += adjust;
14859 else
14860 relocation += adjust;
14861 }
1e2f5b6e 14862 }
5bd4f169
AM
14863 }
14864 else
14865 {
62d887d4
L
14866 bfd_boolean ignored;
14867
b2a8e766
AM
14868 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14869 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14870 h_elf, sec, relocation,
62d887d4 14871 unresolved_reloc, warned, ignored);
039b3fef
AM
14872 sym_name = h_elf->root.root.string;
14873 sym_type = h_elf->type;
b69fdb4e
AM
14874 if (sec != NULL
14875 && sec->owner == output_bfd
14876 && strcmp (sec->name, ".opd") == 0)
14877 {
14878 /* This is a symbol defined in a linker script. All
14879 such are defined in output sections, even those
14880 defined by simple assignment from a symbol defined in
14881 an input section. Transfer the symbol to an
14882 appropriate input .opd section, so that a branch to
14883 this symbol will be mapped to the location specified
14884 by the opd entry. */
14885 struct bfd_link_order *lo;
14886 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14887 if (lo->type == bfd_indirect_link_order)
14888 {
14889 asection *isec = lo->u.indirect.section;
14890 if (h_elf->root.u.def.value >= isec->output_offset
14891 && h_elf->root.u.def.value < (isec->output_offset
14892 + isec->size))
14893 {
14894 h_elf->root.u.def.value -= isec->output_offset;
14895 h_elf->root.u.def.section = isec;
14896 sec = isec;
14897 break;
14898 }
14899 }
14900 }
5bd4f169 14901 }
ed7007c1 14902 h = ppc_elf_hash_entry (h_elf);
5bd4f169 14903
dbaa2011 14904 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14905 {
14906 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14907 input_bfd, input_section,
0930cb30 14908 contents, rel->r_offset);
c316a17c
AM
14909 wrel->r_offset = rel->r_offset;
14910 wrel->r_info = 0;
14911 wrel->r_addend = 0;
14912
14913 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14914 symbols defined in discarded sections. Not done for
c316a17c
AM
14915 non-debug to preserve relocs in .eh_frame which the
14916 eh_frame editing code expects to be present. */
14917 if (bfd_link_relocatable (info)
14918 && (input_section->flags & SEC_DEBUGGING))
14919 wrel--;
14920
14921 continue;
14922 }
ab96bf03 14923
0e1862bb 14924 if (bfd_link_relocatable (info))
c316a17c 14925 goto copy_reloc;
ab96bf03 14926
f40da81b
AM
14927 if (h != NULL && &h->elf == htab->elf.hgot)
14928 {
6f20ed8a 14929 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14930 sec = bfd_abs_section_ptr;
14931 unresolved_reloc = FALSE;
14932 }
14933
951fd09b
AM
14934 /* TLS optimizations. Replace instruction sequences and relocs
14935 based on information we collected in tls_optimize. We edit
14936 RELOCS so that --emit-relocs will output something sensible
14937 for the final instruction stream. */
14938 tls_mask = 0;
14939 tls_gd = 0;
0d4792f7 14940 toc_symndx = 0;
727fc41e
AM
14941 if (h != NULL)
14942 tls_mask = h->tls_mask;
14943 else if (local_got_ents != NULL)
411e1bfb 14944 {
e054468f
AM
14945 struct plt_entry **local_plt = (struct plt_entry **)
14946 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14947 unsigned char *lgot_masks = (unsigned char *)
e054468f 14948 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14949 tls_mask = lgot_masks[r_symndx];
14950 }
37da22e5 14951 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14952 && (r_type == R_PPC64_TLS
14953 || r_type == R_PPC64_TLSGD
14954 || r_type == R_PPC64_TLSLD))
14955 {
14956 /* Check for toc tls entries. */
f961d9dd 14957 unsigned char *toc_tls;
0d4792f7 14958
727fc41e
AM
14959 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14960 &local_syms, rel, input_bfd))
14961 return FALSE;
0d4792f7 14962
727fc41e
AM
14963 if (toc_tls)
14964 tls_mask = *toc_tls;
0d4792f7
AM
14965 }
14966
14967 /* Check that tls relocs are used with tls syms, and non-tls
14968 relocs are used with non-tls syms. */
cf35638d 14969 if (r_symndx != STN_UNDEF
0d4792f7
AM
14970 && r_type != R_PPC64_NONE
14971 && (h == NULL
039b3fef
AM
14972 || h->elf.root.type == bfd_link_hash_defined
14973 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14974 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14975 {
37da22e5 14976 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14977 && (r_type == R_PPC64_TLS
14978 || r_type == R_PPC64_TLSGD
14979 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14980 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14981 ;
14982 else
25f53a85 14983 info->callbacks->einfo
1d483afe 14984 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14985 /* xgettext:c-format */
c1c8c1ef 14986 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14987 /* xgettext:c-format */
c1c8c1ef 14988 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14989 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14990 ppc64_elf_howto_table[r_type]->name,
14991 sym_name);
411e1bfb
AM
14992 }
14993
14994 /* Ensure reloc mapping code below stays sane. */
14995 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14996 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14997 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
14998 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
14999 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
15000 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
15001 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
15002 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
15003 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
15004 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
15005 abort ();
0d4792f7 15006
411e1bfb
AM
15007 switch (r_type)
15008 {
15009 default:
411e1bfb
AM
15010 break;
15011
ba761f19 15012 case R_PPC64_LO_DS_OPT:
95f0d0d2 15013 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 15014 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
15015 abort ();
15016 insn += (14u << 26) - (58u << 26);
95f0d0d2 15017 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
15018 r_type = R_PPC64_TOC16_LO;
15019 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15020 break;
15021
411e1bfb
AM
15022 case R_PPC64_TOC16:
15023 case R_PPC64_TOC16_LO:
15024 case R_PPC64_TOC16_DS:
15025 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
15026 {
15027 /* Check for toc tls entries. */
f961d9dd 15028 unsigned char *toc_tls;
951fd09b 15029 int retval;
411e1bfb 15030
3a71aa26
AM
15031 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15032 &local_syms, rel, input_bfd);
951fd09b 15033 if (retval == 0)
411e1bfb
AM
15034 return FALSE;
15035
15036 if (toc_tls)
15037 {
951fd09b 15038 tls_mask = *toc_tls;
411e1bfb
AM
15039 if (r_type == R_PPC64_TOC16_DS
15040 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 15041 {
37da22e5 15042 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
15043 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
15044 goto toctprel;
15045 }
411e1bfb 15046 else
951fd09b
AM
15047 {
15048 /* If we found a GD reloc pair, then we might be
15049 doing a GD->IE transition. */
15050 if (retval == 2)
15051 {
b00a0a86 15052 tls_gd = TLS_GDIE;
37da22e5
AM
15053 if ((tls_mask & TLS_TLS) != 0
15054 && (tls_mask & TLS_GD) == 0)
102890f0 15055 goto tls_ldgd_opt;
951fd09b
AM
15056 }
15057 else if (retval == 3)
15058 {
37da22e5
AM
15059 if ((tls_mask & TLS_TLS) != 0
15060 && (tls_mask & TLS_LD) == 0)
102890f0 15061 goto tls_ldgd_opt;
951fd09b
AM
15062 }
15063 }
411e1bfb
AM
15064 }
15065 }
15066 break;
15067
9d6ded02
AM
15068 case R_PPC64_GOT_TPREL16_HI:
15069 case R_PPC64_GOT_TPREL16_HA:
37da22e5 15070 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
15071 && (tls_mask & TLS_TPREL) == 0)
15072 {
15073 rel->r_offset -= d_offset;
95f0d0d2 15074 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15075 r_type = R_PPC64_NONE;
15076 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15077 }
15078 break;
15079
411e1bfb
AM
15080 case R_PPC64_GOT_TPREL16_DS:
15081 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15082 if ((tls_mask & TLS_TLS) != 0
951fd09b 15083 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15084 {
81407a69 15085 toctprel:
95f0d0d2 15086 insn = bfd_get_32 (input_bfd,
c316a17c 15087 contents + rel->r_offset - d_offset);
411e1bfb
AM
15088 insn &= 31 << 21;
15089 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15090 bfd_put_32 (input_bfd, insn,
c316a17c 15091 contents + rel->r_offset - d_offset);
411e1bfb 15092 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15093 if (toc_symndx != 0)
15094 {
15095 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15096 rel->r_addend = toc_addend;
0d4792f7
AM
15097 /* We changed the symbol. Start over in order to
15098 get h, sym, sec etc. right. */
c316a17c 15099 goto again;
0d4792f7
AM
15100 }
15101 else
15102 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15103 }
15104 break;
15105
87c69f97 15106 case R_PPC64_GOT_TPREL_PCREL34:
c213164a
AM
15107 if ((tls_mask & TLS_TLS) != 0
15108 && (tls_mask & TLS_TPREL) == 0)
15109 {
15110 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15111 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15112 pinsn <<= 32;
15113 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15114 pinsn += ((2ULL << 56) + (-1ULL << 52)
15115 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15116 bfd_put_32 (input_bfd, pinsn >> 32,
15117 contents + rel->r_offset);
15118 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15119 contents + rel->r_offset + 4);
15120 r_type = R_PPC64_TPREL34;
15121 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15122 }
15123 break;
15124
411e1bfb 15125 case R_PPC64_TLS:
37da22e5 15126 if ((tls_mask & TLS_TLS) != 0
951fd09b 15127 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15128 {
c213164a 15129 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15130 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15131 if (insn == 0)
c213164a
AM
15132 break;
15133 if ((rel->r_offset & 3) == 0)
0d4792f7 15134 {
c213164a
AM
15135 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15136 /* Was PPC64_TLS which sits on insn boundary, now
15137 PPC64_TPREL16_LO which is at low-order half-word. */
15138 rel->r_offset += d_offset;
15139 r_type = R_PPC64_TPREL16_LO;
15140 if (toc_symndx != 0)
15141 {
15142 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15143 rel->r_addend = toc_addend;
15144 /* We changed the symbol. Start over in order to
15145 get h, sym, sec etc. right. */
15146 goto again;
15147 }
15148 else
15149 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15150 }
15151 else if ((rel->r_offset & 3) == 1)
15152 {
15153 /* For pcrel IE to LE we already have the full
15154 offset and thus don't need an addi here. A nop
15155 or mr will do. */
2365f8d7 15156 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15157 {
15158 /* Extract regs from addi rt,ra,si. */
15159 unsigned int rt = (insn >> 21) & 0x1f;
15160 unsigned int ra = (insn >> 16) & 0x1f;
15161 if (rt == ra)
15162 insn = NOP;
15163 else
15164 {
15165 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15166 insn = (rt << 16) | (ra << 21) | (ra << 11);
15167 insn |= (31u << 26) | (444u << 1);
15168 }
15169 }
15170 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15171 }
411e1bfb
AM
15172 }
15173 break;
15174
411e1bfb
AM
15175 case R_PPC64_GOT_TLSGD16_HI:
15176 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15177 tls_gd = TLS_GDIE;
37da22e5 15178 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15179 goto tls_gdld_hi;
15180 break;
15181
411e1bfb
AM
15182 case R_PPC64_GOT_TLSLD16_HI:
15183 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15184 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15185 {
951fd09b
AM
15186 tls_gdld_hi:
15187 if ((tls_mask & tls_gd) != 0)
15188 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15189 + R_PPC64_GOT_TPREL16_DS);
15190 else
411e1bfb 15191 {
4fe5ca5b 15192 rel->r_offset -= d_offset;
95f0d0d2 15193 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15194 r_type = R_PPC64_NONE;
411e1bfb 15195 }
951fd09b 15196 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15197 }
15198 break;
15199
951fd09b
AM
15200 case R_PPC64_GOT_TLSGD16:
15201 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15202 tls_gd = TLS_GDIE;
