]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-ppc.c
Power10 stub selection
[thirdparty/binutils-gdb.git] / bfd / elf64-ppc.c
CommitLineData
5bd4f169 1/* PowerPC64-specific support for 64-bit ELF.
b3adc24a 2 Copyright (C) 1999-2020 Free Software Foundation, Inc.
5bd4f169
AM
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
32ca9640 5 Largely rewritten by Alan Modra.
5bd4f169 6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
5bd4f169 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
5bd4f169 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
5bd4f169 18
4ce794b7
AM
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
3e110533 21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
5bd4f169 22
cd123cb7 23
4ce794b7
AM
24/* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
5bd4f169 27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
5bd4f169 30#include "bfd.h"
5bd4f169
AM
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
04c9666a 34#include "elf/ppc64.h"
5d1634d7 35#include "elf64-ppc.h"
58d180e8 36#include "dwarf2.h"
5bd4f169 37
bb294208
AM
38/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
39#define OCTETS_PER_BYTE(ABFD, SEC) 1
40
805fc799 41static bfd_reloc_status_type ppc64_elf_ha_reloc
4ce794b7 42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016
AM
43static bfd_reloc_status_type ppc64_elf_branch_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 45static bfd_reloc_status_type ppc64_elf_brtaken_reloc
4ce794b7 46 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 47static bfd_reloc_status_type ppc64_elf_sectoff_reloc
4ce794b7 48 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 49static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
4ce794b7 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 51static bfd_reloc_status_type ppc64_elf_toc_reloc
4ce794b7 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 53static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
4ce794b7 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 55static bfd_reloc_status_type ppc64_elf_toc64_reloc
4ce794b7 56 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
5663e321
AM
57static bfd_reloc_status_type ppc64_elf_prefix_reloc
58 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
805fc799 59static bfd_reloc_status_type ppc64_elf_unhandled_reloc
4ce794b7 60 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
2441e016 61static bfd_vma opd_entry_value
aef36ac1 62 (asection *, bfd_vma, asection **, bfd_vma *, bfd_boolean);
5bd4f169 63
6d00b590 64#define TARGET_LITTLE_SYM powerpc_elf64_le_vec
ad8e1ba5 65#define TARGET_LITTLE_NAME "elf64-powerpcle"
6d00b590 66#define TARGET_BIG_SYM powerpc_elf64_vec
ad8e1ba5
AM
67#define TARGET_BIG_NAME "elf64-powerpc"
68#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 69#define ELF_TARGET_ID PPC64_ELF_DATA
ad8e1ba5
AM
70#define ELF_MACHINE_CODE EM_PPC64
71#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
72#define ELF_COMMONPAGESIZE 0x1000
73#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
ad8e1ba5
AM
74#define elf_info_to_howto ppc64_elf_info_to_howto
75
76#define elf_backend_want_got_sym 0
77#define elf_backend_want_plt_sym 0
78#define elf_backend_plt_alignment 3
79#define elf_backend_plt_not_loaded 1
ad8e1ba5 80#define elf_backend_got_header_size 8
5474d94f 81#define elf_backend_want_dynrelro 1
ad8e1ba5
AM
82#define elf_backend_can_gc_sections 1
83#define elf_backend_can_refcount 1
84#define elf_backend_rela_normal 1
64f52338 85#define elf_backend_dtrel_excludes_plt 1
6bfdb61b 86#define elf_backend_default_execstack 0
ad8e1ba5 87
e717da7e 88#define bfd_elf64_mkobject ppc64_elf_mkobject
ad8e1ba5 89#define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
aa374f67 90#define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
ee67d69a
AM
91#define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
92#define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
ad8e1ba5
AM
93#define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
94#define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
90e3cdf2 95#define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
aa374f67 96#define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
8c5b4e52 97#define bfd_elf64_bfd_gc_sections ppc64_elf_gc_sections
ad8e1ba5
AM
98
99#define elf_backend_object_p ppc64_elf_object_p
d37c89e5
AM
100#define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
101#define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
183e98be 102#define elf_backend_write_core_note ppc64_elf_write_core_note
9d19e4fd 103#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
ad8e1ba5 104#define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
555cd476 105#define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
f6c7c3e8 106#define elf_backend_check_directives ppc64_elf_before_check_relocs
e5034e59 107#define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
8387904d 108#define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
ad8e1ba5 109#define elf_backend_check_relocs ppc64_elf_check_relocs
c0e331c7 110#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
74f0fb50 111#define elf_backend_gc_keep ppc64_elf_gc_keep
64d03ab5 112#define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
ad8e1ba5 113#define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
ad8e1ba5
AM
114#define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
115#define elf_backend_hide_symbol ppc64_elf_hide_symbol
9f296da3 116#define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
ad8e1ba5
AM
117#define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
118#define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
a345bc8d 119#define elf_backend_hash_symbol ppc64_elf_hash_symbol
74541ad4 120#define elf_backend_init_index_section _bfd_elf_init_2_index_sections
60124e18 121#define elf_backend_action_discarded ppc64_elf_action_discarded
ad8e1ba5
AM
122#define elf_backend_relocate_section ppc64_elf_relocate_section
123#define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
124#define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
125#define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
754021d0 126#define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
29ef7005 127#define elf_backend_special_sections ppc64_elf_special_sections
bf577467 128#define elf_backend_section_flags ppc64_elf_section_flags
6911b7dc 129#define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
8c5b4e52 130#define elf_backend_merge_symbol ppc64_elf_merge_symbol
bce964aa 131#define elf_backend_get_reloc_section bfd_get_section_by_name
ad8e1ba5 132
5bd4f169
AM
133/* The name of the dynamic interpreter. This is put in the .interp
134 section. */
135#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
136
137/* The size in bytes of an entry in the procedure linkage table. */
b9e5796b 138#define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
2d7ad24e 139#define LOCAL_PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 16 : 8)
5bd4f169
AM
140
141/* The initial size of the plt reserved for the dynamic linker. */
b9e5796b 142#define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
5bd4f169 143
a078d95a
AM
144/* Offsets to some stack save slots. */
145#define STK_LR 16
146#define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
eb8d7fda 147/* This one is dodgy. ELFv2 does not have a linker word, so use the
a078d95a
AM
148 CR save slot. Used only by optimised __tls_get_addr call stub,
149 relying on __tls_get_addr_opt not saving CR.. */
150#define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
151
5bd4f169 152/* TOC base pointers offset from start of TOC. */
411e1bfb 153#define TOC_BASE_OFF 0x8000
a27e685f
AM
154/* TOC base alignment. */
155#define TOC_BASE_ALIGN 256
411e1bfb
AM
156
157/* Offset of tp and dtp pointers from start of TLS block. */
158#define TP_OFFSET 0x7000
159#define DTP_OFFSET 0x8000
5bd4f169 160
ad8e1ba5
AM
161/* .plt call stub instructions. The normal stub is like this, but
162 sometimes the .plt entry crosses a 64k boundary and we need to
71a39c98 163 insert an addi to adjust r11. */
a078d95a 164#define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
71a39c98
AM
165#define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
166#define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
167#define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
168#define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
169#define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
5d1634d7
AM
170#define BCTR 0x4e800420 /* bctr */
171
07d6d2b8 172#define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
05d0e962
AM
173#define ADDI_R12_R11 0x398b0000 /* addi %r12,%r11,off@l */
174#define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
07d6d2b8
AM
175#define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
176#define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
177
178#define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
179#define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
180#define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
181#define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
182#define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
183#define BNECTR 0x4ca20420 /* bnectr+ */
184#define BNECTR_P4 0x4ce20420 /* bnectr+ */
794e51c0 185
71a39c98 186#define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
ac2df442 187#define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
07d6d2b8 188#define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
ac2df442 189
07d6d2b8
AM
190#define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
191#define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
192#define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
ad8e1ba5 193
04bdff6a 194#define LI_R11_0 0x39600000 /* li %r11,0 */
07d6d2b8 195#define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
04bdff6a 196#define LIS_R11 0x3d600000 /* lis %r11,xxx@ha */
05d0e962 197#define LIS_R12 0x3d800000 /* lis %r12,xxx@ha */
006589cf
AM
198#define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
199#define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
05d0e962 200#define ADDIS_R12_R11 0x3d8b0000 /* addis %r12,%r11,xxx@ha */
a345bc8d 201#define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
05d0e962 202#define ORIS_R12_R12_0 0x658c0000 /* oris %r12,%r12,xxx@hi */
04bdff6a 203#define ORI_R11_R11_0 0x616b0000 /* ori %r11,%r11,xxx@l */
05d0e962 204#define ORI_R12_R12_0 0x618c0000 /* ori %r12,%r12,xxx@l */
07d6d2b8 205#define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
04bdff6a 206#define SLDI_R11_R11_34 0x796b1746 /* sldi %r11,%r11,34 */
05d0e962
AM
207#define SLDI_R12_R12_32 0x799c07c6 /* sldi %r12,%r12,32 */
208#define LDX_R12_R11_R12 0x7d8b602a /* ldx %r12,%r11,%r12 */
209#define ADD_R12_R11_R12 0x7d8b6214 /* add %r12,%r11,%r12 */
04bdff6a
AM
210#define PADDI_R12_PC 0x0610000039800000ULL
211#define PLD_R12_PC 0x04100000e5800000ULL
5663e321 212#define PNOP 0x0700000000000000ULL
a345bc8d 213
9e390558
AM
214/* __glink_PLTresolve stub instructions. We enter with the index in R0. */
215#define GLINK_PLTRESOLVE_SIZE(htab) \
407aa07c 216 (8u + (htab->opd_abi ? 11 * 4 : 14 * 4))
ee4bf8d2
AM
217 /* 0: */
218 /* .quad plt0-1f */
219 /* __glink: */
220#define MFLR_R12 0x7d8802a6 /* mflr %12 */
221#define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
222 /* 1: */
223#define MFLR_R11 0x7d6802a6 /* mflr %11 */
71a39c98 224 /* ld %2,(0b-1b)(%11) */
ee4bf8d2 225#define MTLR_R12 0x7d8803a6 /* mtlr %12 */
71a39c98
AM
226#define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
227 /* ld %12,0(%11) */
228 /* ld %2,8(%11) */
229 /* mtctr %12 */
230 /* ld %11,16(%11) */
ee4bf8d2 231 /* bctr */
b9e5796b
AM
232#define MFLR_R0 0x7c0802a6 /* mflr %r0 */
233#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
234#define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
235#define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
236#define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
5d1634d7
AM
237
238/* Pad with this. */
239#define NOP 0x60000000
240
721956f4
AM
241/* Some other nops. */
242#define CROR_151515 0x4def7b82
243#define CROR_313131 0x4ffffb82
244
cedb70c5 245/* .glink entries for the first 32k functions are two instructions. */
5d1634d7
AM
246#define LI_R0_0 0x38000000 /* li %r0,0 */
247#define B_DOT 0x48000000 /* b . */
248
249/* After that, we need two instructions to load the index, followed by
250 a branch. */
251#define LIS_R0_0 0x3c000000 /* lis %r0,0 */
10ed1bba 252#define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
41bd81ab 253
deb0e272
AM
254/* Instructions used by the save and restore reg functions. */
255#define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
256#define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
257#define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
258#define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
82bd7b59
AM
259#define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
260#define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
deb0e272
AM
261#define LI_R12_0 0x39800000 /* li %r12,0 */
262#define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
263#define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
264#define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
82bd7b59
AM
265#define BLR 0x4e800020 /* blr */
266
41bd81ab
AM
267/* Since .opd is an array of descriptors and each entry will end up
268 with identical R_PPC64_RELATIVE relocs, there is really no need to
269 propagate .opd relocs; The dynamic linker should be taught to
1e2f5b6e 270 relocate .opd without reloc entries. */
41bd81ab
AM
271#ifndef NO_OPD_RELOCS
272#define NO_OPD_RELOCS 0
273#endif
810d4e75 274
a4b6fadd
AM
275#ifndef ARRAY_SIZE
276#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
277#endif
278
810d4e75
AM
279static inline int
280abiversion (bfd *abfd)
281{
282 return elf_elfheader (abfd)->e_flags & EF_PPC64_ABI;
283}
284
285static inline void
286set_abiversion (bfd *abfd, int ver)
287{
288 elf_elfheader (abfd)->e_flags &= ~EF_PPC64_ABI;
289 elf_elfheader (abfd)->e_flags |= ver & EF_PPC64_ABI;
290}
5bd4f169
AM
291\f
292/* Relocation HOWTO's. */
46807bf4
AM
293/* Like other ELF RELA targets that don't apply multiple
294 field-altering relocations to the same localation, src_mask is
295 always zero and pcrel_offset is the same as pc_relative.
296 PowerPC can always use a zero bitpos, even when the field is not at
297 the LSB. For example, a REL24 could use rightshift=2, bisize=24
298 and bitpos=2 which matches the ABI description, or as we do here,
299 rightshift=0, bitsize=26 and bitpos=0. */
300#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
301 complain, special_func) \
302 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
303 complain_overflow_ ## complain, special_func, \
304 #type, FALSE, 0, mask, pc_relative)
305
04c9666a 306static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
5bd4f169 307
f3185997
NC
308static reloc_howto_type ppc64_elf_howto_raw[] =
309{
5bd4f169 310 /* This reloc does nothing. */
46807bf4
AM
311 HOW (R_PPC64_NONE, 3, 0, 0, 0, FALSE, dont,
312 bfd_elf_generic_reloc),
5bd4f169
AM
313
314 /* A standard 32 bit relocation. */
46807bf4
AM
315 HOW (R_PPC64_ADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
316 bfd_elf_generic_reloc),
5bd4f169
AM
317
318 /* An absolute 26 bit branch; the lower two bits must be zero.
319 FIXME: we don't check that, we just clear them. */
46807bf4
AM
320 HOW (R_PPC64_ADDR24, 2, 26, 0x03fffffc, 0, FALSE, bitfield,
321 bfd_elf_generic_reloc),
5bd4f169
AM
322
323 /* A standard 16 bit relocation. */
46807bf4
AM
324 HOW (R_PPC64_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
325 bfd_elf_generic_reloc),
5bd4f169
AM
326
327 /* A 16 bit relocation without overflow. */
46807bf4
AM
328 HOW (R_PPC64_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
5bd4f169
AM
330
331 /* Bits 16-31 of an address. */
46807bf4
AM
332 HOW (R_PPC64_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, signed,
333 bfd_elf_generic_reloc),
5bd4f169
AM
334
335 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
336 bits, treated as a signed number, is negative. */
46807bf4
AM
337 HOW (R_PPC64_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, signed,
338 ppc64_elf_ha_reloc),
5bd4f169
AM
339
340 /* An absolute 16 bit branch; the lower two bits must be zero.
341 FIXME: we don't check that, we just clear them. */
46807bf4
AM
342 HOW (R_PPC64_ADDR14, 2, 16, 0x0000fffc, 0, FALSE, signed,
343 ppc64_elf_branch_reloc),
5bd4f169
AM
344
345 /* An absolute 16 bit branch, for which bit 10 should be set to
346 indicate that the branch is expected to be taken. The lower two
347 bits must be zero. */
46807bf4
AM
348 HOW (R_PPC64_ADDR14_BRTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
349 ppc64_elf_brtaken_reloc),
5bd4f169
AM
350
351 /* An absolute 16 bit branch, for which bit 10 should be set to
352 indicate that the branch is not expected to be taken. The lower
353 two bits must be zero. */
46807bf4
AM
354 HOW (R_PPC64_ADDR14_BRNTAKEN, 2, 16, 0x0000fffc, 0, FALSE, signed,
355 ppc64_elf_brtaken_reloc),
5bd4f169
AM
356
357 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
358 HOW (R_PPC64_REL24, 2, 26, 0x03fffffc, 0, TRUE, signed,
359 ppc64_elf_branch_reloc),
5bd4f169 360
05d0e962 361 /* A variant of R_PPC64_REL24, used when r2 is not the toc pointer. */
46807bf4
AM
362 HOW (R_PPC64_REL24_NOTOC, 2, 26, 0x03fffffc, 0, TRUE, signed,
363 ppc64_elf_branch_reloc),
05d0e962 364
5bd4f169 365 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
366 HOW (R_PPC64_REL14, 2, 16, 0x0000fffc, 0, TRUE, signed,
367 ppc64_elf_branch_reloc),
5bd4f169
AM
368
369 /* A relative 16 bit branch. Bit 10 should be set to indicate that
370 the branch is expected to be taken. The lower two bits must be
371 zero. */
46807bf4
AM
372 HOW (R_PPC64_REL14_BRTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
373 ppc64_elf_brtaken_reloc),
5bd4f169
AM
374
375 /* A relative 16 bit branch. Bit 10 should be set to indicate that
376 the branch is not expected to be taken. The lower two bits must
377 be zero. */
46807bf4
AM
378 HOW (R_PPC64_REL14_BRNTAKEN, 2, 16, 0x0000fffc, 0, TRUE, signed,
379 ppc64_elf_brtaken_reloc),
5bd4f169
AM
380
381 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
382 symbol. */
46807bf4
AM
383 HOW (R_PPC64_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
384 ppc64_elf_unhandled_reloc),
5bd4f169
AM
385
386 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
387 the symbol. */
46807bf4
AM
388 HOW (R_PPC64_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
389 ppc64_elf_unhandled_reloc),
5bd4f169
AM
390
391 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
392 the symbol. */
46807bf4
AM
393 HOW (R_PPC64_GOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
394 ppc64_elf_unhandled_reloc),
5bd4f169
AM
395
396 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
397 the symbol. */
46807bf4
AM
398 HOW (R_PPC64_GOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
399 ppc64_elf_unhandled_reloc),
5bd4f169
AM
400
401 /* This is used only by the dynamic linker. The symbol should exist
402 both in the object being run and in some shared library. The
403 dynamic linker copies the data addressed by the symbol from the
404 shared library into the object, because the object being
405 run has to have the data at some particular address. */
46807bf4
AM
406 HOW (R_PPC64_COPY, 0, 0, 0, 0, FALSE, dont,
407 ppc64_elf_unhandled_reloc),
5bd4f169
AM
408
409 /* Like R_PPC64_ADDR64, but used when setting global offset table
410 entries. */
46807bf4
AM
411 HOW (R_PPC64_GLOB_DAT, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
412 ppc64_elf_unhandled_reloc),
5bd4f169
AM
413
414 /* Created by the link editor. Marks a procedure linkage table
415 entry for a symbol. */
46807bf4
AM
416 HOW (R_PPC64_JMP_SLOT, 0, 0, 0, 0, FALSE, dont,
417 ppc64_elf_unhandled_reloc),
5bd4f169
AM
418
419 /* Used only by the dynamic linker. When the object is run, this
420 doubleword64 is set to the load address of the object, plus the
421 addend. */
46807bf4
AM
422 HOW (R_PPC64_RELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
423 bfd_elf_generic_reloc),
5bd4f169
AM
424
425 /* Like R_PPC64_ADDR32, but may be unaligned. */
46807bf4
AM
426 HOW (R_PPC64_UADDR32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
427 bfd_elf_generic_reloc),
5bd4f169
AM
428
429 /* Like R_PPC64_ADDR16, but may be unaligned. */
46807bf4
AM
430 HOW (R_PPC64_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
431 bfd_elf_generic_reloc),
5bd4f169
AM
432
433 /* 32-bit PC relative. */
46807bf4
AM
434 HOW (R_PPC64_REL32, 2, 32, 0xffffffff, 0, TRUE, signed,
435 bfd_elf_generic_reloc),
5bd4f169 436
10ed1bba 437 /* 32-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
438 HOW (R_PPC64_PLT32, 2, 32, 0xffffffff, 0, FALSE, bitfield,
439 ppc64_elf_unhandled_reloc),
5bd4f169
AM
440
441 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
442 FIXME: R_PPC64_PLTREL32 not supported. */
46807bf4
AM
443 HOW (R_PPC64_PLTREL32, 2, 32, 0xffffffff, 0, TRUE, signed,
444 ppc64_elf_unhandled_reloc),
5bd4f169
AM
445
446 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
447 the symbol. */
46807bf4
AM
448 HOW (R_PPC64_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
449 ppc64_elf_unhandled_reloc),
5bd4f169
AM
450
451 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
452 the symbol. */
46807bf4
AM
453 HOW (R_PPC64_PLT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
454 ppc64_elf_unhandled_reloc),
5bd4f169
AM
455
456 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
457 the symbol. */
46807bf4
AM
458 HOW (R_PPC64_PLT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
459 ppc64_elf_unhandled_reloc),
5bd4f169 460
c061c2d8 461 /* 16-bit section relative relocation. */
46807bf4
AM
462 HOW (R_PPC64_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
463 ppc64_elf_sectoff_reloc),
5bd4f169 464
c061c2d8 465 /* Like R_PPC64_SECTOFF, but no overflow warning. */
46807bf4
AM
466 HOW (R_PPC64_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
467 ppc64_elf_sectoff_reloc),
5bd4f169
AM
468
469 /* 16-bit upper half section relative relocation. */
46807bf4
AM
470 HOW (R_PPC64_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, signed,
471 ppc64_elf_sectoff_reloc),
5bd4f169
AM
472
473 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
474 HOW (R_PPC64_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, signed,
475 ppc64_elf_sectoff_ha_reloc),
5bd4f169 476
04c9666a 477 /* Like R_PPC64_REL24 without touching the two least significant bits. */
46807bf4
AM
478 HOW (R_PPC64_REL30, 2, 30, 0xfffffffc, 2, TRUE, dont,
479 bfd_elf_generic_reloc),
5bd4f169
AM
480
481 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
482
483 /* A standard 64-bit relocation. */
46807bf4
AM
484 HOW (R_PPC64_ADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
485 bfd_elf_generic_reloc),
5bd4f169
AM
486
487 /* The bits 32-47 of an address. */
46807bf4
AM
488 HOW (R_PPC64_ADDR16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
489 bfd_elf_generic_reloc),
5bd4f169
AM
490
491 /* The bits 32-47 of an address, plus 1 if the contents of the low
492 16 bits, treated as a signed number, is negative. */
46807bf4
AM
493 HOW (R_PPC64_ADDR16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
494 ppc64_elf_ha_reloc),
5bd4f169
AM
495
496 /* The bits 48-63 of an address. */
46807bf4
AM
497 HOW (R_PPC64_ADDR16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
498 bfd_elf_generic_reloc),
5bd4f169
AM
499
500 /* The bits 48-63 of an address, plus 1 if the contents of the low
501 16 bits, treated as a signed number, is negative. */
46807bf4
AM
502 HOW (R_PPC64_ADDR16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
503 ppc64_elf_ha_reloc),
5bd4f169
AM
504
505 /* Like ADDR64, but may be unaligned. */
46807bf4
AM
506 HOW (R_PPC64_UADDR64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
507 bfd_elf_generic_reloc),
5bd4f169
AM
508
509 /* 64-bit relative relocation. */
46807bf4
AM
510 HOW (R_PPC64_REL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
511 bfd_elf_generic_reloc),
5bd4f169 512
cedb70c5 513 /* 64-bit relocation to the symbol's procedure linkage table. */
46807bf4
AM
514 HOW (R_PPC64_PLT64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
515 ppc64_elf_unhandled_reloc),
5bd4f169
AM
516
517 /* 64-bit PC relative relocation to the symbol's procedure linkage
518 table. */
519 /* FIXME: R_PPC64_PLTREL64 not supported. */
46807bf4
AM
520 HOW (R_PPC64_PLTREL64, 4, 64, 0xffffffffffffffffULL, 0, TRUE, dont,
521 ppc64_elf_unhandled_reloc),
5bd4f169
AM
522
523 /* 16 bit TOC-relative relocation. */
5bd4f169 524 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
46807bf4
AM
525 HOW (R_PPC64_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
526 ppc64_elf_toc_reloc),
5bd4f169
AM
527
528 /* 16 bit TOC-relative relocation without overflow. */
5bd4f169 529 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
46807bf4
AM
530 HOW (R_PPC64_TOC16_LO, 1, 16, 0xffff, 0, FALSE, dont,
531 ppc64_elf_toc_reloc),
5bd4f169
AM
532
533 /* 16 bit TOC-relative relocation, high 16 bits. */
5bd4f169 534 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
46807bf4
AM
535 HOW (R_PPC64_TOC16_HI, 1, 16, 0xffff, 16, FALSE, signed,
536 ppc64_elf_toc_reloc),
5bd4f169
AM
537
538 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
539 contents of the low 16 bits, treated as a signed number, is
540 negative. */
5bd4f169 541 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
46807bf4
AM
542 HOW (R_PPC64_TOC16_HA, 1, 16, 0xffff, 16, FALSE, signed,
543 ppc64_elf_toc_ha_reloc),
5bd4f169
AM
544
545 /* 64-bit relocation; insert value of TOC base (.TOC.). */
5bd4f169 546 /* R_PPC64_TOC 51 doubleword64 .TOC. */
46807bf4
AM
547 HOW (R_PPC64_TOC, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
548 ppc64_elf_toc64_reloc),
5bd4f169
AM
549
550 /* Like R_PPC64_GOT16, but also informs the link editor that the
551 value to relocate may (!) refer to a PLT entry which the link
552 editor (a) may replace with the symbol value. If the link editor
553 is unable to fully resolve the symbol, it may (b) create a PLT
554 entry and store the address to the new PLT entry in the GOT.
555 This permits lazy resolution of function symbols at run time.
556 The link editor may also skip all of this and just (c) emit a
557 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
558 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
46807bf4
AM
559 HOW (R_PPC64_PLTGOT16, 1, 16, 0xffff, 0, FALSE,signed,
560 ppc64_elf_unhandled_reloc),
411e1bfb
AM
561
562 /* Like R_PPC64_PLTGOT16, but without overflow. */
563 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
564 HOW (R_PPC64_PLTGOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
565 ppc64_elf_unhandled_reloc),
411e1bfb
AM
566
567 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
568 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
46807bf4
AM
569 HOW (R_PPC64_PLTGOT16_HI, 1, 16, 0xffff, 16, FALSE, signed,
570 ppc64_elf_unhandled_reloc),
411e1bfb
AM
571
572 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
573 1 if the contents of the low 16 bits, treated as a signed number,
574 is negative. */
575 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
46807bf4
AM
576 HOW (R_PPC64_PLTGOT16_HA, 1, 16, 0xffff, 16, FALSE, signed,
577 ppc64_elf_unhandled_reloc),
411e1bfb
AM
578
579 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
46807bf4
AM
580 HOW (R_PPC64_ADDR16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
581 bfd_elf_generic_reloc),
411e1bfb
AM
582
583 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
46807bf4
AM
584 HOW (R_PPC64_ADDR16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
585 bfd_elf_generic_reloc),
411e1bfb
AM
586
587 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
46807bf4
AM
588 HOW (R_PPC64_GOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
589 ppc64_elf_unhandled_reloc),
411e1bfb
AM
590
591 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
46807bf4
AM
592 HOW (R_PPC64_GOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
593 ppc64_elf_unhandled_reloc),
411e1bfb
AM
594
595 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
46807bf4
AM
596 HOW (R_PPC64_PLT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
597 ppc64_elf_unhandled_reloc),
411e1bfb
AM
598
599 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
46807bf4
AM
600 HOW (R_PPC64_SECTOFF_DS, 1, 16, 0xfffc, 0, FALSE, signed,
601 ppc64_elf_sectoff_reloc),
411e1bfb
AM
602
603 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
46807bf4
AM
604 HOW (R_PPC64_SECTOFF_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
605 ppc64_elf_sectoff_reloc),
411e1bfb
AM
606
607 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
46807bf4
AM
608 HOW (R_PPC64_TOC16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
609 ppc64_elf_toc_reloc),
411e1bfb
AM
610
611 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
46807bf4
AM
612 HOW (R_PPC64_TOC16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
613 ppc64_elf_toc_reloc),
411e1bfb
AM
614
615 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
616 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
46807bf4
AM
617 HOW (R_PPC64_PLTGOT16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
618 ppc64_elf_unhandled_reloc),
411e1bfb
AM
619
620 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
621 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
46807bf4
AM
622 HOW (R_PPC64_PLTGOT16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
623 ppc64_elf_unhandled_reloc),
411e1bfb 624
727fc41e 625 /* Marker relocs for TLS. */
46807bf4
AM
626 HOW (R_PPC64_TLS, 2, 32, 0, 0, FALSE, dont,
627 bfd_elf_generic_reloc),
628
629 HOW (R_PPC64_TLSGD, 2, 32, 0, 0, FALSE, dont,
630 bfd_elf_generic_reloc),
631
632 HOW (R_PPC64_TLSLD, 2, 32, 0, 0, FALSE, dont,
633 bfd_elf_generic_reloc),
727fc41e 634
23cedd1d
AM
635 /* Marker reloc for optimizing r2 save in prologue rather than on
636 each plt call stub. */
46807bf4
AM
637 HOW (R_PPC64_TOCSAVE, 2, 32, 0, 0, FALSE, dont,
638 bfd_elf_generic_reloc),
3b421ab3 639
23cedd1d 640 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
641 HOW (R_PPC64_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
642 bfd_elf_generic_reloc),
643
644 HOW (R_PPC64_PLTCALL, 2, 32, 0, 0, FALSE, dont,
645 bfd_elf_generic_reloc),
23cedd1d 646
411e1bfb
AM
647 /* Computes the load module index of the load module that contains the
648 definition of its TLS sym. */
46807bf4
AM
649 HOW (R_PPC64_DTPMOD64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
650 ppc64_elf_unhandled_reloc),
411e1bfb
AM
651
652 /* Computes a dtv-relative displacement, the difference between the value
653 of sym+add and the base address of the thread-local storage block that
654 contains the definition of sym, minus 0x8000. */
46807bf4
AM
655 HOW (R_PPC64_DTPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
656 ppc64_elf_unhandled_reloc),
411e1bfb
AM
657
658 /* A 16 bit dtprel reloc. */
46807bf4
AM
659 HOW (R_PPC64_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
660 ppc64_elf_unhandled_reloc),
411e1bfb
AM
661
662 /* Like DTPREL16, but no overflow. */
46807bf4
AM
663 HOW (R_PPC64_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
664 ppc64_elf_unhandled_reloc),
411e1bfb
AM
665
666 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
667 HOW (R_PPC64_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
668 ppc64_elf_unhandled_reloc),
411e1bfb
AM
669
670 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
671 HOW (R_PPC64_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
672 ppc64_elf_unhandled_reloc),
411e1bfb
AM
673
674 /* Like DTPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
675 HOW (R_PPC64_DTPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
676 ppc64_elf_unhandled_reloc),
411e1bfb
AM
677
678 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
679 HOW (R_PPC64_DTPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
680 ppc64_elf_unhandled_reloc),
411e1bfb
AM
681
682 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
683 HOW (R_PPC64_DTPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
684 ppc64_elf_unhandled_reloc),
411e1bfb
AM
685
686 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
687 HOW (R_PPC64_DTPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
688 ppc64_elf_unhandled_reloc),
411e1bfb
AM
689
690 /* Like DTPREL16, but for insns with a DS field. */
46807bf4
AM
691 HOW (R_PPC64_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
692 ppc64_elf_unhandled_reloc),
411e1bfb
AM
693
694 /* Like DTPREL16_DS, but no overflow. */
46807bf4
AM
695 HOW (R_PPC64_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
696 ppc64_elf_unhandled_reloc),
411e1bfb
AM
697
698 /* Computes a tp-relative displacement, the difference between the value of
699 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
700 HOW (R_PPC64_TPREL64, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
701 ppc64_elf_unhandled_reloc),
411e1bfb
AM
702
703 /* A 16 bit tprel reloc. */
46807bf4
AM
704 HOW (R_PPC64_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
705 ppc64_elf_unhandled_reloc),
411e1bfb
AM
706
707 /* Like TPREL16, but no overflow. */
46807bf4
AM
708 HOW (R_PPC64_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
709 ppc64_elf_unhandled_reloc),
411e1bfb
AM
710
711 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
712 HOW (R_PPC64_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
713 ppc64_elf_unhandled_reloc),
411e1bfb
AM
714
715 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
716 HOW (R_PPC64_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
717 ppc64_elf_unhandled_reloc),
411e1bfb
AM
718
719 /* Like TPREL16_HI, but next higher group of 16 bits. */
46807bf4
AM
720 HOW (R_PPC64_TPREL16_HIGHER, 1, 16, 0xffff, 32, FALSE, dont,
721 ppc64_elf_unhandled_reloc),
411e1bfb
AM
722
723 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
46807bf4
AM
724 HOW (R_PPC64_TPREL16_HIGHERA, 1, 16, 0xffff, 32, FALSE, dont,
725 ppc64_elf_unhandled_reloc),
411e1bfb
AM
726
727 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
46807bf4
AM
728 HOW (R_PPC64_TPREL16_HIGHEST, 1, 16, 0xffff, 48, FALSE, dont,
729 ppc64_elf_unhandled_reloc),
411e1bfb
AM
730
731 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
46807bf4
AM
732 HOW (R_PPC64_TPREL16_HIGHESTA, 1, 16, 0xffff, 48, FALSE, dont,
733 ppc64_elf_unhandled_reloc),
411e1bfb
AM
734
735 /* Like TPREL16, but for insns with a DS field. */
46807bf4
AM
736 HOW (R_PPC64_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
737 ppc64_elf_unhandled_reloc),
411e1bfb
AM
738
739 /* Like TPREL16_DS, but no overflow. */
46807bf4
AM
740 HOW (R_PPC64_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
741 ppc64_elf_unhandled_reloc),
411e1bfb
AM
742
743 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
744 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
745 to the first entry relative to the TOC base (r2). */
46807bf4
AM
746 HOW (R_PPC64_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
747 ppc64_elf_unhandled_reloc),
5bd4f169 748
411e1bfb 749 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
750 HOW (R_PPC64_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
751 ppc64_elf_unhandled_reloc),
5bd4f169 752
411e1bfb 753 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
754 HOW (R_PPC64_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
755 ppc64_elf_unhandled_reloc),
5bd4f169 756
411e1bfb 757 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
758 HOW (R_PPC64_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
759 ppc64_elf_unhandled_reloc),
5bd4f169 760
411e1bfb
AM
761 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
762 with values (sym+add)@dtpmod and zero, and computes the offset to the
763 first entry relative to the TOC base (r2). */
46807bf4
AM
764 HOW (R_PPC64_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
765 ppc64_elf_unhandled_reloc),
5bd4f169 766
411e1bfb 767 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
768 HOW (R_PPC64_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
769 ppc64_elf_unhandled_reloc),
5bd4f169 770
411e1bfb 771 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
772 HOW (R_PPC64_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, signed,
773 ppc64_elf_unhandled_reloc),
5bd4f169 774
411e1bfb 775 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
776 HOW (R_PPC64_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, signed,
777 ppc64_elf_unhandled_reloc),
5bd4f169 778
411e1bfb
AM
779 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
780 the offset to the entry relative to the TOC base (r2). */
46807bf4
AM
781 HOW (R_PPC64_GOT_DTPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