37da22e5 15203 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15204 goto tls_ldgd_opt;
951fd09b 15205 break;
411e1bfb 15206
951fd09b
AM
15207 case R_PPC64_GOT_TLSLD16:
15208 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15209 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15210 {
b9f04fe0 15211 unsigned int insn1, insn2;
102890f0
AM
15212
15213 tls_ldgd_opt:
727fc41e
AM
15214 offset = (bfd_vma) -1;
15215 /* If not using the newer R_PPC64_TLSGD/LD to mark
15216 __tls_get_addr calls, we must trust that the call
15217 stays with its arg setup insns, ie. that the next
15218 reloc is the __tls_get_addr call associated with
15219 the current reloc. Edit both insns. */
9737e8af 15220 if (input_section->nomark_tls_get_addr
727fc41e
AM
15221 && rel + 1 < relend
15222 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15223 htab->tls_get_addr_fd,
15224 htab->tga_desc_fd,
727fc41e 15225 htab->tls_get_addr,
9e7028aa 15226 htab->tga_desc))
727fc41e 15227 offset = rel[1].r_offset;
b86ac8e3
AM
15228 /* We read the low GOT_TLS (or TOC16) insn because we
15229 need to keep the destination reg. It may be
15230 something other than the usual r3, and moved to r3
15231 before the call by intervening code. */
95f0d0d2 15232 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15233 contents + rel->r_offset - d_offset);
102890f0 15234 if ((tls_mask & tls_gd) != 0)
411e1bfb 15235 {
102890f0 15236 /* IE */
b86ac8e3 15237 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15238 insn1 |= 58u << 26; /* ld */
102890f0 15239 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15240 if (offset != (bfd_vma) -1)
f58d5a2d 15241 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15242 if (r_type == R_PPC64_TOC16
15243 || r_type == R_PPC64_TOC16_LO)
102890f0 15244 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15245 else
15246 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15247 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15248 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15249 }
15250 else
15251 {
15252 /* LE */
b86ac8e3
AM
15253 insn1 &= 0x1f << 21;
15254 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15255 insn2 = 0x38630000; /* addi 3,3,0 */
15256 if (tls_gd == 0)
951fd09b 15257 {
102890f0 15258 /* Was an LD reloc. */
71c4e95a 15259 r_symndx = STN_UNDEF;
102890f0 15260 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15261 }
102890f0 15262 else if (toc_symndx != 0)
3a71aa26
AM
15263 {
15264 r_symndx = toc_symndx;
15265 rel->r_addend = toc_addend;
15266 }
102890f0
AM
15267 r_type = R_PPC64_TPREL16_HA;
15268 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15269 if (offset != (bfd_vma) -1)
15270 {
15271 rel[1].r_info = ELF64_R_INFO (r_symndx,
15272 R_PPC64_TPREL16_LO);
15273 rel[1].r_offset = offset + d_offset;
15274 rel[1].r_addend = rel->r_addend;
15275 }
102890f0 15276 }
95f0d0d2 15277 bfd_put_32 (input_bfd, insn1,
3a71aa26 15278 contents + rel->r_offset - d_offset);
727fc41e 15279 if (offset != (bfd_vma) -1)
c96e0573
AM
15280 {
15281 bfd_put_32 (input_bfd, insn2, contents + offset);
15282 if (offset + 8 <= input_section->size)
15283 {
15284 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15285 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15286 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15287 }
15288 }
727fc41e
AM
15289 if ((tls_mask & tls_gd) == 0
15290 && (tls_gd == 0 || toc_symndx != 0))
15291 {
15292 /* We changed the symbol. Start over in order
15293 to get h, sym, sec etc. right. */
c316a17c 15294 goto again;
727fc41e
AM
15295 }
15296 }
15297 break;
15298
87c69f97 15299 case R_PPC64_GOT_TLSGD_PCREL34:
c213164a
AM
15300 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15301 {
15302 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15303 pinsn <<= 32;
15304 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15305 if ((tls_mask & TLS_GDIE) != 0)
15306 {
15307 /* IE, pla -> pld */
15308 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
87c69f97 15309 r_type = R_PPC64_GOT_TPREL_PCREL34;
c213164a
AM
15310 }
15311 else
15312 {
15313 /* LE, pla pcrel -> paddi r13 */
15314 pinsn += (-1ULL << 52) + (13ULL << 16);
15315 r_type = R_PPC64_TPREL34;
15316 }
15317 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15318 bfd_put_32 (input_bfd, pinsn >> 32,
15319 contents + rel->r_offset);
15320 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15321 contents + rel->r_offset + 4);
15322 }
15323 break;
15324
87c69f97 15325 case R_PPC64_GOT_TLSLD_PCREL34:
c213164a
AM
15326 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15327 {
15328 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15329 pinsn <<= 32;
15330 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15331 pinsn += (-1ULL << 52) + (13ULL << 16);
15332 bfd_put_32 (input_bfd, pinsn >> 32,
15333 contents + rel->r_offset);
15334 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15335 contents + rel->r_offset + 4);
15336 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15337 r_symndx = STN_UNDEF;
15338 r_type = R_PPC64_TPREL34;
15339 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15340 goto again;
15341 }
15342 break;
15343
727fc41e 15344 case R_PPC64_TLSGD:
37da22e5 15345 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15346 && rel + 1 < relend)
727fc41e 15347 {
b9f04fe0 15348 unsigned int insn2;
5663e321 15349 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15350
4a421c53 15351 offset = rel->r_offset;
5663e321 15352 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15353 {
15354 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15355 if (r_type1 == R_PPC64_PLT_PCREL34
15356 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15357 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15358 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15359 break;
15360 }
15361
15362 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15363 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15364
b00a0a86 15365 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15366 {
15367 /* IE */
15368 r_type = R_PPC64_NONE;
15369 insn2 = 0x7c636a14; /* add 3,3,13 */
15370 }
15371 else
15372 {
15373 /* LE */
15374 if (toc_symndx != 0)
15375 {
15376 r_symndx = toc_symndx;
15377 rel->r_addend = toc_addend;
15378 }
c213164a
AM
15379 if (r_type1 == R_PPC64_REL24_NOTOC
15380 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15381 {
15382 r_type = R_PPC64_NONE;
15383 insn2 = NOP;
15384 }
15385 else
15386 {
15387 rel->r_offset = offset + d_offset;
15388 r_type = R_PPC64_TPREL16_LO;
15389 insn2 = 0x38630000; /* addi 3,3,0 */
15390 }
727fc41e
AM
15391 }
15392 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15393 /* Zap the reloc on the _tls_get_addr call too. */
15394 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15395 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15396 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15397 if ((tls_mask & TLS_GDIE) == 0
15398 && toc_symndx != 0
15399 && r_type != R_PPC64_NONE)
c316a17c 15400 goto again;
411e1bfb 15401 }
411e1bfb
AM
15402 break;
15403
727fc41e 15404 case R_PPC64_TLSLD:
37da22e5 15405 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15406 && rel + 1 < relend)
727fc41e 15407 {
b9f04fe0 15408 unsigned int insn2;
5663e321 15409 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15410
4a421c53 15411 offset = rel->r_offset;
5663e321 15412 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15413 {
15414 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15415 if (r_type1 == R_PPC64_PLT_PCREL34
15416 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15417 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15418 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15419 break;
15420 }
15421
15422 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15423 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15424
c213164a
AM
15425 if (r_type1 == R_PPC64_REL24_NOTOC
15426 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15427 {
15428 r_type = R_PPC64_NONE;
15429 insn2 = NOP;
15430 }
15431 else
15432 {
15433 rel->r_offset = offset + d_offset;
15434 r_symndx = STN_UNDEF;
15435 r_type = R_PPC64_TPREL16_LO;
15436 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15437 insn2 = 0x38630000; /* addi 3,3,0 */
15438 }
727fc41e 15439 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15440 /* Zap the reloc on the _tls_get_addr call too. */
15441 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15442 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15443 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15444 if (r_type != R_PPC64_NONE)
15445 goto again;
727fc41e
AM
15446 }
15447 break;
15448
411e1bfb 15449 case R_PPC64_DTPMOD64:
951fd09b
AM
15450 if (rel + 1 < relend
15451 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15452 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15453 {
951fd09b
AM
15454 if ((tls_mask & TLS_GD) == 0)
15455 {
15456 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15457 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15458 r_type = R_PPC64_TPREL64;
15459 else
15460 {
4ce794b7 15461 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15462 r_type = R_PPC64_NONE;
15463 }
15464 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15465 }
15466 }
15467 else
15468 {
15469 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15470 {
4ce794b7 15471 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15472 r_type = R_PPC64_NONE;
951fd09b 15473 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15474 }
411e1bfb
AM
15475 }
15476 break;
15477
15478 case R_PPC64_TPREL64:
951fd09b 15479 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15480 {
15481 r_type = R_PPC64_NONE;
15482 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15483 }
15484 break;
52a82034 15485
006589cf
AM
15486 case R_PPC64_ENTRY:
15487 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15488 if (!bfd_link_pic (info)
15489 && !info->traditional_format
15490 && relocation + 0x80008000 <= 0xffffffff)
15491 {
15492 unsigned int insn1, insn2;
15493
15494 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15495 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15496 if ((insn1 & ~0xfffc) == LD_R2_0R12
15497 && insn2 == ADD_R2_R2_R12)
15498 {
95f0d0d2 15499 bfd_put_32 (input_bfd,
006589cf
AM
15500 LIS_R2 + PPC_HA (relocation),
15501 contents + rel->r_offset);
95f0d0d2 15502 bfd_put_32 (input_bfd,
006589cf
AM
15503 ADDI_R2_R2 + PPC_LO (relocation),
15504 contents + rel->r_offset + 4);
15505 }
15506 }
15507 else
15508 {
15509 relocation -= (rel->r_offset
15510 + input_section->output_offset
15511 + input_section->output_section->vma);
15512 if (relocation + 0x80008000 <= 0xffffffff)
15513 {
15514 unsigned int insn1, insn2;
15515
15516 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15517 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15518 if ((insn1 & ~0xfffc) == LD_R2_0R12
15519 && insn2 == ADD_R2_R2_R12)
15520 {
95f0d0d2 15521 bfd_put_32 (input_bfd,
006589cf
AM
15522 ADDIS_R2_R12 + PPC_HA (relocation),
15523 contents + rel->r_offset);
95f0d0d2 15524 bfd_put_32 (input_bfd,
006589cf
AM
15525 ADDI_R2_R2 + PPC_LO (relocation),
15526 contents + rel->r_offset + 4);
15527 }
15528 }
15529 }
15530 break;
15531
52a82034
AM
15532 case R_PPC64_REL16_HA:
15533 /* If we are generating a non-PIC executable, edit
15534 . 0: addis 2,12,.TOC.-0b@ha
15535 . addi 2,2,.TOC.-0b@l
15536 used by ELFv2 global entry points to set up r2, to
15537 . lis 2,.TOC.@ha
15538 . addi 2,2,.TOC.@l
15539 if .TOC. is in range. */
0e1862bb 15540 if (!bfd_link_pic (info)
810d4e75 15541 && !info->traditional_format
006589cf 15542 && !htab->opd_abi
4f038ee5 15543 && rel->r_addend == d_offset
52a82034
AM
15544 && h != NULL && &h->elf == htab->elf.hgot
15545 && rel + 1 < relend
15546 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15547 && rel[1].r_offset == rel->r_offset + 4
15548 && rel[1].r_addend == rel->r_addend + 4
15549 && relocation + 0x80008000 <= 0xffffffff)
15550 {
15551 unsigned int insn1, insn2;
4a421c53 15552 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15553 insn1 = bfd_get_32 (input_bfd, contents + offset);
15554 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15555 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15556 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15557 {
15558 r_type = R_PPC64_ADDR16_HA;
15559 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15560 rel->r_addend -= d_offset;
15561 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15562 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15563 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15564 }
15565 }
15566 break;
411e1bfb
AM
15567 }
15568
15569 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15570 insn = 0;
b25116a9
AM
15571 max_br_offset = 1 << 25;
15572 addend = rel->r_addend;
bc30df16 15573 reloc_dest = DEST_NORMAL;
65f38f15 15574 switch (r_type)
5bd4f169
AM
15575 {
15576 default:
65f38f15 15577 break;
5bd4f169 15578
3b421ab3
AM
15579 case R_PPC64_TOCSAVE:
15580 if (relocation + addend == (rel->r_offset
15581 + input_section->output_offset
15582 + input_section->output_section->vma)
15583 && tocsave_find (htab, NO_INSERT,
15584 &local_syms, rel, input_bfd))
15585 {
15586 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15587 if (insn == NOP
15588 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15589 bfd_put_32 (input_bfd,
15590 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15591 contents + rel->r_offset);
15592 }
15593 break;
15594
65f38f15
AM
15595 /* Branch taken prediction relocations. */
15596 case R_PPC64_ADDR14_BRTAKEN:
15597 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15598 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15599 /* Fall through. */
65f38f15 15600
86c76c7b 15601 /* Branch not taken prediction relocations. */
65f38f15
AM
15602 case R_PPC64_ADDR14_BRNTAKEN:
15603 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15604 insn |= bfd_get_32 (input_bfd,
411e1bfb 15605 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15606 /* Fall through. */
86c76c7b 15607
b25116a9
AM
15608 case R_PPC64_REL14:
15609 max_br_offset = 1 << 15;
1a0670f3 15610 /* Fall through. */
5bd4f169 15611
65f38f15 15612 case R_PPC64_REL24:
05d0e962 15613 case R_PPC64_REL24_NOTOC:
23cedd1d 15614 case R_PPC64_PLTCALL:
5663e321 15615 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15616 /* Calls to functions with a different TOC, such as calls to
15617 shared objects, need to alter the TOC pointer. This is
15618 done using a linkage stub. A REL24 branching to these
15619 linkage stubs needs to be followed by a nop, as the nop
15620 will be replaced with an instruction to restore the TOC
15621 base pointer. */
8387904d 15622 fdh = h;
b31867b6
AM
15623 if (h != NULL
15624 && h->oh != NULL
15625 && h->oh->is_func_descriptor)
15626 fdh = ppc_follow_link (h->oh);
31c76678
DK
15627 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15628 htab);
5663e321
AM
15629 if ((r_type == R_PPC64_PLTCALL
15630 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15631 && stub_entry != NULL
05d0e962
AM
15632 && stub_entry->stub_type >= ppc_stub_plt_call
15633 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15634 stub_entry = NULL;
15635
6abec6bc 15636 if (stub_entry != NULL
d0abeec8
AM
15637 && ((stub_entry->stub_type >= ppc_stub_plt_call
15638 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15639 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15640 || stub_entry->stub_type == ppc_stub_plt_branch_both
15641 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15642 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15643 {
b25116a9 15644 bfd_boolean can_plt_call = FALSE;
721956f4 15645
6e1816be
AM
15646 if (stub_entry->stub_type == ppc_stub_plt_call
15647 && !htab->opd_abi
15648 && htab->params->plt_localentry0 != 0
15649 && is_elfv2_localentry0 (&h->elf))
15650 {
15651 /* The function doesn't use or change r2. */
15652 can_plt_call = TRUE;
15653 }
05d0e962
AM
15654 else if (r_type == R_PPC64_REL24_NOTOC)
15655 {
15656 /* NOTOC calls don't need to restore r2. */
15657 can_plt_call = TRUE;
15658 }
6e1816be 15659
f378ab09 15660 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15661 branch and link followed by a nop. The nop is
15662 replaced by an insn to restore r2. */
6e1816be 15663 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15664 {
ba8ca3e7
AM
15665 unsigned long br;
15666
15667 br = bfd_get_32 (input_bfd,
15668 contents + rel->r_offset);
15669 if ((br & 1) != 0)
41bd81ab 15670 {
ba8ca3e7
AM
15671 unsigned long nop;
15672
15673 nop = bfd_get_32 (input_bfd,
15674 contents + rel->r_offset + 4);
23cedd1d
AM
15675 if (nop == LD_R2_0R1 + STK_TOC (htab))
15676 can_plt_call = TRUE;
15677 else if (nop == NOP
15678 || nop == CROR_151515
15679 || nop == CROR_313131)
a7f2871e 15680 {
ba8ca3e7 15681 if (h != NULL
ed7007c1 15682 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15683 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15684 {
15685 /* Special stub used, leave nop alone. */
15686 }
15687 else
a078d95a
AM
15688 bfd_put_32 (input_bfd,
15689 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15690 contents + rel->r_offset + 4);
15691 can_plt_call = TRUE;
a7f2871e 15692 }
41bd81ab 15693 }
5bd4f169 15694 }
721956f4 15695
ba8ca3e7 15696 if (!can_plt_call && h != NULL)
721956f4 15697 {
ba8ca3e7
AM
15698 const char *name = h->elf.root.root.string;
15699
15700 if (*name == '.')
15701 ++name;
15702
15703 if (strncmp (name, "__libc_start_main", 17) == 0
15704 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15705 {
ba8ca3e7
AM
15706 /* Allow crt1 branch to go via a toc adjusting
15707 stub. Other calls that never return could do
15708 the same, if we could detect such. */
b25116a9 15709 can_plt_call = TRUE;
6ab189d5 15710 }
ba8ca3e7
AM
15711 }
15712
15713 if (!can_plt_call)
15714 {
15715 /* g++ as of 20130507 emits self-calls without a
15716 following nop. This is arguably wrong since we
15717 have conflicting information. On the one hand a
15718 global symbol and on the other a local call
15719 sequence, but don't error for this special case.
15720 It isn't possible to cheaply verify we have
15721 exactly such a call. Allow all calls to the same
15722 section. */
15723 asection *code_sec = sec;
15724
15725 if (get_opd_info (sec) != NULL)
ad8e1ba5 15726 {
ba8ca3e7
AM
15727 bfd_vma off = (relocation + addend
15728 - sec->output_section->vma
15729 - sec->output_offset);
bc30df16 15730
ba8ca3e7 15731 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15732 }
ba8ca3e7
AM
15733 if (code_sec == input_section)
15734 can_plt_call = TRUE;
15735 }
15736
15737 if (!can_plt_call)
15738 {
05d0e962
AM
15739 if (stub_entry->stub_type >= ppc_stub_plt_call
15740 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15741 info->callbacks->einfo
695344c0 15742 /* xgettext:c-format */
c1c8c1ef 15743 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15744 "(plt call stub)\n"),
4805fc55
AM
15745 input_bfd, input_section, rel->r_offset, sym_name);
15746 else
15747 info->callbacks->einfo
695344c0 15748 /* xgettext:c-format */
c1c8c1ef 15749 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15750 "(toc save/adjust stub)\n"),
4805fc55 15751 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15752
15753 bfd_set_error (bfd_error_bad_value);
15754 ret = FALSE;
721956f4
AM
15755 }
15756
b25116a9 15757 if (can_plt_call
05d0e962
AM
15758 && stub_entry->stub_type >= ppc_stub_plt_call
15759 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15760 unresolved_reloc = FALSE;
15761 }
15762
6abec6bc
AM
15763 if ((stub_entry == NULL
15764 || stub_entry->stub_type == ppc_stub_long_branch
15765 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15766 && get_opd_info (sec) != NULL)
15767 {
15768 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15769 bfd_vma off = (relocation + addend
15770 - sec->output_section->vma
15771 - sec->output_offset);
aef36ac1 15772 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15773 if (dest != (bfd_vma) -1)
15774 {
15775 relocation = dest;
15776 addend = 0;
bc30df16 15777 reloc_dest = DEST_OPD;
8387904d
AM
15778 }
15779 }
15780
b25116a9
AM
15781 /* If the branch is out of reach we ought to have a long
15782 branch stub. */
15783 from = (rel->r_offset
15784 + input_section->output_offset
15785 + input_section->output_section->vma);
15786
6911b7dc
AM
15787 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15788 ? fdh->elf.other
15789 : sym->st_other);
15790
6abec6bc
AM
15791 if (stub_entry != NULL
15792 && (stub_entry->stub_type == ppc_stub_long_branch
15793 || stub_entry->stub_type == ppc_stub_plt_branch)
15794 && (r_type == R_PPC64_ADDR14_BRTAKEN
15795 || r_type == R_PPC64_ADDR14_BRNTAKEN
15796 || (relocation + addend - from + max_br_offset
15797 < 2 * max_br_offset)))
15798 /* Don't use the stub if this branch is in range. */
15799 stub_entry = NULL;
b25116a9 15800
05d0e962
AM
15801 if (stub_entry != NULL
15802 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15803 || stub_entry->stub_type == ppc_stub_long_branch_both
15804 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15805 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15806 && (r_type != R_PPC64_REL24_NOTOC
15807 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15808 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15809 && (relocation + addend - from + max_br_offset
15810 < 2 * max_br_offset))
15811 stub_entry = NULL;
15812
15813 if (stub_entry != NULL
15814 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15815 || stub_entry->stub_type == ppc_stub_long_branch_both
15816 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15817 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15818 && r_type == R_PPC64_REL24_NOTOC
15819 && (relocation + addend - from + max_br_offset
15820 < 2 * max_br_offset))
15821 stub_entry = NULL;
15822
b25116a9
AM
15823 if (stub_entry != NULL)
15824 {
15825 /* Munge up the value and addend so that we call the stub
15826 rather than the procedure directly. */
a4b6fadd
AM
15827 asection *stub_sec = stub_entry->group->stub_sec;
15828
15829 if (stub_entry->stub_type == ppc_stub_save_res)
15830 relocation += (stub_sec->output_offset
15831 + stub_sec->output_section->vma
15832 + stub_sec->size - htab->sfpr->size
15833 - htab->sfpr->output_offset
15834 - htab->sfpr->output_section->vma);
15835 else
15836 relocation = (stub_entry->stub_offset
15837 + stub_sec->output_offset
15838 + stub_sec->output_section->vma);
b25116a9 15839 addend = 0;
bc30df16 15840 reloc_dest = DEST_STUB;
3b421ab3 15841
05d0e962
AM
15842 if (((stub_entry->stub_type == ppc_stub_plt_call
15843 && ALWAYS_EMIT_R2SAVE)
15844 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15845 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93 15846 && !(h != NULL
ed7007c1 15847 && is_tls_get_addr (&h->elf, htab)
e81b4c93 15848 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15849 && rel + 1 < relend
15850 && rel[1].r_offset == rel->r_offset + 4
15851 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15852 relocation += 4;
05d0e962
AM
15853 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15854 || stub_entry->stub_type == ppc_stub_plt_branch_both
15855 || stub_entry->stub_type == ppc_stub_plt_call_both)
15856 && r_type == R_PPC64_REL24_NOTOC)
15857 relocation += 4;
5663e321
AM
15858
15859 if (r_type == R_PPC64_REL24_NOTOC
15860 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15861 || stub_entry->stub_type == ppc_stub_plt_call_both))
15862 htab->notoc_plt = 1;
b25116a9
AM
15863 }
15864
15865 if (insn != 0)
15866 {
794e51c0 15867 if (is_isa_v2)
721956f4 15868 {
b25116a9
AM
15869 /* Set 'a' bit. This is 0b00010 in BO field for branch
15870 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15871 for branch on CTR insns (BO == 1a00t or 1a01t). */
15872 if ((insn & (0x14 << 21)) == (0x04 << 21))
15873 insn |= 0x02 << 21;
15874 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15875 insn |= 0x08 << 21;
15876 else
15877 break;
15878 }
15879 else
15880 {
15881 /* Invert 'y' bit if not the default. */
4cc603a5 15882 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15883 insn ^= 0x01 << 21;
721956f4 15884 }
b25116a9 15885
95f0d0d2 15886 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15887 }
e86ce104 15888
06da1e8e
AM
15889 /* NOP out calls to undefined weak functions.