782 ppc64_elf_unhandled_reloc),
5bd4f169 783
411e1bfb 784 /* Like GOT_DTPREL16_DS, but no overflow. */
46807bf4
AM
785 HOW (R_PPC64_GOT_DTPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
786 ppc64_elf_unhandled_reloc),
5bd4f169 787
411e1bfb 788 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
789 HOW (R_PPC64_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
790 ppc64_elf_unhandled_reloc),
5bd4f169 791
411e1bfb 792 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
793 HOW (R_PPC64_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
794 ppc64_elf_unhandled_reloc),
411e1bfb
AM
795
796 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
797 offset to the entry relative to the TOC base (r2). */
46807bf4
AM
798 HOW (R_PPC64_GOT_TPREL16_DS, 1, 16, 0xfffc, 0, FALSE, signed,
799 ppc64_elf_unhandled_reloc),
5bd4f169 800
411e1bfb 801 /* Like GOT_TPREL16_DS, but no overflow. */
46807bf4
AM
802 HOW (R_PPC64_GOT_TPREL16_LO_DS, 1, 16, 0xfffc, 0, FALSE, dont,
803 ppc64_elf_unhandled_reloc),
5bd4f169 804
411e1bfb 805 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
46807bf4
AM
806 HOW (R_PPC64_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, signed,
807 ppc64_elf_unhandled_reloc),
5bd4f169 808
411e1bfb 809 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
810 HOW (R_PPC64_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, signed,
811 ppc64_elf_unhandled_reloc),
812
813 HOW (R_PPC64_JMP_IREL, 0, 0, 0, 0, FALSE, dont,
814 ppc64_elf_unhandled_reloc),
815
816 HOW (R_PPC64_IRELATIVE, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
817 bfd_elf_generic_reloc),
e054468f 818
25f23106 819 /* A 16 bit relative relocation. */
46807bf4
AM
820 HOW (R_PPC64_REL16, 1, 16, 0xffff, 0, TRUE, signed,
821 bfd_elf_generic_reloc),
25f23106
AM
822
823 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
824 HOW (R_PPC64_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
825 bfd_elf_generic_reloc),
25f23106
AM
826
827 /* The high order 16 bits of a relative address. */
46807bf4
AM
828 HOW (R_PPC64_REL16_HI, 1, 16, 0xffff, 16, TRUE, signed,
829 bfd_elf_generic_reloc),
25f23106
AM
830
831 /* The high order 16 bits of a relative address, plus 1 if the contents of
832 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
833 HOW (R_PPC64_REL16_HA, 1, 16, 0xffff, 16, TRUE, signed,
834 ppc64_elf_ha_reloc),
25f23106 835
4a969973
AM
836 HOW (R_PPC64_REL16_HIGH, 1, 16, 0xffff, 16, TRUE, dont,
837 bfd_elf_generic_reloc),
838
839 HOW (R_PPC64_REL16_HIGHA, 1, 16, 0xffff, 16, TRUE, dont,
840 ppc64_elf_ha_reloc),
841
842 HOW (R_PPC64_REL16_HIGHER, 1, 16, 0xffff, 32, TRUE, dont,
843 bfd_elf_generic_reloc),
844
845 HOW (R_PPC64_REL16_HIGHERA, 1, 16, 0xffff, 32, TRUE, dont,
846 ppc64_elf_ha_reloc),
847
848 HOW (R_PPC64_REL16_HIGHEST, 1, 16, 0xffff, 48, TRUE, dont,
849 bfd_elf_generic_reloc),
850
851 HOW (R_PPC64_REL16_HIGHESTA, 1, 16, 0xffff, 48, TRUE, dont,
852 ppc64_elf_ha_reloc),
853
a680de9a 854 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
46807bf4
AM
855 HOW (R_PPC64_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
856 ppc64_elf_ha_reloc),
a680de9a 857
7ba71655 858 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
859 HOW (R_PPC64_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
860 ppc64_elf_ha_reloc),
7ba71655 861
f9c6b907 862 /* Like R_PPC64_ADDR16_HI, but no overflow. */
46807bf4
AM
863 HOW (R_PPC64_ADDR16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
864 bfd_elf_generic_reloc),
f9c6b907
AM
865
866 /* Like R_PPC64_ADDR16_HA, but no overflow. */
46807bf4
AM
867 HOW (R_PPC64_ADDR16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
868 ppc64_elf_ha_reloc),
f9c6b907
AM
869
870 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
46807bf4
AM
871 HOW (R_PPC64_DTPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
872 ppc64_elf_unhandled_reloc),
f9c6b907
AM
873
874 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
46807bf4
AM
875 HOW (R_PPC64_DTPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
876 ppc64_elf_unhandled_reloc),
f9c6b907
AM
877
878 /* Like R_PPC64_TPREL16_HI, but no overflow. */
46807bf4
AM
879 HOW (R_PPC64_TPREL16_HIGH, 1, 16, 0xffff, 16, FALSE, dont,
880 ppc64_elf_unhandled_reloc),
f9c6b907
AM
881
882 /* Like R_PPC64_TPREL16_HA, but no overflow. */
46807bf4
AM
883 HOW (R_PPC64_TPREL16_HIGHA, 1, 16, 0xffff, 16, FALSE, dont,
884 ppc64_elf_unhandled_reloc),
f9c6b907 885
006589cf 886 /* Marker reloc on ELFv2 large-model function entry. */
46807bf4
AM
887 HOW (R_PPC64_ENTRY, 2, 32, 0, 0, FALSE, dont,
888 bfd_elf_generic_reloc),
006589cf 889
45965137 890 /* Like ADDR64, but use local entry point of function. */
46807bf4
AM
891 HOW (R_PPC64_ADDR64_LOCAL, 4, 64, 0xffffffffffffffffULL, 0, FALSE, dont,
892 bfd_elf_generic_reloc),
45965137 893
5663e321
AM
894 HOW (R_PPC64_PLTSEQ_NOTOC, 2, 32, 0, 0, FALSE, dont,
895 bfd_elf_generic_reloc),
896
897 HOW (R_PPC64_PLTCALL_NOTOC, 2, 32, 0, 0, FALSE, dont,
898 bfd_elf_generic_reloc),
899
900 HOW (R_PPC64_PCREL_OPT, 2, 32, 0, 0, FALSE, dont,
901 bfd_elf_generic_reloc),
902
903 HOW (R_PPC64_D34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
904 ppc64_elf_prefix_reloc),
905
906 HOW (R_PPC64_D34_LO, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, dont,
907 ppc64_elf_prefix_reloc),
908
909 HOW (R_PPC64_D34_HI30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
910 ppc64_elf_prefix_reloc),
911
912 HOW (R_PPC64_D34_HA30, 4, 34, 0x3ffff0000ffffULL, 34, FALSE, dont,
913 ppc64_elf_prefix_reloc),
914
915 HOW (R_PPC64_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
916 ppc64_elf_prefix_reloc),
917
918 HOW (R_PPC64_GOT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
919 ppc64_elf_unhandled_reloc),
920
921 HOW (R_PPC64_PLT_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
922 ppc64_elf_unhandled_reloc),
923
924 HOW (R_PPC64_PLT_PCREL34_NOTOC, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
925 ppc64_elf_unhandled_reloc),
926
c213164a
AM
927 HOW (R_PPC64_TPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
928 ppc64_elf_unhandled_reloc),
929
930 HOW (R_PPC64_DTPREL34, 4, 34, 0x3ffff0000ffffULL, 0, FALSE, signed,
931 ppc64_elf_unhandled_reloc),
932
87c69f97 933 HOW (R_PPC64_GOT_TLSGD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
934 ppc64_elf_unhandled_reloc),
935
87c69f97 936 HOW (R_PPC64_GOT_TLSLD_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
937 ppc64_elf_unhandled_reloc),
938
87c69f97 939 HOW (R_PPC64_GOT_TPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
940 ppc64_elf_unhandled_reloc),
941
87c69f97 942 HOW (R_PPC64_GOT_DTPREL_PCREL34, 4, 34, 0x3ffff0000ffffULL, 0, TRUE, signed,
c213164a
AM
943 ppc64_elf_unhandled_reloc),
944
5663e321
AM
945 HOW (R_PPC64_ADDR16_HIGHER34, 1, 16, 0xffff, 34, FALSE, dont,
946 bfd_elf_generic_reloc),
947
948 HOW (R_PPC64_ADDR16_HIGHERA34, 1, 16, 0xffff, 34, FALSE, dont,
949 ppc64_elf_ha_reloc),
950
951 HOW (R_PPC64_ADDR16_HIGHEST34, 1, 16, 0xffff, 50, FALSE, dont,
952 bfd_elf_generic_reloc),
953
954 HOW (R_PPC64_ADDR16_HIGHESTA34, 1, 16, 0xffff, 50, FALSE, dont,
955 ppc64_elf_ha_reloc),
956
957 HOW (R_PPC64_REL16_HIGHER34, 1, 16, 0xffff, 34, TRUE, dont,
958 bfd_elf_generic_reloc),
959
960 HOW (R_PPC64_REL16_HIGHERA34, 1, 16, 0xffff, 34, TRUE, dont,
961 ppc64_elf_ha_reloc),
962
963 HOW (R_PPC64_REL16_HIGHEST34, 1, 16, 0xffff, 50, TRUE, dont,
964 bfd_elf_generic_reloc),
965
966 HOW (R_PPC64_REL16_HIGHESTA34, 1, 16, 0xffff, 50, TRUE, dont,
967 ppc64_elf_ha_reloc),
968
969 HOW (R_PPC64_D28, 4, 28, 0xfff0000ffffULL, 0, FALSE, signed,
970 ppc64_elf_prefix_reloc),
971
972 HOW (R_PPC64_PCREL28, 4, 28, 0xfff0000ffffULL, 0, TRUE, signed,
973 ppc64_elf_prefix_reloc),
974
5bd4f169 975 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
976 HOW (R_PPC64_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
977 NULL),
5bd4f169
AM
978
979 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
980 HOW (R_PPC64_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
981 NULL),
5bd4f169
AM
982};
983
984\f
985/* Initialize the ppc64_elf_howto_table, so that linear accesses can
986 be done. */
987
988static void
4ce794b7 989ppc_howto_init (void)
5bd4f169
AM
990{
991 unsigned int i, type;
992
a4b6fadd 993 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
5bd4f169
AM
994 {
995 type = ppc64_elf_howto_raw[i].type;
a4b6fadd 996 BFD_ASSERT (type < ARRAY_SIZE (ppc64_elf_howto_table));
5bd4f169
AM
997 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
998 }
999}
1000
1001static reloc_howto_type *
87c69f97 1002ppc64_elf_reloc_type_lookup (bfd *abfd, bfd_reloc_code_real_type code)
5bd4f169 1003{
411e1bfb 1004 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
5bd4f169
AM
1005
1006 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1007 /* Initialize howto table if needed. */
1008 ppc_howto_init ();
1009
4ce794b7 1010 switch (code)
5bd4f169
AM
1011 {
1012 default:
f3185997 1013 /* xgettext:c-format */
2cdcc330
AM
1014 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd,
1015 (int) code);
f3185997 1016 bfd_set_error (bfd_error_bad_value);
4ce794b7 1017 return NULL;
5bd4f169 1018
411e1bfb
AM
1019 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1020 break;
1021 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1022 break;
1023 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1024 break;
1025 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1026 break;
1027 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1028 break;
1029 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1030 break;
f9c6b907
AM
1031 case BFD_RELOC_PPC64_ADDR16_HIGH: r = R_PPC64_ADDR16_HIGH;
1032 break;
411e1bfb 1033 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
5bd4f169 1034 break;
f9c6b907
AM
1035 case BFD_RELOC_PPC64_ADDR16_HIGHA: r = R_PPC64_ADDR16_HIGHA;
1036 break;
411e1bfb 1037 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
5bd4f169 1038 break;
411e1bfb 1039 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
5bd4f169 1040 break;
411e1bfb 1041 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
5bd4f169 1042 break;
411e1bfb 1043 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
5bd4f169 1044 break;
05d0e962
AM
1045 case BFD_RELOC_PPC64_REL24_NOTOC: r = R_PPC64_REL24_NOTOC;
1046 break;
411e1bfb 1047 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
5bd4f169 1048 break;
411e1bfb 1049 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
5bd4f169 1050 break;
411e1bfb 1051 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
5bd4f169 1052 break;
411e1bfb 1053 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
5bd4f169 1054 break;
411e1bfb 1055 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
5bd4f169 1056 break;
411e1bfb 1057 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
5bd4f169 1058 break;
411e1bfb 1059 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
5bd4f169 1060 break;
411e1bfb 1061 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
5bd4f169 1062 break;
411e1bfb 1063 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
5bd4f169 1064 break;
411e1bfb 1065 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
5bd4f169 1066 break;
411e1bfb 1067 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
5bd4f169 1068 break;
411e1bfb 1069 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
5bd4f169 1070 break;
411e1bfb 1071 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
5bd4f169 1072 break;
411e1bfb 1073 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
5bd4f169 1074 break;
411e1bfb 1075 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
5bd4f169 1076 break;
411e1bfb 1077 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
5bd4f169 1078 break;
411e1bfb 1079 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
5bd4f169 1080 break;
411e1bfb 1081 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
5bd4f169 1082 break;
411e1bfb 1083 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
5bd4f169 1084 break;
411e1bfb 1085 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
5bd4f169 1086 break;
411e1bfb 1087 case BFD_RELOC_64: r = R_PPC64_ADDR64;
5bd4f169 1088 break;
411e1bfb 1089 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
5bd4f169 1090 break;
411e1bfb 1091 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
5bd4f169 1092 break;
411e1bfb 1093 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
5bd4f169 1094 break;
411e1bfb 1095 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
5bd4f169 1096 break;
411e1bfb 1097 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
5bd4f169 1098 break;
411e1bfb 1099 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
5bd4f169 1100 break;
411e1bfb 1101 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
5bd4f169 1102 break;
411e1bfb 1103 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
5bd4f169 1104 break;
411e1bfb 1105 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
5bd4f169 1106 break;
411e1bfb 1107 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
5bd4f169 1108 break;
411e1bfb 1109 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
5bd4f169 1110 break;
411e1bfb 1111 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
5bd4f169 1112 break;
411e1bfb 1113 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
5bd4f169 1114 break;
411e1bfb 1115 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
5bd4f169 1116 break;
411e1bfb 1117 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
5bd4f169 1118 break;
411e1bfb 1119 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
5bd4f169 1120 break;
411e1bfb 1121 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
5bd4f169 1122 break;
411e1bfb 1123 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
5bd4f169 1124 break;
411e1bfb 1125 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
5bd4f169 1126 break;
411e1bfb 1127 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
5bd4f169 1128 break;
411e1bfb 1129 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
5bd4f169 1130 break;
411e1bfb 1131 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
5bd4f169 1132 break;
411e1bfb 1133 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
5bd4f169 1134 break;
411e1bfb 1135 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
5bd4f169 1136 break;
411e1bfb 1137 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
5bd4f169 1138 break;
411e1bfb 1139 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
5bd4f169 1140 break;
411e1bfb 1141 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
5bd4f169 1142 break;
c213164a 1143 case BFD_RELOC_PPC64_TLS_PCREL:
411e1bfb 1144 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
5bd4f169 1145 break;
727fc41e
AM
1146 case BFD_RELOC_PPC_TLSGD: r = R_PPC64_TLSGD;
1147 break;
1148 case BFD_RELOC_PPC_TLSLD: r = R_PPC64_TLSLD;
1149 break;
411e1bfb 1150 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
5bd4f169 1151 break;
411e1bfb 1152 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
5bd4f169 1153 break;
411e1bfb 1154 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
5bd4f169 1155 break;
411e1bfb 1156 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
5bd4f169 1157 break;
f9c6b907
AM
1158 case BFD_RELOC_PPC64_TPREL16_HIGH: r = R_PPC64_TPREL16_HIGH;
1159 break;
411e1bfb 1160 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
5bd4f169 1161 break;
f9c6b907
AM
1162 case BFD_RELOC_PPC64_TPREL16_HIGHA: r = R_PPC64_TPREL16_HIGHA;
1163 break;
411e1bfb 1164 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
5bd4f169 1165 break;
411e1bfb
AM
1166 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
1167 break;
1168 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
1169 break;
1170 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
1171 break;
f9c6b907
AM
1172 case BFD_RELOC_PPC64_DTPREL16_HIGH: r = R_PPC64_DTPREL16_HIGH;
1173 break;
411e1bfb
AM
1174 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
1175 break;
f9c6b907
AM
1176 case BFD_RELOC_PPC64_DTPREL16_HIGHA: r = R_PPC64_DTPREL16_HIGHA;
1177 break;
411e1bfb
AM
1178 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
1179 break;
1180 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
1181 break;
1182 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
1183 break;
1184 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
1185 break;
1186 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
1187 break;
1188 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
1189 break;
1190 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
1191 break;
1192 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
1193 break;
1194 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
1195 break;
1196 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
1197 break;
1198 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
1199 break;
1200 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
1201 break;
1202 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
1203 break;
1204 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
1205 break;
1206 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
1207 break;
1208 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
1209 break;
1210 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
1211 break;
1212 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
1213 break;
1214 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
1215 break;
1216 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
1217 break;
1218 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
1219 break;
1220 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
1221 break;
1222 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
1223 break;
1224 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
1225 break;
1226 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
1227 break;
1228 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
1229 break;
1230 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
1231 break;
1232 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
1233 break;
1234 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
1235 break;
25f23106
AM
1236 case BFD_RELOC_16_PCREL: r = R_PPC64_REL16;
1237 break;
1238 case BFD_RELOC_LO16_PCREL: r = R_PPC64_REL16_LO;
1239 break;
1240 case BFD_RELOC_HI16_PCREL: r = R_PPC64_REL16_HI;
1241 break;
1242 case BFD_RELOC_HI16_S_PCREL: r = R_PPC64_REL16_HA;
1243 break;
4a969973
AM
1244 case BFD_RELOC_PPC64_REL16_HIGH: r = R_PPC64_REL16_HIGH;
1245 break;
1246 case BFD_RELOC_PPC64_REL16_HIGHA: r = R_PPC64_REL16_HIGHA;
1247 break;
1248 case BFD_RELOC_PPC64_REL16_HIGHER: r = R_PPC64_REL16_HIGHER;
1249 break;
1250 case BFD_RELOC_PPC64_REL16_HIGHERA: r = R_PPC64_REL16_HIGHERA;
1251 break;
1252 case BFD_RELOC_PPC64_REL16_HIGHEST: r = R_PPC64_REL16_HIGHEST;
1253 break;
1254 case BFD_RELOC_PPC64_REL16_HIGHESTA: r = R_PPC64_REL16_HIGHESTA;
1255 break;
7ba71655
AM
1256 case BFD_RELOC_PPC_16DX_HA: r = R_PPC64_16DX_HA;
1257 break;
a680de9a
PB
1258 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC64_REL16DX_HA;
1259 break;
006589cf
AM
1260 case BFD_RELOC_PPC64_ENTRY: r = R_PPC64_ENTRY;
1261 break;
45965137
AM
1262 case BFD_RELOC_PPC64_ADDR64_LOCAL: r = R_PPC64_ADDR64_LOCAL;
1263 break;
5663e321
AM
1264 case BFD_RELOC_PPC64_D34: r = R_PPC64_D34;
1265 break;
1266 case BFD_RELOC_PPC64_D34_LO: r = R_PPC64_D34_LO;
1267 break;
1268 case BFD_RELOC_PPC64_D34_HI30: r = R_PPC64_D34_HI30;
1269 break;
1270 case BFD_RELOC_PPC64_D34_HA30: r = R_PPC64_D34_HA30;
1271 break;
1272 case BFD_RELOC_PPC64_PCREL34: r = R_PPC64_PCREL34;
1273 break;
1274 case BFD_RELOC_PPC64_GOT_PCREL34: r = R_PPC64_GOT_PCREL34;
1275 break;
1276 case BFD_RELOC_PPC64_PLT_PCREL34: r = R_PPC64_PLT_PCREL34;
1277 break;
c213164a
AM
1278 case BFD_RELOC_PPC64_TPREL34: r = R_PPC64_TPREL34;
1279 break;
1280 case BFD_RELOC_PPC64_DTPREL34: r = R_PPC64_DTPREL34;
1281 break;
87c69f97 1282 case BFD_RELOC_PPC64_GOT_TLSGD_PCREL34: r = R_PPC64_GOT_TLSGD_PCREL34;
c213164a 1283 break;
87c69f97 1284 case BFD_RELOC_PPC64_GOT_TLSLD_PCREL34: r = R_PPC64_GOT_TLSLD_PCREL34;
c213164a 1285 break;
87c69f97 1286 case BFD_RELOC_PPC64_GOT_TPREL_PCREL34: r = R_PPC64_GOT_TPREL_PCREL34;
c213164a 1287 break;
87c69f97 1288 case BFD_RELOC_PPC64_GOT_DTPREL_PCREL34: r = R_PPC64_GOT_DTPREL_PCREL34;
c213164a 1289 break;
5663e321
AM
1290 case BFD_RELOC_PPC64_ADDR16_HIGHER34: r = R_PPC64_ADDR16_HIGHER34;
1291 break;
1292 case BFD_RELOC_PPC64_ADDR16_HIGHERA34: r = R_PPC64_ADDR16_HIGHERA34;
1293 break;
1294 case BFD_RELOC_PPC64_ADDR16_HIGHEST34: r = R_PPC64_ADDR16_HIGHEST34;
1295 break;
1296 case BFD_RELOC_PPC64_ADDR16_HIGHESTA34: r = R_PPC64_ADDR16_HIGHESTA34;
1297 break;
1298 case BFD_RELOC_PPC64_REL16_HIGHER34: r = R_PPC64_REL16_HIGHER34;
1299 break;
1300 case BFD_RELOC_PPC64_REL16_HIGHERA34: r = R_PPC64_REL16_HIGHERA34;
1301 break;
1302 case BFD_RELOC_PPC64_REL16_HIGHEST34: r = R_PPC64_REL16_HIGHEST34;
1303 break;
1304 case BFD_RELOC_PPC64_REL16_HIGHESTA34: r = R_PPC64_REL16_HIGHESTA34;
1305 break;
1306 case BFD_RELOC_PPC64_D28: r = R_PPC64_D28;
1307 break;
1308 case BFD_RELOC_PPC64_PCREL28: r = R_PPC64_PCREL28;
1309 break;
411e1bfb
AM
1310 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
1311 break;
1312 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
5bd4f169
AM
1313 break;
1314 }
1315
4ce794b7 1316 return ppc64_elf_howto_table[r];
5bd4f169
AM
1317};
1318
157090f7 1319static reloc_howto_type *
87c69f97 1320ppc64_elf_reloc_name_lookup (bfd *abfd, const char *r_name)
157090f7
AM
1321{
1322 unsigned int i;
87c69f97
AM
1323 static char *compat_map[][2] = {
1324 { "R_PPC64_GOT_TLSGD34", "R_PPC64_GOT_TLSGD_PCREL34" },
1325 { "R_PPC64_GOT_TLSLD34", "R_PPC64_GOT_TLSLD_PCREL34" },
1326 { "R_PPC64_GOT_TPREL34", "R_PPC64_GOT_TPREL_PCREL34" },
1327 { "R_PPC64_GOT_DTPREL34", "R_PPC64_GOT_DTPREL_PCREL34" }
1328 };
157090f7 1329
a4b6fadd 1330 for (i = 0; i < ARRAY_SIZE (ppc64_elf_howto_raw); i++)
157090f7
AM
1331 if (ppc64_elf_howto_raw[i].name != NULL
1332 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
1333 return &ppc64_elf_howto_raw[i];
1334
87c69f97
AM
1335 /* Handle old names of relocations in case they were used by
1336 .reloc directives.
1337 FIXME: Remove this soon. Mapping the reloc names is very likely
1338 completely unnecessary. */
1339 for (i = 0; i < ARRAY_SIZE (compat_map); i++)
1340 if (strcasecmp (compat_map[i][0], r_name) == 0)
1341 {
1342 _bfd_error_handler (_("warning: %s should be used rather than %s"),
1343 compat_map[i][1], compat_map[i][0]);
1344 return ppc64_elf_reloc_name_lookup (abfd, compat_map[i][1]);
1345 }
1346
157090f7
AM
1347 return NULL;
1348}
1349
5bd4f169
AM
1350/* Set the howto pointer for a PowerPC ELF reloc. */
1351
f3185997 1352static bfd_boolean
4aef7643 1353ppc64_elf_info_to_howto (bfd *abfd, arelent *cache_ptr,
4ce794b7 1354 Elf_Internal_Rela *dst)
5bd4f169 1355{
65f38f15
AM
1356 unsigned int type;
1357
ef60b7ff 1358 /* Initialize howto table if needed. */
5bd4f169 1359 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
1360 ppc_howto_init ();
1361
65f38f15 1362 type = ELF64_R_TYPE (dst->r_info);
a4b6fadd 1363 if (type >= ARRAY_SIZE (ppc64_elf_howto_table))
d0fb9a8d 1364 {
695344c0 1365 /* xgettext:c-format */
0aa13fee 1366 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
cf97bcb0 1367 abfd, type);
f3185997
NC
1368 bfd_set_error (bfd_error_bad_value);
1369 return FALSE;
d0fb9a8d 1370 }
65f38f15 1371 cache_ptr->howto = ppc64_elf_howto_table[type];
f3185997
NC
1372 if (cache_ptr->howto == NULL || cache_ptr->howto->name == NULL)
1373 {
1374 /* xgettext:c-format */
1375 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
1376 abfd, type);
1377 bfd_set_error (bfd_error_bad_value);
1378 return FALSE;
1379 }
2cdcc330 1380
f3185997 1381 return TRUE;
5bd4f169
AM
1382}
1383
04c9666a 1384/* Handle the R_PPC64_ADDR16_HA and similar relocs. */
5bd4f169
AM
1385
1386static bfd_reloc_status_type
4ce794b7
AM
1387ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1388 void *data, asection *input_section,
1389 bfd *output_bfd, char **error_message)
5bd4f169 1390{
a680de9a
PB
1391 enum elf_ppc64_reloc_type r_type;
1392 long insn;
1393 bfd_size_type octets;
3de43e7b 1394 bfd_vma value;
a680de9a 1395
805fc799
AM
1396 /* If this is a relocatable link (output_bfd test tells us), just
1397 call the generic function. Any adjustment will be done at final
1398 link time. */
1399 if (output_bfd != NULL)
cedb70c5 1400 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1401 input_section, output_bfd, error_message);
1402
5663e321
AM
1403 /* Adjust the addend for sign extension of the low 16 (or 34) bits.
1404 We won't actually be using the low bits, so trashing them
805fc799 1405 doesn't matter. */
a680de9a 1406 r_type = reloc_entry->howto->type;
5663e321
AM
1407 if (r_type == R_PPC64_ADDR16_HIGHERA34
1408 || r_type == R_PPC64_ADDR16_HIGHESTA34
1409 || r_type == R_PPC64_REL16_HIGHERA34
1410 || r_type == R_PPC64_REL16_HIGHESTA34)
1411 reloc_entry->addend += 1ULL << 33;
1412 else
1413 reloc_entry->addend += 1U << 15;
a680de9a
PB
1414 if (r_type != R_PPC64_REL16DX_HA)
1415 return bfd_reloc_continue;
1416
1417 value = 0;
1418 if (!bfd_is_com_section (symbol->section))
1419 value = symbol->value;
1420 value += (reloc_entry->addend
1421 + symbol->section->output_offset
1422 + symbol->section->output_section->vma);
1423 value -= (reloc_entry->address
1424 + input_section->output_offset
1425 + input_section->output_section->vma);
3de43e7b 1426 value = (bfd_signed_vma) value >> 16;
a680de9a 1427
bb294208 1428 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
1429 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1430 insn &= ~0x1fffc1;
3de43e7b 1431 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
a680de9a 1432 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
3de43e7b 1433 if (value + 0x8000 > 0xffff)
a680de9a
PB
1434 return bfd_reloc_overflow;
1435 return bfd_reloc_ok;
805fc799 1436}
5bd4f169 1437
2441e016
AM
1438static bfd_reloc_status_type
1439ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1440 void *data, asection *input_section,
1441 bfd *output_bfd, char **error_message)
1442{
1443 if (output_bfd != NULL)
1444 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1445 input_section, output_bfd, error_message);
1446
699733f6
AM
1447 if (strcmp (symbol->section->name, ".opd") == 0
1448 && (symbol->section->owner->flags & DYNAMIC) == 0)
2441e016
AM
1449 {
1450 bfd_vma dest = opd_entry_value (symbol->section,
1451 symbol->value + reloc_entry->addend,
aef36ac1 1452 NULL, NULL, FALSE);
2441e016
AM
1453 if (dest != (bfd_vma) -1)
1454 reloc_entry->addend = dest - (symbol->value
1455 + symbol->section->output_section->vma
1456 + symbol->section->output_offset);
1457 }
810d4e75
AM
1458 else
1459 {
1460 elf_symbol_type *elfsym = (elf_symbol_type *) symbol;
1461
1462 if (symbol->section->owner != abfd
9f284bf9 1463 && symbol->section->owner != NULL
810d4e75
AM
1464 && abiversion (symbol->section->owner) >= 2)
1465 {
1466 unsigned int i;
1467
1468 for (i = 0; i < symbol->section->owner->symcount; ++i)
1469 {
1470 asymbol *symdef = symbol->section->owner->outsymbols[i];
1471
1472 if (strcmp (symdef->name, symbol->name) == 0)
1473 {
1474 elfsym = (elf_symbol_type *) symdef;
1475 break;
1476 }
1477 }
1478 }
1479 reloc_entry->addend
1480 += PPC64_LOCAL_ENTRY_OFFSET (elfsym->internal_elf_sym.st_other);
1481 }
2441e016
AM
1482 return bfd_reloc_continue;
1483}
1484
805fc799 1485static bfd_reloc_status_type
4ce794b7
AM
1486ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1487 void *data, asection *input_section,
1488 bfd *output_bfd, char **error_message)
805fc799
AM
1489{
1490 long insn;
04c9666a 1491 enum elf_ppc64_reloc_type r_type;
805fc799 1492 bfd_size_type octets;
794e51c0
AM
1493 /* Assume 'at' branch hints. */
1494 bfd_boolean is_isa_v2 = TRUE;
805fc799
AM
1495
1496 /* If this is a relocatable link (output_bfd test tells us), just
1497 call the generic function. Any adjustment will be done at final
1498 link time. */
5bd4f169 1499 if (output_bfd != NULL)
cedb70c5 1500 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1501 input_section, output_bfd, error_message);
1502
bb294208 1503 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1504 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
1505 insn &= ~(0x01 << 21);
4ce794b7 1506 r_type = reloc_entry->howto->type;
805fc799
AM
1507 if (r_type == R_PPC64_ADDR14_BRTAKEN
1508 || r_type == R_PPC64_REL14_BRTAKEN)
cedb70c5 1509 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
805fc799 1510
794e51c0 1511 if (is_isa_v2)
5bd4f169 1512 {
805fc799
AM
1513 /* Set 'a' bit. This is 0b00010 in BO field for branch
1514 on CR(BI) insns (BO == 001at or 011at), and 0b01000
1515 for branch on CTR insns (BO == 1a00t or 1a01t). */
1516 if ((insn & (0x14 << 21)) == (0x04 << 21))
1517 insn |= 0x02 << 21;
1518 else if ((insn & (0x14 << 21)) == (0x10 << 21))
1519 insn |= 0x08 << 21;
1520 else
2441e016 1521 goto out;
5bd4f169 1522 }
805fc799
AM
1523 else
1524 {
1525 bfd_vma target = 0;
1526 bfd_vma from;
5bd4f169 1527
805fc799
AM
1528 if (!bfd_is_com_section (symbol->section))
1529 target = symbol->value;
1530 target += symbol->section->output_section->vma;
1531 target += symbol->section->output_offset;
1532 target += reloc_entry->addend;
5bd4f169 1533
805fc799
AM
1534 from = (reloc_entry->address
1535 + input_section->output_offset
1536 + input_section->output_section->vma);
5bd4f169 1537
805fc799
AM
1538 /* Invert 'y' bit if not the default. */
1539 if ((bfd_signed_vma) (target - from) < 0)
1540 insn ^= 0x01 << 21;
1541 }
4ce794b7 1542 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2441e016
AM
1543 out:
1544 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
1545 input_section, output_bfd, error_message);
805fc799 1546}
5bd4f169 1547
805fc799 1548static bfd_reloc_status_type
4ce794b7
AM
1549ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1550 void *data, asection *input_section,
1551 bfd *output_bfd, char **error_message)
805fc799
AM
1552{
1553 /* If this is a relocatable link (output_bfd test tells us), just
1554 call the generic function. Any adjustment will be done at final
1555 link time. */
1556 if (output_bfd != NULL)
cedb70c5 1557 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799 1558 input_section, output_bfd, error_message);
5bd4f169 1559
805fc799
AM
1560 /* Subtract the symbol section base address. */
1561 reloc_entry->addend -= symbol->section->output_section->vma;
5bd4f169
AM
1562 return bfd_reloc_continue;
1563}
1564
805fc799 1565static bfd_reloc_status_type
4ce794b7
AM
1566ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1567 void *data, asection *input_section,
1568 bfd *output_bfd, char **error_message)
805fc799
AM
1569{
1570 /* If this is a relocatable link (output_bfd test tells us), just
1571 call the generic function. Any adjustment will be done at final
1572 link time. */
1573 if (output_bfd != NULL)
cedb70c5 1574 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1575 input_section, output_bfd, error_message);
1576
1577 /* Subtract the symbol section base address. */
1578 reloc_entry->addend -= symbol->section->output_section->vma;
1579
1580 /* Adjust the addend for sign extension of the low 16 bits. */
1581 reloc_entry->addend += 0x8000;
1582 return bfd_reloc_continue;
1583}
1584
1585static bfd_reloc_status_type
4ce794b7
AM
1586ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1587 void *data, asection *input_section,
1588 bfd *output_bfd, char **error_message)
805fc799
AM
1589{
1590 bfd_vma TOCstart;
1591
1592 /* If this is a relocatable link (output_bfd test tells us), just
1593 call the generic function. Any adjustment will be done at final
1594 link time. */
1595 if (output_bfd != NULL)
cedb70c5 1596 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1597 input_section, output_bfd, error_message);
1598
1599 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1600 if (TOCstart == 0)
1c865ab2 1601 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1602
1603 /* Subtract the TOC base address. */
1604 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1605 return bfd_reloc_continue;
1606}
1607
1608static bfd_reloc_status_type
4ce794b7
AM
1609ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1610 void *data, asection *input_section,
1611 bfd *output_bfd, char **error_message)
805fc799
AM
1612{
1613 bfd_vma TOCstart;
1614
1615 /* If this is a relocatable link (output_bfd test tells us), just
1616 call the generic function. Any adjustment will be done at final
1617 link time. */
1618 if (output_bfd != NULL)
cedb70c5 1619 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1620 input_section, output_bfd, error_message);
1621
1622 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1623 if (TOCstart == 0)
1c865ab2 1624 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799
AM
1625
1626 /* Subtract the TOC base address. */
1627 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
1628
1629 /* Adjust the addend for sign extension of the low 16 bits. */
1630 reloc_entry->addend += 0x8000;
1631 return bfd_reloc_continue;
1632}
1633
1634static bfd_reloc_status_type
4ce794b7
AM
1635ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1636 void *data, asection *input_section,
1637 bfd *output_bfd, char **error_message)
805fc799
AM
1638{
1639 bfd_vma TOCstart;
1640 bfd_size_type octets;
1641
1642 /* If this is a relocatable link (output_bfd test tells us), just
1643 call the generic function. Any adjustment will be done at final
1644 link time. */
1645 if (output_bfd != NULL)
cedb70c5 1646 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1647 input_section, output_bfd, error_message);
1648
1649 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
1650 if (TOCstart == 0)
1c865ab2 1651 TOCstart = ppc64_elf_set_toc (NULL, input_section->output_section->owner);
805fc799 1652
bb294208 1653 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
805fc799
AM
1654 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
1655 return bfd_reloc_ok;
1656}
1657
5663e321
AM
1658static bfd_reloc_status_type
1659ppc64_elf_prefix_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1660 void *data, asection *input_section,
1661 bfd *output_bfd, char **error_message)
1662{
1663 uint64_t insn;
1664 bfd_vma targ;
1665
1666 if (output_bfd != NULL)
1667 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1668 input_section, output_bfd, error_message);
1669
1670 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
1671 insn <<= 32;
1672 insn |= bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address + 4);
1673
1674 targ = (symbol->section->output_section->vma
1675 + symbol->section->output_offset
1676 + reloc_entry->addend);
1677 if (!bfd_is_com_section (symbol->section))
1678 targ += symbol->value;
1679 if (reloc_entry->howto->type == R_PPC64_D34_HA30)
1680 targ += 1ULL << 33;
1681 if (reloc_entry->howto->pc_relative)
1682 {
1683 bfd_vma from = (reloc_entry->address
1684 + input_section->output_offset
1685 + input_section->output_section->vma);
1686 targ -=from;
1687 }
1688 targ >>= reloc_entry->howto->rightshift;
1689 insn &= ~reloc_entry->howto->dst_mask;
1690 insn |= ((targ << 16) | (targ & 0xffff)) & reloc_entry->howto->dst_mask;
1691 bfd_put_32 (abfd, insn >> 32, (bfd_byte *) data + reloc_entry->address);
1692 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address + 4);
1693 if (reloc_entry->howto->complain_on_overflow == complain_overflow_signed
1694 && (targ + (1ULL << (reloc_entry->howto->bitsize - 1))
1695 >= 1ULL << reloc_entry->howto->bitsize))
1696 return bfd_reloc_overflow;
1697 return bfd_reloc_ok;
1698}
1699
805fc799 1700static bfd_reloc_status_type
4ce794b7
AM
1701ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
1702 void *data, asection *input_section,
1703 bfd *output_bfd, char **error_message)
805fc799
AM
1704{
1705 /* If this is a relocatable link (output_bfd test tells us), just
1706 call the generic function. Any adjustment will be done at final
1707 link time. */
1708 if (output_bfd != NULL)
cedb70c5 1709 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
805fc799
AM
1710 input_section, output_bfd, error_message);
1711
1712 if (error_message != NULL)
1713 {
1714 static char buf[60];
1715 sprintf (buf, "generic linker can't handle %s",
1716 reloc_entry->howto->name);
1717 *error_message = buf;
1718 }
1719 return bfd_reloc_dangerous;
1720}
1721
927be08e
AM
1722/* Track GOT entries needed for a given symbol. We might need more
1723 than one got entry per symbol. */
1724struct got_entry
1725{
1726 struct got_entry *next;
1727
1728 /* The symbol addend that we'll be placing in the GOT. */
1729 bfd_vma addend;
1730
1731 /* Unlike other ELF targets, we use separate GOT entries for the same
1732 symbol referenced from different input files. This is to support
1733 automatic multiple TOC/GOT sections, where the TOC base can vary
1734 from one input file to another. After partitioning into TOC groups
1735 we merge entries within the group.
1736
1737 Point to the BFD owning this GOT entry. */
1738 bfd *owner;
1739
1740 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
1741 TLS_TPREL or TLS_DTPREL for tls entries. */
f961d9dd 1742 unsigned char tls_type;
927be08e
AM
1743
1744 /* Non-zero if got.ent points to real entry. */
f961d9dd 1745 unsigned char is_indirect;
927be08e
AM
1746
1747 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
1748 union
2cdcc330
AM
1749 {
1750 bfd_signed_vma refcount;
1751 bfd_vma offset;
1752 struct got_entry *ent;
1753 } got;
927be08e
AM
1754};
1755
1756/* The same for PLT. */
1757struct plt_entry
1758{
1759 struct plt_entry *next;
1760
1761 bfd_vma addend;
1762
1763 union
2cdcc330
AM
1764 {
1765 bfd_signed_vma refcount;
1766 bfd_vma offset;
1767 } plt;
927be08e
AM
1768};
1769
e717da7e
AM
1770struct ppc64_elf_obj_tdata
1771{
1772 struct elf_obj_tdata elf;
1773
1774 /* Shortcuts to dynamic linker sections. */
1775 asection *got;
1776 asection *relgot;
1777
b3fac117
AM
1778 /* Used during garbage collection. We attach global symbols defined
1779 on removed .opd entries to this section so that the sym is removed. */
1780 asection *deleted_section;
81688140 1781
927be08e 1782 /* TLS local dynamic got entry handling. Support for multiple GOT
e717da7e 1783 sections means we potentially need one of these for each input bfd. */
927be08e 1784 struct got_entry tlsld_got;
8860955f 1785
2cdcc330
AM
1786 union
1787 {
729eabd5
AM
1788 /* A copy of relocs before they are modified for --emit-relocs. */
1789 Elf_Internal_Rela *relocs;
1790
1791 /* Section contents. */
1792 bfd_byte *contents;
1793 } opd;
d77c8a4b
AM
1794
1795 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
1796 the reloc to be in the range -32768 to 32767. */
98528052
AM
1797 unsigned int has_small_toc_reloc : 1;
1798
560c8763
AM
1799 /* Set if toc/got ha relocs detected not using r2, or lo reloc
1800 instruction not one we handle. */
1801 unsigned int unexpected_toc_insn : 1;
066f4018 1802
903b777d
AM
1803 /* Set if PLT/GOT/TOC relocs that can be optimised are present in
1804 this file. */
1805 unsigned int has_optrel : 1;
e717da7e
AM
1806};
1807
1808#define ppc64_elf_tdata(bfd) \
1809 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
1810
1811#define ppc64_tlsld_got(bfd) \
1812 (&ppc64_elf_tdata (bfd)->tlsld_got)
1813
0c8d6e5c
AM
1814#define is_ppc64_elf(bfd) \
1815 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1816 && elf_object_id (bfd) == PPC64_ELF_DATA)
0c8d6e5c 1817
e717da7e
AM
1818/* Override the generic function because we store some extras. */
1819
1820static bfd_boolean
1821ppc64_elf_mkobject (bfd *abfd)
1822{
0ffa91dd 1823 return bfd_elf_allocate_object (abfd, sizeof (struct ppc64_elf_obj_tdata),
4dfe6ac6 1824 PPC64_ELF_DATA);
e717da7e
AM
1825}
1826
feee612b 1827/* Fix bad default arch selected for a 64 bit input bfd when the
14b57c7c 1828 default is 32 bit. Also select arch based on apuinfo. */
feee612b 1829
b34976b6 1830static bfd_boolean
4ce794b7 1831ppc64_elf_object_p (bfd *abfd)
feee612b 1832{
14b57c7c
AM
1833 if (!abfd->arch_info->the_default)
1834 return TRUE;
1835
1836 if (abfd->arch_info->bits_per_word == 32)
feee612b
AM
1837 {
1838 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1839
1840 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
1841 {
1842 /* Relies on arch after 32 bit default being 64 bit default. */
1843 abfd->arch_info = abfd->arch_info->next;
1844 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
1845 }
1846 }
14b57c7c 1847 return _bfd_elf_ppc_set_arch (abfd);
feee612b
AM
1848}
1849
d37c89e5
AM
1850/* Support for core dump NOTE sections. */
1851
1852static bfd_boolean
1853ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1854{
eea6121a 1855 size_t offset, size;
d37c89e5
AM
1856
1857 if (note->descsz != 504)
1858 return FALSE;
1859
1860 /* pr_cursig */
228e534f 1861 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
d37c89e5
AM
1862
1863 /* pr_pid */
228e534f 1864 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
d37c89e5
AM
1865
1866 /* pr_reg */
1867 offset = 112;
eea6121a 1868 size = 384;
d37c89e5
AM
1869
1870 /* Make a ".reg/999" section. */
1871 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 1872 size, note->descpos + offset);
d37c89e5
AM
1873}
1874
1875static bfd_boolean
1876ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1877{
1878 if (note->descsz != 136)
1879 return FALSE;
1880
228e534f 1881 elf_tdata (abfd)->core->pid
bc989cdc 1882 = bfd_get_32 (abfd, note->descdata + 24);
228e534f 1883 elf_tdata (abfd)->core->program
d37c89e5 1884 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
228e534f 1885 elf_tdata (abfd)->core->command
d37c89e5
AM
1886 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
1887
1888 return TRUE;
1889}
1890
183e98be
AM
1891static char *
1892ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
1893 ...)
1894{
1895 switch (note_type)
1896 {
1897 default:
1898 return NULL;
1899
1900 case NT_PRPSINFO:
1901 {
9ef6d1e3 1902 char data[136] ATTRIBUTE_NONSTRING;
183e98be
AM
1903 va_list ap;
1904
1905 va_start (ap, note_type);
75cd47ed 1906 memset (data, 0, sizeof (data));
183e98be 1907 strncpy (data + 40, va_arg (ap, const char *), 16);
be3e27bb 1908#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1909 DIAGNOSTIC_PUSH;
be3e27bb 1910 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1911 -Wstringop-truncation:
1912 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1913 */
95da9854
L
1914 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1915#endif
183e98be 1916 strncpy (data + 56, va_arg (ap, const char *), 80);
be3e27bb 1917#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1918 DIAGNOSTIC_POP;
fe75810f 1919#endif
183e98be
AM
1920 va_end (ap);
1921 return elfcore_write_note (abfd, buf, bufsiz,
1922 "CORE", note_type, data, sizeof (data));
1923 }
1924
1925 case NT_PRSTATUS:
1926 {
1927 char data[504];
1928 va_list ap;
1929 long pid;
1930 int cursig;
1931 const void *greg;
1932
1933 va_start (ap, note_type);
1934 memset (data, 0, 112);
1935 pid = va_arg (ap, long);
1936 bfd_put_32 (abfd, pid, data + 32);
1937 cursig = va_arg (ap, int);
1938 bfd_put_16 (abfd, cursig, data + 12);
1939 greg = va_arg (ap, const void *);
1940 memcpy (data + 112, greg, 384);
1941 memset (data + 496, 0, 8);
1942 va_end (ap);
1943 return elfcore_write_note (abfd, buf, bufsiz,
1944 "CORE", note_type, data, sizeof (data));
1945 }
1946 }
1947}
1948
5d35169e
AM
1949/* Add extra PPC sections. */
1950
2cdcc330 1951static const struct bfd_elf_special_section ppc64_elf_special_sections[] =
7f4d3958 1952{
07d6d2b8
AM
1953 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
1954 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1955 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8
AM
1956 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1957 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
0112cd26 1958 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
07d6d2b8 1959 { NULL, 0, 0, 0, 0 }
5d35169e
AM
1960};
1961
7c8fe5c4
AM
1962enum _ppc64_sec_type {
1963 sec_normal = 0,
1964 sec_opd = 1,
1965 sec_toc = 2
1966};
1967
f0abc2a1
AM
1968struct _ppc64_elf_section_data
1969{
1970 struct bfd_elf_section_data elf;
411e1bfb 1971
f0abc2a1
AM
1972 union
1973 {
51aecdc5
AM
1974 /* An array with one entry for each opd function descriptor,
1975 and some spares since opd entries may be either 16 or 24 bytes. */
1976#define OPD_NDX(OFF) ((OFF) >> 4)
74f0fb50
AM
1977 struct _opd_sec_data
1978 {
1979 /* Points to the function code section for local opd entries. */
1980 asection **func_sec;
1981
1982 /* After editing .opd, adjust references to opd local syms. */
1983 long *adjust;
1984 } opd;
7c8fe5c4 1985
3a71aa26
AM
1986 /* An array for toc sections, indexed by offset/8. */
1987 struct _toc_sec_data
1988 {
1989 /* Specifies the relocation symbol index used at a given toc offset. */
1990 unsigned *symndx;
1991
1992 /* And the relocation addend. */
1993 bfd_vma *add;
1994 } toc;
7c8fe5c4
AM
1995 } u;
1996
1997 enum _ppc64_sec_type sec_type:2;
411e1bfb 1998
7c8fe5c4
AM
1999 /* Flag set when small branches are detected. Used to
2000 select suitable defaults for the stub group size. */
2001 unsigned int has_14bit_branch:1;
3e04d765
AM
2002
2003 /* Flag set when PLTCALL relocs are detected. */
2004 unsigned int has_pltcall:1;
066f4018 2005
903b777d
AM
2006 /* Flag set when section has PLT/GOT/TOC relocations that can be
2007 optimised. */
2008 unsigned int has_optrel:1;
f0abc2a1
AM
2009};
2010
2011#define ppc64_elf_section_data(sec) \
411e1bfb 2012 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
f0abc2a1
AM
2013
2014static bfd_boolean
4ce794b7 2015ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
f0abc2a1 2016{
f592407e
AM
2017 if (!sec->used_by_bfd)
2018 {
2019 struct _ppc64_elf_section_data *sdata;
986f0783 2020 size_t amt = sizeof (*sdata);
f0abc2a1 2021
f592407e
AM
2022 sdata = bfd_zalloc (abfd, amt);
2023 if (sdata == NULL)
2024 return FALSE;
2025 sec->used_by_bfd = sdata;
2026 }
f0abc2a1
AM
2027
2028 return _bfd_elf_new_section_hook (abfd, sec);
2029}
4025353c 2030
bf577467
AM
2031static bfd_boolean
2032ppc64_elf_section_flags (const Elf_Internal_Shdr *hdr)
2033{
2034 const char *name = hdr->bfd_section->name;
2035
2036 if (strncmp (name, ".sbss", 5) == 0
2037 || strncmp (name, ".sdata", 6) == 0)
2038 hdr->bfd_section->flags |= SEC_SMALL_DATA;
2039
2040 return TRUE;
2041}
2042
74f0fb50 2043static struct _opd_sec_data *
4025353c
AM
2044get_opd_info (asection * sec)
2045{
2046 if (sec != NULL
2047 && ppc64_elf_section_data (sec) != NULL
7c8fe5c4 2048 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
74f0fb50 2049 return &ppc64_elf_section_data (sec)->u.opd;
4025353c
AM
2050 return NULL;
2051}
90e3cdf2
JJ
2052\f
2053/* Parameters for the qsort hook. */
90e3cdf2 2054static bfd_boolean synthetic_relocatable;
cd285db5 2055static asection *synthetic_opd;
90e3cdf2 2056
699733f6 2057/* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
90e3cdf2
JJ
2058
2059static int
2060compare_symbols (const void *ap, const void *bp)
2061{
2cdcc330
AM
2062 const asymbol *a = *(const asymbol **) ap;
2063 const asymbol *b = *(const asymbol **) bp;
90e3cdf2 2064
699733f6
AM
2065 /* Section symbols first. */
2066 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
90e3cdf2 2067 return -1;
699733f6 2068 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
90e3cdf2
JJ
2069 return 1;
2070
699733f6 2071 /* then .opd symbols. */
cd285db5
AM
2072 if (synthetic_opd != NULL)
2073 {
2074 if (strcmp (a->section->name, ".opd") == 0
2075 && strcmp (b->section->name, ".opd") != 0)
2076 return -1;
2077 if (strcmp (a->section->name, ".opd") != 0
2078 && strcmp (b->section->name, ".opd") == 0)
2079 return 1;
2080 }
90e3cdf2 2081
699733f6 2082 /* then other code symbols. */
2cdcc330
AM
2083 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2084 == (SEC_CODE | SEC_ALLOC))
2085 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2086 != (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2087 return -1;
2088
2cdcc330
AM
2089 if (((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2090 != (SEC_CODE | SEC_ALLOC))
2091 && ((b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2092 == (SEC_CODE | SEC_ALLOC)))
90e3cdf2
JJ
2093 return 1;
2094
2095 if (synthetic_relocatable)
2096 {
2097 if (a->section->id < b->section->id)
2098 return -1;
2099
2100 if (a->section->id > b->section->id)
2101 return 1;
2102 }
2103
2104 if (a->value + a->section->vma < b->value + b->section->vma)
2105 return -1;
2106
2107 if (a->value + a->section->vma > b->value + b->section->vma)
2108 return 1;
2109
4d35a0aa
AM
2110 /* For syms with the same value, prefer strong dynamic global function
2111 syms over other syms. */
2112 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2113 return -1;
2114
2115 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2116 return 1;
2117
2118 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2119 return -1;
2120
2121 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2122 return 1;
2123
2124 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2125 return -1;
2126
2127 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2128 return 1;
2129
2130 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2131 return -1;
2132
2133 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2134 return 1;
2135
dcea6a95
AM
2136 /* Finally, sort on where the symbol is in memory. The symbols will
2137 be in at most two malloc'd blocks, one for static syms, one for
2138 dynamic syms, and we distinguish the two blocks above by testing
2139 BSF_DYNAMIC. Since we are sorting the symbol pointers which were
2140 originally in the same order as the symbols (and we're not
2141 sorting the symbols themselves), this ensures a stable sort. */
2142 if (a < b)
2143 return -1;
2144 if (a > b)
2145 return 1;
2146 return 0;
90e3cdf2
JJ
2147}
2148
699733f6 2149/* Search SYMS for a symbol of the given VALUE. */
90e3cdf2 2150
699733f6 2151static asymbol *
9ad9b810
AM
2152sym_exists_at (asymbol **syms, size_t lo, size_t hi, unsigned int id,
2153 bfd_vma value)
90e3cdf2 2154{
9ad9b810 2155 size_t mid;
90e3cdf2 2156
7292b3ac 2157 if (id == (unsigned) -1)
699733f6
AM
2158 {
2159 while (lo < hi)
2160 {
2161 mid = (lo + hi) >> 1;
2162 if (syms[mid]->value + syms[mid]->section->vma < value)
2163 lo = mid + 1;
2164 else if (syms[mid]->value + syms[mid]->section->vma > value)
2165 hi = mid;
2166 else
2167 return syms[mid];
2168 }
2169 }
2170 else
2171 {
2172 while (lo < hi)
2173 {
2174 mid = (lo + hi) >> 1;
2175 if (syms[mid]->section->id < id)
2176 lo = mid + 1;
2177 else if (syms[mid]->section->id > id)
2178 hi = mid;
2179 else if (syms[mid]->value < value)
2180 lo = mid + 1;
2181 else if (syms[mid]->value > value)
2182 hi = mid;
2183 else
2184 return syms[mid];
2185 }
2186 }
2187 return NULL;
90e3cdf2
JJ
2188}
2189
468392fb
AM
2190static bfd_boolean
2191section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2192{
2193 bfd_vma vma = *(bfd_vma *) ptr;
2194 return ((section->flags & SEC_ALLOC) != 0
2195 && section->vma <= vma
2196 && vma < section->vma + section->size);
2197}
2198
699733f6 2199/* Create synthetic symbols, effectively restoring "dot-symbol" function
c4b0b099
AM
2200 entry syms. Also generate @plt symbols for the glink branch table.
2201 Returns count of synthetic symbols in RET or -1 on error. */
90e3cdf2
JJ
2202
2203static long
a7535cf3
AM
2204ppc64_elf_get_synthetic_symtab (bfd *abfd,
2205 long static_count, asymbol **static_syms,
2206 long dyn_count, asymbol **dyn_syms,
c9727e01 2207 asymbol **ret)
90e3cdf2
JJ
2208{
2209 asymbol *s;
0ccf57bd 2210 size_t i, j, count;
90e3cdf2 2211 char *names;
0ccf57bd 2212 size_t symcount, codesecsym, codesecsymend, secsymend, opdsymend;
ee67d69a 2213 asection *opd = NULL;
90e3cdf2 2214 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
a7535cf3 2215 asymbol **syms;
ee67d69a 2216 int abi = abiversion (abfd);
90e3cdf2
JJ
2217
2218 *ret = NULL;
2219
ee67d69a
AM
2220 if (abi < 2)
2221 {
2222 opd = bfd_get_section_by_name (abfd, ".opd");
2223 if (opd == NULL && abi == 1)
2224 return 0;
2225 }
90e3cdf2 2226
a5259595
AM
2227 syms = NULL;
2228 codesecsym = 0;
2229 codesecsymend = 0;
2230 secsymend = 0;
2231 opdsymend = 0;
2232 symcount = 0;
2233 if (opd != NULL)
c9727e01 2234 {
a5259595
AM
2235 symcount = static_count;
2236 if (!relocatable)
2237 symcount += dyn_count;
2238 if (symcount == 0)
2239 return 0;
c9727e01 2240
a5259595
AM
2241 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2242 if (syms == NULL)
2243 return -1;
90e3cdf2 2244
a5259595
AM
2245 if (!relocatable && static_count != 0 && dyn_count != 0)
2246 {
2247 /* Use both symbol tables. */
2248 memcpy (syms, static_syms, static_count * sizeof (*syms));
2249 memcpy (syms + static_count, dyn_syms,
2250 (dyn_count + 1) * sizeof (*syms));
2251 }
2252 else if (!relocatable && static_count == 0)
2253 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2254 else
2255 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
90e3cdf2 2256
0ccf57bd
AM
2257 /* Trim uninteresting symbols. Interesting symbols are section,
2258 function, and notype symbols. */
2259 for (i = 0, j = 0; i < symcount; ++i)
2260 if ((syms[i]->flags & (BSF_FILE | BSF_OBJECT | BSF_THREAD_LOCAL
2261 | BSF_RELC | BSF_SRELC)) == 0)
2262 syms[j++] = syms[i];
2263 symcount = j;
2264
a5259595
AM
2265 synthetic_relocatable = relocatable;
2266 synthetic_opd = opd;
2267 qsort (syms, symcount, sizeof (*syms), compare_symbols);
90e3cdf2 2268
a5259595
AM
2269 if (!relocatable && symcount > 1)
2270 {
bfa5bd2a
PA
2271 /* Trim duplicate syms, since we may have merged the normal
2272 and dynamic symbols. Actually, we only care about syms
2273 that have different values, so trim any with the same
2274 value. Don't consider ifunc and ifunc resolver symbols
2275 duplicates however, because GDB wants to know whether a
2276 text symbol is an ifunc resolver. */
a5259595 2277 for (i = 1, j = 1; i < symcount; ++i)
bfa5bd2a
PA
2278 {
2279 const asymbol *s0 = syms[i - 1];
2280 const asymbol *s1 = syms[i];
2281
2282 if ((s0->value + s0->section->vma
2283 != s1->value + s1->section->vma)
2284 || ((s0->flags & BSF_GNU_INDIRECT_FUNCTION)
2285 != (s1->flags & BSF_GNU_INDIRECT_FUNCTION)))
2286 syms[j++] = syms[i];
2287 }
a5259595
AM
2288 symcount = j;
2289 }
699733f6 2290
a5259595
AM
2291 i = 0;
2292 /* Note that here and in compare_symbols we can't compare opd and
2293 sym->section directly. With separate debug info files, the
2294 symbols will be extracted from the debug file while abfd passed
2295 to this function is the real binary. */
0ccf57bd 2296 if (strcmp (syms[i]->section->name, ".opd") == 0)
a5259595
AM
2297 ++i;
2298 codesecsym = i;
2299
2300 for (; i < symcount; ++i)
2301 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC
2302 | SEC_THREAD_LOCAL))
2303 != (SEC_CODE | SEC_ALLOC))
2304 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2305 break;
2306 codesecsymend = i;
2307
2308 for (; i < symcount; ++i)
2309 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2310 break;
2311 secsymend = i;
2312
2313 for (; i < symcount; ++i)
2314 if (strcmp (syms[i]->section->name, ".opd") != 0)
2315 break;
2316 opdsymend = i;
2317
2318 for (; i < symcount; ++i)
2cdcc330
AM
2319 if (((syms[i]->section->flags
2320 & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL)))
a5259595
AM
2321 != (SEC_CODE | SEC_ALLOC))
2322 break;
2323 symcount = i;
2324 }
c9727e01 2325 count = 0;
90e3cdf2 2326
699733f6 2327 if (relocatable)
90e3cdf2 2328 {
699733f6
AM
2329 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2330 arelent *r;
2331 size_t size;
0ccf57bd 2332 size_t relcount;
90e3cdf2 2333
468392fb
AM
2334 if (opdsymend == secsymend)
2335 goto done;
2336
699733f6 2337 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
90e3cdf2 2338 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
7356fed5 2339 if (relcount == 0)
c9727e01 2340 goto done;
90e3cdf2 2341
7356fed5
AM
2342 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2343 {
2344 count = -1;
2345 goto done;
2346 }
2347
699733f6 2348 size = 0;
595da8c5 2349 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
699733f6
AM
2350 {
2351 asymbol *sym;
90e3cdf2 2352
595da8c5 2353 while (r < opd->relocation + relcount
699733f6
AM
2354 && r->address < syms[i]->value + opd->vma)
2355 ++r;
90e3cdf2 2356
595da8c5 2357 if (r == opd->relocation + relcount)
699733f6 2358 break;
90e3cdf2 2359
699733f6
AM
2360 if (r->address != syms[i]->value + opd->vma)
2361 continue;
90e3cdf2 2362
699733f6
AM
2363 if (r->howto->type != R_PPC64_ADDR64)
2364 continue;
90e3cdf2 2365
699733f6
AM
2366 sym = *r->sym_ptr_ptr;
2367 if (!sym_exists_at (syms, opdsymend, symcount,
2368 sym->section->id, sym->value + r->addend))
2369 {
2370 ++count;
2371 size += sizeof (asymbol);
2372 size += strlen (syms[i]->name) + 2;
2373 }
2374 }
90e3cdf2 2375
c4b0b099
AM
2376 if (size == 0)
2377 goto done;
699733f6
AM
2378 s = *ret = bfd_malloc (size);
2379 if (s == NULL)
2380 {
7356fed5 2381 count = -1;
c9727e01 2382 goto done;
699733f6 2383 }
90e3cdf2 2384
699733f6 2385 names = (char *) (s + count);
90e3cdf2 2386
595da8c5 2387 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
90e3cdf2 2388 {
699733f6 2389 asymbol *sym;
90e3cdf2 2390
595da8c5 2391 while (r < opd->relocation + relcount
699733f6
AM
2392 && r->address < syms[i]->value + opd->vma)
2393 ++r;
90e3cdf2 2394
595da8c5 2395 if (r == opd->relocation + relcount)
699733f6
AM
2396 break;
2397
2398 if (r->address != syms[i]->value + opd->vma)
2399 continue;
2400
2401 if (r->howto->type != R_PPC64_ADDR64)
2402 continue;
90e3cdf2 2403
699733f6
AM
2404 sym = *r->sym_ptr_ptr;
2405 if (!sym_exists_at (syms, opdsymend, symcount,
2406 sym->section->id, sym->value + r->addend))
2407 {
2408 size_t len;
2409
2410 *s = *syms[i];
6ba2a415 2411 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2412 s->section = sym->section;
2413 s->value = sym->value + r->addend;
2414 s->name = names;
2415 *names++ = '.';
2416 len = strlen (syms[i]->name);
2417 memcpy (names, syms[i]->name, len + 1);
2418 names += len + 1;
6f610d07
UW
2419 /* Have udata.p point back to the original symbol this
2420 synthetic symbol was derived from. */
2421 s->udata.p = syms[i];
699733f6
AM
2422 s++;
2423 }
2424 }
2425 }
2426 else
90e3cdf2 2427 {
468392fb 2428 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
ee67d69a 2429 bfd_byte *contents = NULL;
699733f6 2430 size_t size;
0ccf57bd 2431 size_t plt_count = 0;
468392fb
AM
2432 bfd_vma glink_vma = 0, resolv_vma = 0;
2433 asection *dynamic, *glink = NULL, *relplt = NULL;
2434 arelent *p;
90e3cdf2 2435
ee67d69a 2436 if (opd != NULL && !bfd_malloc_and_get_section (abfd, opd, &contents))
699733f6 2437 {
c4b0b099
AM
2438 free_contents_and_exit_err:
2439 count = -1;
ee67d69a 2440 free_contents_and_exit:
c9594989 2441 free (contents);
c9727e01 2442 goto done;
699733f6 2443 }
90e3cdf2 2444
699733f6
AM
2445 size = 0;
2446 for (i = secsymend; i < opdsymend; ++i)
2447 {
2448 bfd_vma ent;
90e3cdf2 2449
5ef11c02
AM
2450 /* Ignore bogus symbols. */
2451 if (syms[i]->value > opd->size - 8)
2452 continue;
2453
699733f6
AM
2454 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2455 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2456 {
2457 ++count;
2458 size += sizeof (asymbol);
2459 size += strlen (syms[i]->name) + 2;
2460 }
2461 }
90e3cdf2 2462
468392fb 2463 /* Get start of .glink stubs from DT_PPC64_GLINK. */
066ee829
AM
2464 if (dyn_count != 0
2465 && (dynamic = bfd_get_section_by_name (abfd, ".dynamic")) != NULL)
468392fb
AM
2466 {
2467 bfd_byte *dynbuf, *extdyn, *extdynend;
2468 size_t extdynsize;
2469 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2470
2471 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
c4b0b099 2472 goto free_contents_and_exit_err;
468392fb
AM
2473
2474 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2475 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2476
2477 extdyn = dynbuf;
2478 extdynend = extdyn + dynamic->size;
2479 for (; extdyn < extdynend; extdyn += extdynsize)
2480 {
2481 Elf_Internal_Dyn dyn;
2482 (*swap_dyn_in) (abfd, extdyn, &dyn);
2483
2484 if (dyn.d_tag == DT_NULL)
2485 break;
2486
2487 if (dyn.d_tag == DT_PPC64_GLINK)
2488 {
9e390558
AM
2489 /* The first glink stub starts at DT_PPC64_GLINK plus 32.
2490 See comment in ppc64_elf_finish_dynamic_sections. */
2491 glink_vma = dyn.d_un.d_val + 8 * 4;
468392fb
AM
2492 /* The .glink section usually does not survive the final
2493 link; search for the section (usually .text) where the
2494 glink stubs now reside. */
2495 glink = bfd_sections_find_if (abfd, section_covers_vma,
2496 &glink_vma);
2497 break;
2498 }
2499 }
2500
2501 free (dynbuf);
2502 }
2503
2504 if (glink != NULL)
2505 {
2506 /* Determine __glink trampoline by reading the relative branch
2507 from the first glink stub. */
2508 bfd_byte buf[4];
b9e5796b
AM
2509 unsigned int off = 0;
2510
2511 while (bfd_get_section_contents (abfd, glink, buf,
2512 glink_vma + off - glink->vma, 4))
468392fb
AM
2513 {
2514 unsigned int insn = bfd_get_32 (abfd, buf);
2515 insn ^= B_DOT;
2516 if ((insn & ~0x3fffffc) == 0)
b9e5796b 2517 {
2cdcc330
AM
2518 resolv_vma
2519 = glink_vma + off + (insn ^ 0x2000000) - 0x2000000;
b9e5796b
AM
2520 break;
2521 }
2522 off += 4;
2523 if (off > 4)
2524 break;
468392fb
AM
2525 }
2526
2527 if (resolv_vma)
2528 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
468392fb 2529
066ee829
AM
2530 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2531 if (relplt != NULL)
2532 {
2533 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2cdcc330 2534 if (!(*slurp_relocs) (abfd, relplt, dyn_syms, TRUE))
c4b0b099 2535 goto free_contents_and_exit_err;
68ffbac6 2536
066ee829
AM
2537 plt_count = relplt->size / sizeof (Elf64_External_Rela);
2538 size += plt_count * sizeof (asymbol);
468392fb 2539
066ee829
AM
2540 p = relplt->relocation;
2541 for (i = 0; i < plt_count; i++, p++)
e054468f
AM
2542 {
2543 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2544 if (p->addend != 0)
2545 size += sizeof ("+0x") - 1 + 16;
2546 }
066ee829 2547 }
468392fb
AM
2548 }
2549
c4b0b099
AM
2550 if (size == 0)
2551 goto free_contents_and_exit;
699733f6
AM
2552 s = *ret = bfd_malloc (size);
2553 if (s == NULL)
c4b0b099 2554 goto free_contents_and_exit_err;
90e3cdf2 2555
468392fb 2556 names = (char *) (s + count + plt_count + (resolv_vma != 0));
90e3cdf2 2557
699733f6 2558 for (i = secsymend; i < opdsymend; ++i)
90e3cdf2 2559 {
699733f6 2560 bfd_vma ent;
90e3cdf2 2561
5ef11c02
AM
2562 if (syms[i]->value > opd->size - 8)
2563 continue;
2564
699733f6
AM
2565 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2566 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
90e3cdf2 2567 {
0ccf57bd 2568 size_t lo, hi;
699733f6 2569 size_t len;
c9727e01 2570 asection *sec = abfd->sections;
90e3cdf2 2571
699733f6
AM
2572 *s = *syms[i];
2573 lo = codesecsym;
2574 hi = codesecsymend;
2575 while (lo < hi)
2576 {
0ccf57bd 2577 size_t mid = (lo + hi) >> 1;
699733f6
AM
2578 if (syms[mid]->section->vma < ent)
2579 lo = mid + 1;
2580 else if (syms[mid]->section->vma > ent)
2581 hi = mid;
2582 else
c9727e01
AM
2583 {
2584 sec = syms[mid]->section;
2585 break;
2586 }
699733f6
AM
2587 }
2588
c9727e01 2589 if (lo >= hi && lo > codesecsym)
699733f6 2590 sec = syms[lo - 1]->section;
699733f6
AM
2591
2592 for (; sec != NULL; sec = sec->next)
2593 {
2594 if (sec->vma > ent)
2595 break;
63524580
JK
2596 /* SEC_LOAD may not be set if SEC is from a separate debug
2597 info file. */
2598 if ((sec->flags & SEC_ALLOC) == 0)
699733f6
AM
2599 break;
2600 if ((sec->flags & SEC_CODE) != 0)
2601 s->section = sec;
2602 }
6ba2a415 2603 s->flags |= BSF_SYNTHETIC;
699733f6
AM
2604 s->value = ent - s->section->vma;
2605 s->name = names;
2606 *names++ = '.';
2607 len = strlen (syms[i]->name);
2608 memcpy (names, syms[i]->name, len + 1);
2609 names += len + 1;
6f610d07
UW
2610 /* Have udata.p point back to the original symbol this
2611 synthetic symbol was derived from. */
2612 s->udata.p = syms[i];
699733f6 2613 s++;
90e3cdf2 2614 }
90e3cdf2 2615 }
699733f6 2616 free (contents);
468392fb
AM
2617
2618 if (glink != NULL && relplt != NULL)
2619 {
2620 if (resolv_vma)
2621 {
2622 /* Add a symbol for the main glink trampoline. */
86a4952b 2623 memset (s, 0, sizeof *s);
468392fb 2624 s->the_bfd = abfd;
6ba2a415 2625 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2626 s->section = glink;
2627 s->value = resolv_vma - glink->vma;
2628 s->name = names;
2cdcc330
AM
2629 memcpy (names, "__glink_PLTresolve",
2630 sizeof ("__glink_PLTresolve"));
468392fb
AM
2631 names += sizeof ("__glink_PLTresolve");
2632 s++;
2633 count++;
2634 }
2635
2636 /* FIXME: It would be very much nicer to put sym@plt on the
2637 stub rather than on the glink branch table entry. The
2638 objdump disassembler would then use a sensible symbol
2639 name on plt calls. The difficulty in doing so is
2640 a) finding the stubs, and,
2641 b) matching stubs against plt entries, and,
2642 c) there can be multiple stubs for a given plt entry.
2643
2644 Solving (a) could be done by code scanning, but older
2645 ppc64 binaries used different stubs to current code.
2646 (b) is the tricky one since you need to known the toc
2647 pointer for at least one function that uses a pic stub to
2648 be able to calculate the plt address referenced.
2649 (c) means gdb would need to set multiple breakpoints (or
2650 find the glink branch itself) when setting breakpoints
2651 for pending shared library loads. */
2652 p = relplt->relocation;
2653 for (i = 0; i < plt_count; i++, p++)
2654 {
2655 size_t len;
2656
2657 *s = **p->sym_ptr_ptr;
2658 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2659 we are defining a symbol, ensure one of them is set. */
2660 if ((s->flags & BSF_LOCAL) == 0)
2661 s->flags |= BSF_GLOBAL;
6ba2a415 2662 s->flags |= BSF_SYNTHETIC;
468392fb
AM
2663 s->section = glink;
2664 s->value = glink_vma - glink->vma;
2665 s->name = names;
2666 s->udata.p = NULL;
2667 len = strlen ((*p->sym_ptr_ptr)->name);
2668 memcpy (names, (*p->sym_ptr_ptr)->name, len);
2669 names += len;
e054468f
AM
2670 if (p->addend != 0)
2671 {
2672 memcpy (names, "+0x", sizeof ("+0x") - 1);
2673 names += sizeof ("+0x") - 1;
2674 bfd_sprintf_vma (abfd, names, p->addend);
2675 names += strlen (names);
2676 }
468392fb
AM
2677 memcpy (names, "@plt", sizeof ("@plt"));
2678 names += sizeof ("@plt");
2679 s++;
b9e5796b
AM
2680 if (abi < 2)
2681 {
2682 glink_vma += 8;
2683 if (i >= 0x8000)
2684 glink_vma += 4;
2685 }
2686 else
468392fb
AM
2687 glink_vma += 4;
2688 }
2689 count += plt_count;
2690 }
90e3cdf2
JJ
2691 }
2692
c9727e01 2693 done:
a7535cf3 2694 free (syms);
90e3cdf2
JJ
2695 return count;
2696}
5bd4f169 2697\f
65f38f15
AM
2698/* The following functions are specific to the ELF linker, while
2699 functions above are used generally. Those named ppc64_elf_* are
2700 called by the main ELF linker code. They appear in this file more
2701 or less in the order in which they are called. eg.
2702 ppc64_elf_check_relocs is called early in the link process,
2703 ppc64_elf_finish_dynamic_sections is one of the last functions
e86ce104
AM
2704 called.
2705
2706 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
2707 functions have both a function code symbol and a function descriptor
2708 symbol. A call to foo in a relocatable object file looks like:
2709
2710 . .text
2711 . x:
2712 . bl .foo
2713 . nop
2714
2715 The function definition in another object file might be:
2716
2717 . .section .opd
2718 . foo: .quad .foo
2719 . .quad .TOC.@tocbase
2720 . .quad 0
2721 .
2722 . .text
2723 . .foo: blr
2724
2725 When the linker resolves the call during a static link, the branch
2726 unsurprisingly just goes to .foo and the .opd information is unused.
2727 If the function definition is in a shared library, things are a little
2728 different: The call goes via a plt call stub, the opd information gets
2729 copied to the plt, and the linker patches the nop.
2730
2731 . x:
2732 . bl .foo_stub
2733 . ld 2,40(1)
2734 .
2735 .
2736 . .foo_stub:
71a39c98
AM
2737 . std 2,40(1) # in practice, the call stub
2738 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
2739 . addi 11,11,Lfoo@toc@l # this is the general idea
2740 . ld 12,0(11)
2741 . ld 2,8(11)
2742 . mtctr 12
2743 . ld 11,16(11)
e86ce104
AM
2744 . bctr
2745 .
2746 . .section .plt
2747 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
2748
2749 The "reloc ()" notation is supposed to indicate that the linker emits
2750 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
2751 copying.
2752
2753 What are the difficulties here? Well, firstly, the relocations
2754 examined by the linker in check_relocs are against the function code
2755 sym .foo, while the dynamic relocation in the plt is emitted against
2756 the function descriptor symbol, foo. Somewhere along the line, we need
2757 to carefully copy dynamic link information from one symbol to the other.
2758 Secondly, the generic part of the elf linker will make .foo a dynamic
2759 symbol as is normal for most other backends. We need foo dynamic
2760 instead, at least for an application final link. However, when
2761 creating a shared library containing foo, we need to have both symbols
2762 dynamic so that references to .foo are satisfied during the early
2763 stages of linking. Otherwise the linker might decide to pull in a
8387904d
AM
2764 definition from some other object, eg. a static library.