15890 We can thus call a weak function without first
15891 checking whether the function is defined. */
b25116a9 15892 else if (h != NULL
039b3fef 15893 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15894 && h->elf.dynindx == -1
05d0e962
AM
15895 && (r_type == R_PPC64_REL24
15896 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15897 && relocation == 0
4cc603a5 15898 && addend == 0)
e86ce104 15899 {
95f0d0d2 15900 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15901 goto copy_reloc;
e86ce104 15902 }
65f38f15 15903 break;
066f4018
AM
15904
15905 case R_PPC64_GOT16_DS:
6738c8a7
AM
15906 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
15907 || !htab->do_toc_opt)
06507dab 15908 break;
066f4018
AM
15909 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15910 if (relocation + addend - from + 0x8000 < 0x10000
15911 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15912 {
15913 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15914 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15915 {
15916 insn += (14u << 26) - (58u << 26);
15917 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15918 r_type = R_PPC64_TOC16;
15919 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15920 }
15921 }
15922 break;
15923
15924 case R_PPC64_GOT16_LO_DS:
15925 case R_PPC64_GOT16_HA:
6738c8a7
AM
15926 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
15927 || !htab->do_toc_opt)
06507dab 15928 break;
066f4018
AM
15929 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15930 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15931 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15932 {
15933 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15934 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15935 {
15936 insn += (14u << 26) - (58u << 26);
15937 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15938 r_type = R_PPC64_TOC16_LO;
15939 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15940 }
2365f8d7 15941 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15942 {
15943 r_type = R_PPC64_TOC16_HA;
15944 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15945 }
15946 }
15947 break;
4a421c53
AM
15948
15949 case R_PPC64_GOT_PCREL34:
6738c8a7
AM
15950 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC
15951 || !htab->do_toc_opt)
06507dab 15952 break;
4a421c53
AM
15953 from = (rel->r_offset
15954 + input_section->output_section->vma
15955 + input_section->output_offset);
6738c8a7
AM
15956 if (!(relocation - from + (1ULL << 33) < 1ULL << 34
15957 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
15958 break;
15959
15960 offset = rel->r_offset;
15961 pinsn = bfd_get_32 (input_bfd, contents + offset);
15962 pinsn <<= 32;
15963 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15964 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15965 != ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15966 break;
15967
15968 /* Replace with paddi. */
15969 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15970 r_type = R_PPC64_PCREL34;
15971 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15972 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15973 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15974 /* Fall through. */
4a421c53
AM
15975
15976 case R_PPC64_PCREL34:
6738c8a7
AM
15977 if (!htab->params->no_pcrel_opt
15978 && rel + 1 < relend
15979 && rel[1].r_offset == rel->r_offset
15980 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT)
15981 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
4a421c53
AM
15982 {
15983 offset = rel->r_offset;
15984 pinsn = bfd_get_32 (input_bfd, contents + offset);
15985 pinsn <<= 32;
15986 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15987 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15988 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15989 | (14ULL << 26) /* paddi */))
15990 {
6738c8a7
AM
15991 bfd_vma off2 = rel[1].r_addend;
15992 if (off2 == 0)
15993 /* zero means next insn. */
15994 off2 = 8;
15995 off2 += offset;
15996 if (off2 + 4 <= input_section->size)
4a421c53 15997 {
6738c8a7
AM
15998 uint64_t pinsn2;
15999 bfd_signed_vma addend_off;
16000 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
16001 pinsn2 <<= 32;
16002 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
4a421c53 16003 {
6738c8a7
AM
16004 if (off2 + 8 > input_section->size)
16005 break;
16006 pinsn2 |= bfd_get_32 (input_bfd,
16007 contents + off2 + 4);
16008 }
16009 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
16010 {
16011 addend += addend_off;
16012 rel->r_addend = addend;
16013 bfd_put_32 (input_bfd, pinsn >> 32,
16014 contents + offset);
16015 bfd_put_32 (input_bfd, pinsn,
16016 contents + offset + 4);
16017 bfd_put_32 (input_bfd, pinsn2 >> 32,
16018 contents + off2);
4a421c53 16019 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
6738c8a7
AM
16020 bfd_put_32 (input_bfd, pinsn2,
16021 contents + off2 + 4);
4a421c53
AM
16022 }
16023 }
16024 }
16025 }
16026 break;
65f38f15 16027 }
5bd4f169 16028
411e1bfb 16029 tls_type = 0;
23cedd1d 16030 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
16031 switch (r_type)
16032 {
16033 default:
cf97bcb0
AM
16034 /* xgettext:c-format */
16035 _bfd_error_handler (_("%pB: %s unsupported"),
16036 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 16037
65f38f15 16038 bfd_set_error (bfd_error_bad_value);
b34976b6 16039 ret = FALSE;
c316a17c 16040 goto copy_reloc;
5bd4f169 16041
65f38f15 16042 case R_PPC64_NONE:
411e1bfb 16043 case R_PPC64_TLS:
727fc41e
AM
16044 case R_PPC64_TLSGD:
16045 case R_PPC64_TLSLD:
3b421ab3 16046 case R_PPC64_TOCSAVE:
04c9666a
AM
16047 case R_PPC64_GNU_VTINHERIT:
16048 case R_PPC64_GNU_VTENTRY:
006589cf 16049 case R_PPC64_ENTRY:
4a421c53 16050 case R_PPC64_PCREL_OPT:
c316a17c 16051 goto copy_reloc;
5bd4f169
AM
16052
16053 /* GOT16 relocations. Like an ADDR16 using the symbol's
16054 address in the GOT as relocation value instead of the
411e1bfb 16055 symbol's value itself. Also, create a GOT entry for the
5bd4f169 16056 symbol and put the symbol value there. */
411e1bfb
AM
16057 case R_PPC64_GOT_TLSGD16:
16058 case R_PPC64_GOT_TLSGD16_LO:
16059 case R_PPC64_GOT_TLSGD16_HI:
16060 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 16061 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 16062 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
16063 goto dogot;
16064
16065 case R_PPC64_GOT_TLSLD16:
16066 case R_PPC64_GOT_TLSLD16_LO:
16067 case R_PPC64_GOT_TLSLD16_HI:
16068 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 16069 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 16070 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
16071 goto dogot;
16072
16073 case R_PPC64_GOT_TPREL16_DS:
16074 case R_PPC64_GOT_TPREL16_LO_DS:
16075 case R_PPC64_GOT_TPREL16_HI:
16076 case R_PPC64_GOT_TPREL16_HA:
87c69f97 16077 case R_PPC64_GOT_TPREL_PCREL34:
411e1bfb
AM
16078 tls_type = TLS_TLS | TLS_TPREL;
16079 goto dogot;
16080
16081 case R_PPC64_GOT_DTPREL16_DS:
16082 case R_PPC64_GOT_DTPREL16_LO_DS:
16083 case R_PPC64_GOT_DTPREL16_HI:
16084 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 16085 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
16086 tls_type = TLS_TLS | TLS_DTPREL;
16087 goto dogot;
16088
65f38f15
AM
16089 case R_PPC64_GOT16:
16090 case R_PPC64_GOT16_LO:
16091 case R_PPC64_GOT16_HI:
16092 case R_PPC64_GOT16_HA:
16093 case R_PPC64_GOT16_DS:
16094 case R_PPC64_GOT16_LO_DS:
5663e321 16095 case R_PPC64_GOT_PCREL34:
411e1bfb 16096 dogot:
5bd4f169
AM
16097 {
16098 /* Relocation is to the entry for this symbol in the global
16099 offset table. */
e717da7e 16100 asection *got;
d881513a 16101 bfd_vma *offp;
5bd4f169 16102 bfd_vma off;
d881513a 16103 unsigned long indx = 0;
927be08e 16104 struct got_entry *ent;
65f38f15 16105
d881513a 16106 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 16107 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 16108 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16109 else
5bd4f169 16110 {
d881513a
AM
16111 if (h != NULL)
16112 {
f0158f44
AM
16113 if (!htab->elf.dynamic_sections_created
16114 || h->elf.dynindx == -1
16115 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16116 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16117 /* This is actually a static link, or it is a
16118 -Bsymbolic link and the symbol is defined
16119 locally, or the symbol was forced to be local
16120 because of a version file. */
16121 ;
16122 else
16123 {
039b3fef 16124 indx = h->elf.dynindx;
d881513a
AM
16125 unresolved_reloc = FALSE;
16126 }
039b3fef 16127 ent = h->elf.got.glist;
d881513a 16128 }
411e1bfb 16129 else
5bd4f169 16130 {
d881513a
AM
16131 if (local_got_ents == NULL)
16132 abort ();
16133 ent = local_got_ents[r_symndx];
5bd4f169 16134 }
d881513a
AM
16135
16136 for (; ent != NULL; ent = ent->next)
133a1f60 16137 if (ent->addend == orig_rel.r_addend
e717da7e 16138 && ent->owner == input_bfd
d881513a
AM
16139 && ent->tls_type == tls_type)
16140 break;
5bd4f169 16141 }
411e1bfb 16142
927be08e
AM
16143 if (ent == NULL)
16144 abort ();
16145 if (ent->is_indirect)
16146 ent = ent->got.ent;
16147 offp = &ent->got.offset;
16148 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16149 if (got == NULL)
16150 abort ();
16151
411e1bfb
AM
16152 /* The offset must always be a multiple of 8. We use the
16153 least significant bit to record whether we have already
16154 processed this entry. */
d881513a 16155 off = *offp;
411e1bfb
AM
16156 if ((off & 1) != 0)
16157 off &= ~1;
5bd4f169
AM
16158 else
16159 {
411e1bfb
AM
16160 /* Generate relocs for the dynamic linker, except in
16161 the case of TLSLD where we'll use one entry per
16162 module. */
25f23106
AM
16163 asection *relgot;
16164 bfd_boolean ifunc;
e717da7e 16165
d881513a 16166 *offp = off | 1;
25f23106
AM
16167 relgot = NULL;
16168 ifunc = (h != NULL
16169 ? h->elf.type == STT_GNU_IFUNC
16170 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16171 if (ifunc)
82e66161
AM
16172 {
16173 relgot = htab->elf.irelplt;
efb2a7b4 16174 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16175 htab->elf.ifunc_resolvers = TRUE;
82e66161 16176 }
f0158f44
AM
16177 else if (indx != 0
16178 || (bfd_link_pic (info)
16179 && (h == NULL
f749f26e
AM
16180 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16181 && !(tls_type != 0
f15d0b54
AM
16182 && bfd_link_executable (info)
16183 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 16184 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16185 if (relgot != NULL)
5bd4f169 16186 {
e717da7e
AM
16187 outrel.r_offset = (got->output_section->vma
16188 + got->output_offset
411e1bfb 16189 + off);
133a1f60 16190 outrel.r_addend = orig_rel.r_addend;
d881513a 16191 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16192 {
411e1bfb 16193 outrel.r_addend = 0;
e515b051 16194 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16195 if (tls_type == (TLS_TLS | TLS_GD))
16196 {
e717da7e
AM
16197 loc = relgot->contents;
16198 loc += (relgot->reloc_count++
d881513a
AM
16199 * sizeof (Elf64_External_Rela));
16200 bfd_elf64_swap_reloca_out (output_bfd,
16201 &outrel, loc);
e515b051 16202 outrel.r_offset += 8;
133a1f60 16203 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16204 outrel.r_info
16205 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16206 }
411e1bfb 16207 }
951fd09b 16208 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16209 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16210 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16211 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16212 else if (indx != 0)
16213 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16214 else
81407a69 16215 {
25f23106
AM
16216 if (ifunc)
16217 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16218 else
16219 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16220
16221 /* Write the .got section contents for the sake
16222 of prelink. */
e717da7e 16223 loc = got->contents + off;
23fbd6fa
JJ
16224 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16225 loc);
81407a69 16226 }
81407a69
AM
16227
16228 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16229 {
16230 outrel.r_addend += relocation;
16231 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16232 {
16233 if (htab->elf.tls_sec == NULL)
16234 outrel.r_addend = 0;
16235 else
16236 outrel.r_addend -= htab->elf.tls_sec->vma;
16237 }
e515b051 16238 }
e717da7e
AM
16239 loc = relgot->contents;
16240 loc += (relgot->reloc_count++
411e1bfb
AM
16241 * sizeof (Elf64_External_Rela));
16242 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16243 }
16244
ad8e1ba5 16245 /* Init the .got section contents here if we're not
81407a69 16246 emitting a reloc. */
d881513a 16247 else
411e1bfb 16248 {
133a1f60 16249 relocation += orig_rel.r_addend;