2765
2766 Update: As of August 2004, we support a new convention. Function
2767 calls may use the function descriptor symbol, ie. "bl foo". This
2768 behaves exactly as "bl .foo". */
65f38f15 2769
7c8bbca5
AM
2770/* Of those relocs that might be copied as dynamic relocs, this
2771 function selects those that must be copied when linking a shared
2772 library or PIE, even when the symbol is local. */
65f38f15 2773
1d483afe
AM
2774static int
2775must_be_dyn_reloc (struct bfd_link_info *info,
2776 enum elf_ppc64_reloc_type r_type)
2777{
2778 switch (r_type)
2779 {
2780 default:
7c8bbca5
AM
2781 /* Only relative relocs can be resolved when the object load
2782 address isn't fixed. DTPREL64 is excluded because the
2783 dynamic linker needs to differentiate global dynamic from
2784 local dynamic __tls_index pairs when PPC64_OPT_TLS is set. */
1d483afe
AM
2785 return 1;
2786
2787 case R_PPC64_REL32:
2788 case R_PPC64_REL64:
2789 case R_PPC64_REL30:
1bdd8fac
AM
2790 case R_PPC64_TOC16:
2791 case R_PPC64_TOC16_DS:
2792 case R_PPC64_TOC16_LO:
2793 case R_PPC64_TOC16_HI:
2794 case R_PPC64_TOC16_HA:
2795 case R_PPC64_TOC16_LO_DS:
1d483afe
AM
2796 return 0;
2797
2798 case R_PPC64_TPREL16:
2799 case R_PPC64_TPREL16_LO:
2800 case R_PPC64_TPREL16_HI:
2801 case R_PPC64_TPREL16_HA:
2802 case R_PPC64_TPREL16_DS:
2803 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
2804 case R_PPC64_TPREL16_HIGH:
2805 case R_PPC64_TPREL16_HIGHA:
1d483afe
AM
2806 case R_PPC64_TPREL16_HIGHER:
2807 case R_PPC64_TPREL16_HIGHERA:
2808 case R_PPC64_TPREL16_HIGHEST:
2809 case R_PPC64_TPREL16_HIGHESTA:
2810 case R_PPC64_TPREL64:
c213164a 2811 case R_PPC64_TPREL34:
7c8bbca5
AM
2812 /* These relocations are relative but in a shared library the
2813 linker doesn't know the thread pointer base. */
2814 return bfd_link_dll (info);
1d483afe
AM
2815 }
2816}
65f38f15 2817
f4656909 2818/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
e1c6cf61 2819 copying dynamic variables from a shared lib into an app's .dynbss
f4656909 2820 section, and instead use a dynamic relocation to point into the
e1c6cf61
AM
2821 shared lib. With code that gcc generates it is vital that this be
2822 enabled; In the PowerPC64 ELFv1 ABI the address of a function is
2823 actually the address of a function descriptor which resides in the
2824 .opd section. gcc uses the descriptor directly rather than going
2825 via the GOT as some other ABIs do, which means that initialized
2826 function pointers reference the descriptor. Thus, a function
2827 pointer initialized to the address of a function in a shared
2828 library will either require a .dynbss copy and a copy reloc, or a
2829 dynamic reloc. Using a .dynbss copy redefines the function
2830 descriptor symbol to point to the copy. This presents a problem as
2831 a PLT entry for that function is also initialized from the function
2832 descriptor symbol and the copy may not be initialized first. */
a23b6845 2833#define ELIMINATE_COPY_RELOCS 1
f4656909 2834
721956f4 2835/* Section name for stubs is the associated section name plus this
29942be8
NC
2836 string. */
2837#define STUB_SUFFIX ".stub"
721956f4
AM
2838
2839/* Linker stubs.
2840 ppc_stub_long_branch:
2841 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
2842 destination, but a 24 bit branch in a stub section will reach.
2843 . b dest
2844
2845 ppc_stub_plt_branch:
2846 Similar to the above, but a 24 bit branch in the stub section won't
2847 reach its destination.
6df4c9c2
AM
2848 . addis %r12,%r2,xxx@toc@ha
2849 . ld %r12,xxx@toc@l(%r12)
71a39c98 2850 . mtctr %r12
721956f4
AM
2851 . bctr
2852
2853 ppc_stub_plt_call:
2c66dc6c
AM
2854 Used to call a function in a shared library. If it so happens that
2855 the plt entry referenced crosses a 64k boundary, then an extra
71a39c98 2856 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
05d0e962 2857 ppc_stub_plt_call_r2save starts with "std %r2,40(%r1)".
71a39c98
AM
2858 . addis %r11,%r2,xxx@toc@ha
2859 . ld %r12,xxx+0@toc@l(%r11)
2860 . mtctr %r12
2861 . ld %r2,xxx+8@toc@l(%r11)
2862 . ld %r11,xxx+16@toc@l(%r11)
721956f4 2863 . bctr
ad8e1ba5
AM
2864
2865 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
2866 code to adjust the value and save r2 to support multiple toc sections.
2867 A ppc_stub_long_branch with an r2 offset looks like:
2868 . std %r2,40(%r1)
2869 . addis %r2,%r2,off@ha
2870 . addi %r2,%r2,off@l
2871 . b dest
2872
2873 A ppc_stub_plt_branch with an r2 offset looks like:
2874 . std %r2,40(%r1)
6df4c9c2
AM
2875 . addis %r12,%r2,xxx@toc@ha
2876 . ld %r12,xxx@toc@l(%r12)
ad8e1ba5
AM
2877 . addis %r2,%r2,off@ha
2878 . addi %r2,%r2,off@l
71a39c98 2879 . mtctr %r12
ad8e1ba5 2880 . bctr
ac2df442 2881
05d0e962
AM
2882 All of the above stubs are shown as their ELFv1 variants. ELFv2
2883 variants exist too, simpler for plt calls since a new toc pointer
2884 and static chain are not loaded by the stub. In addition, ELFv2
2885 has some more complex stubs to handle calls marked with NOTOC
2886 relocs from functions where r2 is not a valid toc pointer. These
2887 come in two flavours, the ones shown below, and _both variants that
2888 start with "std %r2,24(%r1)" to save r2 in the unlikely event that
2889 one call is from a function where r2 is used as the toc pointer but
2890 needs a toc adjusting stub for small-model multi-toc, and another
2891 call is from a function where r2 is not valid.
2892 ppc_stub_long_branch_notoc:
2893 . mflr %r12
2894 . bcl 20,31,1f
2895 . 1:
2896 . mflr %r11
2897 . mtlr %r12
2cdcc330
AM
2898 . addis %r12,%r11,dest-1b@ha
2899 . addi %r12,%r12,dest-1b@l
05d0e962
AM
2900 . b dest
2901
2902 ppc_stub_plt_branch_notoc:
2903 . mflr %r12
2904 . bcl 20,31,1f
2905 . 1:
2906 . mflr %r11
2907 . mtlr %r12
2908 . lis %r12,xxx-1b@highest
f891966f 2909 . ori %r12,%r12,xxx-1b@higher
05d0e962 2910 . sldi %r12,%r12,32
f891966f 2911 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2912 . ori %r12,%r12,xxx-1b@l
2913 . add %r12,%r11,%r12
2914 . mtctr %r12
2915 . bctr
2916
2917 ppc_stub_plt_call_notoc:
2918 . mflr %r12
2919 . bcl 20,31,1f
2920 . 1:
2921 . mflr %r11
2922 . mtlr %r12
2923 . lis %r12,xxx-1b@highest
f891966f 2924 . ori %r12,%r12,xxx-1b@higher
05d0e962 2925 . sldi %r12,%r12,32
f891966f 2926 . oris %r12,%r12,xxx-1b@high
05d0e962
AM
2927 . ori %r12,%r12,xxx-1b@l
2928 . ldx %r12,%r11,%r12
2929 . mtctr %r12
2930 . bctr
2931
7c1f4227 2932 There are also ELFv1 power10 variants of these stubs.
04bdff6a 2933 ppc_stub_long_branch_notoc:
d4b87b1e 2934 . pla %r12,dest@pcrel
04bdff6a
AM
2935 . b dest
2936 ppc_stub_plt_branch_notoc:
2937 . lis %r11,(dest-1f)@highesta34
2938 . ori %r11,%r11,(dest-1f)@highera34
2939 . sldi %r11,%r11,34
d4b87b1e 2940 . 1: pla %r12,dest@pcrel
04bdff6a
AM
2941 . add %r12,%r11,%r12
2942 . mtctr %r12
2943 . bctr
2944 ppc_stub_plt_call_notoc:
2945 . lis %r11,(xxx-1f)@highesta34
2946 . ori %r11,%r11,(xxx-1f)@highera34
2947 . sldi %r11,%r11,34
d4b87b1e 2948 . 1: pla %r12,xxx@pcrel
04bdff6a
AM
2949 . ldx %r12,%r11,%r12
2950 . mtctr %r12
2951 . bctr
2952
05d0e962
AM
2953 In cases where the high instructions would add zero, they are
2954 omitted and following instructions modified in some cases.
7c1f4227 2955 For example, a power10 ppc_stub_plt_call_notoc might simplify down
04bdff6a
AM
2956 to
2957 . pld %r12,xxx@pcrel
2958 . mtctr %r12
2959 . bctr
05d0e962
AM
2960
2961 For a given stub group (a set of sections all using the same toc
2962 pointer value) there will be just one stub type used for any
2963 particular function symbol. For example, if printf is called from
2964 code with the tocsave optimization (ie. r2 saved in function
2965 prologue) and therefore calls use a ppc_stub_plt_call linkage stub,
2966 and from other code without the tocsave optimization requiring a
2967 ppc_stub_plt_call_r2save linkage stub, a single stub of the latter
2968 type will be created. Calls with the tocsave optimization will
2969 enter this stub after the instruction saving r2. A similar
2970 situation exists when calls are marked with R_PPC64_REL24_NOTOC
2971 relocations. These require a ppc_stub_plt_call_notoc linkage stub
2972 to call an external function like printf. If other calls to printf
2973 require a ppc_stub_plt_call linkage stub then a single
2974 ppc_stub_plt_call_notoc linkage stub will be used for both types of
2975 call. If other calls to printf require a ppc_stub_plt_call_r2save
2976 linkage stub then a single ppc_stub_plt_call_both linkage stub will
2977 be created and calls not requiring r2 to be saved will enter the
2978 stub after the r2 save instruction. There is an analogous
2979 hierarchy of long branch and plt branch stubs for local call
2980 linkage. */
721956f4 2981
2cdcc330
AM
2982enum ppc_stub_type
2983{
721956f4
AM
2984 ppc_stub_none,
2985 ppc_stub_long_branch,
ad8e1ba5 2986 ppc_stub_long_branch_r2off,
05d0e962
AM
2987 ppc_stub_long_branch_notoc,
2988 ppc_stub_long_branch_both, /* r2off and notoc variants both needed. */
721956f4 2989 ppc_stub_plt_branch,
ad8e1ba5 2990 ppc_stub_plt_branch_r2off,
05d0e962
AM
2991 ppc_stub_plt_branch_notoc,
2992 ppc_stub_plt_branch_both,
794e51c0 2993 ppc_stub_plt_call,
7341d5e2 2994 ppc_stub_plt_call_r2save,
05d0e962
AM
2995 ppc_stub_plt_call_notoc,
2996 ppc_stub_plt_call_both,
a4b6fadd
AM
2997 ppc_stub_global_entry,
2998 ppc_stub_save_res
721956f4
AM
2999};
3000
6f20ed8a
AM
3001/* Information on stub grouping. */
3002struct map_stub
3003{
3004 /* The stub section. */
3005 asection *stub_sec;
3006 /* This is the section to which stubs in the group will be attached. */
3007 asection *link_sec;
a4b6fadd
AM
3008 /* Next group. */
3009 struct map_stub *next;
3010 /* Whether to emit a copy of register save/restore functions in this
3011 group. */
3012 int needs_save_res;
df136d64
AM
3013 /* Current offset within stubs after the insn restoring lr in a
3014 _notoc or _both stub using bcl for pc-relative addressing, or
3015 after the insn restoring lr in a __tls_get_addr_opt plt stub. */
3016 unsigned int lr_restore;
3017 /* Accumulated size of EH info emitted to describe return address
3018 if stubs modify lr. Does not include 17 byte FDE header. */
3019 unsigned int eh_size;
3020 /* Offset in glink_eh_frame to the start of EH info for this group. */
3021 unsigned int eh_base;
6f20ed8a
AM
3022};
3023
2cdcc330
AM
3024struct ppc_stub_hash_entry
3025{
721956f4
AM
3026 /* Base hash table entry structure. */
3027 struct bfd_hash_entry root;
3028
ad8e1ba5
AM
3029 enum ppc_stub_type stub_type;
3030
6f20ed8a
AM
3031 /* Group information. */
3032 struct map_stub *group;
721956f4
AM
3033
3034 /* Offset within stub_sec of the beginning of this stub. */
3035 bfd_vma stub_offset;
3036
3037 /* Given the symbol's value and its section we can determine its final
3038 value when building the stubs (so the stub knows where to jump. */
3039 bfd_vma target_value;
3040 asection *target_section;
3041
721956f4
AM
3042 /* The symbol table entry, if any, that this was derived from. */
3043 struct ppc_link_hash_entry *h;
e054468f 3044 struct plt_entry *plt_ent;
721956f4 3045
2d7ad24e
AM
3046 /* Symbol type. */
3047 unsigned char symtype;
3048
6911b7dc
AM
3049 /* Symbol st_other. */
3050 unsigned char other;
721956f4
AM
3051};
3052
2cdcc330
AM
3053struct ppc_branch_hash_entry
3054{
721956f4
AM
3055 /* Base hash table entry structure. */
3056 struct bfd_hash_entry root;
3057
c456f082 3058 /* Offset within branch lookup table. */
721956f4
AM
3059 unsigned int offset;
3060
3061 /* Generation marker. */
3062 unsigned int iter;
3063};
65f38f15 3064
19e08130
AM
3065/* Used to track dynamic relocations for local symbols. */
3066struct ppc_dyn_relocs
3067{
3068 struct ppc_dyn_relocs *next;
3069
3070 /* The input section of the reloc. */
3071 asection *sec;
3072
3073 /* Total number of relocs copied for the input section. */
3074 unsigned int count : 31;
3075
3076 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3077 unsigned int ifunc : 1;
3078};
3079
65f38f15
AM
3080struct ppc_link_hash_entry
3081{
3082 struct elf_link_hash_entry elf;
3083
2cdcc330
AM
3084 union
3085 {
b3fac117
AM
3086 /* A pointer to the most recently used stub hash entry against this
3087 symbol. */
3088 struct ppc_stub_hash_entry *stub_cache;
3089
3090 /* A pointer to the next symbol starting with a '.' */
3091 struct ppc_link_hash_entry *next_dot_sym;
3092 } u;
721956f4 3093
721956f4 3094 /* Link between function code and descriptor symbols. */
34814b9f 3095 struct ppc_link_hash_entry *oh;
721956f4 3096
e86ce104
AM
3097 /* Flag function code and descriptor symbols. */
3098 unsigned int is_func:1;
3099 unsigned int is_func_descriptor:1;
908b32fc 3100 unsigned int fake:1;
411e1bfb 3101
c5614fa4
AM
3102 /* Whether global opd/toc sym has been adjusted or not.
3103 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3104 should be set for all globals defined in any opd/toc section. */
754021d0
AM
3105 unsigned int adjust_done:1;
3106
a4b6fadd
AM
3107 /* Set if this is an out-of-line register save/restore function,
3108 with non-standard calling convention. */
3109 unsigned int save_res:1;
3110
8b5f1ed8
AM
3111 /* Set if a duplicate symbol with non-zero localentry is detected,
3112 even when the duplicate symbol does not provide a definition. */
3113 unsigned int non_zero_localentry:1;
3114
411e1bfb 3115 /* Contexts in which symbol is used in the GOT (or TOC).
37da22e5
AM
3116 Bits are or'd into the mask as the corresponding relocs are
3117 encountered during check_relocs, with TLS_TLS being set when any
3118 of the other TLS bits are set. tls_optimize clears bits when
3119 optimizing to indicate the corresponding GOT entry type is not
3120 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 3121 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
3122 These flags are also kept for local symbols. */
3123#define TLS_TLS 1 /* Any TLS reloc. */
3124#define TLS_GD 2 /* GD reloc. */
3125#define TLS_LD 4 /* LD reloc. */
3126#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3127#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3128#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 3129#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
46e9995a 3130#define TLS_EXPLICIT 256 /* TOC section TLS reloc, not stored. */
f961d9dd 3131 unsigned char tls_mask;
37da22e5
AM
3132
3133 /* The above field is also used to mark function symbols. In which
3134 case TLS_TLS will be 0. */
3135#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3136#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5 3137#define NON_GOT 256 /* local symbol plt, not stored. */
65f38f15
AM
3138};
3139
ed7007c1
AM
3140static inline struct ppc_link_hash_entry *
3141ppc_elf_hash_entry (struct elf_link_hash_entry *ent)
3142{
3143 return (struct ppc_link_hash_entry *) ent;
3144}
3145
65f38f15
AM
3146/* ppc64 ELF linker hash table. */
3147
3148struct ppc_link_hash_table
3149{
3150 struct elf_link_hash_table elf;
3151
721956f4
AM
3152 /* The stub hash table. */
3153 struct bfd_hash_table stub_hash_table;
3154
3155 /* Another hash table for plt_branch stubs. */
3156 struct bfd_hash_table branch_hash_table;
3157
3b421ab3
AM
3158 /* Hash table for function prologue tocsave. */
3159 htab_t tocsave_htab;
3160
e7d1c40c
AM
3161 /* Various options and other info passed from the linker. */
3162 struct ppc64_elf_params *params;
721956f4 3163
6f20ed8a
AM
3164 /* The size of sec_info below. */
3165 unsigned int sec_info_arr_size;
3166
3167 /* Per-section array of extra section info. Done this way rather
3168 than as part of ppc64_elf_section_data so we have the info for
3169 non-ppc64 sections. */
3170 struct
3171 {
3172 /* Along with elf_gp, specifies the TOC pointer used by this section. */
ad8e1ba5 3173 bfd_vma toc_off;
6f20ed8a
AM
3174
3175 union
3176 {
3177 /* The section group that this section belongs to. */
3178 struct map_stub *group;
3179 /* A temp section list pointer. */
3180 asection *list;
3181 } u;
3182 } *sec_info;
721956f4 3183
a4b6fadd
AM
3184 /* Linked list of groups. */
3185 struct map_stub *group;
3186
ad8e1ba5
AM
3187 /* Temp used when calculating TOC pointers. */
3188 bfd_vma toc_curr;
bf102f86
AM
3189 bfd *toc_bfd;
3190 asection *toc_first_sec;
ad8e1ba5 3191
b3fac117
AM
3192 /* Used when adding symbols. */
3193 struct ppc_link_hash_entry *dot_syms;
3194
33e44f2e 3195 /* Shortcuts to get to dynamic linker sections. */
4ce794b7 3196 asection *glink;
9e390558 3197 asection *global_entry;
82bd7b59 3198 asection *sfpr;
2d7ad24e
AM
3199 asection *pltlocal;
3200 asection *relpltlocal;
4ce794b7
AM
3201 asection *brlt;
3202 asection *relbrlt;
58d180e8 3203 asection *glink_eh_frame;
ec338859 3204
8387904d
AM
3205 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3206 struct ppc_link_hash_entry *tls_get_addr;
3207 struct ppc_link_hash_entry *tls_get_addr_fd;
9e7028aa
AM
3208 struct ppc_link_hash_entry *tga_desc;
3209 struct ppc_link_hash_entry *tga_desc_fd;
a804e476 3210 struct map_stub *tga_group;
411e1bfb 3211
927be08e
AM
3212 /* The size of reliplt used by got entry relocs. */
3213 bfd_size_type got_reli_size;
3214
9b5ecbd0 3215 /* Statistics. */
7341d5e2 3216 unsigned long stub_count[ppc_stub_global_entry];
9b5ecbd0 3217
ee75fd95
AM
3218 /* Number of stubs against global syms. */
3219 unsigned long stub_globals;
3220
ee67d69a
AM
3221 /* Set if we're linking code with function descriptors. */
3222 unsigned int opd_abi:1;
3223
4c52953f 3224 /* Support for multiple toc sections. */
33c0ec9d 3225 unsigned int do_multi_toc:1;
4c52953f 3226 unsigned int multi_toc_needed:1;
927be08e 3227 unsigned int second_toc_pass:1;
67f0cbdb 3228 unsigned int do_toc_opt:1;
4c52953f 3229
9a23f96e
AM
3230 /* Set if tls optimization is enabled. */
3231 unsigned int do_tls_opt:1;
3232
3e04d765
AM
3233 /* Set if inline plt calls should be converted to direct calls. */
3234 unsigned int can_convert_all_inline_plt:1;
3235
5d1634d7 3236 /* Set on error. */
99877b66 3237 unsigned int stub_error:1;
721956f4 3238
8c5b4e52
AM
3239 /* Whether func_desc_adjust needs to be run over symbols. */
3240 unsigned int need_func_desc_adj:1;
721956f4 3241
f378ab09
AM
3242 /* Whether plt calls for ELFv2 localentry:0 funcs have been optimized. */
3243 unsigned int has_plt_localentry0:1;
3244
5663e321
AM
3245 /* Whether calls are made via the PLT from NOTOC functions. */
3246 unsigned int notoc_plt:1;
3247
d349c8e2
AM
3248 /* Whether any code linked seems to be Power10. */
3249 unsigned int has_power10_relocs:1;
3250
721956f4
AM
3251 /* Incremented every time we size stubs. */
3252 unsigned int stub_iteration;
5d1634d7 3253
87d72d41
AM
3254 /* Small local sym cache. */
3255 struct sym_cache sym_cache;
65f38f15
AM
3256};
3257
4c52953f
AM
3258/* Rename some of the generic section flags to better document how they
3259 are used here. */
b0dddeec
AM
3260
3261/* Nonzero if this section has TLS related relocations. */
3262#define has_tls_reloc sec_flg0
3263
9737e8af
AM
3264/* Nonzero if this section has a call to __tls_get_addr lacking marker
3265 relocations. */
3266#define nomark_tls_get_addr sec_flg1
b0dddeec
AM
3267
3268/* Nonzero if this section has any toc or got relocs. */
3269#define has_toc_reloc sec_flg2
3270
3271/* Nonzero if this section has a call to another section that uses
3272 the toc or got. */
d77c8a4b 3273#define makes_toc_func_call sec_flg3
b0dddeec
AM
3274
3275/* Recursion protection when determining above flag. */
d77c8a4b 3276#define call_check_in_progress sec_flg4
70cc837d 3277#define call_check_done sec_flg5
4c52953f 3278
65f38f15
AM
3279/* Get the ppc64 ELF linker hash table from a link_info structure. */
3280
3281#define ppc_hash_table(p) \
4dfe6ac6
NC
3282 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3283 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
65f38f15 3284
721956f4
AM
3285#define ppc_stub_hash_lookup(table, string, create, copy) \
3286 ((struct ppc_stub_hash_entry *) \
3287 bfd_hash_lookup ((table), (string), (create), (copy)))
3288
3289#define ppc_branch_hash_lookup(table, string, create, copy) \
3290 ((struct ppc_branch_hash_entry *) \
3291 bfd_hash_lookup ((table), (string), (create), (copy)))
3292
3293/* Create an entry in the stub hash table. */
3294
3295static struct bfd_hash_entry *
4ce794b7
AM
3296stub_hash_newfunc (struct bfd_hash_entry *entry,
3297 struct bfd_hash_table *table,
3298 const char *string)
721956f4
AM
3299{
3300 /* Allocate the structure if it has not already been allocated by a
3301 subclass. */
3302 if (entry == NULL)
3303 {
3304 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3305 if (entry == NULL)
3306 return entry;
3307 }
3308
3309 /* Call the allocation method of the superclass. */
3310 entry = bfd_hash_newfunc (entry, table, string);
3311 if (entry != NULL)
3312 {
3313 struct ppc_stub_hash_entry *eh;
3314
3315 /* Initialize the local fields. */
3316 eh = (struct ppc_stub_hash_entry *) entry;
ad8e1ba5 3317 eh->stub_type = ppc_stub_none;
6f20ed8a 3318 eh->group = NULL;
721956f4
AM
3319 eh->stub_offset = 0;
3320 eh->target_value = 0;
3321 eh->target_section = NULL;
721956f4 3322 eh->h = NULL;
6911b7dc 3323 eh->plt_ent = NULL;
6911b7dc 3324 eh->other = 0;
721956f4
AM
3325 }
3326
3327 return entry;
3328}
3329
3330/* Create an entry in the branch hash table. */
3331
3332static struct bfd_hash_entry *
4ce794b7
AM
3333branch_hash_newfunc (struct bfd_hash_entry *entry,
3334 struct bfd_hash_table *table,
3335 const char *string)
721956f4
AM
3336{
3337 /* Allocate the structure if it has not already been allocated by a
3338 subclass. */
3339 if (entry == NULL)
3340 {
3341 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3342 if (entry == NULL)
3343 return entry;
3344 }
3345
3346 /* Call the allocation method of the superclass. */
3347 entry = bfd_hash_newfunc (entry, table, string);
3348 if (entry != NULL)
3349 {
3350 struct ppc_branch_hash_entry *eh;
3351
3352 /* Initialize the local fields. */
3353 eh = (struct ppc_branch_hash_entry *) entry;
3354 eh->offset = 0;
3355 eh->iter = 0;
3356 }
3357
3358 return entry;
3359}
3360
65f38f15
AM
3361/* Create an entry in a ppc64 ELF linker hash table. */
3362
3363static struct bfd_hash_entry *
4ce794b7
AM
3364link_hash_newfunc (struct bfd_hash_entry *entry,
3365 struct bfd_hash_table *table,
3366 const char *string)
65f38f15
AM
3367{
3368 /* Allocate the structure if it has not already been allocated by a
3369 subclass. */
3370 if (entry == NULL)
3371 {
3372 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3373 if (entry == NULL)
3374 return entry;
3375 }
3376
3377 /* Call the allocation method of the superclass. */
3378 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3379 if (entry != NULL)
3380 {
3381 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3382
b3fac117 3383 memset (&eh->u.stub_cache, 0,
908b32fc 3384 (sizeof (struct ppc_link_hash_entry)
b3fac117
AM
3385 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3386
3387 /* When making function calls, old ABI code references function entry
3388 points (dot symbols), while new ABI code references the function
3389 descriptor symbol. We need to make any combination of reference and
3390 definition work together, without breaking archive linking.
3391
3392 For a defined function "foo" and an undefined call to "bar":
3393 An old object defines "foo" and ".foo", references ".bar" (possibly
3394 "bar" too).
3395 A new object defines "foo" and references "bar".
3396
3397 A new object thus has no problem with its undefined symbols being
3398 satisfied by definitions in an old object. On the other hand, the
3399 old object won't have ".bar" satisfied by a new object.
3400
3401 Keep a list of newly added dot-symbols. */
3402
3403 if (string[0] == '.')
3404 {
3405 struct ppc_link_hash_table *htab;
3406
3407 htab = (struct ppc_link_hash_table *) table;
3408 eh->u.next_dot_sym = htab->dot_syms;
3409 htab->dot_syms = eh;
3410 }
65f38f15
AM
3411 }
3412
3413 return entry;
3414}
3415
2cdcc330
AM
3416struct tocsave_entry
3417{
3b421ab3
AM
3418 asection *sec;
3419 bfd_vma offset;
3420};
3421
3422static hashval_t
3423tocsave_htab_hash (const void *p)
3424{
3425 const struct tocsave_entry *e = (const struct tocsave_entry *) p;
4aef7643 3426 return ((bfd_vma) (intptr_t) e->sec ^ e->offset) >> 3;
3b421ab3
AM
3427}
3428
3429static int
3430tocsave_htab_eq (const void *p1, const void *p2)
3431{
3432 const struct tocsave_entry *e1 = (const struct tocsave_entry *) p1;
3433 const struct tocsave_entry *e2 = (const struct tocsave_entry *) p2;
3434 return e1->sec == e2->sec && e1->offset == e2->offset;
3435}
3436
68faa637
AM
3437/* Destroy a ppc64 ELF linker hash table. */
3438
3439static void
d495ab0d 3440ppc64_elf_link_hash_table_free (bfd *obfd)
68faa637 3441{
d495ab0d 3442 struct ppc_link_hash_table *htab;
68faa637 3443
d495ab0d 3444 htab = (struct ppc_link_hash_table *) obfd->link.hash;
68faa637
AM
3445 if (htab->tocsave_htab)
3446 htab_delete (htab->tocsave_htab);
d495ab0d
AM
3447 bfd_hash_table_free (&htab->branch_hash_table);
3448 bfd_hash_table_free (&htab->stub_hash_table);
3449 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
3450}
3451
65f38f15
AM
3452/* Create a ppc64 ELF linker hash table. */
3453
3454static struct bfd_link_hash_table *
4ce794b7 3455ppc64_elf_link_hash_table_create (bfd *abfd)
65f38f15
AM
3456{
3457 struct ppc_link_hash_table *htab;
986f0783 3458 size_t amt = sizeof (struct ppc_link_hash_table);
65f38f15 3459
4ce794b7 3460 htab = bfd_zmalloc (amt);
65f38f15
AM
3461 if (htab == NULL)
3462 return NULL;
3463
66eb6687 3464 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
3465 sizeof (struct ppc_link_hash_entry),
3466 PPC64_ELF_DATA))
65f38f15 3467 {
e2d34d7d 3468 free (htab);
65f38f15
AM
3469 return NULL;
3470 }
3471
721956f4 3472 /* Init the stub hash table too. */
66eb6687
AM
3473 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3474 sizeof (struct ppc_stub_hash_entry)))
2915c55b 3475 {
d495ab0d 3476 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3477 return NULL;
3478 }
721956f4
AM
3479
3480 /* And the branch hash table. */
66eb6687
AM
3481 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3482 sizeof (struct ppc_branch_hash_entry)))
2915c55b
JK
3483 {
3484 bfd_hash_table_free (&htab->stub_hash_table);
d495ab0d 3485 _bfd_elf_link_hash_table_free (abfd);
2915c55b
JK
3486 return NULL;
3487 }
721956f4 3488
3b421ab3
AM
3489 htab->tocsave_htab = htab_try_create (1024,
3490 tocsave_htab_hash,
3491 tocsave_htab_eq,
3492 NULL);
3493 if (htab->tocsave_htab == NULL)
2915c55b 3494 {
d495ab0d 3495 ppc64_elf_link_hash_table_free (abfd);
2915c55b
JK
3496 return NULL;
3497 }
d495ab0d 3498 htab->elf.root.hash_table_free = ppc64_elf_link_hash_table_free;
3b421ab3 3499
3254fd24
AM
3500 /* Initializing two fields of the union is just cosmetic. We really
3501 only care about glist, but when compiled on a 32-bit host the
3502 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3503 debugger inspection of these fields look nicer. */
a6aa5195
AM
3504 htab->elf.init_got_refcount.refcount = 0;
3505 htab->elf.init_got_refcount.glist = NULL;
3506 htab->elf.init_plt_refcount.refcount = 0;
3507 htab->elf.init_plt_refcount.glist = NULL;
3508 htab->elf.init_got_offset.offset = 0;
3509 htab->elf.init_got_offset.glist = NULL;
3510 htab->elf.init_plt_offset.offset = 0;
3511 htab->elf.init_plt_offset.glist = NULL;
3254fd24 3512
65f38f15
AM
3513 return &htab->elf.root;
3514}
3515
bfeb4a28
AM
3516/* Create sections for linker generated code. */
3517
3518static bfd_boolean
3519create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3520{
3521 struct ppc_link_hash_table *htab;
3522 flagword flags;
3523
3524 htab = ppc_hash_table (info);
3525
bfeb4a28
AM
3526 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3527 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
b32547cd
AM
3528 if (htab->params->save_restore_funcs)
3529 {
3530 /* Create .sfpr for code to save and restore fp regs. */
3531 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3532 flags);
3533 if (htab->sfpr == NULL
fd361982 3534 || !bfd_set_section_alignment (htab->sfpr, 2))
b32547cd
AM
3535 return FALSE;
3536 }
3537
3538 if (bfd_link_relocatable (info))
3539 return TRUE;
bfeb4a28
AM
3540
3541 /* Create .glink for lazy dynamic linking support. */
3542 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3543 flags);
3544 if (htab->glink == NULL
fd361982 3545 || !bfd_set_section_alignment (htab->glink, 3))
bfeb4a28
AM
3546 return FALSE;
3547
9e390558
AM
3548 /* The part of .glink used by global entry stubs, separate so that
3549 it can be aligned appropriately without affecting htab->glink. */
3550 htab->global_entry = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3551 flags);
3552 if (htab->global_entry == NULL
fd361982 3553 || !bfd_set_section_alignment (htab->global_entry, 2))
9e390558
AM
3554 return FALSE;
3555
bfeb4a28
AM
3556 if (!info->no_ld_generated_unwind_info)
3557 {
3558 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3559 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3560 htab->glink_eh_frame = bfd_make_section_anyway_with_flags (dynobj,
3561 ".eh_frame",
3562 flags);
3563 if (htab->glink_eh_frame == NULL
fd361982 3564 || !bfd_set_section_alignment (htab->glink_eh_frame, 2))
bfeb4a28
AM
3565 return FALSE;
3566 }
3567
3568 flags = SEC_ALLOC | SEC_LINKER_CREATED;
33e44f2e
AM
3569 htab->elf.iplt = bfd_make_section_anyway_with_flags (dynobj, ".iplt", flags);
3570 if (htab->elf.iplt == NULL
fd361982 3571 || !bfd_set_section_alignment (htab->elf.iplt, 3))
bfeb4a28
AM
3572 return FALSE;
3573
3574 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3575 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
33e44f2e
AM
3576 htab->elf.irelplt
3577 = bfd_make_section_anyway_with_flags (dynobj, ".rela.iplt", flags);
3578 if (htab->elf.irelplt == NULL
fd361982 3579 || !bfd_set_section_alignment (htab->elf.irelplt, 3))
bfeb4a28
AM
3580 return FALSE;
3581
3582 /* Create branch lookup table for plt_branch stubs. */
3583 flags = (SEC_ALLOC | SEC_LOAD
3584 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3585 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3586 flags);
3587 if (htab->brlt == NULL
fd361982 3588 || !bfd_set_section_alignment (htab->brlt, 3))
bfeb4a28
AM
3589 return FALSE;
3590
2d7ad24e
AM
3591 /* Local plt entries, put in .branch_lt but a separate section for
3592 convenience. */
3593 htab->pltlocal = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3594 flags);
3595 if (htab->pltlocal == NULL
fd361982 3596 || !bfd_set_section_alignment (htab->pltlocal, 3))
2d7ad24e
AM
3597 return FALSE;
3598
0e1862bb 3599 if (!bfd_link_pic (info))
bfeb4a28
AM
3600 return TRUE;
3601
3602 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3603 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2d7ad24e
AM
3604 htab->relbrlt
3605 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
bfeb4a28 3606 if (htab->relbrlt == NULL
fd361982 3607 || !bfd_set_section_alignment (htab->relbrlt, 3))
bfeb4a28
AM
3608 return FALSE;
3609
2d7ad24e
AM
3610 htab->relpltlocal
3611 = bfd_make_section_anyway_with_flags (dynobj, ".rela.branch_lt", flags);
3612 if (htab->relpltlocal == NULL
fd361982 3613 || !bfd_set_section_alignment (htab->relpltlocal, 3))
2d7ad24e
AM
3614 return FALSE;
3615
bfeb4a28
AM
3616 return TRUE;
3617}
3618
e717da7e
AM
3619/* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3620
bfeb4a28 3621bfd_boolean
e7d1c40c
AM
3622ppc64_elf_init_stub_bfd (struct bfd_link_info *info,
3623 struct ppc64_elf_params *params)
e717da7e
AM
3624{
3625 struct ppc_link_hash_table *htab;
3626
e7d1c40c 3627 elf_elfheader (params->stub_bfd)->e_ident[EI_CLASS] = ELFCLASS64;
e717da7e
AM
3628
3629/* Always hook our dynamic sections into the first bfd, which is the
3630 linker created stub bfd. This ensures that the GOT header is at
3631 the start of the output TOC section. */
3632 htab = ppc_hash_table (info);
e7d1c40c
AM
3633 htab->elf.dynobj = params->stub_bfd;
3634 htab->params = params;
bfeb4a28 3635
bfeb4a28 3636 return create_linkage_sections (htab->elf.dynobj, info);
e717da7e
AM
3637}
3638
721956f4
AM
3639/* Build a name for an entry in the stub hash table. */
3640
3641static char *
4ce794b7
AM
3642ppc_stub_name (const asection *input_section,
3643 const asection *sym_sec,
3644 const struct ppc_link_hash_entry *h,
3645 const Elf_Internal_Rela *rel)
721956f4
AM
3646{
3647 char *stub_name;
bcaa2f82 3648 ssize_t len;
721956f4
AM
3649
3650 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3651 offsets from a sym as a branch target? In fact, we could
3652 probably assume the addend is always zero. */
3653 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3654
3655 if (h)
3656 {
3657 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3658 stub_name = bfd_malloc (len);
46de2a7c
AM
3659 if (stub_name == NULL)
3660 return stub_name;
3661
bcaa2f82
AM
3662 len = sprintf (stub_name, "%08x.%s+%x",
3663 input_section->id & 0xffffffff,
3664 h->elf.root.root.string,
3665 (int) rel->r_addend & 0xffffffff);
721956f4
AM
3666 }
3667 else
3668 {
ad8e1ba5 3669 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
721956f4 3670 stub_name = bfd_malloc (len);
46de2a7c
AM
3671 if (stub_name == NULL)
3672 return stub_name;
3673
bcaa2f82
AM
3674 len = sprintf (stub_name, "%08x.%x:%x+%x",
3675 input_section->id & 0xffffffff,
3676 sym_sec->id & 0xffffffff,
3677 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3678 (int) rel->r_addend & 0xffffffff);
721956f4 3679 }
bcaa2f82 3680 if (len > 2 && stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
ee75fd95 3681 stub_name[len - 2] = 0;
721956f4
AM
3682 return stub_name;
3683}
3684
d349c8e2
AM
3685/* If mixing power10 with non-power10 code and --power10-stubs is not
3686 specified (or is auto) then calls using @notoc relocations that
3687 need a stub will utilize power10 instructions in the stub, and
3688 calls without @notoc relocations will not use power10 instructions.