f0158f44 16250 if (tls_type != 0)
411e1bfb 16251 {
989f9879
AM
16252 if (htab->elf.tls_sec == NULL)
16253 relocation = 0;
16254 else
16255 {
f0158f44
AM
16256 if (tls_type & TLS_LD)
16257 relocation = 0;
16258 else
16259 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16260 if (tls_type & TLS_TPREL)
989f9879
AM
16261 relocation += DTP_OFFSET - TP_OFFSET;
16262 }
5bd4f169 16263
f0158f44 16264 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16265 {
16266 bfd_put_64 (output_bfd, relocation,
e717da7e 16267 got->contents + off + 8);
676ee2b5 16268 relocation = 1;
7b609f53 16269 }
411e1bfb
AM
16270 }
16271 bfd_put_64 (output_bfd, relocation,
e717da7e 16272 got->contents + off);
5bd4f169
AM
16273 }
16274 }
16275
65f38f15
AM
16276 if (off >= (bfd_vma) -2)
16277 abort ();
16278
bf102f86 16279 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16280 addend = 0;
c213164a 16281 if (!(r_type == R_PPC64_GOT_PCREL34
87c69f97
AM
16282 || r_type == R_PPC64_GOT_TLSGD_PCREL34
16283 || r_type == R_PPC64_GOT_TLSLD_PCREL34
16284 || r_type == R_PPC64_GOT_TPREL_PCREL34
16285 || r_type == R_PPC64_GOT_DTPREL_PCREL34))
5663e321 16286 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16287 }
65f38f15
AM
16288 break;
16289
16290 case R_PPC64_PLT16_HA:
16291 case R_PPC64_PLT16_HI:
16292 case R_PPC64_PLT16_LO:
08be3224 16293 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16294 case R_PPC64_PLT_PCREL34:
16295 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16296 case R_PPC64_PLT32:
16297 case R_PPC64_PLT64:
23cedd1d 16298 case R_PPC64_PLTSEQ:
5663e321 16299 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16300 case R_PPC64_PLTCALL:
5663e321 16301 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16302 /* Relocation is to the entry for this symbol in the
16303 procedure linkage table. */
23cedd1d 16304 unresolved_reloc = TRUE;
cbf95972
AM
16305 {
16306 struct plt_entry **plt_list = NULL;
16307 if (h != NULL)
16308 plt_list = &h->elf.plt.plist;
16309 else if (local_got_ents != NULL)
16310 {
16311 struct plt_entry **local_plt = (struct plt_entry **)
16312 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16313 plt_list = local_plt + r_symndx;
cbf95972
AM
16314 }
16315 if (plt_list)
16316 {
16317 struct plt_entry *ent;
65f38f15 16318
cbf95972
AM
16319 for (ent = *plt_list; ent != NULL; ent = ent->next)
16320 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16321 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16322 {
16323 asection *plt;
08be3224 16324 bfd_vma got;
cbf95972
AM
16325
16326 plt = htab->elf.splt;
16327 if (!htab->elf.dynamic_sections_created
16328 || h == NULL
16329 || h->elf.dynindx == -1)
2d7ad24e
AM
16330 {
16331 if (h != NULL
16332 ? h->elf.type == STT_GNU_IFUNC
16333 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16334 plt = htab->elf.iplt;
16335 else
16336 plt = htab->pltlocal;
16337 }
16338 relocation = (plt->output_section->vma
16339 + plt->output_offset
16340 + ent->plt.offset);
08be3224 16341 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16342 || r_type == R_PPC64_PLT16_HI
16343 || r_type == R_PPC64_PLT16_LO
16344 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16345 {
16346 got = (elf_gp (output_bfd)
16347 + htab->sec_info[input_section->id].toc_off);
16348 relocation -= got;
16349 }
133a1f60 16350 addend = 0;
cbf95972
AM
16351 unresolved_reloc = FALSE;
16352 break;
16353 }
16354 }
16355 }
65f38f15 16356 break;
5bd4f169 16357
0b13192e
AM
16358 case R_PPC64_TOC:
16359 /* Relocation value is TOC base. */
16360 relocation = TOCstart;
cf35638d 16361 if (r_symndx == STN_UNDEF)
6f20ed8a 16362 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16363 else if (unresolved_reloc)
16364 ;
6f20ed8a
AM
16365 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16366 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16367 else
16368 unresolved_reloc = TRUE;
ab96bf03 16369 goto dodyn;
0b13192e 16370
5bd4f169
AM
16371 /* TOC16 relocs. We want the offset relative to the TOC base,
16372 which is the address of the start of the TOC plus 0x8000.
16373 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16374 in this order. */
65f38f15
AM
16375 case R_PPC64_TOC16:
16376 case R_PPC64_TOC16_LO:
16377 case R_PPC64_TOC16_HI:
16378 case R_PPC64_TOC16_DS:
16379 case R_PPC64_TOC16_LO_DS:
16380 case R_PPC64_TOC16_HA:
6f20ed8a 16381 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16382 if (h != NULL)
16383 goto dodyn;
5bd4f169
AM
16384 break;
16385
16386 /* Relocate against the beginning of the section. */
65f38f15
AM
16387 case R_PPC64_SECTOFF:
16388 case R_PPC64_SECTOFF_LO:
16389 case R_PPC64_SECTOFF_HI:
16390 case R_PPC64_SECTOFF_DS:
16391 case R_PPC64_SECTOFF_LO_DS:
16392 case R_PPC64_SECTOFF_HA:
4ce794b7 16393 if (sec != NULL)
65f38f15 16394 addend -= sec->output_section->vma;
5bd4f169
AM
16395 break;
16396
25f23106
AM
16397 case R_PPC64_REL16:
16398 case R_PPC64_REL16_LO:
16399 case R_PPC64_REL16_HI:
16400 case R_PPC64_REL16_HA:
4a969973
AM
16401 case R_PPC64_REL16_HIGH:
16402 case R_PPC64_REL16_HIGHA:
16403 case R_PPC64_REL16_HIGHER:
16404 case R_PPC64_REL16_HIGHERA:
16405 case R_PPC64_REL16_HIGHEST:
16406 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16407 case R_PPC64_REL16_HIGHER34:
16408 case R_PPC64_REL16_HIGHERA34:
16409 case R_PPC64_REL16_HIGHEST34:
16410 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16411 case R_PPC64_REL16DX_HA:
721956f4
AM
16412 case R_PPC64_REL14:
16413 case R_PPC64_REL14_BRNTAKEN:
16414 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16415 case R_PPC64_REL24:
05d0e962 16416 case R_PPC64_REL24_NOTOC:
5663e321
AM
16417 case R_PPC64_PCREL34:
16418 case R_PPC64_PCREL28:
5d1634d7
AM
16419 break;
16420
411e1bfb
AM
16421 case R_PPC64_TPREL16:
16422 case R_PPC64_TPREL16_LO:
16423 case R_PPC64_TPREL16_HI:
16424 case R_PPC64_TPREL16_HA:
16425 case R_PPC64_TPREL16_DS:
16426 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16427 case R_PPC64_TPREL16_HIGH:
16428 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16429 case R_PPC64_TPREL16_HIGHER:
16430 case R_PPC64_TPREL16_HIGHERA:
16431 case R_PPC64_TPREL16_HIGHEST:
16432 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16433 case R_PPC64_TPREL34:
766bc656
AM
16434 if (h != NULL
16435 && h->elf.root.type == bfd_link_hash_undefweak
16436 && h->elf.dynindx == -1)
16437 {
16438 /* Make this relocation against an undefined weak symbol
16439 resolve to zero. This is really just a tweak, since
16440 code using weak externs ought to check that they are
16441 defined before using them. */
16442 bfd_byte *p = contents + rel->r_offset - d_offset;
16443
95f0d0d2 16444 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16445 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16446 if (insn != 0)
95f0d0d2 16447 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16448 break;
16449 }
989f9879
AM
16450 if (htab->elf.tls_sec != NULL)
16451 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16452 /* The TPREL16 relocs shouldn't really be used in shared
16453 libs or with non-local symbols as that will result in
16454 DT_TEXTREL being set, but support them anyway. */
16455 goto dodyn;
411e1bfb
AM
16456
16457 case R_PPC64_DTPREL16:
16458 case R_PPC64_DTPREL16_LO:
16459 case R_PPC64_DTPREL16_HI:
16460 case R_PPC64_DTPREL16_HA:
16461 case R_PPC64_DTPREL16_DS:
16462 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16463 case R_PPC64_DTPREL16_HIGH:
16464 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16465 case R_PPC64_DTPREL16_HIGHER:
16466 case R_PPC64_DTPREL16_HIGHERA:
16467 case R_PPC64_DTPREL16_HIGHEST:
16468 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16469 case R_PPC64_DTPREL34:
989f9879
AM
16470 if (htab->elf.tls_sec != NULL)
16471 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16472 break;
16473
45965137
AM
16474 case R_PPC64_ADDR64_LOCAL:
16475 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16476 ? h->elf.other
16477 : sym->st_other);
16478 break;
16479
e515b051
AM
16480 case R_PPC64_DTPMOD64:
16481 relocation = 1;
16482 addend = 0;
16483 goto dodyn;
16484
411e1bfb 16485 case R_PPC64_TPREL64:
989f9879
AM
16486 if (htab->elf.tls_sec != NULL)
16487 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16488 goto dodyn;
16489
16490 case R_PPC64_DTPREL64:
989f9879
AM
16491 if (htab->elf.tls_sec != NULL)
16492 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16493 /* Fall through. */
411e1bfb 16494
65f38f15
AM
16495 /* Relocations that may need to be propagated if this is a
16496 dynamic object. */
04c9666a 16497 case R_PPC64_REL30:
65f38f15
AM
16498 case R_PPC64_REL32:
16499 case R_PPC64_REL64:
16500 case R_PPC64_ADDR14:
16501 case R_PPC64_ADDR14_BRNTAKEN:
16502 case R_PPC64_ADDR14_BRTAKEN:
16503 case R_PPC64_ADDR16:
16504 case R_PPC64_ADDR16_DS:
16505 case R_PPC64_ADDR16_HA:
16506 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16507 case R_PPC64_ADDR16_HIGH:
16508 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16509 case R_PPC64_ADDR16_HIGHER:
16510 case R_PPC64_ADDR16_HIGHERA:
16511 case R_PPC64_ADDR16_HIGHEST:
16512 case R_PPC64_ADDR16_HIGHESTA:
16513 case R_PPC64_ADDR16_LO:
16514 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16515 case R_PPC64_ADDR16_HIGHER34:
16516 case R_PPC64_ADDR16_HIGHERA34:
16517 case R_PPC64_ADDR16_HIGHEST34:
16518 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16519 case R_PPC64_ADDR24:
65f38f15
AM
16520 case R_PPC64_ADDR32:
16521 case R_PPC64_ADDR64:
16522 case R_PPC64_UADDR16:
16523 case R_PPC64_UADDR32:
16524 case R_PPC64_UADDR64:
5663e321
AM
16525 case R_PPC64_D34:
16526 case R_PPC64_D34_LO:
16527 case R_PPC64_D34_HI30:
16528 case R_PPC64_D34_HA30:
16529 case R_PPC64_D28:
411e1bfb 16530 dodyn:
5d1634d7 16531 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16532 break;
16533
41bd81ab
AM
16534 if (NO_OPD_RELOCS && is_opd)
16535 break;
16536
8a9e8e72 16537 if (bfd_link_pic (info)
b1b07054 16538 ? ((h == NULL
190eb1dd 16539 || h->elf.dyn_relocs != NULL)
b1b07054
AM
16540 && ((h != NULL && pc_dynrelocs (h))
16541 || must_be_dyn_reloc (info, r_type)))
8a9e8e72 16542 : (h != NULL
190eb1dd 16543 ? h->elf.dyn_relocs != NULL
d311bc8b 16544 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16545 {
b34976b6 16546 bfd_boolean skip, relocate;
65f38f15 16547 asection *sreloc;
1cf1f670 16548 bfd_vma out_off;
82e66161 16549 long indx = 0;
65f38f15
AM
16550
16551 /* When generating a dynamic object, these relocations
16552 are copied into the output file to be resolved at run
16553 time. */
16554
b34976b6
AM
16555 skip = FALSE;
16556 relocate = FALSE;
65f38f15 16557
1cf1f670
AM
16558 out_off = _bfd_elf_section_offset (output_bfd, info,
16559 input_section, rel->r_offset);
16560 if (out_off == (bfd_vma) -1)
b34976b6 16561 skip = TRUE;
1cf1f670 16562 else if (out_off == (bfd_vma) -2)
b34976b6 16563 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16564 out_off += (input_section->output_section->vma
16565 + input_section->output_offset);
16566 outrel.r_offset = out_off;
411e1bfb 16567 outrel.r_addend = rel->r_addend;
65f38f15 16568
1cf1f670
AM
16569 /* Optimize unaligned reloc use. */
16570 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16571 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16572 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16573 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16574 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16575 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16576 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16577 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16578 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16579
65f38f15 16580 if (skip)
0bb2d96a 16581 memset (&outrel, 0, sizeof outrel);
afe397ea 16582 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16583 && !is_opd
16584 && r_type != R_PPC64_TOC)
14acf4dc 16585 {
82e66161
AM
16586 indx = h->elf.dynindx;
16587 BFD_ASSERT (indx != -1);
16588 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16589 }
65f38f15
AM
16590 else
16591 {
41bd81ab
AM
16592 /* This symbol is local, or marked to become local,
16593 or this is an opd section reloc which must point
16594 at a local function. */
65f38f15 16595 outrel.r_addend += relocation;
e86ce104 16596 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16597 {
3fad3c7c 16598 if (is_opd && h != NULL)
afbe61cf
AM
16599 {
16600 /* Lie about opd entries. This case occurs
16601 when building shared libraries and we
16602 reference a function in another shared
3fad3c7c
AM
16603 lib. The same thing happens for a weak
16604 definition in an application that's
16605 overridden by a strong definition in a
16606 shared lib. (I believe this is a generic
16607 bug in binutils handling of weak syms.)