3689 The two classes of stubs are stored in separate stub_hash_table
3690 entries having the same key string. The two entries will always be
3691 adjacent on entry->root.next chain, even if hash table resizing
3692 occurs. This function selects the correct entry to use. */
3693
3694static struct ppc_stub_hash_entry *
3695select_alt_stub (struct ppc_stub_hash_entry *entry, bfd_boolean notoc)
3696{
3697 bfd_boolean have_notoc;
3698
3699 have_notoc = (entry->stub_type == ppc_stub_plt_call_notoc
3700 || entry->stub_type == ppc_stub_plt_branch_notoc
3701 || entry->stub_type == ppc_stub_long_branch_notoc);
3702
3703 if (have_notoc != notoc)
3704 {
3705 const char *stub_name = entry->root.string;
3706
3707 entry = (struct ppc_stub_hash_entry *) entry->root.next;
3708 if (entry != NULL
3709 && entry->root.string != stub_name)
3710 entry = NULL;
3711 }
3712
3713 return entry;
3714}
3715
721956f4
AM
3716/* Look up an entry in the stub hash. Stub entries are cached because
3717 creating the stub name takes a bit of time. */
3718
3719static struct ppc_stub_hash_entry *
4ce794b7
AM
3720ppc_get_stub_entry (const asection *input_section,
3721 const asection *sym_sec,
039b3fef 3722 struct ppc_link_hash_entry *h,
4ce794b7
AM
3723 const Elf_Internal_Rela *rel,
3724 struct ppc_link_hash_table *htab)
721956f4
AM
3725{
3726 struct ppc_stub_hash_entry *stub_entry;
6f20ed8a 3727 struct map_stub *group;
721956f4
AM
3728
3729 /* If this input section is part of a group of sections sharing one
3730 stub section, then use the id of the first section in the group.
3731 Stub names need to include a section id, as there may well be
3732 more than one stub used to reach say, printf, and we need to
3733 distinguish between them. */
6f20ed8a 3734 group = htab->sec_info[input_section->id].u.group;
89d77b8a
AM
3735 if (group == NULL)
3736 return NULL;
721956f4 3737
b3fac117
AM
3738 if (h != NULL && h->u.stub_cache != NULL
3739 && h->u.stub_cache->h == h
6f20ed8a 3740 && h->u.stub_cache->group == group)
721956f4 3741 {
b3fac117 3742 stub_entry = h->u.stub_cache;
721956f4
AM
3743 }
3744 else
3745 {
3746 char *stub_name;
3747
6f20ed8a 3748 stub_name = ppc_stub_name (group->link_sec, sym_sec, h, rel);
721956f4
AM
3749 if (stub_name == NULL)
3750 return NULL;
3751
3752 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 3753 stub_name, FALSE, FALSE);
721956f4 3754 if (h != NULL)
b3fac117 3755 h->u.stub_cache = stub_entry;
721956f4
AM
3756
3757 free (stub_name);
3758 }
3759
d349c8e2
AM
3760 if (stub_entry != NULL && htab->params->power10_stubs == -1)
3761 {
3762 bfd_boolean notoc = ELF64_R_TYPE (rel->r_info) == R_PPC64_REL24_NOTOC;
3763
3764 stub_entry = select_alt_stub (stub_entry, notoc);
3765 }
3766
721956f4
AM
3767 return stub_entry;
3768}
3769
3770/* Add a new stub entry to the stub hash. Not all fields of the new
3771 stub entry are initialised. */
3772
3773static struct ppc_stub_hash_entry *
4ce794b7
AM
3774ppc_add_stub (const char *stub_name,
3775 asection *section,
25f53a85 3776 struct bfd_link_info *info)
721956f4 3777{
25f53a85 3778 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 3779 struct map_stub *group;
721956f4
AM
3780 asection *link_sec;
3781 asection *stub_sec;
3782 struct ppc_stub_hash_entry *stub_entry;
3783
6f20ed8a
AM
3784 group = htab->sec_info[section->id].u.group;
3785 link_sec = group->link_sec;
3786 stub_sec = group->stub_sec;
721956f4
AM
3787 if (stub_sec == NULL)
3788 {
6f20ed8a
AM
3789 size_t namelen;
3790 bfd_size_type len;
3791 char *s_name;
721956f4 3792
6f20ed8a
AM
3793 namelen = strlen (link_sec->name);
3794 len = namelen + sizeof (STUB_SUFFIX);
3795 s_name = bfd_alloc (htab->params->stub_bfd, len);
3796 if (s_name == NULL)
3797 return NULL;
721956f4 3798
6f20ed8a
AM
3799 memcpy (s_name, link_sec->name, namelen);
3800 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3801 stub_sec = (*htab->params->add_stub_section) (s_name, link_sec);
3802 if (stub_sec == NULL)
3803 return NULL;
3804 group->stub_sec = stub_sec;
721956f4
AM
3805 }
3806
3807 /* Enter this entry into the linker stub hash table. */
3808 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 3809 TRUE, FALSE);
721956f4
AM
3810 if (stub_entry == NULL)
3811 {
695344c0 3812 /* xgettext:c-format */
cf97bcb0
AM
3813 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
3814 section->owner, stub_name);
721956f4
AM
3815 return NULL;
3816 }
3817
6f20ed8a 3818 stub_entry->group = group;
721956f4 3819 stub_entry->stub_offset = 0;
721956f4
AM
3820 return stub_entry;
3821}
3822
e717da7e
AM
3823/* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3824 not already done. */
65f38f15 3825
b34976b6 3826static bfd_boolean
e717da7e 3827create_got_section (bfd *abfd, struct bfd_link_info *info)
65f38f15 3828{
e717da7e
AM
3829 asection *got, *relgot;
3830 flagword flags;
3831 struct ppc_link_hash_table *htab = ppc_hash_table (info);
65f38f15 3832
0c8d6e5c 3833 if (!is_ppc64_elf (abfd))
0ffa91dd 3834 return FALSE;
4dfe6ac6
NC
3835 if (htab == NULL)
3836 return FALSE;
0ffa91dd 3837
33e44f2e
AM
3838 if (!htab->elf.sgot
3839 && !_bfd_elf_create_got_section (htab->elf.dynobj, info))
3840 return FALSE;
e717da7e
AM
3841
3842 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3843 | SEC_LINKER_CREATED);
3844
c456f082 3845 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
e717da7e 3846 if (!got
fd361982 3847 || !bfd_set_section_alignment (got, 3))
e717da7e 3848 return FALSE;
65f38f15 3849
c456f082
AM
3850 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3851 flags | SEC_READONLY);
e717da7e 3852 if (!relgot
fd361982 3853 || !bfd_set_section_alignment (relgot, 3))
b34976b6 3854 return FALSE;
e717da7e
AM
3855
3856 ppc64_elf_tdata (abfd)->got = got;
3857 ppc64_elf_tdata (abfd)->relgot = relgot;
b34976b6 3858 return TRUE;
65f38f15 3859}
5bd4f169 3860
b31867b6
AM
3861/* Follow indirect and warning symbol links. */
3862
3863static inline struct bfd_link_hash_entry *
3864follow_link (struct bfd_link_hash_entry *h)
3865{
3866 while (h->type == bfd_link_hash_indirect
3867 || h->type == bfd_link_hash_warning)
3868 h = h->u.i.link;
3869 return h;
3870}
3871
3872static inline struct elf_link_hash_entry *
3873elf_follow_link (struct elf_link_hash_entry *h)
3874{
3875 return (struct elf_link_hash_entry *) follow_link (&h->root);
3876}
3877
3878static inline struct ppc_link_hash_entry *
3879ppc_follow_link (struct ppc_link_hash_entry *h)
3880{
ed7007c1 3881 return ppc_elf_hash_entry (elf_follow_link (&h->elf));
b31867b6
AM
3882}
3883
40d16e0b
AM
3884/* Merge PLT info on FROM with that on TO. */
3885
3886static void
3887move_plt_plist (struct ppc_link_hash_entry *from,
3888 struct ppc_link_hash_entry *to)
3889{
3890 if (from->elf.plt.plist != NULL)
3891 {
3892 if (to->elf.plt.plist != NULL)
3893 {
3894 struct plt_entry **entp;
3895 struct plt_entry *ent;
3896
3897 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3898 {
3899 struct plt_entry *dent;
3900
3901 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3902 if (dent->addend == ent->addend)
3903 {
3904 dent->plt.refcount += ent->plt.refcount;
3905 *entp = ent->next;
3906 break;
3907 }
3908 if (dent == NULL)
3909 entp = &ent->next;
3910 }
3911 *entp = to->elf.plt.plist;
3912 }
3913
3914 to->elf.plt.plist = from->elf.plt.plist;
3915 from->elf.plt.plist = NULL;
3916 }
3917}
3918
65f38f15
AM
3919/* Copy the extra info we tack onto an elf_link_hash_entry. */
3920
3921static void
fcfa13d2
AM
3922ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3923 struct elf_link_hash_entry *dir,
3924 struct elf_link_hash_entry *ind)
65f38f15
AM
3925{
3926 struct ppc_link_hash_entry *edir, *eind;
3927
ed7007c1
AM
3928 edir = ppc_elf_hash_entry (dir);
3929 eind = ppc_elf_hash_entry (ind);
65f38f15 3930
c79d6685
AM
3931 edir->is_func |= eind->is_func;
3932 edir->is_func_descriptor |= eind->is_func_descriptor;
3933 edir->tls_mask |= eind->tls_mask;
3934 if (eind->oh != NULL)
3935 edir->oh = ppc_follow_link (eind->oh);
3936
474436e6 3937 if (edir->elf.versioned != versioned_hidden)
e81830c5
AM
3938 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3939 edir->elf.ref_regular |= eind->elf.ref_regular;
3940 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3941 edir->elf.non_got_ref |= eind->elf.non_got_ref;
e81830c5
AM
3942 edir->elf.needs_plt |= eind->elf.needs_plt;
3943 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
c79d6685 3944
d311bc8b
AM
3945 /* If we were called to copy over info for a weak sym, don't copy
3946 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
3947 in order to simplify readonly_dynrelocs and save a field in the
3948 symbol hash entry, but that means dyn_relocs can't be used in any
3949 tests about a specific symbol, or affect other symbol flags which
ab2477e1 3950 are then tested. */
d311bc8b 3951 if (eind->elf.root.type != bfd_link_hash_indirect)
ab2477e1 3952 return;
d311bc8b 3953
411e1bfb 3954 /* Copy over any dynamic relocs we may have on the indirect sym. */
190eb1dd 3955 if (ind->dyn_relocs != NULL)
65f38f15 3956 {
190eb1dd 3957 if (dir->dyn_relocs != NULL)
bbd7ec4a 3958 {
6061a67d
AM
3959 struct elf_dyn_relocs **pp;
3960 struct elf_dyn_relocs *p;
bbd7ec4a 3961
fcfa13d2 3962 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 3963 list. Merge any entries against the same section. */
190eb1dd 3964 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
bbd7ec4a 3965 {
6061a67d 3966 struct elf_dyn_relocs *q;
bbd7ec4a 3967
190eb1dd 3968 for (q = dir->dyn_relocs; q != NULL; q = q->next)
bbd7ec4a
AM
3969 if (q->sec == p->sec)
3970 {
3971 q->pc_count += p->pc_count;
3972 q->count += p->count;
3973 *pp = p->next;
3974 break;
3975 }
3976 if (q == NULL)
3977 pp = &p->next;
3978 }
190eb1dd 3979 *pp = dir->dyn_relocs;
bbd7ec4a
AM
3980 }
3981
190eb1dd
L
3982 dir->dyn_relocs = ind->dyn_relocs;
3983 ind->dyn_relocs = NULL;
65f38f15 3984 }
65f38f15 3985
81848ca0
AM
3986 /* Copy over got entries that we may have already seen to the
3987 symbol which just became indirect. */
411e1bfb
AM
3988 if (eind->elf.got.glist != NULL)
3989 {
3990 if (edir->elf.got.glist != NULL)
3991 {
3992 struct got_entry **entp;
3993 struct got_entry *ent;
3994
3995 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
3996 {
3997 struct got_entry *dent;
3998
3999 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4000 if (dent->addend == ent->addend
e717da7e 4001 && dent->owner == ent->owner
411e1bfb
AM
4002 && dent->tls_type == ent->tls_type)
4003 {
4004 dent->got.refcount += ent->got.refcount;
4005 *entp = ent->next;
4006 break;
4007 }
4008 if (dent == NULL)
4009 entp = &ent->next;
4010 }
4011 *entp = edir->elf.got.glist;
4012 }
4013
4014 edir->elf.got.glist = eind->elf.got.glist;
4015 eind->elf.got.glist = NULL;
4016 }
4017
4018 /* And plt entries. */
40d16e0b 4019 move_plt_plist (eind, edir);
411e1bfb 4020
fcfa13d2 4021 if (eind->elf.dynindx != -1)
411e1bfb 4022 {
fcfa13d2
AM
4023 if (edir->elf.dynindx != -1)
4024 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4025 edir->elf.dynstr_index);
411e1bfb
AM
4026 edir->elf.dynindx = eind->elf.dynindx;
4027 edir->elf.dynstr_index = eind->elf.dynstr_index;
4028 eind->elf.dynindx = -1;
4029 eind->elf.dynstr_index = 0;
4030 }
411e1bfb
AM
4031}
4032
8387904d
AM
4033/* Find the function descriptor hash entry from the given function code
4034 hash entry FH. Link the entries via their OH fields. */
4035
4036static struct ppc_link_hash_entry *
b31867b6 4037lookup_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
8387904d
AM
4038{
4039 struct ppc_link_hash_entry *fdh = fh->oh;
4040
4041 if (fdh == NULL)
4042 {
4043 const char *fd_name = fh->elf.root.root.string + 1;
4044
ed7007c1
AM
4045 fdh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, fd_name,
4046 FALSE, FALSE, FALSE));
b31867b6
AM
4047 if (fdh == NULL)
4048 return fdh;
4049
4050 fdh->is_func_descriptor = 1;
4051 fdh->oh = fh;
4052 fh->is_func = 1;
4053 fh->oh = fdh;
8387904d
AM
4054 }
4055
8c5b4e52
AM
4056 fdh = ppc_follow_link (fdh);
4057 fdh->is_func_descriptor = 1;
4058 fdh->oh = fh;
4059 return fdh;
8387904d
AM
4060}
4061
8c5b4e52 4062/* Make a fake function descriptor sym for the undefined code sym FH. */
bb700d78
AM
4063
4064static struct ppc_link_hash_entry *
4065make_fdh (struct bfd_link_info *info,
908b32fc 4066 struct ppc_link_hash_entry *fh)
bb700d78 4067{
8c5b4e52
AM
4068 bfd *abfd = fh->elf.root.u.undef.abfd;
4069 struct bfd_link_hash_entry *bh = NULL;
bb700d78 4070 struct ppc_link_hash_entry *fdh;
8c5b4e52
AM
4071 flagword flags = (fh->elf.root.type == bfd_link_hash_undefweak
4072 ? BSF_WEAK
4073 : BSF_GLOBAL);
4074
4075 if (!_bfd_generic_link_add_one_symbol (info, abfd,
4076 fh->elf.root.root.string + 1,
4077 flags, bfd_und_section_ptr, 0,
4078 NULL, FALSE, FALSE, &bh))
bb700d78
AM
4079 return NULL;
4080
4081 fdh = (struct ppc_link_hash_entry *) bh;
4082 fdh->elf.non_elf = 0;
908b32fc
AM
4083 fdh->fake = 1;
4084 fdh->is_func_descriptor = 1;
4085 fdh->oh = fh;
4086 fh->is_func = 1;
4087 fh->oh = fdh;
bb700d78
AM
4088 return fdh;
4089}
4090
8387904d
AM
4091/* Fix function descriptor symbols defined in .opd sections to be
4092 function type. */
555cd476
AM
4093
4094static bfd_boolean
c16153ae 4095ppc64_elf_add_symbol_hook (bfd *ibfd,
e054468f 4096 struct bfd_link_info *info,
555cd476 4097 Elf_Internal_Sym *isym,
6911b7dc 4098 const char **name,
555cd476
AM
4099 flagword *flags ATTRIBUTE_UNUSED,
4100 asection **sec,
b53dfeb2 4101 bfd_vma *value)
555cd476 4102{
b53dfeb2 4103 if (*sec != NULL
f1885d1e 4104 && strcmp ((*sec)->name, ".opd") == 0)
b53dfeb2
AM
4105 {
4106 asection *code_sec;
4107
4108 if (!(ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC
4109 || ELF_ST_TYPE (isym->st_info) == STT_FUNC))
4110 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4111
4112 /* If the symbol is a function defined in .opd, and the function
4113 code is in a discarded group, let it appear to be undefined. */
0e1862bb 4114 if (!bfd_link_relocatable (info)
b53dfeb2
AM
4115 && (*sec)->reloc_count != 0
4116 && opd_entry_value (*sec, *value, &code_sec, NULL,
4117 FALSE) != (bfd_vma) -1
4118 && discarded_section (code_sec))
4119 {
4120 *sec = bfd_und_section_ptr;
4121 isym->st_shndx = SHN_UNDEF;
4122 }
4123 }
dbd1e97e
AM
4124 else if (*sec != NULL
4125 && strcmp ((*sec)->name, ".toc") == 0
4126 && ELF_ST_TYPE (isym->st_info) == STT_OBJECT)
4127 {
4128 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4129 if (htab != NULL)
4130 htab->params->object_in_toc = 1;
4131 }
433817dd 4132
6911b7dc
AM
4133 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
4134 {
4135 if (abiversion (ibfd) == 0)
4136 set_abiversion (ibfd, 2);
4137 else if (abiversion (ibfd) == 1)
4138 {
cf97bcb0
AM
4139 _bfd_error_handler (_("symbol '%s' has invalid st_other"
4140 " for ABI version 1"), *name);
6911b7dc
AM
4141 bfd_set_error (bfd_error_bad_value);
4142 return FALSE;
4143 }
4144 }
4145
555cd476
AM
4146 return TRUE;
4147}
4148
6911b7dc
AM
4149/* Merge non-visibility st_other attributes: local entry point. */
4150
4151static void
4152ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry *h,
4153 const Elf_Internal_Sym *isym,
4154 bfd_boolean definition,
4155 bfd_boolean dynamic)
4156{
f378ab09 4157 if (definition && (!dynamic || !h->def_regular))
6911b7dc
AM
4158 h->other = ((isym->st_other & ~ELF_ST_VISIBILITY (-1))
4159 | ELF_ST_VISIBILITY (h->other));
4160}
4161
8c5b4e52
AM
4162/* Hook called on merging a symbol. We use this to clear "fake" since
4163 we now have a real symbol. */
4164
4165static bfd_boolean
4166ppc64_elf_merge_symbol (struct elf_link_hash_entry *h,
8b5f1ed8 4167 const Elf_Internal_Sym *isym,
8c5b4e52
AM
4168 asection **psec ATTRIBUTE_UNUSED,
4169 bfd_boolean newdef ATTRIBUTE_UNUSED,
4170 bfd_boolean olddef ATTRIBUTE_UNUSED,
4171 bfd *oldbfd ATTRIBUTE_UNUSED,
4172 const asection *oldsec ATTRIBUTE_UNUSED)
4173{
ed7007c1 4174 ppc_elf_hash_entry (h)->fake = 0;
8b5f1ed8 4175 if ((STO_PPC64_LOCAL_MASK & isym->st_other) != 0)
ed7007c1 4176 ppc_elf_hash_entry (h)->non_zero_localentry = 1;
8c5b4e52
AM
4177 return TRUE;
4178}
4179
8387904d 4180/* This function makes an old ABI object reference to ".bar" cause the
908b32fc
AM
4181 inclusion of a new ABI object archive that defines "bar".
4182 NAME is a symbol defined in an archive. Return a symbol in the hash
4183 table that might be satisfied by the archive symbols. */
8387904d
AM
4184
4185static struct elf_link_hash_entry *
4186ppc64_elf_archive_symbol_lookup (bfd *abfd,
4187 struct bfd_link_info *info,
4188 const char *name)
4189{
4190 struct elf_link_hash_entry *h;
4191 char *dot_name;
4192 size_t len;
4193
4194 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
908b32fc
AM
4195 if (h != NULL
4196 /* Don't return this sym if it is a fake function descriptor
4197 created by add_symbol_adjust. */
ed7007c1 4198 && !ppc_elf_hash_entry (h)->fake)
8387904d
AM
4199 return h;
4200
4201 if (name[0] == '.')
4202 return h;
4203
4204 len = strlen (name);
4205 dot_name = bfd_alloc (abfd, len + 2);
4206 if (dot_name == NULL)
e99955cd 4207 return (struct elf_link_hash_entry *) -1;
8387904d
AM
4208 dot_name[0] = '.';
4209 memcpy (dot_name + 1, name, len + 1);
4210 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4211 bfd_release (abfd, dot_name);
a804e476
AM
4212 if (h != NULL)
4213 return h;
4214
4215 if (strcmp (name, "__tls_get_addr_opt") == 0)
4216 h = _bfd_elf_archive_symbol_lookup (abfd, info, "__tls_get_addr_desc");
8387904d
AM
4217 return h;
4218}
4219
4220/* This function satisfies all old ABI object references to ".bar" if a
99877b66
AM
4221 new ABI object defines "bar". Well, at least, undefined dot symbols
4222 are made weak. This stops later archive searches from including an
4223 object if we already have a function descriptor definition. It also
35b0ce59
AM
4224 prevents the linker complaining about undefined symbols.
4225 We also check and correct mismatched symbol visibility here. The
4226 most restrictive visibility of the function descriptor and the
4227 function entry symbol is used. */
8387904d
AM
4228
4229static bfd_boolean
b3fac117 4230add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
8387904d 4231{
8387904d
AM
4232 struct ppc_link_hash_table *htab;
4233 struct ppc_link_hash_entry *fdh;
4234
b3fac117
AM
4235 if (eh->elf.root.type == bfd_link_hash_warning)
4236 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
8387904d 4237
8400d40d
AM
4238 if (eh->elf.root.type == bfd_link_hash_indirect)
4239 return TRUE;
4240
b3fac117
AM
4241 if (eh->elf.root.root.string[0] != '.')
4242 abort ();
8387904d 4243
b3fac117 4244 htab = ppc_hash_table (info);
4dfe6ac6
NC
4245 if (htab == NULL)
4246 return FALSE;
4247
b31867b6 4248 fdh = lookup_fdh (eh, htab);
8c5b4e52
AM
4249 if (fdh == NULL
4250 && !bfd_link_relocatable (info)
4251 && (eh->elf.root.type == bfd_link_hash_undefined
4252 || eh->elf.root.type == bfd_link_hash_undefweak)
4253 && eh->elf.ref_regular)
4254 {
4255 /* Make an undefined function descriptor sym, in order to
4256 pull in an --as-needed shared lib. Archives are handled
4257 elsewhere. */
4258 fdh = make_fdh (info, eh);
4259 if (fdh == NULL)
4260 return FALSE;
bb700d78 4261 }
8c5b4e52
AM
4262
4263 if (fdh != NULL)
8387904d 4264 {
35b0ce59
AM
4265 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4266 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
8c5b4e52
AM
4267
4268 /* Make both descriptor and entry symbol have the most
4269 constraining visibility of either symbol. */
35b0ce59
AM
4270 if (entry_vis < descr_vis)
4271 fdh->elf.other += entry_vis - descr_vis;
4272 else if (entry_vis > descr_vis)
4273 eh->elf.other += descr_vis - entry_vis;
4274
8c5b4e52
AM
4275 /* Propagate reference flags from entry symbol to function
4276 descriptor symbol. */
bc4e12de 4277 fdh->elf.root.non_ir_ref_regular |= eh->elf.root.non_ir_ref_regular;
4070765b 4278 fdh->elf.root.non_ir_ref_dynamic |= eh->elf.root.non_ir_ref_dynamic;
8c5b4e52
AM
4279 fdh->elf.ref_regular |= eh->elf.ref_regular;
4280 fdh->elf.ref_regular_nonweak |= eh->elf.ref_regular_nonweak;
4281
4282 if (!fdh->elf.forced_local
4283 && fdh->elf.dynindx == -1
4284 && fdh->elf.versioned != versioned_hidden
4285 && (bfd_link_dll (info)
4286 || fdh->elf.def_dynamic
4287 || fdh->elf.ref_dynamic)
4288 && (eh->elf.ref_regular
4289 || eh->elf.def_regular))
4290 {
2cdcc330 4291 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
8c5b4e52 4292 return FALSE;
35b0ce59 4293 }
8387904d 4294 }
99877b66 4295
8387904d
AM
4296 return TRUE;
4297}
4298
f6c7c3e8
AM
4299/* Set up opd section info and abiversion for IBFD, and process list
4300 of dot-symbols we made in link_hash_newfunc. */
b3fac117 4301
8387904d 4302static bfd_boolean
f6c7c3e8 4303ppc64_elf_before_check_relocs (bfd *ibfd, struct bfd_link_info *info)
8387904d 4304{
99877b66 4305 struct ppc_link_hash_table *htab;
b3fac117 4306 struct ppc_link_hash_entry **p, *eh;
459609d6 4307 asection *opd = bfd_get_section_by_name (ibfd, ".opd");
433817dd 4308
459609d6 4309 if (opd != NULL && opd->size != 0)
b3fac117 4310 {
b9399fcf
AM
4311 BFD_ASSERT (ppc64_elf_section_data (opd)->sec_type == sec_normal);
4312 ppc64_elf_section_data (opd)->sec_type = sec_opd;
4313
459609d6
AM
4314 if (abiversion (ibfd) == 0)
4315 set_abiversion (ibfd, 1);
8a2058b5 4316 else if (abiversion (ibfd) >= 2)
f6c7c3e8 4317 {
695344c0 4318 /* xgettext:c-format */
cf97bcb0
AM
4319 _bfd_error_handler (_("%pB .opd not allowed in ABI version %d"),
4320 ibfd, abiversion (ibfd));
459609d6
AM
4321 bfd_set_error (bfd_error_bad_value);
4322 return FALSE;
f6c7c3e8 4323 }
b9399fcf 4324 }
f6c7c3e8 4325
b9399fcf
AM
4326 if (is_ppc64_elf (info->output_bfd))
4327 {
4328 /* For input files without an explicit abiversion in e_flags
4329 we should have flagged any with symbol st_other bits set
4330 as ELFv1 and above flagged those with .opd as ELFv2.
4331 Set the output abiversion if not yet set, and for any input
4332 still ambiguous, take its abiversion from the output.
4333 Differences in ABI are reported later. */
4334 if (abiversion (info->output_bfd) == 0)
4335 set_abiversion (info->output_bfd, abiversion (ibfd));
4336 else if (abiversion (ibfd) == 0)
4337 set_abiversion (ibfd, abiversion (info->output_bfd));
b3fac117
AM
4338 }
4339
459609d6
AM
4340 htab = ppc_hash_table (info);
4341 if (htab == NULL)
b9399fcf 4342 return TRUE;
459609d6 4343
b9399fcf
AM
4344 if (opd != NULL && opd->size != 0
4345 && (ibfd->flags & DYNAMIC) == 0
4346 && (opd->flags & SEC_RELOC) != 0
4347 && opd->reloc_count != 0
4348 && !bfd_is_abs_section (opd->output_section)
4349 && info->gc_sections)
4350 {
4351 /* Garbage collection needs some extra help with .opd sections.