16608 In these cases we won't use the opd
1e2f5b6e 16609 entry in this lib. */
b34976b6 16610 unresolved_reloc = FALSE;
afbe61cf 16611 }
25f23106
AM
16612 if (!is_opd
16613 && r_type == R_PPC64_ADDR64
16614 && (h != NULL
16615 ? h->elf.type == STT_GNU_IFUNC
16616 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16617 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16618 else
16619 {
16620 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16621
25f23106
AM
16622 /* We need to relocate .opd contents for ld.so.
16623 Prelink also wants simple and consistent rules
16624 for relocs. This make all RELATIVE relocs have
16625 *r_offset equal to r_addend. */
16626 relocate = TRUE;
16627 }
65f38f15
AM
16628 }
16629 else
16630 {
25f23106
AM
16631 if (h != NULL
16632 ? h->elf.type == STT_GNU_IFUNC
16633 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16634 {
25f53a85 16635 info->callbacks->einfo
695344c0 16636 /* xgettext:c-format */
174d0a74 16637 (_("%H: %s for indirect "
c1c8c1ef 16638 "function `%pT' unsupported\n"),
25f53a85 16639 input_bfd, input_section, rel->r_offset,
25f23106
AM
16640 ppc64_elf_howto_table[r_type]->name,
16641 sym_name);
16642 ret = FALSE;
16643 }
cf35638d 16644 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16645 ;
16646 else if (sec == NULL || sec->owner == NULL)
16647 {
16648 bfd_set_error (bfd_error_bad_value);
b34976b6 16649 return FALSE;
65f38f15
AM
16650 }
16651 else
16652 {
f26a3287 16653 asection *osec = sec->output_section;
65f38f15 16654
f26a3287
AM
16655 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16656 {
16657 /* TLS symbol values are relative to the
16658 TLS segment. Dynamic relocations for
16659 local TLS symbols therefore can't be
16660 reduced to a relocation against their
16661 section symbol because it holds the
16662 address of the section, not a value
16663 relative to the TLS segment. We could
16664 change the .tdata dynamic section symbol
16665 to be zero value but STN_UNDEF works
16666 and is used elsewhere, eg. for TPREL64
16667 GOT relocs against local TLS symbols. */
16668 osec = htab->elf.tls_sec;
16669 indx = 0;
16670 }
16671 else
74541ad4 16672 {
74541ad4 16673 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16674 if (indx == 0)
16675 {
16676 if ((osec->flags & SEC_READONLY) == 0
16677 && htab->elf.data_index_section != NULL)
16678 osec = htab->elf.data_index_section;
16679 else
16680 osec = htab->elf.text_index_section;
16681 indx = elf_section_data (osec)->dynindx;
16682 }
16683 BFD_ASSERT (indx != 0);
74541ad4 16684 }
74541ad4 16685
65f38f15
AM
16686 /* We are turning this relocation into one
16687 against a section symbol, so subtract out
16688 the output section's address but not the
16689 offset of the input section in the output
16690 section. */
16691 outrel.r_addend -= osec->vma;
16692 }
16693
16694 outrel.r_info = ELF64_R_INFO (indx, r_type);
16695 }
16696 }
16697
16698 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16699 if (h != NULL
16700 ? h->elf.type == STT_GNU_IFUNC
16701 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16702 {
16703 sreloc = htab->elf.irelplt;
efb2a7b4 16704 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16705 htab->elf.ifunc_resolvers = TRUE;
82e66161 16706 }
65f38f15
AM
16707 if (sreloc == NULL)
16708 abort ();
16709
dfbb6ac9
AM
16710 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16711 >= sreloc->size)
16712 abort ();
947216bf
AM
16713 loc = sreloc->contents;
16714 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16715 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16716
e59a1001
AM
16717 if (!warned_dynamic
16718 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16719 {
16720 info->callbacks->einfo
16721 /* xgettext:c-format */
16722 (_("%X%P: %pB: %s against %pT "
16723 "is not supported by glibc as a dynamic relocation\n"),
16724 input_bfd,
16725 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16726 sym_name);
16727 warned_dynamic = TRUE;
16728 }
16729
65f38f15
AM
16730 /* If this reloc is against an external symbol, it will
16731 be computed at runtime, so there's no need to do
81407a69
AM
16732 anything now. However, for the sake of prelink ensure
16733 that the section contents are a known value. */
2cdcc330 16734 if (!relocate)
81407a69
AM
16735 {
16736 unresolved_reloc = FALSE;
16737 /* The value chosen here is quite arbitrary as ld.so
16738 ignores section contents except for the special
16739 case of .opd where the contents might be accessed
16740 before relocation. Choose zero, as that won't
16741 cause reloc overflow. */
16742 relocation = 0;
16743 addend = 0;
16744 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16745 to improve backward compatibility with older
16746 versions of ld. */
16747 if (r_type == R_PPC64_ADDR64)
16748 addend = outrel.r_addend;
16749 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16750 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16751 addend = outrel.r_offset;
81407a69 16752 }
65f38f15 16753 }
5bd4f169
AM
16754 break;
16755
65f38f15
AM
16756 case R_PPC64_COPY:
16757 case R_PPC64_GLOB_DAT:
16758 case R_PPC64_JMP_SLOT:
25f23106 16759 case R_PPC64_JMP_IREL:
65f38f15
AM
16760 case R_PPC64_RELATIVE:
16761 /* We shouldn't ever see these dynamic relocs in relocatable
16762 files. */
ae9a127f 16763 /* Fall through. */
65f38f15
AM
16764
16765 case R_PPC64_PLTGOT16:
16766 case R_PPC64_PLTGOT16_DS:
16767 case R_PPC64_PLTGOT16_HA:
16768 case R_PPC64_PLTGOT16_HI:
16769 case R_PPC64_PLTGOT16_LO:
16770 case R_PPC64_PLTGOT16_LO_DS:
16771 case R_PPC64_PLTREL32:
16772 case R_PPC64_PLTREL64:
16773 /* These ones haven't been implemented yet. */
16774
25f53a85 16775 info->callbacks->einfo
695344c0 16776 /* xgettext:c-format */
c1c8c1ef 16777 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16778 input_bfd,
4ce794b7 16779 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16780
16781 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16782 ret = FALSE;
c316a17c 16783 goto copy_reloc;
65f38f15 16784 }
5bd4f169 16785
67f0cbdb
AM
16786 /* Multi-instruction sequences that access the TOC can be
16787 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16788 to nop; addi rb,r2,x; */
67f0cbdb
AM
16789 switch (r_type)
16790 {
16791 default:
16792 break;
16793
16794 case R_PPC64_GOT_TLSLD16_HI:
16795 case R_PPC64_GOT_TLSGD16_HI:
16796 case R_PPC64_GOT_TPREL16_HI:
16797 case R_PPC64_GOT_DTPREL16_HI:
16798 case R_PPC64_GOT16_HI:
16799 case R_PPC64_TOC16_HI:
16800 /* These relocs would only be useful if building up an
16801 offset to later add to r2, perhaps in an indexed
16802 addressing mode instruction. Don't try to optimize.
16803 Unfortunately, the possibility of someone building up an
16804 offset like this or even with the HA relocs, means that
16805 we need to check the high insn when optimizing the low
16806 insn. */
16807 break;
16808
5663e321
AM
16809 case R_PPC64_PLTCALL_NOTOC:
16810 if (!unresolved_reloc)
16811 htab->notoc_plt = 1;
16812 /* Fall through. */
23cedd1d
AM
16813 case R_PPC64_PLTCALL:
16814 if (unresolved_reloc)
16815 {
16816 /* No plt entry. Make this into a direct call. */
16817 bfd_byte *p = contents + rel->r_offset;
16818 insn = bfd_get_32 (input_bfd, p);
16819 insn &= 1;
16820 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16821 if (r_type == R_PPC64_PLTCALL)
16822 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16823 unresolved_reloc = save_unresolved_reloc;
16824 r_type = R_PPC64_REL24;
16825 }
16826 break;
16827
5663e321 16828 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16829 case R_PPC64_PLTSEQ:
16830 if (unresolved_reloc)
16831 {
16832 unresolved_reloc = FALSE;
16833 goto nop_it;
16834 }
16835 break;
16836
5663e321
AM
16837 case R_PPC64_PLT_PCREL34_NOTOC:
16838 if (!unresolved_reloc)
16839 htab->notoc_plt = 1;
16840 /* Fall through. */
16841 case R_PPC64_PLT_PCREL34:
16842 if (unresolved_reloc)
16843 {
16844 bfd_byte *p = contents + rel->r_offset;
16845 bfd_put_32 (input_bfd, PNOP >> 32, p);
16846 bfd_put_32 (input_bfd, PNOP, p + 4);
16847 unresolved_reloc = FALSE;
16848 goto copy_reloc;
16849 }
16850 break;
16851
23cedd1d
AM
16852 case R_PPC64_PLT16_HA:
16853 if (unresolved_reloc)
16854 {
16855 unresolved_reloc = FALSE;
16856 goto nop_it;
16857 }
16858 /* Fall through. */
67f0cbdb
AM
16859 case R_PPC64_GOT_TLSLD16_HA:
16860 case R_PPC64_GOT_TLSGD16_HA:
16861 case R_PPC64_GOT_TPREL16_HA:
16862 case R_PPC64_GOT_DTPREL16_HA:
16863 case R_PPC64_GOT16_HA:
16864 case R_PPC64_TOC16_HA:
98528052 16865 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16866 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16867 {
23cedd1d
AM
16868 bfd_byte *p;
16869 nop_it:
16870 p = contents + (rel->r_offset & ~3);
98528052 16871 bfd_put_32 (input_bfd, NOP, p);
d830549d 16872 goto copy_reloc;
98528052 16873 }
67f0cbdb
AM
16874 break;
16875
23cedd1d
AM
16876 case R_PPC64_PLT16_LO:
16877 case R_PPC64_PLT16_LO_DS:
16878 if (unresolved_reloc)
16879 {
16880 unresolved_reloc = FALSE;
16881 goto nop_it;
16882 }
16883 /* Fall through. */
67f0cbdb
AM
16884 case R_PPC64_GOT_TLSLD16_LO:
16885 case R_PPC64_GOT_TLSGD16_LO:
16886 case R_PPC64_GOT_TPREL16_LO_DS:
16887 case R_PPC64_GOT_DTPREL16_LO_DS:
16888 case R_PPC64_GOT16_LO:
16889 case R_PPC64_GOT16_LO_DS:
16890 case R_PPC64_TOC16_LO:
16891 case R_PPC64_TOC16_LO_DS:
98528052 16892 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16893 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16894 {
16895 bfd_byte *p = contents + (rel->r_offset & ~3);
16896 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16897 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16898 {
16899 /* Transform addic to addi when we change reg. */
2365f8d7 16900 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16901 insn |= (14u << 26) | (2 << 16);
16902 }
16903 else
67f0cbdb 16904 {
98528052
AM
16905 insn &= ~(0x1f << 16);
16906 insn |= 2 << 16;
67f0cbdb 16907 }
560c8763 16908 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16909 }
16910 break;
9a23f96e
AM
16911
16912 case R_PPC64_TPREL16_HA:
16913 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16914 {
16915 bfd_byte *p = contents + (rel->r_offset & ~3);
16916 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16917 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16918 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16919 /* xgettext:c-format */
16920 info->callbacks->minfo
16921 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16922 input_bfd, input_section, rel->r_offset,
16923 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16924 else
d830549d
AM
16925 {
16926 bfd_put_32 (input_bfd, NOP, p);
16927 goto copy_reloc;
16928 }
9a23f96e
AM
16929 }
16930 break;
16931
16932 case R_PPC64_TPREL16_LO:
16933 case R_PPC64_TPREL16_LO_DS:
16934 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16935 {
16936 bfd_byte *p = contents + (rel->r_offset & ~3);
16937 insn = bfd_get_32 (input_bfd, p);
16938 insn &= ~(0x1f << 16);
16939 insn |= 13 << 16;
16940 bfd_put_32 (input_bfd, insn, p);
16941 }
16942 break;
67f0cbdb
AM
16943 }
16944
65f38f15
AM
16945 /* Do any further special processing. */
16946 switch (r_type)
16947 {
16948 default:
16949 break;
16950
25f23106 16951 case R_PPC64_REL16_HA:
4a969973
AM
16952 case R_PPC64_REL16_HIGHA:
16953 case R_PPC64_REL16_HIGHERA:
16954 case R_PPC64_REL16_HIGHESTA:
a680de9a 16955 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16956 case R_PPC64_ADDR16_HA:
16957 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16958 case R_PPC64_ADDR16_HIGHERA:
16959 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16960 case R_PPC64_TOC16_HA:
16961 case R_PPC64_SECTOFF_HA:
411e1bfb 16962 case R_PPC64_TPREL16_HA:
f9c6b907 16963 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16964 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16965 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16966 case R_PPC64_DTPREL16_HA:
16967 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16968 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16969 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16970 /* It's just possible that this symbol is a weak symbol
16971 that's not actually defined anywhere. In that case,
16972 'sec' would be NULL, and we should leave the symbol
16973 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16974 if (sec == NULL)
16975 break;
1a0670f3 16976 /* Fall through. */
5c5f6e17
AM
16977
16978 case R_PPC64_GOT16_HA:
16979 case R_PPC64_PLTGOT16_HA:
16980 case R_PPC64_PLT16_HA:
16981 case R_PPC64_GOT_TLSGD16_HA:
16982 case R_PPC64_GOT_TLSLD16_HA:
16983 case R_PPC64_GOT_TPREL16_HA:
16984 case R_PPC64_GOT_DTPREL16_HA:
16985 /* Add 0x10000 if sign bit in 0:15 is set.