4352 We don't want to necessarily keep everything referenced by
4353 relocs in .opd, as that would keep all functions. Instead,
4354 if we reference an .opd symbol (a function descriptor), we
4355 want to keep the function code symbol's section. This is
4356 easy for global symbols, but for local syms we need to keep
4357 information about the associated function section. */
4358 bfd_size_type amt;
4359 asection **opd_sym_map;
4360 Elf_Internal_Shdr *symtab_hdr;
4361 Elf_Internal_Rela *relocs, *rel_end, *rel;
4362
4363 amt = OPD_NDX (opd->size) * sizeof (*opd_sym_map);
4364 opd_sym_map = bfd_zalloc (ibfd, amt);
4365 if (opd_sym_map == NULL)
4366 return FALSE;
4367 ppc64_elf_section_data (opd)->u.opd.func_sec = opd_sym_map;
4368 relocs = _bfd_elf_link_read_relocs (ibfd, opd, NULL, NULL,
4369 info->keep_memory);
4370 if (relocs == NULL)
4371 return FALSE;
4372 symtab_hdr = &elf_symtab_hdr (ibfd);
4373 rel_end = relocs + opd->reloc_count - 1;
4374 for (rel = relocs; rel < rel_end; rel++)
4375 {
4376 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
4377 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
4378
4379 if (r_type == R_PPC64_ADDR64
4380 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC
4381 && r_symndx < symtab_hdr->sh_info)
4382 {
4383 Elf_Internal_Sym *isym;
4384 asection *s;
4385
4386 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, r_symndx);
4387 if (isym == NULL)
4388 {
4389 if (elf_section_data (opd)->relocs != relocs)
4390 free (relocs);
4391 return FALSE;
4392 }
4393
4394 s = bfd_section_from_elf_index (ibfd, isym->st_shndx);
4395 if (s != NULL && s != opd)
4396 opd_sym_map[OPD_NDX (rel->r_offset)] = s;
4397 }
4398 }
4399 if (elf_section_data (opd)->relocs != relocs)
4400 free (relocs);
4401 }
459609d6
AM
4402
4403 p = &htab->dot_syms;
4404 while ((eh = *p) != NULL)
4405 {
4406 *p = NULL;
4407 if (&eh->elf == htab->elf.hgot)
4408 ;
4409 else if (htab->elf.hgot == NULL
4410 && strcmp (eh->elf.root.root.string, ".TOC.") == 0)
4411 htab->elf.hgot = &eh->elf;
8c5b4e52
AM
4412 else if (abiversion (ibfd) <= 1)
4413 {
4414 htab->need_func_desc_adj = 1;
4415 if (!add_symbol_adjust (eh, info))
4416 return FALSE;
4417 }
459609d6
AM
4418 p = &eh->u.next_dot_sym;
4419 }
b3fac117 4420 return TRUE;
8387904d
AM
4421}
4422
97fed1c9
JJ
4423/* Undo hash table changes when an --as-needed input file is determined
4424 not to be needed. */
4425
4426static bfd_boolean
e5034e59
AM
4427ppc64_elf_notice_as_needed (bfd *ibfd,
4428 struct bfd_link_info *info,
4429 enum notice_asneeded_action act)
97fed1c9 4430{
e5034e59
AM
4431 if (act == notice_not_needed)
4432 {
4433 struct ppc_link_hash_table *htab = ppc_hash_table (info);
4dfe6ac6 4434
e5034e59
AM
4435 if (htab == NULL)
4436 return FALSE;
4dfe6ac6 4437
e5034e59
AM
4438 htab->dot_syms = NULL;
4439 }
4440 return _bfd_elf_notice_as_needed (ibfd, info, act);
97fed1c9
JJ
4441}
4442
aa374f67
AM
4443/* If --just-symbols against a final linked binary, then assume we need
4444 toc adjusting stubs when calling functions defined there. */
4445
4446static void
4447ppc64_elf_link_just_syms (asection *sec, struct bfd_link_info *info)
4448{
4449 if ((sec->flags & SEC_CODE) != 0
4450 && (sec->owner->flags & (EXEC_P | DYNAMIC)) != 0
4451 && is_ppc64_elf (sec->owner))
4452 {
2c3f079f
AM
4453 if (abiversion (sec->owner) >= 2
4454 || bfd_get_section_by_name (sec->owner, ".opd") != NULL)
aa374f67
AM
4455 sec->has_toc_reloc = 1;
4456 }
4457 _bfd_elf_link_just_syms (sec, info);
4458}
4459
e054468f 4460static struct plt_entry **
4ce794b7
AM
4461update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4462 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
411e1bfb
AM
4463{
4464 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
e054468f 4465 struct plt_entry **local_plt;
f961d9dd 4466 unsigned char *local_got_tls_masks;
411e1bfb
AM
4467
4468 if (local_got_ents == NULL)
4469 {
4470 bfd_size_type size = symtab_hdr->sh_info;
4471
e054468f
AM
4472 size *= (sizeof (*local_got_ents)
4473 + sizeof (*local_plt)
4474 + sizeof (*local_got_tls_masks));
4ce794b7 4475 local_got_ents = bfd_zalloc (abfd, size);
411e1bfb 4476 if (local_got_ents == NULL)
e054468f 4477 return NULL;
411e1bfb
AM
4478 elf_local_got_ents (abfd) = local_got_ents;
4479 }
4480
37da22e5 4481 if ((tls_type & (NON_GOT | TLS_EXPLICIT)) == 0)
411e1bfb
AM
4482 {
4483 struct got_entry *ent;
4484
4485 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
e717da7e
AM
4486 if (ent->addend == r_addend
4487 && ent->owner == abfd
4488 && ent->tls_type == tls_type)
411e1bfb
AM
4489 break;
4490 if (ent == NULL)
4491 {
986f0783 4492 size_t amt = sizeof (*ent);
4ce794b7 4493 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4494 if (ent == NULL)
4495 return FALSE;
4496 ent->next = local_got_ents[r_symndx];
4497 ent->addend = r_addend;
e717da7e 4498 ent->owner = abfd;
411e1bfb 4499 ent->tls_type = tls_type;
927be08e 4500 ent->is_indirect = FALSE;
411e1bfb
AM
4501 ent->got.refcount = 0;
4502 local_got_ents[r_symndx] = ent;
4503 }
4504 ent->got.refcount += 1;
4505 }
4506
e054468f 4507 local_plt = (struct plt_entry **) (local_got_ents + symtab_hdr->sh_info);
f961d9dd 4508 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5 4509 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
e054468f
AM
4510
4511 return local_plt + r_symndx;
65f38f15
AM
4512}
4513
411e1bfb 4514static bfd_boolean
e054468f 4515update_plt_info (bfd *abfd, struct plt_entry **plist, bfd_vma addend)
1e2f5b6e 4516{
411e1bfb 4517 struct plt_entry *ent;
1e2f5b6e 4518
e054468f 4519 for (ent = *plist; ent != NULL; ent = ent->next)
411e1bfb
AM
4520 if (ent->addend == addend)
4521 break;
4522 if (ent == NULL)
1e2f5b6e 4523 {
986f0783 4524 size_t amt = sizeof (*ent);
4ce794b7 4525 ent = bfd_alloc (abfd, amt);
411e1bfb
AM
4526 if (ent == NULL)
4527 return FALSE;
e054468f 4528 ent->next = *plist;
411e1bfb
AM
4529 ent->addend = addend;
4530 ent->plt.refcount = 0;
e054468f 4531 *plist = ent;
1e2f5b6e 4532 }
411e1bfb 4533 ent->plt.refcount += 1;
b34976b6 4534 return TRUE;
1e2f5b6e
AM
4535}
4536
e054468f
AM
4537static bfd_boolean
4538is_branch_reloc (enum elf_ppc64_reloc_type r_type)
4539{
4540 return (r_type == R_PPC64_REL24
05d0e962 4541 || r_type == R_PPC64_REL24_NOTOC
e054468f
AM
4542 || r_type == R_PPC64_REL14
4543 || r_type == R_PPC64_REL14_BRTAKEN
4544 || r_type == R_PPC64_REL14_BRNTAKEN
4545 || r_type == R_PPC64_ADDR24
4546 || r_type == R_PPC64_ADDR14
4547 || r_type == R_PPC64_ADDR14_BRTAKEN
23cedd1d 4548 || r_type == R_PPC64_ADDR14_BRNTAKEN
5663e321
AM
4549 || r_type == R_PPC64_PLTCALL
4550 || r_type == R_PPC64_PLTCALL_NOTOC);
23cedd1d
AM
4551}
4552
4553/* Relocs on inline plt call sequence insns prior to the call. */
4554
4555static bfd_boolean
4556is_plt_seq_reloc (enum elf_ppc64_reloc_type r_type)
4557{
4558 return (r_type == R_PPC64_PLT16_HA
4559 || r_type == R_PPC64_PLT16_HI
4560 || r_type == R_PPC64_PLT16_LO
4561 || r_type == R_PPC64_PLT16_LO_DS
5663e321
AM
4562 || r_type == R_PPC64_PLT_PCREL34
4563 || r_type == R_PPC64_PLT_PCREL34_NOTOC
4564 || r_type == R_PPC64_PLTSEQ
4565 || r_type == R_PPC64_PLTSEQ_NOTOC);
e054468f
AM
4566}
4567
5bd4f169 4568/* Look through the relocs for a section during the first phase, and
65f38f15 4569 calculate needed space in the global offset table, procedure
5d1634d7 4570 linkage table, and dynamic reloc sections. */
5bd4f169 4571
b34976b6 4572static bfd_boolean
4ce794b7
AM
4573ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4574 asection *sec, const Elf_Internal_Rela *relocs)
5bd4f169 4575{
65f38f15 4576 struct ppc_link_hash_table *htab;
5bd4f169 4577 Elf_Internal_Shdr *symtab_hdr;
c7e2358a 4578 struct elf_link_hash_entry **sym_hashes;
5bd4f169
AM
4579 const Elf_Internal_Rela *rel;
4580 const Elf_Internal_Rela *rel_end;
5bd4f169 4581 asection *sreloc;
3a71aa26 4582 struct elf_link_hash_entry *tga, *dottga;
b9399fcf 4583 bfd_boolean is_opd;
5bd4f169 4584
0e1862bb 4585 if (bfd_link_relocatable (info))
b34976b6 4586 return TRUE;
5bd4f169 4587
0c8d6e5c 4588 BFD_ASSERT (is_ppc64_elf (abfd));
0ffa91dd 4589
65f38f15 4590 htab = ppc_hash_table (info);
4dfe6ac6
NC
4591 if (htab == NULL)
4592 return FALSE;
4593
3a71aa26
AM
4594 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4595 FALSE, FALSE, TRUE);
4596 dottga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
4597 FALSE, FALSE, TRUE);
0ffa91dd 4598 symtab_hdr = &elf_symtab_hdr (abfd);
5bd4f169 4599 sym_hashes = elf_sym_hashes (abfd);
5bd4f169 4600 sreloc = NULL;
b9399fcf 4601 is_opd = ppc64_elf_section_data (sec)->sec_type == sec_opd;
5bd4f169
AM
4602 rel_end = relocs + sec->reloc_count;
4603 for (rel = relocs; rel < rel_end; rel++)
4604 {
4605 unsigned long r_symndx;
4606 struct elf_link_hash_entry *h;
04c9666a 4607 enum elf_ppc64_reloc_type r_type;
727fc41e 4608 int tls_type;
7c8fe5c4 4609 struct _ppc64_elf_section_data *ppc64_sec;
cbf95972 4610 struct plt_entry **ifunc, **plt_list;
5bd4f169
AM
4611
4612 r_symndx = ELF64_R_SYM (rel->r_info);
4613 if (r_symndx < symtab_hdr->sh_info)
4614 h = NULL;
4615 else
973a3492
L
4616 {
4617 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 4618 h = elf_follow_link (h);
1c865ab2
AM
4619
4620 if (h == htab->elf.hgot)
4621 sec->has_toc_reloc = 1;
973a3492 4622 }
5bd4f169 4623
5663e321
AM
4624 r_type = ELF64_R_TYPE (rel->r_info);
4625 switch (r_type)
4626 {
04bdff6a
AM
4627 case R_PPC64_D34:
4628 case R_PPC64_D34_LO:
4629 case R_PPC64_D34_HI30:
4630 case R_PPC64_D34_HA30:
4631 case R_PPC64_D28:
c213164a
AM
4632 case R_PPC64_TPREL34:
4633 case R_PPC64_DTPREL34:
04bdff6a 4634 case R_PPC64_PCREL34:
5663e321 4635 case R_PPC64_GOT_PCREL34:
87c69f97
AM
4636 case R_PPC64_GOT_TLSGD_PCREL34:
4637 case R_PPC64_GOT_TLSLD_PCREL34:
4638 case R_PPC64_GOT_TPREL_PCREL34:
4639 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
4640 case R_PPC64_PLT_PCREL34:
4641 case R_PPC64_PLT_PCREL34_NOTOC:
04bdff6a 4642 case R_PPC64_PCREL28:
d349c8e2 4643 htab->has_power10_relocs = 1;
133a1f60
AM
4644 break;
4645 default:
5663e321
AM
4646 break;
4647 }
903b777d
AM
4648
4649 switch (r_type)
4650 {
4651 case R_PPC64_PLT16_HA:
4652 case R_PPC64_GOT_TLSLD16_HA:
4653 case R_PPC64_GOT_TLSGD16_HA:
4654 case R_PPC64_GOT_TPREL16_HA:
4655 case R_PPC64_GOT_DTPREL16_HA:
4656 case R_PPC64_GOT16_HA:
4657 case R_PPC64_TOC16_HA:
4658 case R_PPC64_PLT16_LO:
4659 case R_PPC64_PLT16_LO_DS:
4660 case R_PPC64_GOT_TLSLD16_LO:
4661 case R_PPC64_GOT_TLSGD16_LO:
4662 case R_PPC64_GOT_TPREL16_LO_DS:
4663 case R_PPC64_GOT_DTPREL16_LO_DS:
4664 case R_PPC64_GOT16_LO:
4665 case R_PPC64_GOT16_LO_DS:
4666 case R_PPC64_TOC16_LO:
4667 case R_PPC64_TOC16_LO_DS:
4668 case R_PPC64_GOT_PCREL34:
4669 ppc64_elf_tdata (abfd)->has_optrel = 1;
4670 ppc64_elf_section_data (sec)->has_optrel = 1;
4671 break;
4672 default:
4673 break;
4674 }
4675
f749f26e 4676 ifunc = NULL;
25f23106
AM
4677 if (h != NULL)
4678 {
4679 if (h->type == STT_GNU_IFUNC)
4680 {
4681 h->needs_plt = 1;
4682 ifunc = &h->plt.plist;
4683 }
4684 }
4685 else
4686 {
4687 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4688 abfd, r_symndx);
4689 if (isym == NULL)
4690 return FALSE;
4691
4692 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4693 {
4694 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4695 rel->r_addend,
37da22e5 4696 NON_GOT | PLT_IFUNC);
25f23106
AM
4697 if (ifunc == NULL)
4698 return FALSE;
4699 }
4700 }
727fc41e 4701
f749f26e 4702 tls_type = 0;
a33d1f77 4703 switch (r_type)
5bd4f169 4704 {
727fc41e
AM
4705 case R_PPC64_TLSGD:
4706 case R_PPC64_TLSLD:
4707 /* These special tls relocs tie a call to __tls_get_addr with
4708 its parameter symbol. */
37da22e5 4709 if (h != NULL)
ed7007c1 4710 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
37da22e5
AM
4711 else
4712 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4713 rel->r_addend,
37da22e5
AM
4714 NON_GOT | TLS_TLS | TLS_MARK))
4715 return FALSE;
4716 sec->has_tls_reloc = 1;
727fc41e
AM
4717 break;
4718
411e1bfb
AM
4719 case R_PPC64_GOT_TLSLD16:
4720 case R_PPC64_GOT_TLSLD16_LO:
4721 case R_PPC64_GOT_TLSLD16_HI:
4722 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 4723 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 4724 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
4725 goto dogottls;
4726
4727 case R_PPC64_GOT_TLSGD16:
4728 case R_PPC64_GOT_TLSGD16_LO:
4729 case R_PPC64_GOT_TLSGD16_HI:
4730 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 4731 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 4732 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
4733 goto dogottls;
4734
4735 case R_PPC64_GOT_TPREL16_DS:
4736 case R_PPC64_GOT_TPREL16_LO_DS:
4737 case R_PPC64_GOT_TPREL16_HI:
4738 case R_PPC64_GOT_TPREL16_HA:
87c69f97 4739 case R_PPC64_GOT_TPREL_PCREL34:
7c8bbca5 4740 if (bfd_link_dll (info))
411e1bfb
AM
4741 info->flags |= DF_STATIC_TLS;
4742 tls_type = TLS_TLS | TLS_TPREL;
4743 goto dogottls;
4744
4745 case R_PPC64_GOT_DTPREL16_DS:
4746 case R_PPC64_GOT_DTPREL16_LO_DS:
4747 case R_PPC64_GOT_DTPREL16_HI:
4748 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 4749 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
4750 tls_type = TLS_TLS | TLS_DTPREL;
4751 dogottls:
4752 sec->has_tls_reloc = 1;
066f4018 4753 goto dogot;
411e1bfb 4754
903b777d
AM
4755 case R_PPC64_GOT16:
4756 case R_PPC64_GOT16_LO:
4757 case R_PPC64_GOT16_HI:
65f38f15 4758 case R_PPC64_GOT16_HA:
903b777d 4759 case R_PPC64_GOT16_DS:
066f4018 4760 case R_PPC64_GOT16_LO_DS:
4a421c53 4761 case R_PPC64_GOT_PCREL34:
066f4018 4762 dogot:
65f38f15 4763 /* This symbol requires a global offset table entry. */
4c52953f 4764 sec->has_toc_reloc = 1;
33c0ec9d
AM
4765 if (r_type == R_PPC64_GOT_TLSLD16
4766 || r_type == R_PPC64_GOT_TLSGD16
4767 || r_type == R_PPC64_GOT_TPREL16_DS
4768 || r_type == R_PPC64_GOT_DTPREL16_DS
4769 || r_type == R_PPC64_GOT16
4770 || r_type == R_PPC64_GOT16_DS)
4771 {
4772 htab->do_multi_toc = 1;
d77c8a4b 4773 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
33c0ec9d
AM
4774 }
4775
e717da7e
AM
4776 if (ppc64_elf_tdata (abfd)->got == NULL
4777 && !create_got_section (abfd, info))
b34976b6 4778 return FALSE;
5bd4f169
AM
4779
4780 if (h != NULL)
4781 {
411e1bfb
AM
4782 struct ppc_link_hash_entry *eh;
4783 struct got_entry *ent;
65f38f15 4784
ed7007c1 4785 eh = ppc_elf_hash_entry (h);
411e1bfb 4786 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
133a1f60 4787 if (ent->addend == rel->r_addend
e717da7e 4788 && ent->owner == abfd
411e1bfb
AM
4789 && ent->tls_type == tls_type)
4790 break;
4791 if (ent == NULL)
5bd4f169 4792 {
986f0783 4793 size_t amt = sizeof (*ent);
4ce794b7 4794 ent = bfd_alloc (abfd, amt);
411e1bfb 4795 if (ent == NULL)
b34976b6 4796 return FALSE;
411e1bfb 4797 ent->next = eh->elf.got.glist;
133a1f60 4798 ent->addend = rel->r_addend;
e717da7e 4799 ent->owner = abfd;
411e1bfb 4800 ent->tls_type = tls_type;
927be08e 4801 ent->is_indirect = FALSE;
411e1bfb
AM
4802 ent->got.refcount = 0;
4803 eh->elf.got.glist = ent;
5bd4f169 4804 }
411e1bfb 4805 ent->got.refcount += 1;
e7b938ca 4806 eh->tls_mask |= tls_type;
5bd4f169 4807 }
411e1bfb
AM
4808 else
4809 /* This is a global offset table entry for a local symbol. */
4810 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4811 rel->r_addend, tls_type))
411e1bfb 4812 return FALSE;
5bd4f169
AM
4813 break;
4814
5bd4f169 4815 case R_PPC64_PLT16_HA:
65f38f15
AM
4816 case R_PPC64_PLT16_HI:
4817 case R_PPC64_PLT16_LO:
08be3224 4818 case R_PPC64_PLT16_LO_DS:
5663e321
AM
4819 case R_PPC64_PLT_PCREL34:
4820 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
4821 case R_PPC64_PLT32:
4822 case R_PPC64_PLT64:
cbf95972
AM
4823 /* This symbol requires a procedure linkage table entry. */
4824 plt_list = ifunc;
4825 if (h != NULL)
e054468f 4826 {
e054468f
AM
4827 h->needs_plt = 1;
4828 if (h->root.root.string[0] == '.'
4829 && h->root.root.string[1] != '\0')
ed7007c1
AM
4830 ppc_elf_hash_entry (h)->is_func = 1;
4831 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
cbf95972
AM
4832 plt_list = &h->plt.plist;
4833 }
4834 if (plt_list == NULL)
2d7ad24e 4835 plt_list = update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 4836 rel->r_addend,
2d7ad24e 4837 NON_GOT | PLT_KEEP);
133a1f60 4838 if (!update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 4839 return FALSE;
5bd4f169
AM
4840 break;
4841
4842 /* The following relocations don't need to propagate the
4843 relocation if linking a shared object since they are
4844 section relative. */
4845 case R_PPC64_SECTOFF:
4846 case R_PPC64_SECTOFF_LO:
4847 case R_PPC64_SECTOFF_HI:
4848 case R_PPC64_SECTOFF_HA:
4849 case R_PPC64_SECTOFF_DS:
4850 case R_PPC64_SECTOFF_LO_DS:
411e1bfb
AM
4851 case R_PPC64_DTPREL16:
4852 case R_PPC64_DTPREL16_LO:
4853 case R_PPC64_DTPREL16_HI:
4854 case R_PPC64_DTPREL16_HA:
4855 case R_PPC64_DTPREL16_DS:
4856 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
4857 case R_PPC64_DTPREL16_HIGH:
4858 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
4859 case R_PPC64_DTPREL16_HIGHER:
4860 case R_PPC64_DTPREL16_HIGHERA:
4861 case R_PPC64_DTPREL16_HIGHEST:
4862 case R_PPC64_DTPREL16_HIGHESTA:
5bd4f169
AM
4863 break;
4864
ad8e1ba5 4865 /* Nor do these. */
25f23106
AM
4866 case R_PPC64_REL16:
4867 case R_PPC64_REL16_LO:
4868 case R_PPC64_REL16_HI:
4869 case R_PPC64_REL16_HA:
4a969973
AM
4870 case R_PPC64_REL16_HIGH:
4871 case R_PPC64_REL16_HIGHA:
4872 case R_PPC64_REL16_HIGHER:
4873 case R_PPC64_REL16_HIGHERA:
4874 case R_PPC64_REL16_HIGHEST:
4875 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
4876 case R_PPC64_REL16_HIGHER34:
4877 case R_PPC64_REL16_HIGHERA34:
4878 case R_PPC64_REL16_HIGHEST34:
4879 case R_PPC64_REL16_HIGHESTA34:
a680de9a 4880 case R_PPC64_REL16DX_HA:
25f23106
AM
4881 break;
4882
45965137
AM
4883 /* Not supported as a dynamic relocation. */
4884 case R_PPC64_ADDR64_LOCAL:
0e1862bb 4885 if (bfd_link_pic (info))
45965137
AM
4886 {
4887 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
4888 ppc_howto_init ();
695344c0 4889 /* xgettext:c-format */
174d0a74 4890 info->callbacks->einfo (_("%H: %s reloc unsupported "
cf97bcb0 4891 "in shared libraries and PIEs\n"),
45965137
AM
4892 abfd, sec, rel->r_offset,
4893 ppc64_elf_howto_table[r_type]->name);
4894 bfd_set_error (bfd_error_bad_value);
4895 return FALSE;
4896 }
4897 break;
4898
ad8e1ba5 4899 case R_PPC64_TOC16:
33c0ec9d
AM
4900 case R_PPC64_TOC16_DS:
4901 htab->do_multi_toc = 1;
d77c8a4b 4902 ppc64_elf_tdata (abfd)->has_small_toc_reloc = 1;
1a0670f3 4903 /* Fall through. */
ad8e1ba5
AM
4904 case R_PPC64_TOC16_LO:
4905 case R_PPC64_TOC16_HI:
4906 case R_PPC64_TOC16_HA:
ad8e1ba5 4907 case R_PPC64_TOC16_LO_DS:
4c52953f 4908 sec->has_toc_reloc = 1;
ec73ddcd 4909 if (h != NULL && bfd_link_executable (info))
1bdd8fac
AM
4910 {
4911 /* We may need a copy reloc. */
4912 h->non_got_ref = 1;
4913 /* Strongly prefer a copy reloc over a dynamic reloc.
4914 glibc ld.so as of 2019-08 will error out if one of
4915 these relocations is emitted. */
4916 h->needs_copy = 1;
4917 goto dodyn;
4918 }
ad8e1ba5
AM
4919 break;
4920
006589cf
AM
4921 /* Marker reloc. */
4922 case R_PPC64_ENTRY:
4923 break;
4924
5bd4f169
AM
4925 /* This relocation describes the C++ object vtable hierarchy.
4926 Reconstruct it for later use during GC. */
4927 case R_PPC64_GNU_VTINHERIT:
c152c796 4928 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 4929 return FALSE;
5bd4f169
AM
4930 break;
4931
4932 /* This relocation describes which C++ vtable entries are actually
4933 used. Record for later use during GC. */
4934 case R_PPC64_GNU_VTENTRY:
a0ea3a14 4935 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 4936 return FALSE;
5bd4f169
AM
4937 break;
4938
721956f4
AM
4939 case R_PPC64_REL14:
4940 case R_PPC64_REL14_BRTAKEN:
4941 case R_PPC64_REL14_BRNTAKEN:
220c76dd
AM
4942 {
4943 asection *dest = NULL;
4944
4945 /* Heuristic: If jumping outside our section, chances are
4946 we are going to need a stub. */
4947 if (h != NULL)
4948 {
4949 /* If the sym is weak it may be overridden later, so
4950 don't assume we know where a weak sym lives. */
4951 if (h->root.type == bfd_link_hash_defined)
4952 dest = h->root.u.def.section;
4953 }
4954 else
87d72d41
AM
4955 {
4956 Elf_Internal_Sym *isym;
4957
4958 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4959 abfd, r_symndx);
4960 if (isym == NULL)
4961 return FALSE;
4962
4963 dest = bfd_section_from_elf_index (abfd, isym->st_shndx);
4964 }
4965
220c76dd 4966 if (dest != sec)
7c8fe5c4 4967 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
220c76dd 4968 }
3e04d765
AM
4969 goto rel24;
4970
4971 case R_PPC64_PLTCALL:
5663e321 4972 case R_PPC64_PLTCALL_NOTOC:
3e04d765 4973 ppc64_elf_section_data (sec)->has_pltcall = 1;
721956f4
AM
4974 /* Fall through. */
4975
5d1634d7 4976 case R_PPC64_REL24:
05d0e962 4977 case R_PPC64_REL24_NOTOC:
3e04d765 4978 rel24:
cbf95972
AM
4979 plt_list = ifunc;
4980 if (h != NULL)
5d1634d7 4981 {
e054468f
AM
4982 h->needs_plt = 1;
4983 if (h->root.root.string[0] == '.'
4984 && h->root.root.string[1] != '\0')
ed7007c1 4985 ppc_elf_hash_entry (h)->is_func = 1;
cbf95972 4986
3a71aa26 4987 if (h == tga || h == dottga)
cbf95972
AM
4988 {
4989 sec->has_tls_reloc = 1;
4990 if (rel != relocs
4991 && (ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSGD
4992 || ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_TLSLD))
4993 /* We have a new-style __tls_get_addr call with
4994 a marker reloc. */
4995 ;
4996 else
4997 /* Mark this section as having an old-style call. */
9737e8af 4998 sec->nomark_tls_get_addr = 1;
cbf95972
AM
4999 }
5000 plt_list = &h->plt.plist;
411e1bfb 5001 }
cbf95972
AM
5002
5003 /* We may need a .plt entry if the function this reloc
5004 refers to is in a shared lib. */
5005 if (plt_list
133a1f60 5006 && !update_plt_info (abfd, plt_list, rel->r_addend))
cbf95972 5007 return FALSE;
411e1bfb
AM
5008 break;
5009
cbf95972
AM
5010 case R_PPC64_ADDR14:
5011 case R_PPC64_ADDR14_BRNTAKEN:
5012 case R_PPC64_ADDR14_BRTAKEN:
5013 case R_PPC64_ADDR24:
5014 goto dodyn;
5015
411e1bfb
AM
5016 case R_PPC64_TPREL64:
5017 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
7c8bbca5 5018 if (bfd_link_dll (info))
411e1bfb
AM
5019 info->flags |= DF_STATIC_TLS;
5020 goto dotlstoc;
5021
5022 case R_PPC64_DTPMOD64:
5023 if (rel + 1 < rel_end
5024 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
5025 && rel[1].r_offset == rel->r_offset + 8)
951fd09b 5026 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
411e1bfb 5027 else
951fd09b 5028 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
411e1bfb
AM
5029 goto dotlstoc;
5030
5031 case R_PPC64_DTPREL64:
5032 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
5033 if (rel != relocs
5034 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
5035 && rel[-1].r_offset == rel->r_offset - 8)
5036 /* This is the second reloc of a dtpmod, dtprel pair.
5037 Don't mark with TLS_DTPREL. */
5038 goto dodyn;
5039
5040 dotlstoc:
5041 sec->has_tls_reloc = 1;
5042 if (h != NULL)
ed7007c1 5043 ppc_elf_hash_entry (h)->tls_mask |= tls_type & 0xff;
411e1bfb
AM
5044 else
5045 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
133a1f60 5046 rel->r_addend, tls_type))
411e1bfb
AM
5047 return FALSE;
5048
7c8fe5c4
AM
5049 ppc64_sec = ppc64_elf_section_data (sec);
5050 if (ppc64_sec->sec_type != sec_toc)
411e1bfb 5051 {
3a71aa26
AM
5052 bfd_size_type amt;
5053
e7b938ca 5054 /* One extra to simplify get_tls_mask. */
3a71aa26
AM
5055 amt = sec->size * sizeof (unsigned) / 8 + sizeof (unsigned);
5056 ppc64_sec->u.toc.symndx = bfd_zalloc (abfd, amt);
5057 if (ppc64_sec->u.toc.symndx == NULL)
5058 return FALSE;
5059 amt = sec->size * sizeof (bfd_vma) / 8;
5060 ppc64_sec->u.toc.add = bfd_zalloc (abfd, amt);
5061 if (ppc64_sec->u.toc.add == NULL)
411e1bfb 5062 return FALSE;
7c8fe5c4
AM
5063 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
5064 ppc64_sec->sec_type = sec_toc;
411e1bfb
AM
5065 }
5066 BFD_ASSERT (rel->r_offset % 8 == 0);
3a71aa26 5067 ppc64_sec->u.toc.symndx[rel->r_offset / 8] = r_symndx;
133a1f60 5068 ppc64_sec->u.toc.add[rel->r_offset / 8] = rel->r_addend;
951fd09b
AM
5069
5070 /* Mark the second slot of a GD or LD entry.
5071 -1 to indicate GD and -2 to indicate LD. */
5072 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
3a71aa26 5073 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -1;
951fd09b 5074 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
3a71aa26 5075 ppc64_sec->u.toc.symndx[rel->r_offset / 8 + 1] = -2;
411e1bfb
AM
5076 goto dodyn;
5077
5078 case R_PPC64_TPREL16:
5079 case R_PPC64_TPREL16_LO:
5080 case R_PPC64_TPREL16_HI:
5081 case R_PPC64_TPREL16_HA:
5082 case R_PPC64_TPREL16_DS:
5083 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
5084 case R_PPC64_TPREL16_HIGH:
5085 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
5086 case R_PPC64_TPREL16_HIGHER:
5087 case R_PPC64_TPREL16_HIGHERA:
5088 case R_PPC64_TPREL16_HIGHEST:
5089 case R_PPC64_TPREL16_HIGHESTA:
c213164a 5090 case R_PPC64_TPREL34:
7c8bbca5
AM
5091 if (bfd_link_dll (info))
5092 info->flags |= DF_STATIC_TLS;
5093 goto dodyn;
5d1634d7 5094
e86ce104 5095 case R_PPC64_ADDR64:
b9399fcf 5096 if (is_opd
1e2f5b6e 5097 && rel + 1 < rel_end
4ce794b7 5098 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
1e2f5b6e 5099 {
8387904d 5100 if (h != NULL)
ed7007c1 5101 ppc_elf_hash_entry (h)->is_func = 1;
1e2f5b6e 5102 }
e86ce104
AM
5103 /* Fall through. */
5104
65f38f15
AM
5105 case R_PPC64_ADDR16:
5106 case R_PPC64_ADDR16_DS:
5107 case R_PPC64_ADDR16_HA:
5108 case R_PPC64_ADDR16_HI:
f9c6b907
AM
5109 case R_PPC64_ADDR16_HIGH:
5110 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
5111 case R_PPC64_ADDR16_HIGHER:
5112 case R_PPC64_ADDR16_HIGHERA:
5113 case R_PPC64_ADDR16_HIGHEST:
5114 case R_PPC64_ADDR16_HIGHESTA:
5115 case R_PPC64_ADDR16_LO:
5116 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
5117 case R_PPC64_D34:
5118 case R_PPC64_D34_LO:
5119 case R_PPC64_D34_HI30:
5120 case R_PPC64_D34_HA30:
5121 case R_PPC64_ADDR16_HIGHER34:
5122 case R_PPC64_ADDR16_HIGHERA34:
5123 case R_PPC64_ADDR16_HIGHEST34:
5124 case R_PPC64_ADDR16_HIGHESTA34:
5125 case R_PPC64_D28:
0e1862bb 5126 if (h != NULL && !bfd_link_pic (info) && abiversion (abfd) != 1
a345bc8d
AM
5127 && rel->r_addend == 0)
5128 {
5129 /* We may need a .plt entry if this reloc refers to a
5130 function in a shared lib. */
5663e321 5131 if (!update_plt_info (abfd, &h->plt.plist, 0))
a345bc8d
AM
5132 return FALSE;
5133 h->pointer_equality_needed = 1;
5134 }
5135 /* Fall through. */
5136
5137 case R_PPC64_REL30:
5138 case R_PPC64_REL32:
5139 case R_PPC64_REL64:
65f38f15 5140 case R_PPC64_ADDR32:
65f38f15
AM
5141 case R_PPC64_UADDR16:
5142 case R_PPC64_UADDR32:
5143 case R_PPC64_UADDR64:
5bd4f169 5144 case R_PPC64_TOC:
ec73ddcd 5145 if (h != NULL && bfd_link_executable (info))
81848ca0 5146 /* We may need a copy reloc. */
f5385ebf 5147 h->non_got_ref = 1;
81848ca0 5148
41bd81ab 5149 /* Don't propagate .opd relocs. */
b9399fcf 5150 if (NO_OPD_RELOCS && is_opd)
e86ce104 5151 break;
e86ce104 5152
65f38f15
AM
5153 /* If we are creating a shared library, and this is a reloc
5154 against a global symbol, or a non PC relative reloc
5155 against a local symbol, then we need to copy the reloc
5156 into the shared library. However, if we are linking with
5157 -Bsymbolic, we do not need to copy a reloc against a
5158 global symbol which is defined in an object we are
5159 including in the link (i.e., DEF_REGULAR is set). At
5160 this point we have not seen all the input files, so it is
5161 possible that DEF_REGULAR is not set now but will be set
5162 later (it is never cleared). In case of a weak definition,
5163 DEF_REGULAR may be cleared later by a strong definition in
5164 a shared library. We account for that possibility below by
f4656909 5165 storing information in the dyn_relocs field of the hash
65f38f15
AM
5166 table entry. A similar situation occurs when creating
5167 shared libraries and symbol visibility changes render the
5168 symbol local.
5169
5170 If on the other hand, we are creating an executable, we
5171 may need to keep relocations for symbols satisfied by a
5172 dynamic library if we manage to avoid copy relocs for the
5173 symbol. */
411e1bfb 5174 dodyn:
ec73ddcd
AM
5175 if ((h != NULL
5176 && (h->root.type == bfd_link_hash_defweak
5177 || !h->def_regular))
5178 || (h != NULL
5179 && !bfd_link_executable (info)
5180 && !SYMBOLIC_BIND (info, h))
5181 || (bfd_link_pic (info)
5182 && must_be_dyn_reloc (info, r_type))
0e1862bb 5183 || (!bfd_link_pic (info)
25f23106 5184 && ifunc != NULL))
5bd4f169 5185 {
65f38f15
AM
5186 /* We must copy these reloc types into the output file.
5187 Create a reloc section in dynobj and make room for
5188 this reloc. */
5bd4f169
AM
5189 if (sreloc == NULL)
5190 {
83bac4b0
NC
5191 sreloc = _bfd_elf_make_dynamic_reloc_section
5192 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
65f38f15 5193
5bd4f169 5194 if (sreloc == NULL)
83bac4b0 5195 return FALSE;
5bd4f169
AM
5196 }
5197
65f38f15
AM
5198 /* If this is a global symbol, we count the number of
5199 relocations we need for this symbol. */
5200 if (h != NULL)
5201 {
19e08130
AM
5202 struct elf_dyn_relocs *p;
5203 struct elf_dyn_relocs **head;
5204
190eb1dd 5205 head = &h->dyn_relocs;
19e08130
AM
5206 p = *head;
5207 if (p == NULL || p->sec != sec)
5208 {
5209 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5210 if (p == NULL)
5211 return FALSE;
5212 p->next = *head;
5213 *head = p;
5214 p->sec = sec;
5215 p->count = 0;
5216 p->pc_count = 0;
5217 }
5218 p->count += 1;
5219 if (!must_be_dyn_reloc (info, r_type))
5220 p->pc_count += 1;
65f38f15
AM
5221 }
5222 else
5223 {
ec338859
AM
5224 /* Track dynamic relocs needed for local syms too.
5225 We really need local syms available to do this
5226 easily. Oh well. */
19e08130
AM
5227 struct ppc_dyn_relocs *p;
5228 struct ppc_dyn_relocs **head;
5229 bfd_boolean is_ifunc;
ec338859 5230 asection *s;
6edfbbad 5231 void *vpp;
87d72d41 5232 Elf_Internal_Sym *isym;
6edfbbad 5233
87d72d41
AM
5234 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
5235 abfd, r_symndx);
5236 if (isym == NULL)
b34976b6 5237 return FALSE;
ec338859 5238
87d72d41
AM
5239 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
5240 if (s == NULL)
5241 s = sec;
5242
6edfbbad 5243 vpp = &elf_section_data (s)->local_dynrel;
19e08130
AM
5244 head = (struct ppc_dyn_relocs **) vpp;
5245 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
5246 p = *head;
5247 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
5248 p = p->next;
5249 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
5250 {
5251 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
5252 if (p == NULL)
5253 return FALSE;
5254 p->next = *head;
5255 *head = p;
5256 p->sec = sec;
5257 p->ifunc = is_ifunc;
5258 p->count = 0;
5259 }
5260 p->count += 1;
ec338859 5261 }
65f38f15 5262 }
5bd4f169 5263 break;
65f38f15
AM
5264
5265 default:
96e0dda4 5266 break;
5bd4f169
AM
5267 }
5268 }
5269
b34976b6 5270 return TRUE;
5bd4f169
AM
5271}
5272
ee67d69a
AM
5273/* Merge backend specific data from an object file to the output
5274 object file when linking. */
5275
5276static bfd_boolean
50e03d47 5277ppc64_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
ee67d69a 5278{
50e03d47 5279 bfd *obfd = info->output_bfd;
ee67d69a
AM
5280 unsigned long iflags, oflags;
5281
5282 if ((ibfd->flags & BFD_LINKER_CREATED) != 0)
5283 return TRUE;
5284
5285 if (!is_ppc64_elf (ibfd) || !is_ppc64_elf (obfd))
5286 return TRUE;
5287
50e03d47 5288 if (!_bfd_generic_verify_endian_match (ibfd, info))
ee67d69a
AM
5289 return FALSE;
5290
5291 iflags = elf_elfheader (ibfd)->e_flags;
5292 oflags = elf_elfheader (obfd)->e_flags;
5293
f6c7c3e8 5294 if (iflags & ~EF_PPC64_ABI)
ee67d69a 5295 {
4eca0228 5296 _bfd_error_handler
695344c0 5297 /* xgettext:c-format */
871b3ab2 5298 (_("%pB uses unknown e_flags 0x%lx"), ibfd, iflags);
ee67d69a
AM
5299 bfd_set_error (bfd_error_bad_value);
5300 return FALSE;
5301 }
f6c7c3e8 5302 else if (iflags != oflags && iflags != 0)
ee67d69a 5303 {
4eca0228 5304 _bfd_error_handler
695344c0 5305 /* xgettext:c-format */
871b3ab2 5306 (_("%pB: ABI version %ld is not compatible with ABI version %ld output"),
ee67d69a
AM
5307 ibfd, iflags, oflags);
5308 bfd_set_error (bfd_error_bad_value);
5309 return FALSE;
5310 }
5311
4a91d0ba
AM
5312 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
5313 return FALSE;
005d79fd 5314
ee67d69a 5315 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 5316 return _bfd_elf_merge_object_attributes (ibfd, info);
ee67d69a
AM
5317}
5318
5319static bfd_boolean
5320ppc64_elf_print_private_bfd_data (bfd *abfd, void *ptr)
5321{
5322 /* Print normal ELF private data. */
5323 _bfd_elf_print_private_bfd_data (abfd, ptr);
5324
5325 if (elf_elfheader (abfd)->e_flags != 0)
5326 {
5327 FILE *file = ptr;
5328
ee67d69a
AM
5329 fprintf (file, _("private flags = 0x%lx:"),
5330 elf_elfheader (abfd)->e_flags);
5331
5332 if ((elf_elfheader (abfd)->e_flags & EF_PPC64_ABI) != 0)
5333 fprintf (file, _(" [abiv%ld]"),
5334 elf_elfheader (abfd)->e_flags & EF_PPC64_ABI);
5335 fputc ('\n', file);
5336 }
5337
5338 return TRUE;
5339}
5340
8387904d 5341/* OFFSET in OPD_SEC specifies a function descriptor. Return the address
b53dfeb2
AM
5342 of the code entry point, and its section, which must be in the same
5343 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
8387904d
AM
5344
5345static bfd_vma
5346opd_entry_value (asection *opd_sec,
5347 bfd_vma offset,
5348 asection **code_sec,
aef36ac1
AM
5349 bfd_vma *code_off,
5350 bfd_boolean in_code_sec)
8387904d
AM
5351{
5352 bfd *opd_bfd = opd_sec->owner;
8860955f 5353 Elf_Internal_Rela *relocs;
8387904d 5354 Elf_Internal_Rela *lo, *hi, *look;
645ea6a9 5355 bfd_vma val;
8387904d 5356
9f296da3
AM
5357 /* No relocs implies we are linking a --just-symbols object, or looking
5358 at a final linked executable with addr2line or somesuch. */
4b85d634
AM
5359 if (opd_sec->reloc_count == 0)
5360 {
729eabd5 5361 bfd_byte *contents = ppc64_elf_tdata (opd_bfd)->opd.contents;
3b36f7e6 5362
729eabd5
AM
5363 if (contents == NULL)
5364 {
5365 if (!bfd_malloc_and_get_section (opd_bfd, opd_sec, &contents))
5366 return (bfd_vma) -1;
5367 ppc64_elf_tdata (opd_bfd)->opd.contents = contents;
5368 }
ee1e4ede 5369
dbb3fbbb 5370 /* PR 17512: file: 64b9dfbb. */
451dfd38 5371 if (offset + 7 >= opd_sec->size || offset + 7 < offset)
dbb3fbbb
NC
5372 return (bfd_vma) -1;
5373
729eabd5 5374 val = bfd_get_64 (opd_bfd, contents + offset);
aef36ac1
AM
5375 if (code_sec != NULL)
5376 {
5377 asection *sec, *likely = NULL;
ee1e4ede 5378
aef36ac1 5379 if (in_code_sec)
4b85d634 5380 {
aef36ac1
AM
5381 sec = *code_sec;
5382 if (sec->vma <= val
5383 && val < sec->vma + sec->size)
5384 likely = sec;
5385 else
5386 val = -1;
5387 }
5388 else
5389 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
5390 if (sec->vma <= val
5391 && (sec->flags & SEC_LOAD) != 0
5392 && (sec->flags & SEC_ALLOC) != 0)
5393 likely = sec;
5394 if (likely != NULL)
5395 {
5396 *code_sec = likely;
5397 if (code_off != NULL)
5398 *code_off = val - likely->vma;
4b85d634
AM
5399 }
5400 }
aef36ac1 5401 return val;
4b85d634
AM
5402 }
5403
0c8d6e5c 5404 BFD_ASSERT (is_ppc64_elf (opd_bfd));
0ffa91dd 5405
729eabd5 5406 relocs = ppc64_elf_tdata (opd_bfd)->opd.relocs;
8860955f
AM
5407 if (relocs == NULL)
5408 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
877a8638
NC
5409 /* PR 17512: file: df8e1fd6. */
5410 if (relocs == NULL)
5411 return (bfd_vma) -1;
645ea6a9 5412
8387904d 5413 /* Go find the opd reloc at the sym address. */
8860955f 5414 lo = relocs;
8387904d 5415 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
645ea6a9 5416 val = (bfd_vma) -1;
8387904d
AM
5417 while (lo < hi)
5418 {
5419 look = lo + (hi - lo) / 2;
5420 if (look->r_offset < offset)
5421 lo = look + 1;
5422 else if (look->r_offset > offset)
5423 hi = look;
5424 else
5425 {
0ffa91dd
NC
5426 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (opd_bfd);
5427
8387904d
AM
5428 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5429 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5430 {
5431 unsigned long symndx = ELF64_R_SYM (look->r_info);
b53dfeb2 5432 asection *sec = NULL;
8387904d 5433
b53dfeb2
AM
5434 if (symndx >= symtab_hdr->sh_info
5435 && elf_sym_hashes (opd_bfd) != NULL)
8387904d
AM
5436 {
5437 struct elf_link_hash_entry **sym_hashes;
5438 struct elf_link_hash_entry *rh;
5439
5440 sym_hashes = elf_sym_hashes (opd_bfd);
5441 rh = sym_hashes[symndx - symtab_hdr->sh_info];
128205bb
AM
5442 if (rh != NULL)
5443 {
5444 rh = elf_follow_link (rh);
bb854a36
AM
5445 if (rh->root.type != bfd_link_hash_defined
5446 && rh->root.type != bfd_link_hash_defweak)
5447 break;
5448 if (rh->root.u.def.section->owner == opd_bfd)
b53dfeb2 5449 {
bb854a36
AM
5450 val = rh->root.u.def.value;
5451 sec = rh->root.u.def.section;
b53dfeb2
AM
5452 }
5453 }
5454 }
5455
5456 if (sec == NULL)
5457 {
5458 Elf_Internal_Sym *sym;
5459
5460 if (symndx < symtab_hdr->sh_info)
5461 {
5462 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5463 if (sym == NULL)
5464 {
5465 size_t symcnt = symtab_hdr->sh_info;
5466 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5467 symcnt, 0,
5468 NULL, NULL, NULL);
5469 if (sym == NULL)
5470 break;
5471 symtab_hdr->contents = (bfd_byte *) sym;
5472 }
5473 sym += symndx;
128205bb
AM
5474 }
5475 else
5476 {
b53dfeb2
AM
5477 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5478 1, symndx,
5479 NULL, NULL, NULL);
128205bb
AM
5480 if (sym == NULL)
5481 break;
128205bb 5482 }
b53dfeb2
AM
5483 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5484 if (sec == NULL)
5485 break;
5486 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5487 val = sym->st_value;
8387904d 5488 }
b53dfeb2 5489
8387904d
AM
5490 val += look->r_addend;
5491 if (code_off != NULL)
5492 *code_off = val;
5493 if (code_sec != NULL)
aef36ac1
AM
5494 {
5495 if (in_code_sec && *code_sec != sec)
5496 return -1;
5497 else
5498 *code_sec = sec;
5499 }
b53dfeb2 5500 if (sec->output_section != NULL)
8387904d 5501 val += sec->output_section->vma + sec->output_offset;
8387904d
AM
5502 }
5503 break;
5504 }
5505 }
645ea6a9 5506
645ea6a9 5507 return val;
8387904d
AM
5508}
5509
aef36ac1
AM
5510/* If the ELF symbol SYM might be a function in SEC, return the
5511 function size and set *CODE_OFF to the function's entry point,
5512 otherwise return zero. */
9f296da3 5513
aef36ac1
AM
5514static bfd_size_type
5515ppc64_elf_maybe_function_sym (const asymbol *sym, asection *sec,
5516 bfd_vma *code_off)
9f296da3 5517{
aef36ac1
AM
5518 bfd_size_type size;
5519
5520 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
5521 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0)
5522 return 0;
5523
5524 size = 0;
5525 if (!(sym->flags & BSF_SYNTHETIC))
5526 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
5527
5528 if (strcmp (sym->section->name, ".opd") == 0)
9f296da3 5529 {
b07bca4e
AM
5530 struct _opd_sec_data *opd = get_opd_info (sym->section);
5531 bfd_vma symval = sym->value;
5532
5533 if (opd != NULL
5534 && opd->adjust != NULL
5535 && elf_section_data (sym->section)->relocs != NULL)
5536 {
5537 /* opd_entry_value will use cached relocs that have been
5538 adjusted, but with raw symbols. That means both local
5539 and global symbols need adjusting. */
5540 long adjust = opd->adjust[OPD_NDX (symval)];
5541 if (adjust == -1)
5542 return 0;
5543 symval += adjust;
5544 }
5545
5546 if (opd_entry_value (sym->section, symval,
aef36ac1
AM
5547 &sec, code_off, TRUE) == (bfd_vma) -1)
5548 return 0;
5549 /* An old ABI binary with dot-syms has a size of 24 on the .opd
5550 symbol. This size has nothing to do with the code size of the
5551 function, which is what we're supposed to return, but the
5552 code size isn't available without looking up the dot-sym.