16986 Bits 0:15 are not used. */
16987 addend += 0x8000;
65f38f15
AM
16988 break;
16989
5663e321
AM
16990 case R_PPC64_D34_HA30:
16991 case R_PPC64_ADDR16_HIGHERA34:
16992 case R_PPC64_ADDR16_HIGHESTA34:
16993 case R_PPC64_REL16_HIGHERA34:
16994 case R_PPC64_REL16_HIGHESTA34:
16995 if (sec != NULL)
16996 addend += 1ULL << 33;
16997 break;
16998
65f38f15
AM
16999 case R_PPC64_ADDR16_DS:
17000 case R_PPC64_ADDR16_LO_DS:
17001 case R_PPC64_GOT16_DS:
17002 case R_PPC64_GOT16_LO_DS:
17003 case R_PPC64_PLT16_LO_DS:
17004 case R_PPC64_SECTOFF_DS:
17005 case R_PPC64_SECTOFF_LO_DS:
17006 case R_PPC64_TOC16_DS:
17007 case R_PPC64_TOC16_LO_DS:
17008 case R_PPC64_PLTGOT16_DS:
17009 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
17010 case R_PPC64_GOT_TPREL16_DS:
17011 case R_PPC64_GOT_TPREL16_LO_DS:
17012 case R_PPC64_GOT_DTPREL16_DS:
17013 case R_PPC64_GOT_DTPREL16_LO_DS:
17014 case R_PPC64_TPREL16_DS:
17015 case R_PPC64_TPREL16_LO_DS:
17016 case R_PPC64_DTPREL16_DS:
17017 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
17018 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17019 mask = 3;
a680de9a
PB
17020 /* If this reloc is against an lq, lxv, or stxv insn, then
17021 the value must be a multiple of 16. This is somewhat of
17022 a hack, but the "correct" way to do this by defining _DQ
17023 forms of all the _DS relocs bloats all reloc switches in
17024 this file. It doesn't make much sense to use these
17025 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
17026 if ((insn & (0x3fu << 26)) == (56u << 26)
17027 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 17028 mask = 15;
a680de9a
PB
17029 relocation += addend;
17030 addend = insn & (mask ^ 3);
17031 if ((relocation & mask) != 0)
65f38f15 17032 {
a680de9a 17033 relocation ^= relocation & mask;
25f53a85 17034 info->callbacks->einfo
695344c0 17035 /* xgettext:c-format */
174d0a74 17036 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 17037 input_bfd, input_section, rel->r_offset,
d830549d 17038 ppc64_elf_howto_table[r_type]->name,
adadcc0c 17039 mask + 1);
65f38f15 17040 bfd_set_error (bfd_error_bad_value);
b34976b6 17041 ret = FALSE;
c316a17c 17042 goto copy_reloc;
65f38f15
AM
17043 }
17044 break;
5bd4f169
AM
17045 }
17046
239e1f3a
AM
17047 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17048 because such sections are not SEC_ALLOC and thus ld.so will
17049 not process them. */
d830549d 17050 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 17051 if (unresolved_reloc
239e1f3a 17052 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
17053 && h->elf.def_dynamic)
17054 && _bfd_elf_section_offset (output_bfd, info, input_section,
17055 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 17056 {
25f53a85 17057 info->callbacks->einfo
695344c0 17058 /* xgettext:c-format */
c1c8c1ef 17059 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 17060 input_bfd, input_section, rel->r_offset,
b80eed39 17061 howto->name,
039b3fef 17062 h->elf.root.root.string);
b34976b6 17063 ret = FALSE;
9c07fe7c 17064 }
5bd4f169 17065
b80eed39
AM
17066 /* 16-bit fields in insns mostly have signed values, but a
17067 few insns have 16-bit unsigned values. Really, we should
17068 have different reloc types. */
17069 if (howto->complain_on_overflow != complain_overflow_dont
17070 && howto->dst_mask == 0xffff
17071 && (input_section->flags & SEC_CODE) != 0)
17072 {
17073 enum complain_overflow complain = complain_overflow_signed;
17074
17075 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17076 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17077 complain = complain_overflow_bitfield;
17078 else if (howto->rightshift == 0
2365f8d7
AM
17079 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17080 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17081 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17082 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17083 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17084 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17085 complain = complain_overflow_unsigned;
17086 if (howto->complain_on_overflow != complain)
17087 {
17088 alt_howto = *howto;
17089 alt_howto.complain_on_overflow = complain;
17090 howto = &alt_howto;
17091 }
17092 }
17093
5663e321 17094 switch (r_type)
a680de9a 17095 {
5663e321
AM
17096 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17097 case R_PPC64_D34:
17098 case R_PPC64_D34_LO:
17099 case R_PPC64_D34_HI30:
17100 case R_PPC64_D34_HA30:
17101 case R_PPC64_PCREL34:
17102 case R_PPC64_GOT_PCREL34:
c213164a
AM
17103 case R_PPC64_TPREL34:
17104 case R_PPC64_DTPREL34:
87c69f97
AM
17105 case R_PPC64_GOT_TLSGD_PCREL34:
17106 case R_PPC64_GOT_TLSLD_PCREL34:
17107 case R_PPC64_GOT_TPREL_PCREL34:
17108 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
17109 case R_PPC64_PLT_PCREL34:
17110 case R_PPC64_PLT_PCREL34_NOTOC:
17111 case R_PPC64_D28:
17112 case R_PPC64_PCREL28:
17113 if (rel->r_offset + 8 > input_section->size)
17114 r = bfd_reloc_outofrange;
17115 else
17116 {
5663e321
AM
17117 relocation += addend;
17118 if (howto->pc_relative)
17119 relocation -= (rel->r_offset
17120 + input_section->output_offset
17121 + input_section->output_section->vma);
17122 relocation >>= howto->rightshift;
17123
17124 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17125 pinsn <<= 32;
17126 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17127
17128 pinsn &= ~howto->dst_mask;
17129 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17130 & howto->dst_mask);
17131 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17132 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17133 r = bfd_reloc_ok;
17134 if (howto->complain_on_overflow == complain_overflow_signed
17135 && (relocation + (1ULL << (howto->bitsize - 1))
17136 >= 1ULL << howto->bitsize))
17137 r = bfd_reloc_overflow;
17138 }
17139 break;
17140
17141 case R_PPC64_REL16DX_HA:
a680de9a
PB
17142 if (rel->r_offset + 4 > input_section->size)
17143 r = bfd_reloc_outofrange;
17144 else
17145 {
17146 relocation += addend;
17147 relocation -= (rel->r_offset
17148 + input_section->output_offset
17149 + input_section->output_section->vma);
3de43e7b 17150 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17151 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17152 insn &= ~0x1fffc1;
3de43e7b 17153 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17154 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17155 r = bfd_reloc_ok;
3de43e7b 17156 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17157 r = bfd_reloc_overflow;
17158 }
5663e321
AM
17159 break;
17160
17161 default:
17162 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17163 contents, rel->r_offset,
17164 relocation, addend);
a680de9a 17165 }
5bd4f169 17166
ef60b7ff 17167 if (r != bfd_reloc_ok)
5bd4f169 17168 {
bc30df16 17169 char *more_info = NULL;
b80eed39 17170 const char *reloc_name = howto->name;
bc30df16
AM
17171
17172 if (reloc_dest != DEST_NORMAL)
17173 {
17174 more_info = bfd_malloc (strlen (reloc_name) + 8);
17175 if (more_info != NULL)
17176 {
17177 strcpy (more_info, reloc_name);
17178 strcat (more_info, (reloc_dest == DEST_OPD
17179 ? " (OPD)" : " (stub)"));
17180 reloc_name = more_info;
17181 }
17182 }
17183
cd27b276 17184 if (r == bfd_reloc_overflow)
5bd4f169 17185 {
8131c122
AM
17186 /* On code like "if (foo) foo();" don't report overflow
17187 on a branch to zero when foo is undefined. */
17188 if (!warned
17189 && (reloc_dest == DEST_STUB
17190 || !(h != NULL
17191 && (h->elf.root.type == bfd_link_hash_undefweak
17192 || h->elf.root.type == bfd_link_hash_undefined)
17193 && is_branch_reloc (r_type))))
1a72702b
AM
17194 info->callbacks->reloc_overflow (info, &h->elf.root,
17195 sym_name, reloc_name,
17196 orig_rel.r_addend,
17197 input_bfd, input_section,
17198 rel->r_offset);
ef60b7ff
AM
17199 }
17200 else
17201 {
25f53a85 17202 info->callbacks->einfo
695344c0 17203 /* xgettext:c-format */
c1c8c1ef 17204 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17205 input_bfd, input_section, rel->r_offset,
bc30df16 17206 reloc_name, sym_name, (int) r);
b34976b6 17207 ret = FALSE;
ef60b7ff 17208 }
c9594989 17209 free (more_info);
5bd4f169 17210 }
c316a17c
AM
17211 copy_reloc:
17212 if (wrel != rel)
17213 *wrel = *rel;
17214 }
17215
17216 if (wrel != rel)
17217 {
17218 Elf_Internal_Shdr *rel_hdr;
17219 size_t deleted = rel - wrel;
17220
17221 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17222 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17223 if (rel_hdr->sh_size == 0)
17224 {
17225 /* It is too late to remove an empty reloc section. Leave
17226 one NONE reloc.
17227 ??? What is wrong with an empty section??? */
17228 rel_hdr->sh_size = rel_hdr->sh_entsize;
17229 deleted -= 1;
17230 }
17231 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17232 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17233 input_section->reloc_count -= deleted;
5bd4f169
AM
17234 }
17235
645ea6a9
AM
17236 /* If we're emitting relocations, then shortly after this function
17237 returns, reloc offsets and addends for this section will be
17238 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17239 file rather than the input. Save a copy of the relocs for
17240 opd_entry_value. */
0e1862bb 17241 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17242 {
17243 bfd_size_type amt;
17244 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17245 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17246 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17247 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17248 if (rel == NULL)
17249 return FALSE;
17250 memcpy (rel, relocs, amt);
17251 }
5bd4f169
AM
17252 return ret;
17253}
17254
754021d0
AM
17255/* Adjust the value of any local symbols in opd sections. */
17256
6e0b88f1 17257static int
754021d0
AM
17258ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17259 const char *name ATTRIBUTE_UNUSED,
17260 Elf_Internal_Sym *elfsym,
17261 asection *input_sec,
17262 struct elf_link_hash_entry *h)
17263{
74f0fb50
AM
17264 struct _opd_sec_data *opd;
17265 long adjust;
754021d0
AM
17266 bfd_vma value;
17267
4025353c 17268 if (h != NULL)
6e0b88f1 17269 return 1;
4025353c 17270
74f0fb50
AM
17271 opd = get_opd_info (input_sec);
17272 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17273 return 1;
754021d0
AM
17274
17275 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17276 if (!bfd_link_relocatable (info))
754021d0
AM
17277 value -= input_sec->output_section->vma;
17278
51aecdc5 17279 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17280 if (adjust == -1)
6e0b88f1
AM
17281 return 2;
17282
17283 elfsym->st_value += adjust;
17284 return 1;
754021d0
AM
17285}
17286
5bd4f169
AM
17287/* Finish up dynamic symbol handling. We set the contents of various
17288 dynamic sections here. */
17289
b34976b6 17290static bfd_boolean
4ce794b7
AM
17291ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17292 struct bfd_link_info *info,
17293 struct elf_link_hash_entry *h,
4aef7643 17294 Elf_Internal_Sym *sym)
5bd4f169 17295{
65f38f15 17296 struct ppc_link_hash_table *htab;
8387904d 17297 struct plt_entry *ent;
5bd4f169 17298
65f38f15 17299 htab = ppc_hash_table (info);
4dfe6ac6
NC
17300 if (htab == NULL)
17301 return FALSE;
5bd4f169 17302
49c09209
AM
17303 if (!htab->opd_abi && !h->def_regular)
17304 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17305 if (ent->plt.offset != (bfd_vma) -1)
17306 {
17307 /* Mark the symbol as undefined, rather than as
17308 defined in glink. Leave the value if there were
17309 any relocations where pointer equality matters
17310 (this is a clue for the dynamic linker, to make
17311 function pointer comparisons work between an
17312 application and shared library), otherwise set it
17313 to zero. */
17314 sym->st_shndx = SHN_UNDEF;
17315 if (!h->pointer_equality_needed)
17316 sym->st_value = 0;
17317 else if (!h->ref_regular_nonweak)
17318 {
17319 /* This breaks function pointer comparisons, but
17320 that is better than breaking tests for a NULL
17321 function pointer. */
17322 sym->st_value = 0;
17323 }
17324 break;
17325 }
5bd4f169 17326
1bdd8fac
AM
17327 if (h->needs_copy
17328 && (h->root.type == bfd_link_hash_defined
17329 || h->root.type == bfd_link_hash_defweak)
17330 && (h->root.u.def.section == htab->elf.sdynbss
17331 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17332 {
65f38f15 17333 /* This symbol needs a copy reloc. Set it up. */
49c09209 17334 Elf_Internal_Rela rela;
5474d94f 17335 asection *srel;
49c09209 17336 bfd_byte *loc;
5bd4f169 17337
1bdd8fac 17338 if (h->dynindx == -1)
65f38f15 17339 abort ();
5bd4f169 17340
ed7007c1 17341 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17342 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17343 rela.r_addend = 0;
afbf7e8e 17344 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17345 srel = htab->elf.sreldynrelro;
17346 else
17347 srel = htab->elf.srelbss;
17348 loc = srel->contents;
17349 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17350 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17351 }
17352
b34976b6 17353 return TRUE;
5bd4f169
AM
17354}
17355
65f38f15
AM
17356/* Used to decide how to sort relocs in an optimal manner for the
17357 dynamic linker, before writing them out. */
17358
17359static enum elf_reloc_type_class
7e612e98
AM
17360ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17361 const asection *rel_sec,
17362 const Elf_Internal_Rela *rela)
65f38f15 17363{
04c9666a 17364 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17365 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17366
33e44f2e 17367 if (rel_sec == htab->elf.irelplt)
7e612e98 17368 return reloc_class_ifunc;
a33d1f77 17369
4ce794b7 17370 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17371 switch (r_type)
65f38f15
AM
17372 {
17373 case R_PPC64_RELATIVE:
17374 return reloc_class_relative;
17375 case R_PPC64_JMP_SLOT:
17376 return reloc_class_plt;
17377 case R_PPC64_COPY:
17378 return reloc_class_copy;
17379 default:
17380 return reloc_class_normal;
17381 }
17382}
17383
5bd4f169
AM
17384/* Finish up the dynamic sections. */
17385
b34976b6 17386static bfd_boolean
4ce794b7
AM
17387ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17388 struct bfd_link_info *info)
5bd4f169 17389{
65f38f15
AM
17390 struct ppc_link_hash_table *htab;
17391 bfd *dynobj;
5bd4f169 17392 asection *sdyn;
5bd4f169 17393
65f38f15 17394 htab = ppc_hash_table (info);
4dfe6ac6
NC
17395 if (htab == NULL)
17396 return FALSE;
17397
65f38f15 17398 dynobj = htab->elf.dynobj;
3d4d4302 17399 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17400
65f38f15 17401 if (htab->elf.dynamic_sections_created)
5bd4f169 17402 {
5bd4f169
AM
17403 Elf64_External_Dyn *dyncon, *dynconend;
17404
33e44f2e 17405 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17406 abort ();
5bd4f169
AM
17407
17408 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17409 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17410 for (; dyncon < dynconend; dyncon++)
17411 {
17412 Elf_Internal_Dyn dyn;
19397422 17413 asection *s;
5bd4f169
AM
17414
17415 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17416
17417 switch (dyn.d_tag)
17418 {
65f38f15
AM
17419 default:
17420 continue;
5bd4f169 17421
5d1634d7 17422 case DT_PPC64_GLINK:
4ce794b7 17423 s = htab->glink;
6348e046 17424 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17425 /* We stupidly defined DT_PPC64_GLINK to be the start
17426 of glink rather than the first entry point, which is
17427 what ld.so needs, and now have a bigger stub to
17428 support automatic multiple TOCs. */
9e390558 17429 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17430 break;
17431
19397422
AM
17432 case DT_PPC64_OPD:
17433 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17434 if (s == NULL)
17435 continue;
17436 dyn.d_un.d_ptr = s->vma;
19397422
AM
17437 break;
17438
e8910a83 17439 case DT_PPC64_OPT:
5663e321
AM
17440 if ((htab->do_multi_toc && htab->multi_toc_needed)
17441 || htab->notoc_plt)
e8910a83 17442 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17443 if (htab->has_plt_localentry0)
17444 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17445 break;
17446
19397422
AM
17447 case DT_PPC64_OPDSZ:
17448 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17449 if (s == NULL)
17450 continue;
eea6121a 17451 dyn.d_un.d_val = s->size;
19397422
AM
17452 break;
17453
65f38f15 17454 case DT_PLTGOT:
33e44f2e 17455 s = htab->elf.splt;
6348e046 17456 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17457 break;
17458
17459 case DT_JMPREL:
33e44f2e 17460 s = htab->elf.srelplt;
6348e046 17461 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17462 break;
5bd4f169 17463
65f38f15 17464 case DT_PLTRELSZ:
33e44f2e 17465 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17466 break;
82e66161
AM
17467
17468 case DT_TEXTREL:
cebd6b8a 17469 if (htab->elf.ifunc_resolvers)
82e66161
AM
17470 info->callbacks->einfo
17471 (_("%P: warning: text relocations and GNU indirect "
17472 "functions may result in a segfault at runtime\n"));
17473 continue;
5bd4f169 17474 }
5bd4f169 17475
65f38f15 17476 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17477 }
5bd4f169
AM
17478 }
17479
6528b6eb
AM
17480 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17481 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17482 {
17483 /* Fill in the first entry in the global offset table.
17484 We use it to hold the link-time TOCbase. */
17485 bfd_put_64 (output_bfd,
60ee0d4a 17486 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17487 htab->elf.sgot->contents);
5d1634d7
AM
17488
17489 /* Set .got entry size. */
2cdcc330
AM
17490 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17491 = 8;
5d1634d7
AM
17492 }
17493
6528b6eb
AM
17494 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17495 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17496 {
17497 /* Set .plt entry size. */
33e44f2e 17498 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17499 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17500 }
17501
84f5d08e
AM
17502 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17503 brlt ourselves if emitrelocations. */
17504 if (htab->brlt != NULL
17505 && htab->brlt->reloc_count != 0
17506 && !_bfd_elf_link_output_relocs (output_bfd,
17507 htab->brlt,
d4730f92 17508 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17509 elf_section_data (htab->brlt)->relocs,
17510 NULL))
17511 return FALSE;
17512
176a0d42
AM
17513 if (htab->glink != NULL
17514 && htab->glink->reloc_count != 0
17515 && !_bfd_elf_link_output_relocs (output_bfd,
17516 htab->glink,
d4730f92 17517 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17518 elf_section_data (htab->glink)->relocs,
17519 NULL))
17520 return FALSE;
17521
da44f4e5 17522
df136d64
AM
17523 if (htab->glink_eh_frame != NULL
17524 && htab->glink_eh_frame->size != 0
17525 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17526 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17527 htab->glink_eh_frame,
17528 htab->glink_eh_frame->contents))
17529 return FALSE;
58d180e8 17530
e717da7e 17531 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17532 since we didn't add them to DYNOBJ. We know dynobj is the first
17533 bfd. */
c72f2fb2 17534 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17535 {
17536 asection *s;
7b53ace3 17537
0c8d6e5c 17538 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17539 continue;
17540
e717da7e
AM
17541 s = ppc64_elf_tdata (dynobj)->got;
17542 if (s != NULL
eea6121a 17543 && s->size != 0
e717da7e
AM
17544 && s->output_section != bfd_abs_section_ptr
17545 && !bfd_set_section_contents (output_bfd, s->output_section,
17546 s->contents, s->output_offset,
eea6121a 17547 s->size))
e717da7e
AM
17548 return FALSE;
17549 s = ppc64_elf_tdata (dynobj)->relgot;
17550 if (s != NULL
eea6121a 17551 && s->size != 0
e717da7e
AM
17552 && s->output_section != bfd_abs_section_ptr
17553 && !bfd_set_section_contents (output_bfd, s->output_section,
17554 s->contents, s->output_offset,
eea6121a 17555 s->size))
e717da7e
AM
17556 return FALSE;
17557 }
f6c52c13 17558
b34976b6 17559 return TRUE;
5bd4f169
AM
17560}
17561
5bd4f169 17562#include "elf64-target.h"
7b8e7dad
AM
17563
17564/* FreeBSD support */
17565
17566#undef TARGET_LITTLE_SYM
17567#undef TARGET_LITTLE_NAME
17568
17569#undef TARGET_BIG_SYM
6d00b590 17570#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17571#undef TARGET_BIG_NAME
17572#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17573
17574#undef ELF_OSABI
17575#define ELF_OSABI ELFOSABI_FREEBSD
17576
17577#undef elf64_bed
17578#define elf64_bed elf64_powerpc_fbsd_bed
17579
17580#include "elf64-target.h"