5553 However, doing that would be a waste of time particularly
5554 since elf_find_function will look at the dot-sym anyway.
5555 Now, elf_find_function will keep the largest size of any
5556 function sym found at the code address of interest, so return
5557 1 here to avoid it incorrectly caching a larger function size
5558 for a small function. This does mean we return the wrong
5559 size for a new-ABI function of size 24, but all that does is
5560 disable caching for such functions. */
5561 if (size == 24)
5562 size = 1;
9f296da3 5563 }
aef36ac1
AM
5564 else
5565 {
5566 if (sym->section != sec)
5567 return 0;
5568 *code_off = sym->value;
5569 }
5570 if (size == 0)
5571 size = 1;
5572 return size;
9f296da3
AM
5573}
5574
f378ab09
AM
5575/* Return true if symbol is a strong function defined in an ELFv2
5576 object with st_other localentry bits of zero, ie. its local entry
5577 point coincides with its global entry point. */
5578
5579static bfd_boolean
5580is_elfv2_localentry0 (struct elf_link_hash_entry *h)
5581{
5582 return (h != NULL
5583 && h->type == STT_FUNC
5584 && h->root.type == bfd_link_hash_defined
5585 && (STO_PPC64_LOCAL_MASK & h->other) == 0
ed7007c1 5586 && !ppc_elf_hash_entry (h)->non_zero_localentry
f378ab09
AM
5587 && is_ppc64_elf (h->root.u.def.section->owner)
5588 && abiversion (h->root.u.def.section->owner) >= 2);
5589}
5590
854b41e7
AM
5591/* Return true if symbol is defined in a regular object file. */
5592
5593static bfd_boolean
5594is_static_defined (struct elf_link_hash_entry *h)
5595{
5596 return ((h->root.type == bfd_link_hash_defined
5597 || h->root.type == bfd_link_hash_defweak)
5598 && h->root.u.def.section != NULL
5599 && h->root.u.def.section->output_section != NULL);
5600}
5601
b31867b6
AM
5602/* If FDH is a function descriptor symbol, return the associated code
5603 entry symbol if it is defined. Return NULL otherwise. */
5604
5605static struct ppc_link_hash_entry *
5606defined_code_entry (struct ppc_link_hash_entry *fdh)
5607{
5608 if (fdh->is_func_descriptor)
5609 {
5610 struct ppc_link_hash_entry *fh = ppc_follow_link (fdh->oh);
5611 if (fh->elf.root.type == bfd_link_hash_defined
5612 || fh->elf.root.type == bfd_link_hash_defweak)
5613 return fh;
5614 }
5615 return NULL;
5616}
5617
5618/* If FH is a function code entry symbol, return the associated
5619 function descriptor symbol if it is defined. Return NULL otherwise. */
5620
5621static struct ppc_link_hash_entry *
5622defined_func_desc (struct ppc_link_hash_entry *fh)
5623{
5624 if (fh->oh != NULL
5625 && fh->oh->is_func_descriptor)
5626 {
5627 struct ppc_link_hash_entry *fdh = ppc_follow_link (fh->oh);
5628 if (fdh->elf.root.type == bfd_link_hash_defined
5629 || fdh->elf.root.type == bfd_link_hash_defweak)
5630 return fdh;
5631 }
5632 return NULL;
5633}
5634
ed7007c1
AM
5635/* Given H is a symbol that satisfies is_static_defined, return the
5636 value in the output file. */
5637
5638static bfd_vma
5639defined_sym_val (struct elf_link_hash_entry *h)
5640{
5641 return (h->root.u.def.section->output_section->vma
5642 + h->root.u.def.section->output_offset
5643 + h->root.u.def.value);
5644}
5645
5646/* Return true if H matches __tls_get_addr or one of its variants. */
5647
5648static bfd_boolean
5649is_tls_get_addr (struct elf_link_hash_entry *h,
5650 struct ppc_link_hash_table *htab)
5651{
9e7028aa
AM
5652 return (h == &htab->tls_get_addr_fd->elf || h == &htab->tga_desc_fd->elf
5653 || h == &htab->tls_get_addr->elf || h == &htab->tga_desc->elf);
ed7007c1
AM
5654}
5655
8c5b4e52
AM
5656static bfd_boolean func_desc_adjust (struct elf_link_hash_entry *, void *);
5657
5658/* Garbage collect sections, after first dealing with dot-symbols. */
5659
5660static bfd_boolean
5661ppc64_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
5662{
5663 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5664
5665 if (htab != NULL && htab->need_func_desc_adj)
5666 {
5667 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5668 htab->need_func_desc_adj = 0;
5669 }
5670 return bfd_elf_gc_sections (abfd, info);
5671}
5672
74f0fb50
AM
5673/* Mark all our entry sym sections, both opd and code section. */
5674
5675static void
5676ppc64_elf_gc_keep (struct bfd_link_info *info)
5677{
5678 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5679 struct bfd_sym_chain *sym;
5680
4dfe6ac6
NC
5681 if (htab == NULL)
5682 return;
5683
74f0fb50
AM
5684 for (sym = info->gc_sym_list; sym != NULL; sym = sym->next)
5685 {
b31867b6 5686 struct ppc_link_hash_entry *eh, *fh;
74f0fb50
AM
5687 asection *sec;
5688
ed7007c1
AM
5689 eh = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym->name,
5690 FALSE, FALSE, TRUE));
74f0fb50
AM
5691 if (eh == NULL)
5692 continue;
5693 if (eh->elf.root.type != bfd_link_hash_defined
5694 && eh->elf.root.type != bfd_link_hash_defweak)
5695 continue;
5696
b31867b6
AM
5697 fh = defined_code_entry (eh);
5698 if (fh != NULL)
74f0fb50 5699 {
b31867b6 5700 sec = fh->elf.root.u.def.section;
74f0fb50
AM
5701 sec->flags |= SEC_KEEP;
5702 }
5703 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5704 && opd_entry_value (eh->elf.root.u.def.section,
5705 eh->elf.root.u.def.value,
aef36ac1 5706 &sec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50
AM
5707 sec->flags |= SEC_KEEP;
5708
5709 sec = eh->elf.root.u.def.section;
5710 sec->flags |= SEC_KEEP;
5711 }
5712}
5713
64d03ab5
AM
5714/* Mark sections containing dynamically referenced symbols. When
5715 building shared libraries, we must assume that any visible symbol is
5716 referenced. */
5717
5718static bfd_boolean
5719ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5720{
5721 struct bfd_link_info *info = (struct bfd_link_info *) inf;
ed7007c1 5722 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
b31867b6 5723 struct ppc_link_hash_entry *fdh;
b407645f 5724 struct bfd_elf_dynamic_list *d = info->dynamic_list;
64d03ab5 5725
64d03ab5 5726 /* Dynamic linking info is on the func descriptor sym. */
b31867b6
AM
5727 fdh = defined_func_desc (eh);
5728 if (fdh != NULL)
5729 eh = fdh;
64d03ab5
AM
5730
5731 if ((eh->elf.root.type == bfd_link_hash_defined
5732 || eh->elf.root.type == bfd_link_hash_defweak)
87e79a65 5733 && ((eh->elf.ref_dynamic && !eh->elf.forced_local)
1c9177d9 5734 || ((eh->elf.def_regular || ELF_COMMON_DEF_P (&eh->elf))
64d03ab5 5735 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
4c58e0d8 5736 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN
0e1862bb 5737 && (!bfd_link_executable (info)
e278ae05 5738 || info->gc_keep_exported
b407645f
AM
5739 || info->export_dynamic
5740 || (eh->elf.dynamic
5741 && d != NULL
2cdcc330
AM
5742 && (*d->match) (&d->head, NULL,
5743 eh->elf.root.root.string)))
e278ae05 5744 && (eh->elf.versioned >= versioned
4c58e0d8
AM
5745 || !bfd_hide_sym_by_version (info->version_info,
5746 eh->elf.root.root.string)))))
64d03ab5
AM
5747 {
5748 asection *code_sec;
b31867b6 5749 struct ppc_link_hash_entry *fh;
64d03ab5
AM
5750
5751 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5752
5753 /* Function descriptor syms cause the associated
5754 function code sym section to be marked. */
b31867b6
AM
5755 fh = defined_code_entry (eh);
5756 if (fh != NULL)
5757 {
5758 code_sec = fh->elf.root.u.def.section;
5759 code_sec->flags |= SEC_KEEP;
5760 }
64d03ab5
AM
5761 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5762 && opd_entry_value (eh->elf.root.u.def.section,
5763 eh->elf.root.u.def.value,
aef36ac1 5764 &code_sec, NULL, FALSE) != (bfd_vma) -1)
64d03ab5
AM
5765 code_sec->flags |= SEC_KEEP;
5766 }
5767
5768 return TRUE;
5769}
5770
5bd4f169
AM
5771/* Return the section that should be marked against GC for a given
5772 relocation. */
5773
5774static asection *
4ce794b7 5775ppc64_elf_gc_mark_hook (asection *sec,
fb34365b 5776 struct bfd_link_info *info,
4ce794b7
AM
5777 Elf_Internal_Rela *rel,
5778 struct elf_link_hash_entry *h,
5779 Elf_Internal_Sym *sym)
5bd4f169 5780{
ccfa59ea
AM
5781 asection *rsec;
5782
ccfa59ea
AM
5783 /* Syms return NULL if we're marking .opd, so we avoid marking all
5784 function sections, as all functions are referenced in .opd. */
5785 rsec = NULL;
5786 if (get_opd_info (sec) != NULL)
5787 return rsec;
1e2f5b6e 5788
5bd4f169
AM
5789 if (h != NULL)
5790 {
04c9666a 5791 enum elf_ppc64_reloc_type r_type;
b31867b6 5792 struct ppc_link_hash_entry *eh, *fh, *fdh;
a33d1f77 5793
4ce794b7 5794 r_type = ELF64_R_TYPE (rel->r_info);
a33d1f77 5795 switch (r_type)
5bd4f169
AM
5796 {
5797 case R_PPC64_GNU_VTINHERIT:
5798 case R_PPC64_GNU_VTENTRY:
5799 break;
5800
5801 default:
5802 switch (h->root.type)
5803 {
5804 case bfd_link_hash_defined:
5805 case bfd_link_hash_defweak:
ed7007c1 5806 eh = ppc_elf_hash_entry (h);
b31867b6
AM
5807 fdh = defined_func_desc (eh);
5808 if (fdh != NULL)
8c5b4e52
AM
5809 {
5810 /* -mcall-aixdesc code references the dot-symbol on
5811 a call reloc. Mark the function descriptor too
5812 against garbage collection. */
5813 fdh->elf.mark = 1;
60d67dc8
AM
5814 if (fdh->elf.is_weakalias)
5815 weakdef (&fdh->elf)->mark = 1;
8c5b4e52
AM
5816 eh = fdh;
5817 }
1e2f5b6e
AM
5818
5819 /* Function descriptor syms cause the associated
5820 function code sym section to be marked. */
b31867b6
AM
5821 fh = defined_code_entry (eh);
5822 if (fh != NULL)
ccfa59ea
AM
5823 {
5824 /* They also mark their opd section. */
74f0fb50 5825 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5826
b31867b6 5827 rsec = fh->elf.root.u.def.section;
ccfa59ea 5828 }
8387904d
AM
5829 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5830 && opd_entry_value (eh->elf.root.u.def.section,
5831 eh->elf.root.u.def.value,
aef36ac1 5832 &rsec, NULL, FALSE) != (bfd_vma) -1)
74f0fb50 5833 eh->elf.root.u.def.section->gc_mark = 1;
ccfa59ea 5834 else
1e2f5b6e
AM
5835 rsec = h->root.u.def.section;
5836 break;
5bd4f169
AM
5837
5838 case bfd_link_hash_common:
1e2f5b6e
AM
5839 rsec = h->root.u.c.p->section;
5840 break;
5bd4f169
AM
5841
5842 default:
fb34365b 5843 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5bd4f169
AM
5844 }
5845 }
5846 }
5847 else
5848 {
74f0fb50 5849 struct _opd_sec_data *opd;
1e2f5b6e
AM
5850
5851 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
74f0fb50
AM
5852 opd = get_opd_info (rsec);
5853 if (opd != NULL && opd->func_sec != NULL)
ccfa59ea 5854 {
74f0fb50 5855 rsec->gc_mark = 1;
ccfa59ea 5856
51aecdc5 5857 rsec = opd->func_sec[OPD_NDX (sym->st_value + rel->r_addend)];
ccfa59ea 5858 }
5bd4f169
AM
5859 }
5860
1e2f5b6e 5861 return rsec;
5bd4f169
AM
5862}
5863
deb0e272
AM
5864/* The maximum size of .sfpr. */
5865#define SFPR_MAX (218*4)
5866
5867struct sfpr_def_parms
5868{
699733f6
AM
5869 const char name[12];
5870 unsigned char lo, hi;
2cdcc330
AM
5871 bfd_byte *(*write_ent) (bfd *, bfd_byte *, int);
5872 bfd_byte *(*write_tail) (bfd *, bfd_byte *, int);
deb0e272
AM
5873};
5874
a4b6fadd
AM
5875/* Auto-generate _save*, _rest* functions in .sfpr.
5876 If STUB_SEC is non-null, define alias symbols in STUB_SEC
5877 instead. */
deb0e272 5878
4dfe6ac6 5879static bfd_boolean
a4b6fadd
AM
5880sfpr_define (struct bfd_link_info *info,
5881 const struct sfpr_def_parms *parm,
5882 asection *stub_sec)
deb0e272
AM
5883{
5884 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5885 unsigned int i;
5886 size_t len = strlen (parm->name);
5887 bfd_boolean writing = FALSE;
699733f6 5888 char sym[16];
deb0e272 5889
4dfe6ac6
NC
5890 if (htab == NULL)
5891 return FALSE;
5892
deb0e272
AM
5893 memcpy (sym, parm->name, len);
5894 sym[len + 2] = 0;
5895
5896 for (i = parm->lo; i <= parm->hi; i++)
5897 {
a4b6fadd 5898 struct ppc_link_hash_entry *h;
deb0e272
AM
5899
5900 sym[len + 0] = i / 10 + '0';
5901 sym[len + 1] = i % 10 + '0';
ed7007c1
AM
5902 h = ppc_elf_hash_entry (elf_link_hash_lookup (&htab->elf, sym,
5903 writing, TRUE, TRUE));
a4b6fadd 5904 if (stub_sec != NULL)
deb0e272 5905 {
a4b6fadd
AM
5906 if (h != NULL
5907 && h->elf.root.type == bfd_link_hash_defined
5908 && h->elf.root.u.def.section == htab->sfpr)
5909 {
5910 struct elf_link_hash_entry *s;
5911 char buf[32];
5912 sprintf (buf, "%08x.%s", stub_sec->id & 0xffffffff, sym);
5913 s = elf_link_hash_lookup (&htab->elf, buf, TRUE, TRUE, FALSE);
5914 if (s == NULL)
5915 return FALSE;
779f2ae7 5916 if (s->root.type == bfd_link_hash_new)
a4b6fadd
AM
5917 {
5918 s->root.type = bfd_link_hash_defined;
5919 s->root.u.def.section = stub_sec;
7dda8d3c 5920 s->root.u.def.value = (stub_sec->size - htab->sfpr->size
a4b6fadd
AM
5921 + h->elf.root.u.def.value);
5922 s->ref_regular = 1;
5923 s->def_regular = 1;
5924 s->ref_regular_nonweak = 1;
5925 s->forced_local = 1;
5926 s->non_elf = 0;
5927 s->root.linker_def = 1;
5928 }
5929 }
5930 continue;
5931 }
5932 if (h != NULL)
5933 {
5934 h->save_res = 1;
5935 if (!h->elf.def_regular)
deb0e272 5936 {
a4b6fadd
AM
5937 h->elf.root.type = bfd_link_hash_defined;
5938 h->elf.root.u.def.section = htab->sfpr;
5939 h->elf.root.u.def.value = htab->sfpr->size;
5940 h->elf.type = STT_FUNC;
5941 h->elf.def_regular = 1;
b32547cd 5942 h->elf.non_elf = 0;
a4b6fadd
AM
5943 _bfd_elf_link_hash_hide_symbol (info, &h->elf, TRUE);
5944 writing = TRUE;
deb0e272 5945 if (htab->sfpr->contents == NULL)
a4b6fadd 5946 {
2cdcc330
AM
5947 htab->sfpr->contents
5948 = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
a4b6fadd
AM
5949 if (htab->sfpr->contents == NULL)
5950 return FALSE;
5951 }
deb0e272
AM
5952 }
5953 }
5954 if (writing)
5955 {
5956 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5957 if (i != parm->hi)
5958 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5959 else
5960 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5961 htab->sfpr->size = p - htab->sfpr->contents;
5962 }
5963 }
5964
5965 return TRUE;
5966}
5967
5968static bfd_byte *
5969savegpr0 (bfd *abfd, bfd_byte *p, int r)
5970{
5971 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5972 return p + 4;
5973}
5974
5975static bfd_byte *
5976savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5977{
5978 p = savegpr0 (abfd, p, r);
a078d95a 5979 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
5980 p = p + 4;
5981 bfd_put_32 (abfd, BLR, p);
5982 return p + 4;
5983}
5984
5985static bfd_byte *
5986restgpr0 (bfd *abfd, bfd_byte *p, int r)
5987{
5988 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5989 return p + 4;
5990}
5991
5992static bfd_byte *
5993restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5994{
a078d95a 5995 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
5996 p = p + 4;
5997 p = restgpr0 (abfd, p, r);
5998 bfd_put_32 (abfd, MTLR_R0, p);
5999 p = p + 4;
6000 if (r == 29)
6001 {
6002 p = restgpr0 (abfd, p, 30);
6003 p = restgpr0 (abfd, p, 31);
6004 }
6005 bfd_put_32 (abfd, BLR, p);
6006 return p + 4;
6007}
6008
6009static bfd_byte *
6010savegpr1 (bfd *abfd, bfd_byte *p, int r)
6011{
6012 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6013 return p + 4;
6014}
6015
6016static bfd_byte *
6017savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
6018{
6019 p = savegpr1 (abfd, p, r);
6020 bfd_put_32 (abfd, BLR, p);
6021 return p + 4;
6022}
6023
6024static bfd_byte *
6025restgpr1 (bfd *abfd, bfd_byte *p, int r)
6026{
6027 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6028 return p + 4;
6029}
6030
6031static bfd_byte *
6032restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
6033{
6034 p = restgpr1 (abfd, p, r);
6035 bfd_put_32 (abfd, BLR, p);
6036 return p + 4;
6037}
6038
6039static bfd_byte *
6040savefpr (bfd *abfd, bfd_byte *p, int r)
6041{
6042 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6043 return p + 4;
6044}
6045
6046static bfd_byte *
6047savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
6048{
6049 p = savefpr (abfd, p, r);
a078d95a 6050 bfd_put_32 (abfd, STD_R0_0R1 + STK_LR, p);
deb0e272
AM
6051 p = p + 4;
6052 bfd_put_32 (abfd, BLR, p);
6053 return p + 4;
6054}
6055
6056static bfd_byte *
6057restfpr (bfd *abfd, bfd_byte *p, int r)
6058{
6059 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
6060 return p + 4;
6061}
6062
6063static bfd_byte *
6064restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
6065{
a078d95a 6066 bfd_put_32 (abfd, LD_R0_0R1 + STK_LR, p);
deb0e272
AM
6067 p = p + 4;
6068 p = restfpr (abfd, p, r);
6069 bfd_put_32 (abfd, MTLR_R0, p);
6070 p = p + 4;
6071 if (r == 29)
6072 {
6073 p = restfpr (abfd, p, 30);
6074 p = restfpr (abfd, p, 31);
6075 }
6076 bfd_put_32 (abfd, BLR, p);
6077 return p + 4;
6078}
6079
6080static bfd_byte *
6081savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
6082{
6083 p = savefpr (abfd, p, r);
6084 bfd_put_32 (abfd, BLR, p);
6085 return p + 4;
6086}
6087
6088static bfd_byte *
6089restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
6090{
6091 p = restfpr (abfd, p, r);
6092 bfd_put_32 (abfd, BLR, p);
6093 return p + 4;
6094}
6095
6096static bfd_byte *
6097savevr (bfd *abfd, bfd_byte *p, int r)
6098{
6099 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6100 p = p + 4;
6101 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
6102 return p + 4;
6103}
6104
6105static bfd_byte *
6106savevr_tail (bfd *abfd, bfd_byte *p, int r)
6107{
6108 p = savevr (abfd, p, r);
6109 bfd_put_32 (abfd, BLR, p);
6110 return p + 4;
6111}
6112
6113static bfd_byte *
6114restvr (bfd *abfd, bfd_byte *p, int r)
6115{
6116 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
6117 p = p + 4;
6118 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
6119 return p + 4;
6120}
6121
6122static bfd_byte *
6123restvr_tail (bfd *abfd, bfd_byte *p, int r)
6124{
6125 p = restvr (abfd, p, r);
6126 bfd_put_32 (abfd, BLR, p);
6127 return p + 4;
6128}
6129
9e7028aa
AM
6130#define STDU_R1_0R1 0xf8210001
6131#define ADDI_R1_R1 0x38210000
6132
6133/* Emit prologue of wrapper preserving regs around a call to
6134 __tls_get_addr_opt. */
6135
6136static bfd_byte *
6137tls_get_addr_prologue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6138{
6139 unsigned int i;
6140
6141 bfd_put_32 (obfd, MFLR_R0, p);
6142 p += 4;
6143 bfd_put_32 (obfd, STD_R0_0R1 + 16, p);
6144 p += 4;
6145
6146 if (htab->opd_abi)
6147 {
6148 for (i = 4; i < 12; i++)
6149 {
6150 bfd_put_32 (obfd,
6151 STD_R0_0R1 | i << 21 | (-(13 - i) * 8 & 0xffff), p);
6152 p += 4;
6153 }
6154 bfd_put_32 (obfd, STDU_R1_0R1 | (-128 & 0xffff), p);
6155 p += 4;
6156 }
6157 else
6158 {
6159 for (i = 4; i < 12; i++)
6160 {
6161 bfd_put_32 (obfd,
6162 STD_R0_0R1 | i << 21 | (-(12 - i) * 8 & 0xffff), p);
6163 p += 4;
6164 }
6165 bfd_put_32 (obfd, STDU_R1_0R1 | (-96 & 0xffff), p);
6166 p += 4;
6167 }
6168 return p;
6169}
6170
6171/* Emit epilogue of wrapper preserving regs around a call to
6172 __tls_get_addr_opt. */
6173
6174static bfd_byte *
6175tls_get_addr_epilogue (bfd *obfd, bfd_byte *p, struct ppc_link_hash_table *htab)
6176{
6177 unsigned int i;
6178
6179 if (htab->opd_abi)
6180 {
6181 for (i = 4; i < 12; i++)
6182 {
6183 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (128 - (13 - i) * 8), p);
6184 p += 4;
6185 }
6186 bfd_put_32 (obfd, ADDI_R1_R1 | 128, p);
6187 p += 4;
6188 }
6189 else
6190 {
6191 for (i = 4; i < 12; i++)
6192 {
6193 bfd_put_32 (obfd, LD_R0_0R1 | i << 21 | (96 - (12 - i) * 8), p);
6194 p += 4;
6195 }
6196 bfd_put_32 (obfd, ADDI_R1_R1 | 96, p);
6197 p += 4;
6198 }
6199 bfd_put_32 (obfd, LD_R0_0R1 | 16, p);
6200 p += 4;
6201 bfd_put_32 (obfd, MTLR_R0, p);
6202 p += 4;
6203 bfd_put_32 (obfd, BLR, p);
6204 p += 4;
6205 return p;
6206}
6207
e86ce104
AM
6208/* Called via elf_link_hash_traverse to transfer dynamic linking
6209 information on function code symbol entries to their corresponding
6210 function descriptor symbol entries. */
deb0e272 6211
b34976b6 6212static bfd_boolean
4ce794b7 6213func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5bd4f169 6214{
e86ce104 6215 struct bfd_link_info *info;
65f38f15 6216 struct ppc_link_hash_table *htab;
50bc7936
AM
6217 struct ppc_link_hash_entry *fh;
6218 struct ppc_link_hash_entry *fdh;
6219 bfd_boolean force_local;
5bd4f169 6220
ed7007c1 6221 fh = ppc_elf_hash_entry (h);
50bc7936 6222 if (fh->elf.root.type == bfd_link_hash_indirect)
b34976b6 6223 return TRUE;
e86ce104 6224
8c5b4e52
AM
6225 if (!fh->is_func)
6226 return TRUE;
6227
6228 if (fh->elf.root.root.string[0] != '.'
6229 || fh->elf.root.root.string[1] == '\0')
6230 return TRUE;
6231
4ce794b7 6232 info = inf;
65f38f15 6233 htab = ppc_hash_table (info);
4dfe6ac6
NC
6234 if (htab == NULL)
6235 return FALSE;
5bd4f169 6236
8c5b4e52
AM
6237 /* Find the corresponding function descriptor symbol. */
6238 fdh = lookup_fdh (fh, htab);
6239
c09bdfe5
AM
6240 /* Resolve undefined references to dot-symbols as the value
6241 in the function descriptor, if we have one in a regular object.
6242 This is to satisfy cases like ".quad .foo". Calls to functions
6243 in dynamic objects are handled elsewhere. */
8c5b4e52
AM
6244 if ((fh->elf.root.type == bfd_link_hash_undefined
6245 || fh->elf.root.type == bfd_link_hash_undefweak)
6246 && (fdh->elf.root.type == bfd_link_hash_defined
6247 || fdh->elf.root.type == bfd_link_hash_defweak)
b31867b6
AM
6248 && get_opd_info (fdh->elf.root.u.def.section) != NULL
6249 && opd_entry_value (fdh->elf.root.u.def.section,
6250 fdh->elf.root.u.def.value,
c09bdfe5 6251 &fh->elf.root.u.def.section,
aef36ac1 6252 &fh->elf.root.u.def.value, FALSE) != (bfd_vma) -1)
c09bdfe5 6253 {
b31867b6 6254 fh->elf.root.type = fdh->elf.root.type;
f5385ebf 6255 fh->elf.forced_local = 1;
b31867b6
AM
6256 fh->elf.def_regular = fdh->elf.def_regular;
6257 fh->elf.def_dynamic = fdh->elf.def_dynamic;
c09bdfe5
AM
6258 }
6259
8c5b4e52
AM
6260 if (!fh->elf.dynamic)
6261 {
6262 struct plt_entry *ent;
5bd4f169 6263
8c5b4e52
AM
6264 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
6265 if (ent->plt.refcount > 0)
6266 break;
6267 if (ent == NULL)
6268 return TRUE;
6269 }
5bd4f169 6270
8c5b4e52 6271 /* Create a descriptor as undefined if necessary. */
50bc7936 6272 if (fdh == NULL
0e1862bb 6273 && !bfd_link_executable (info)
50bc7936
AM
6274 && (fh->elf.root.type == bfd_link_hash_undefined
6275 || fh->elf.root.type == bfd_link_hash_undefweak))
6276 {
908b32fc 6277 fdh = make_fdh (info, fh);
bb700d78
AM
6278 if (fdh == NULL)
6279 return FALSE;
50bc7936 6280 }
648cca2c 6281
8c5b4e52 6282 /* We can't support overriding of symbols on a fake descriptor. */
908b32fc
AM
6283 if (fdh != NULL
6284 && fdh->fake
8c5b4e52
AM
6285 && (fh->elf.root.type == bfd_link_hash_defined
6286 || fh->elf.root.type == bfd_link_hash_defweak))
6287 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
908b32fc 6288
8c5b4e52
AM
6289 /* Transfer dynamic linking information to the function descriptor. */
6290 if (fdh != NULL)
6291 {
f5385ebf
AM
6292 fdh->elf.ref_regular |= fh->elf.ref_regular;
6293 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
6294 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
6295 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
8c5b4e52
AM
6296 fdh->elf.dynamic |= fh->elf.dynamic;
6297 fdh->elf.needs_plt |= (fh->elf.needs_plt
6298 || fh->elf.type == STT_FUNC
6299 || fh->elf.type == STT_GNU_IFUNC);
6300 move_plt_plist (fh, fdh);
6301
6302 if (!fdh->elf.forced_local
6303 && fh->elf.dynindx != -1)
6304 if (!bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
6305 return FALSE;
e86ce104
AM
6306 }
6307
50bc7936
AM
6308 /* Now that the info is on the function descriptor, clear the
6309 function code sym info. Any function code syms for which we
6310 don't have a definition in a regular file, we force local.
6311 This prevents a shared library from exporting syms that have
6312 been imported from another library. Function code syms that
6313 are really in the library we must leave global to prevent the
6314 linker dragging in a definition from a static library. */
93f3fa99
AM
6315 force_local = (!fh->elf.def_regular
6316 || fdh == NULL
6317 || !fdh->elf.def_regular
6318 || fdh->elf.forced_local);
50bc7936
AM
6319 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
6320
b34976b6 6321 return TRUE;
e86ce104 6322}
40b8271b 6323
a4b6fadd
AM
6324static const struct sfpr_def_parms save_res_funcs[] =
6325 {
6326 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
6327 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
6328 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
6329 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
6330 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
6331 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
6332 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
6333 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
6334 { "._savef", 14, 31, savefpr, savefpr1_tail },
6335 { "._restf", 14, 31, restfpr, restfpr1_tail },
6336 { "_savevr_", 20, 31, savevr, savevr_tail },
6337 { "_restvr_", 20, 31, restvr, restvr_tail }
6338 };
6339
e86ce104 6340/* Called near the start of bfd_elf_size_dynamic_sections. We use
82bd7b59
AM
6341 this hook to a) provide some gcc support functions, and b) transfer
6342 dynamic linking information gathered so far on function code symbol
6343 entries, to their corresponding function descriptor symbol entries. */
deb0e272 6344
b34976b6 6345static bfd_boolean
4ce794b7
AM
6346ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
6347 struct bfd_link_info *info)
e86ce104
AM
6348{
6349 struct ppc_link_hash_table *htab;
6350
6351 htab = ppc_hash_table (info);
4dfe6ac6
NC
6352 if (htab == NULL)
6353 return FALSE;
6354
b32547cd
AM
6355 /* Provide any missing _save* and _rest* functions. */
6356 if (htab->sfpr != NULL)
6357 {
6358 unsigned int i;
6359
6360 htab->sfpr->size = 0;
6361 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
6362 if (!sfpr_define (info, &save_res_funcs[i], NULL))
6363 return FALSE;
6364 if (htab->sfpr->size == 0)
6365 htab->sfpr->flags |= SEC_EXCLUDE;
6366 }
6367
6368 if (bfd_link_relocatable (info))
6369 return TRUE;
6370
6371 if (htab->elf.hgot != NULL)
dba6fa9b
AM
6372 {
6373 _bfd_elf_link_hash_hide_symbol (info, htab->elf.hgot, TRUE);
6374 /* Make .TOC. defined so as to prevent it being made dynamic.
6375 The wrong value here is fixed later in ppc64_elf_set_toc. */
43417696
AM
6376 if (!htab->elf.hgot->def_regular
6377 || htab->elf.hgot->root.type != bfd_link_hash_defined)
6378 {
6379 htab->elf.hgot->root.type = bfd_link_hash_defined;
6380 htab->elf.hgot->root.u.def.value = 0;
6381 htab->elf.hgot->root.u.def.section = bfd_abs_section_ptr;
6382 htab->elf.hgot->def_regular = 1;
6383 htab->elf.hgot->root.linker_def = 1;
6384 }
dba6fa9b 6385 htab->elf.hgot->type = STT_OBJECT;
2cdcc330
AM
6386 htab->elf.hgot->other
6387 = (htab->elf.hgot->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
dba6fa9b 6388 }
c66bb0ee 6389
8c5b4e52
AM
6390 if (htab->need_func_desc_adj)
6391 {
6392 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
6393 htab->need_func_desc_adj = 0;
6394 }
805fc799 6395
b34976b6 6396 return TRUE;
e86ce104
AM
6397}
6398
d311bc8b 6399/* Return true if we have dynamic relocs against H or any of its weak
ab2477e1
AM
6400 aliases, that apply to read-only sections. Cannot be used after
6401 size_dynamic_sections. */
d311bc8b
AM
6402
6403static bfd_boolean
6404alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
6405{
ed7007c1 6406 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
d311bc8b
AM
6407 do
6408 {
5dbc8b37 6409 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
d311bc8b 6410 return TRUE;
ed7007c1 6411 eh = ppc_elf_hash_entry (eh->elf.u.alias);
2cdcc330
AM
6412 }
6413 while (eh != NULL && &eh->elf != h);
d311bc8b
AM
6414
6415 return FALSE;
6416}
8a2058b5 6417
8a9e8e72
AM
6418/* Return whether EH has pc-relative dynamic relocs. */
6419
6420static bfd_boolean
6421pc_dynrelocs (struct ppc_link_hash_entry *eh)
6422{
6423 struct elf_dyn_relocs *p;
6424
190eb1dd 6425 for (p = eh->elf.dyn_relocs; p != NULL; p = p->next)
8a9e8e72
AM
6426 if (p->pc_count != 0)
6427 return TRUE;
6428 return FALSE;
6429}
6430
8a2058b5
AM
6431/* Return true if a global entry stub will be created for H. Valid
6432 for ELFv2 before plt entries have been allocated. */
6433
6434static bfd_boolean
6435global_entry_stub (struct elf_link_hash_entry *h)
6436{
6437 struct plt_entry *pent;
6438
6439 if (!h->pointer_equality_needed
6440 || h->def_regular)
6441 return FALSE;
6442
6443 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
6444 if (pent->plt.refcount > 0
6445 && pent->addend == 0)
6446 return TRUE;
6447
6448 return FALSE;
6449}
6450
e86ce104
AM
6451/* Adjust a symbol defined by a dynamic object and referenced by a
6452 regular object. The current definition is in some section of the
6453 dynamic object, but we're not including those sections. We have to
6454 change the definition to something the rest of the link can
6455 understand. */
6456
b34976b6 6457static bfd_boolean
4ce794b7
AM
6458ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
6459 struct elf_link_hash_entry *h)
e86ce104
AM
6460{
6461 struct ppc_link_hash_table *htab;
5474d94f 6462 asection *s, *srel;
e86ce104
AM
6463
6464 htab = ppc_hash_table (info);
4dfe6ac6
NC
6465 if (htab == NULL)
6466 return FALSE;
e86ce104
AM
6467
6468 /* Deal with function syms. */
6469 if (h->type == STT_FUNC
e054468f 6470 || h->type == STT_GNU_IFUNC
f5385ebf 6471 || h->needs_plt)
e86ce104 6472 {
ed7007c1 6473 bfd_boolean local = (ppc_elf_hash_entry (h)->save_res
529fe20e
AM
6474 || SYMBOL_CALLS_LOCAL (info, h)
6475 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
6476 /* Discard dyn_relocs when non-pic if we've decided that a
6477 function symbol is local and not an ifunc. We keep dynamic
6478 relocs for ifuncs when local rather than always emitting a
6479 plt call stub for them and defining the symbol on the call
6480 stub. We can't do that for ELFv1 anyway (a function symbol
6481 is defined on a descriptor, not code) and it can be faster at
6482 run-time due to not needing to bounce through a stub. The
6483 dyn_relocs for ifuncs will be applied even in a static
6484 executable. */
6485 if (!bfd_link_pic (info)
6486 && h->type != STT_GNU_IFUNC
6487 && local)
190eb1dd 6488 h->dyn_relocs = NULL;
529fe20e 6489
e86ce104
AM
6490 /* Clear procedure linkage table information for any symbol that
6491 won't need a .plt entry. */
411e1bfb
AM
6492 struct plt_entry *ent;
6493 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6494 if (ent->plt.refcount > 0)
6495 break;
8387904d 6496 if (ent == NULL
2d7ad24e
AM
6497 || (h->type != STT_GNU_IFUNC
6498 && local
3e04d765 6499 && (htab->can_convert_all_inline_plt
ed7007c1 6500 || (ppc_elf_hash_entry (h)->tls_mask
3e04d765 6501 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
40b8271b 6502 {
411e1bfb 6503 h->plt.plist = NULL;
f5385ebf 6504 h->needs_plt = 0;
d1eca1e4 6505 h->pointer_equality_needed = 0;
40b8271b 6506 }
8a2058b5 6507 else if (abiversion (info->output_bfd) >= 2)
a345bc8d 6508 {
d1eca1e4
AM
6509 /* Taking a function's address in a read/write section
6510 doesn't require us to define the function symbol in the
6511 executable on a global entry stub. A dynamic reloc can
8a2058b5
AM
6512 be used instead. The reason we prefer a few more dynamic
6513 relocs is that calling via a global entry stub costs a
6514 few more instructions, and pointer_equality_needed causes
6515 extra work in ld.so when resolving these symbols. */
529fe20e 6516 if (global_entry_stub (h))
d1eca1e4 6517 {
5dbc8b37 6518 if (!_bfd_elf_readonly_dynrelocs (h))
529fe20e
AM
6519 {
6520 h->pointer_equality_needed = 0;
04383fd1
AM
6521 /* If we haven't seen a branch reloc and the symbol
6522 isn't an ifunc then we don't need a plt entry. */
529fe20e
AM
6523 if (!h->needs_plt)
6524 h->plt.plist = NULL;
6525 }
6526 else if (!bfd_link_pic (info))
6527 /* We are going to be defining the function symbol on the
6528 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 6529 h->dyn_relocs = NULL;
d1eca1e4
AM
6530 }
6531
3988aed5
AM
6532 /* ELFv2 function symbols can't have copy relocs. */
6533 return TRUE;
6534 }
6535 else if (!h->needs_plt
5dbc8b37 6536 && !_bfd_elf_readonly_dynrelocs (h))
3988aed5 6537 {
04383fd1
AM
6538 /* If we haven't seen a branch reloc and the symbol isn't an
6539 ifunc then we don't need a plt entry. */
3988aed5
AM
6540 h->plt.plist = NULL;
6541 h->pointer_equality_needed = 0;
a345bc8d
AM
6542 return TRUE;
6543 }
5bd4f169 6544 }
bbd7ec4a 6545 else
411e1bfb 6546 h->plt.plist = NULL;
5bd4f169
AM
6547
6548 /* If this is a weak symbol, and there is a real definition, the
6549 processor independent code will have arranged for us to see the
6550 real definition first, and we can just use the same value. */
60d67dc8 6551 if (h->is_weakalias)
5bd4f169 6552 {
60d67dc8
AM
6553 struct elf_link_hash_entry *def = weakdef (h);
6554 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
6555 h->root.u.def.section = def->root.u.def.section;
6556 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
6557 if (def->root.u.def.section == htab->elf.sdynbss
6558 || def->root.u.def.section == htab->elf.sdynrelro)
190eb1dd 6559 h->dyn_relocs = NULL;
b34976b6 6560 return TRUE;
5bd4f169
AM
6561 }
6562
5bd4f169
AM
6563 /* If we are creating a shared library, we must presume that the
6564 only references to the symbol are via the global offset table.
6565 For such cases we need not do anything here; the relocations will
6566 be handled correctly by relocate_section. */
ec73ddcd 6567 if (!bfd_link_executable (info))
b34976b6 6568 return TRUE;
5bd4f169 6569
65f38f15
AM
6570 /* If there are no references to this symbol that do not use the
6571 GOT, we don't need to generate a copy reloc. */
f5385ebf 6572 if (!h->non_got_ref)
b34976b6 6573 return TRUE;
65f38f15 6574
b186458a 6575 /* Don't generate a copy reloc for symbols defined in the executable. */
d93d1c80 6576 if (!h->def_dynamic || !h->ref_regular || h->def_regular
b186458a 6577
d93d1c80
AM
6578 /* If -z nocopyreloc was given, don't generate them either. */
6579 || info->nocopyreloc
a127494f 6580
dce2246a 6581 /* If we don't find any dynamic relocs in read-only sections, then
d93d1c80 6582 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1bdd8fac
AM
6583 || (ELIMINATE_COPY_RELOCS
6584 && !h->needs_copy
6585 && !alias_readonly_dynrelocs (h))
65f38f15 6586
d93d1c80
AM
6587 /* Protected variables do not work with .dynbss. The copy in
6588 .dynbss won't be used by the shared library with the protected
6589 definition for the variable. Text relocations are preferable
6590 to an incorrect program. */
6591 || h->protected_def)
529fe20e 6592 return TRUE;
a127494f 6593
e1c6cf61
AM
6594 if (h->type == STT_FUNC
6595 || h->type == STT_GNU_IFUNC)
97b639ba 6596 {
e1c6cf61
AM
6597 /* .dynbss copies of function symbols only work if we have
6598 ELFv1 dot-symbols. ELFv1 compilers since 2004 default to not
6599 use dot-symbols and set the function symbol size to the text
6600 size of the function rather than the size of the descriptor.
6601 That's wrong for copying a descriptor. */
ed7007c1 6602 if (ppc_elf_hash_entry (h)->oh == NULL
e1c6cf61
AM
6603 || !(h->size == 24 || h->size == 16))
6604 return TRUE;
6605
6606 /* We should never get here, but unfortunately there are old
6607 versions of gcc (circa gcc-3.2) that improperly for the
6608 ELFv1 ABI put initialized function pointers, vtable refs and
6609 suchlike in read-only sections. Allow them to proceed, but
6610 warn that this might break at runtime. */
25f53a85 6611 info->callbacks->einfo
c1c8c1ef 6612 (_("%P: copy reloc against `%pT' requires lazy plt linking; "
25f53a85 6613 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
97b639ba
AM
6614 h->root.root.string);
6615 }
5d35169e
AM
6616
6617 /* This is a reference to a symbol defined by a dynamic object which
6618 is not a function. */
6619
5bd4f169
AM
6620 /* We must allocate the symbol in our .dynbss section, which will
6621 become part of the .bss section of the executable. There will be
6622 an entry for this symbol in the .dynsym section. The dynamic
6623 object will contain position independent code, so all references
6624 from the dynamic object to this symbol will go through the global
6625 offset table. The dynamic linker will use the .dynsym entry to
6626 determine the address it must put in the global offset table, so
6627 both the dynamic object and the regular object will refer to the
6628 same memory location for the variable. */
5474d94f
AM
6629 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6630 {
6631 s = htab->elf.sdynrelro;
6632 srel = htab->elf.sreldynrelro;
6633 }
6634 else
6635 {
6636 s = htab->elf.sdynbss;
6637 srel = htab->elf.srelbss;
6638 }
1d7e9d18 6639 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5bd4f169 6640 {
4a7e5234
AM
6641 /* We must generate a R_PPC64_COPY reloc to tell the dynamic
6642 linker to copy the initial value out of the dynamic object
6643 and into the runtime process image. */
5474d94f 6644 srel->size += sizeof (Elf64_External_Rela);
f5385ebf 6645 h->needs_copy = 1;
5bd4f169
AM
6646 }
6647
529fe20e 6648 /* We no longer want dyn_relocs. */
190eb1dd 6649 h->dyn_relocs = NULL;
6cabe1ea 6650 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5bd4f169
AM
6651}
6652
e86ce104
AM
6653/* If given a function descriptor symbol, hide both the function code
6654 sym and the descriptor. */
6655static void
4ce794b7
AM
6656ppc64_elf_hide_symbol (struct bfd_link_info *info,
6657 struct elf_link_hash_entry *h,
6658 bfd_boolean force_local)
e86ce104 6659{
34814b9f 6660 struct ppc_link_hash_entry *eh;
e86ce104
AM
6661 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
6662
87469ba2
AM
6663 if (ppc_hash_table (info) == NULL)
6664 return;
6665
ed7007c1 6666 eh = ppc_elf_hash_entry (h);
34814b9f 6667 if (eh->is_func_descriptor)
e86ce104 6668 {
34814b9f 6669 struct ppc_link_hash_entry *fh = eh->oh;
e86ce104 6670
721956f4 6671 if (fh == NULL)
d1329ca3
AM
6672 {
6673 const char *p, *q;
b8ac2841 6674 struct elf_link_hash_table *htab = elf_hash_table (info);
d1329ca3
AM
6675 char save;
6676
6677 /* We aren't supposed to use alloca in BFD because on
6678 systems which do not have alloca the version in libiberty
6679 calls xmalloc, which might cause the program to crash
6680 when it runs out of memory. This function doesn't have a
6681 return status, so there's no way to gracefully return an
6682 error. So cheat. We know that string[-1] can be safely
34814b9f
AM
6683 accessed; It's either a string in an ELF string table,
6684 or allocated in an objalloc structure. */
d1329ca3 6685
34814b9f 6686 p = eh->elf.root.root.string - 1;
d1329ca3
AM
6687 save = *p;
6688 *(char *) p = '.';
ed7007c1
AM
6689 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6690 FALSE, FALSE));
d1329ca3
AM
6691 *(char *) p = save;
6692
6693 /* Unfortunately, if it so happens that the string we were
6694 looking for was allocated immediately before this string,
6695 then we overwrote the string terminator. That's the only
6696 reason the lookup should fail. */
6697 if (fh == NULL)
6698 {
34814b9f
AM
6699 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
6700 while (q >= eh->elf.root.root.string && *q == *p)
d1329ca3 6701 --q, --p;
34814b9f 6702 if (q < eh->elf.root.root.string && *p == '.')
ed7007c1
AM
6703 fh = ppc_elf_hash_entry (elf_link_hash_lookup (htab, p, FALSE,
6704 FALSE, FALSE));
d1329ca3
AM
6705 }
6706 if (fh != NULL)
6707 {
34814b9f
AM
6708 eh->oh = fh;
6709 fh->oh = eh;
d1329ca3
AM
6710 }
6711 }
e86ce104 6712 if (fh != NULL)
34814b9f 6713 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
e86ce104
AM
6714 }
6715}
6716
411e1bfb 6717static bfd_boolean
8843416a
AM
6718get_sym_h (struct elf_link_hash_entry **hp,
6719 Elf_Internal_Sym **symp,
6720 asection **symsecp,
f961d9dd 6721 unsigned char **tls_maskp,
8843416a
AM
6722 Elf_Internal_Sym **locsymsp,
6723 unsigned long r_symndx,
6724 bfd *ibfd)
411e1bfb 6725{
0ffa91dd 6726 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
411e1bfb
AM
6727
6728 if (r_symndx >= symtab_hdr->sh_info)
6729 {
6730 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6731 struct elf_link_hash_entry *h;
6732
6733 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 6734 h = elf_follow_link (h);
411e1bfb
AM
6735
6736 if (hp != NULL)
6737 *hp = h;
6738
6739 if (symp != NULL)
6740 *symp = NULL;
6741
6742 if (symsecp != NULL)
6743 {
6744 asection *symsec = NULL;
6745 if (h->root.type == bfd_link_hash_defined
6746 || h->root.type == bfd_link_hash_defweak)
6747 symsec = h->root.u.def.section;
6748 *symsecp = symsec;
6749 }
6750
e7b938ca 6751 if (tls_maskp != NULL)
ed7007c1 6752 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
411e1bfb
AM
6753 }
6754 else
6755 {
6756 Elf_Internal_Sym *sym;
6757 Elf_Internal_Sym *locsyms = *locsymsp;
6758
6759 if (locsyms == NULL)
6760 {
6761 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6762 if (locsyms == NULL)
6763 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6764 symtab_hdr->sh_info,
6765 0, NULL, NULL, NULL);
6766 if (locsyms == NULL)
6767 return FALSE;
6768 *locsymsp = locsyms;
6769 }
6770 sym = locsyms + r_symndx;
6771
6772 if (hp != NULL)
6773 *hp = NULL;
6774
6775 if (symp != NULL)
6776 *symp = sym;
6777
6778 if (symsecp != NULL)
cb33740c 6779 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
411e1bfb 6780
e7b938ca 6781 if (tls_maskp != NULL)
411e1bfb
AM
6782 {
6783 struct got_entry **lgot_ents;
f961d9dd 6784 unsigned char *tls_mask;
411e1bfb 6785
e7b938ca 6786 tls_mask = NULL;
411e1bfb
AM
6787 lgot_ents = elf_local_got_ents (ibfd);
6788 if (lgot_ents != NULL)
6789 {
e054468f
AM
6790 struct plt_entry **local_plt = (struct plt_entry **)
6791 (lgot_ents + symtab_hdr->sh_info);
f961d9dd 6792 unsigned char *lgot_masks = (unsigned char *)
e054468f 6793 (local_plt + symtab_hdr->sh_info);
e7b938ca 6794 tls_mask = &lgot_masks[r_symndx];
411e1bfb 6795 }
e7b938ca 6796 *tls_maskp = tls_mask;
411e1bfb
AM
6797 }
6798 }
6799 return TRUE;
6800}
6801
e7b938ca 6802/* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
951fd09b 6803 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
ad8e1ba5 6804 type suitable for optimization, and 1 otherwise. */
951fd09b
AM
6805
6806static int
f961d9dd 6807get_tls_mask (unsigned char **tls_maskp,
3a71aa26
AM
6808 unsigned long *toc_symndx,
6809 bfd_vma *toc_addend,
0d4792f7 6810 Elf_Internal_Sym **locsymsp,
3a71aa26
AM
6811 const Elf_Internal_Rela *rel,
6812 bfd *ibfd)
411e1bfb
AM
6813{
6814 unsigned long r_symndx;
0d4792f7 6815 int next_r;
411e1bfb
AM
6816 struct elf_link_hash_entry *h;
6817 Elf_Internal_Sym *sym;
6818 asection *sec;
6819 bfd_vma off;
6820
6821 r_symndx = ELF64_R_SYM (rel->r_info);
e7b938ca 6822 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
951fd09b 6823 return 0;
411e1bfb 6824
37da22e5
AM
6825 if ((*tls_maskp != NULL
6826 && (**tls_maskp & TLS_TLS) != 0
6827 && **tls_maskp != (TLS_TLS | TLS_MARK))
411e1bfb 6828 || sec == NULL
6bee8834 6829 || ppc64_elf_section_data (sec) == NULL
7c8fe5c4 6830 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
951fd09b 6831 return 1;
411e1bfb
AM
6832
6833 /* Look inside a TOC section too. */
6834 if (h != NULL)
6835 {
6836 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6837 off = h->root.u.def.value;
6838 }
6839 else
6840 off = sym->st_value;
6841 off += rel->r_addend;
6842 BFD_ASSERT (off % 8 == 0);
3a71aa26
AM
6843 r_symndx = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8];
6844 next_r = ppc64_elf_section_data (sec)->u.toc.symndx[off / 8 + 1];
0d4792f7
AM
6845 if (toc_symndx != NULL)
6846 *toc_symndx = r_symndx;
3a71aa26
AM
6847 if (toc_addend != NULL)
6848 *toc_addend = ppc64_elf_section_data (sec)->u.toc.add[off / 8];
6849 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6850 return 0;
854b41e7 6851 if ((h == NULL || is_static_defined (h))
0d4792f7
AM
6852 && (next_r == -1 || next_r == -2))
6853 return 1 - next_r;
951fd09b 6854 return 1;
411e1bfb
AM
6855}
6856
3b421ab3
AM
6857/* Find (or create) an entry in the tocsave hash table. */
6858
6859static struct tocsave_entry *
6860tocsave_find (struct ppc_link_hash_table *htab,
6861 enum insert_option insert,
6862 Elf_Internal_Sym **local_syms,
6863 const Elf_Internal_Rela *irela,
6864 bfd *ibfd)
6865{
6866 unsigned long r_indx;
6867 struct elf_link_hash_entry *h;
6868 Elf_Internal_Sym *sym;
6869 struct tocsave_entry ent, *p;
6870 hashval_t hash;
6871 struct tocsave_entry **slot;
6872
6873 r_indx = ELF64_R_SYM (irela->r_info);
6874 if (!get_sym_h (&h, &sym, &ent.sec, NULL, local_syms, r_indx, ibfd))
6875 return NULL;
6876 if (ent.sec == NULL || ent.sec->output_section == NULL)
6877 {
4eca0228 6878 _bfd_error_handler
871b3ab2 6879 (_("%pB: undefined symbol on R_PPC64_TOCSAVE relocation"), ibfd);
3b421ab3
AM
6880 return NULL;
6881 }
6882
6883 if (h != NULL)
6884 ent.offset = h->root.u.def.value;
6885 else
6886 ent.offset = sym->st_value;
6887 ent.offset += irela->r_addend;
6888
6889 hash = tocsave_htab_hash (&ent);
6890 slot = ((struct tocsave_entry **)
6891 htab_find_slot_with_hash (htab->tocsave_htab, &ent, hash, insert));
6892 if (slot == NULL)
6893 return NULL;
6894
6895 if (*slot == NULL)
6896 {
6897 p = (struct tocsave_entry *) bfd_alloc (ibfd, sizeof (*p));
6898 if (p == NULL)
6899 return NULL;
6900 *p = ent;
6901 *slot = p;
6902 }
6903 return *slot;
6904}
6905
754021d0 6906/* Adjust all global syms defined in opd sections. In gcc generated
8387904d 6907 code for the old ABI, these will already have been done. */
754021d0
AM
6908
6909static bfd_boolean
6910adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6911{
6912 struct ppc_link_hash_entry *eh;
6913 asection *sym_sec;
74f0fb50 6914 struct _opd_sec_data *opd;
754021d0
AM
6915
6916 if (h->root.type == bfd_link_hash_indirect)
6917 return TRUE;
6918
754021d0
AM
6919 if (h->root.type != bfd_link_hash_defined
6920 && h->root.type != bfd_link_hash_defweak)
6921 return TRUE;
6922
ed7007c1 6923 eh = ppc_elf_hash_entry (h);
754021d0
AM
6924 if (eh->adjust_done)
6925 return TRUE;
6926
6927 sym_sec = eh->elf.root.u.def.section;
74f0fb50
AM
6928 opd = get_opd_info (sym_sec);
6929 if (opd != NULL && opd->adjust != NULL)
754021d0 6930 {
51aecdc5 6931 long adjust = opd->adjust[OPD_NDX (eh->elf.root.u.def.value)];
4025353c
AM
6932 if (adjust == -1)
6933 {
6934 /* This entry has been deleted. */
b3fac117 6935 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
81688140
AM
6936 if (dsec == NULL)
6937 {
6938 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
dbaa2011 6939 if (discarded_section (dsec))
81688140 6940 {
b3fac117 6941 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
81688140
AM
6942 break;
6943 }
6944 }
4025353c 6945 eh->elf.root.u.def.value = 0;
81688140 6946 eh->elf.root.u.def.section = dsec;
4025353c
AM
6947 }
6948 else
6949 eh->elf.root.u.def.value += adjust;
754021d0
AM
6950 eh->adjust_done = 1;
6951 }
6952 return TRUE;
6953}
6954
8c1d1bb8 6955/* Handles decrementing dynamic reloc counts for the reloc specified by
19e08130 6956 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
8c1d1bb8
AM
6957 have already been determined. */
6958
6959static bfd_boolean
6960dec_dynrel_count (bfd_vma r_info,
6961 asection *sec,
6962 struct bfd_link_info *info,
6963 Elf_Internal_Sym **local_syms,
6964 struct elf_link_hash_entry *h,
19e08130 6965 Elf_Internal_Sym *sym)
8c1d1bb8
AM
6966{
6967 enum elf_ppc64_reloc_type r_type;
19e08130 6968 asection *sym_sec = NULL;
8c1d1bb8
AM
6969
6970 /* Can this reloc be dynamic? This switch, and later tests here
6971 should be kept in sync with the code in check_relocs. */
6972 r_type = ELF64_R_TYPE (r_info);
6973 switch (r_type)
6974 {
6975 default:
6976 return TRUE;
6977
1bdd8fac
AM
6978 case R_PPC64_TOC16:
6979 case R_PPC64_TOC16_DS:
6980 case R_PPC64_TOC16_LO:
6981 case R_PPC64_TOC16_HI:
6982 case R_PPC64_TOC16_HA:
6983 case R_PPC64_TOC16_LO_DS:
6984 if (h == NULL)
6985 return TRUE;
6986 break;
6987
8c1d1bb8
AM
6988 case R_PPC64_TPREL16:
6989 case R_PPC64_TPREL16_LO:
6990 case R_PPC64_TPREL16_HI:
6991 case R_PPC64_TPREL16_HA:
6992 case R_PPC64_TPREL16_DS:
6993 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
6994 case R_PPC64_TPREL16_HIGH:
6995 case R_PPC64_TPREL16_HIGHA:
8c1d1bb8
AM
6996 case R_PPC64_TPREL16_HIGHER:
6997 case R_PPC64_TPREL16_HIGHERA:
6998 case R_PPC64_TPREL16_HIGHEST:
6999 case R_PPC64_TPREL16_HIGHESTA:
8c1d1bb8 7000 case R_PPC64_TPREL64:
c213164a 7001 case R_PPC64_TPREL34:
8c1d1bb8
AM
7002 case R_PPC64_DTPMOD64:
7003 case R_PPC64_DTPREL64:
7004 case R_PPC64_ADDR64:
7005 case R_PPC64_REL30:
7006 case R_PPC64_REL32:
7007 case R_PPC64_REL64:
7008 case R_PPC64_ADDR14:
7009 case R_PPC64_ADDR14_BRNTAKEN:
7010 case R_PPC64_ADDR14_BRTAKEN:
7011 case R_PPC64_ADDR16:
7012 case R_PPC64_ADDR16_DS:
7013 case R_PPC64_ADDR16_HA:
7014 case R_PPC64_ADDR16_HI:
f9c6b907
AM
7015 case R_PPC64_ADDR16_HIGH:
7016 case R_PPC64_ADDR16_HIGHA:
8c1d1bb8
AM
7017 case R_PPC64_ADDR16_HIGHER:
7018 case R_PPC64_ADDR16_HIGHERA:
7019 case R_PPC64_ADDR16_HIGHEST:
7020 case R_PPC64_ADDR16_HIGHESTA:
7021 case R_PPC64_ADDR16_LO:
7022 case R_PPC64_ADDR16_LO_DS:
7023 case R_PPC64_ADDR24:
7024 case R_PPC64_ADDR32:
7025 case R_PPC64_UADDR16:
7026 case R_PPC64_UADDR32:
7027 case R_PPC64_UADDR64:
7028 case R_PPC64_TOC:
5663e321
AM
7029 case R_PPC64_D34:
7030 case R_PPC64_D34_LO:
7031 case R_PPC64_D34_HI30:
7032 case R_PPC64_D34_HA30:
7033 case R_PPC64_ADDR16_HIGHER34:
7034 case R_PPC64_ADDR16_HIGHERA34:
7035 case R_PPC64_ADDR16_HIGHEST34:
7036 case R_PPC64_ADDR16_HIGHESTA34:
7037 case R_PPC64_D28:
8c1d1bb8
AM
7038 break;
7039 }
7040
7041 if (local_syms != NULL)
7042 {
7043 unsigned long r_symndx;
8c1d1bb8
AM
7044 bfd *ibfd = sec->owner;
7045
7046 r_symndx = ELF64_R_SYM (r_info);
7047 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
7048 return FALSE;
7049 }
7050
ec73ddcd
AM
7051 if ((h != NULL
7052 && (h->root.type == bfd_link_hash_defweak
7053 || !h->def_regular))
7054 || (h != NULL
7055 && !bfd_link_executable (info)
7056 && !SYMBOLIC_BIND (info, h))
7057 || (bfd_link_pic (info)
7058 && must_be_dyn_reloc (info, r_type))
7059 || (!bfd_link_pic (info)
7060 && (h != NULL
7061 ? h->type == STT_GNU_IFUNC
7062 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)))
8c1d1bb8
AM
7063 ;
7064 else
7065 return TRUE;
7066
7067 if (h != NULL)
6edfbbad 7068 {
19e08130
AM
7069 struct elf_dyn_relocs *p;
7070 struct elf_dyn_relocs **pp;
190eb1dd 7071 pp = &h->dyn_relocs;
19e08130
AM
7072
7073 /* elf_gc_sweep may have already removed all dyn relocs associated
7074 with local syms for a given section. Also, symbol flags are
7075 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7076 report a dynreloc miscount. */
7077 if (*pp == NULL && info->gc_sections)
7078 return TRUE;
7079
7080 while ((p = *pp) != NULL)
60124e18 7081 {
19e08130
AM
7082 if (p->sec == sec)
7083 {
7084 if (!must_be_dyn_reloc (info, r_type))
7085 p->pc_count -= 1;
7086 p->count -= 1;
7087 if (p->count == 0)
7088 *pp = p->next;
7089 return TRUE;
7090 }
7091 pp = &p->next;
60124e18 7092 }
6edfbbad 7093 }
19e08130
AM
7094 else
7095 {
7096 struct ppc_dyn_relocs *p;
7097 struct ppc_dyn_relocs **pp;
7098 void *vpp;
7099 bfd_boolean is_ifunc;
8c1d1bb8 7100
19e08130
AM
7101 if (local_syms == NULL)
7102 sym_sec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
7103 if (sym_sec == NULL)
7104 sym_sec = sec;
c57da1a7 7105
19e08130
AM
7106 vpp = &elf_section_data (sym_sec)->local_dynrel;
7107 pp = (struct ppc_dyn_relocs **) vpp;
7108
7109 if (*pp == NULL && info->gc_sections)
7110 return TRUE;
7111
7112 is_ifunc = ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC;
7113 while ((p = *pp) != NULL)
8c1d1bb8 7114 {
19e08130
AM
7115 if (p->sec == sec && p->ifunc == is_ifunc)
7116 {
7117 p->count -= 1;
7118 if (p->count == 0)
7119 *pp = p->next;
7120 return TRUE;
7121 }
7122 pp = &p->next;
8c1d1bb8 7123 }
8c1d1bb8
AM
7124 }
7125
695344c0 7126 /* xgettext:c-format */
cf97bcb0
AM
7127 _bfd_error_handler (_("dynreloc miscount for %pB, section %pA"),
7128 sec->owner, sec);
8c1d1bb8
AM
7129 bfd_set_error (bfd_error_bad_value);
7130 return FALSE;
7131}
7132
754021d0
AM
7133/* Remove unused Official Procedure Descriptor entries. Currently we
7134 only remove those associated with functions in discarded link-once
7135 sections, or weakly defined functions that have been overridden. It
7136 would be possible to remove many more entries for statically linked
7137 applications. */
7138
b34976b6 7139bfd_boolean
e7d1c40c 7140ppc64_elf_edit_opd (struct bfd_link_info *info)
1e2f5b6e
AM
7141{
7142 bfd *ibfd;
754021d0 7143 bfd_boolean some_edited = FALSE;
3f764659 7144 asection *need_pad = NULL;
e7d1c40c
AM
7145 struct ppc_link_hash_table *htab;
7146
7147 htab = ppc_hash_table (info);
7148 if (htab == NULL)
7149 return FALSE;
1e2f5b6e 7150
c72f2fb2 7151 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1e2f5b6e
AM
7152 {
7153 asection *sec;
7154 Elf_Internal_Rela *relstart, *rel, *relend;
7155 Elf_Internal_Shdr *symtab_hdr;
6cdc0ccc 7156 Elf_Internal_Sym *local_syms;
74f0fb50 7157 struct _opd_sec_data *opd;
51aecdc5 7158 bfd_boolean need_edit, add_aux_fields, broken;
3f764659 7159 bfd_size_type cnt_16b = 0;
1e2f5b6e 7160
854b41e7
AM
7161 if (!is_ppc64_elf (ibfd))
7162 continue;
7163
1e2f5b6e 7164 sec = bfd_get_section_by_name (ibfd, ".opd");
46de2a7c 7165 if (sec == NULL || sec->size == 0)
1e2f5b6e
AM
7166 continue;
7167
dbaa2011 7168 if (sec->sec_info_type == SEC_INFO_TYPE_JUST_SYMS)
4b85d634
AM
7169 continue;
7170
1e2f5b6e
AM
7171 if (sec->output_section == bfd_abs_section_ptr)
7172 continue;
7173
7174 /* Look through the section relocs. */
7175 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
7176 continue;
7177
6cdc0ccc 7178 local_syms = NULL;
0ffa91dd 7179 symtab_hdr = &elf_symtab_hdr (ibfd);
1e2f5b6e
AM
7180
7181 /* Read the relocations. */
4ce794b7 7182 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
45d6a902 7183 info->keep_memory);
1e2f5b6e 7184 if (relstart == NULL)
b34976b6 7185 return FALSE;
1e2f5b6e
AM
7186
7187 /* First run through the relocs to check they are sane, and to
7188 determine whether we need to edit this opd section. */
b34976b6 7189 need_edit = FALSE;
51aecdc5 7190 broken = FALSE;
3f764659 7191 need_pad = sec;
1e2f5b6e 7192 relend = relstart + sec->reloc_count;
50bc7936 7193 for (rel = relstart; rel < relend; )
1e2f5b6e 7194 {
04c9666a 7195 enum elf_ppc64_reloc_type r_type;
1e2f5b6e
AM
7196 unsigned long r_symndx;
7197 asection *sym_sec;
7198 struct elf_link_hash_entry *h;
7199 Elf_Internal_Sym *sym;
51aecdc5 7200 bfd_vma offset;
1e2f5b6e 7201
51aecdc5 7202 /* .opd contains an array of 16 or 24 byte entries. We're
1e2f5b6e
AM
7203 only interested in the reloc pointing to a function entry
7204 point. */
51aecdc5
AM
7205 offset = rel->r_offset;
7206 if (rel + 1 == relend
7207 || rel[1].r_offset != offset + 8)
1e2f5b6e
AM
7208 {
7209 /* If someone messes with .opd alignment then after a
7210 "ld -r" we might have padding in the middle of .opd.
7211 Also, there's nothing to prevent someone putting
7212 something silly in .opd with the assembler. No .opd
b34976b6 7213 optimization for them! */
3f764659 7214 broken_opd:
4eca0228 7215 _bfd_error_handler
871b3ab2 7216 (_("%pB: .opd is not a regular array of opd entries"), ibfd);
51aecdc5 7217 broken = TRUE;
1e2f5b6e
AM
7218 break;
7219 }
7220
50bc7936
AM
7221 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
7222 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
7223 {
4eca0228 7224 _bfd_error_handler
695344c0 7225 /* xgettext:c-format */
871b3ab2 7226 (_("%pB: unexpected reloc type %u in .opd section"),
d003868e 7227 ibfd, r_type);
51aecdc5 7228 broken = TRUE;
50bc7936
AM
7229 break;
7230 }
7231
1e2f5b6e 7232 r_symndx = ELF64_R_SYM (rel->r_info);
411e1bfb
AM
7233 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7234 r_symndx, ibfd))
50bc7936 7235 goto error_ret;
1e2f5b6e
AM
7236
7237 if (sym_sec == NULL || sym_sec->owner == NULL)
7238 {
411e1bfb
AM
7239 const char *sym_name;
7240 if (h != NULL)
7241 sym_name = h->root.root.string;
7242 else
26c61ae5
L
7243 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7244 sym_sec);
411e1bfb 7245
4eca0228 7246 _bfd_error_handler
695344c0 7247 /* xgettext:c-format */
871b3ab2 7248 (_("%pB: undefined sym `%s' in .opd section"),
d003868e 7249 ibfd, sym_name);
51aecdc5 7250 broken = TRUE;
1e2f5b6e
AM
7251 break;
7252 }
7253
51020317
AM
7254 /* opd entries are always for functions defined in the
7255 current input bfd. If the symbol isn't defined in the
7256 input bfd, then we won't be using the function in this
7257 bfd; It must be defined in a linkonce section in another
7258 bfd, or is weak. It's also possible that we are
7259 discarding the function due to a linker script /DISCARD/,
7260 which we test for via the output_section. */
7261 if (sym_sec->owner != ibfd
7262 || sym_sec->output_section == bfd_abs_section_ptr)
b34976b6 7263 need_edit = TRUE;
1e2f5b6e 7264
50bc7936 7265 rel += 2;
51aecdc5
AM
7266 if (rel + 1 == relend
7267 || (rel + 2 < relend
7268 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC))
7269 ++rel;
7270
7271 if (rel == relend)
3f764659
JJ
7272 {
7273 if (sec->size == offset + 24)
7274 {
7275 need_pad = NULL;
7276 break;
7277 }
51aecdc5 7278 if (sec->size == offset + 16)
3f764659
JJ
7279 {
7280 cnt_16b++;
7281 break;
7282 }
7283 goto broken_opd;
7284 }
3f764659
JJ
7285 else if (rel + 1 < relend
7286 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
7287 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
7288 {
51aecdc5
AM
7289 if (rel[0].r_offset == offset + 16)
7290 cnt_16b++;
7291 else if (rel[0].r_offset != offset + 24)
7292 goto broken_opd;
3f764659
JJ
7293 }
7294 else
7295 goto broken_opd;
1e2f5b6e
AM
7296 }
7297
e7d1c40c 7298 add_aux_fields = htab->params->non_overlapping_opd && cnt_16b > 0;
3f764659 7299
51aecdc5 7300 if (!broken && (need_edit || add_aux_fields))
1e2f5b6e
AM
7301 {
7302 Elf_Internal_Rela *write_rel;
d4730f92 7303 Elf_Internal_Shdr *rel_hdr;
1e2f5b6e 7304 bfd_byte *rptr, *wptr;
983bddc8 7305 bfd_byte *new_contents;
74f0fb50
AM
7306 bfd_size_type amt;
7307
983bddc8 7308 new_contents = NULL;
51aecdc5 7309 amt = OPD_NDX (sec->size) * sizeof (long);
74f0fb50 7310 opd = &ppc64_elf_section_data (sec)->u.opd;
33c0ec9d 7311 opd->adjust = bfd_zalloc (sec->owner, amt);
74f0fb50
AM
7312 if (opd->adjust == NULL)
7313 return FALSE;
1e2f5b6e
AM
7314
7315 /* This seems a waste of time as input .opd sections are all
7316 zeros as generated by gcc, but I suppose there's no reason
7317 this will always be so. We might start putting something in
7318 the third word of .opd entries. */
7319 if ((sec->flags & SEC_IN_MEMORY) == 0)
7320 {
eea6121a
AM
7321 bfd_byte *loc;
7322 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6cdc0ccc 7323 {
c9594989 7324 free (loc);
50bc7936 7325 error_ret:
c9594989 7326 if (symtab_hdr->contents != (unsigned char *) local_syms)
6cdc0ccc 7327 free (local_syms);
6cdc0ccc
AM
7328 if (elf_section_data (sec)->relocs != relstart)
7329 free (relstart);
b34976b6 7330 return FALSE;
6cdc0ccc 7331 }
1e2f5b6e
AM
7332 sec->contents = loc;
7333 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7334 }
7335
7336 elf_section_data (sec)->relocs = relstart;
7337
3f764659 7338 new_contents = sec->contents;
3f764659
JJ
7339 if (add_aux_fields)
7340 {
7341 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
7342 if (new_contents == NULL)
7343 return FALSE;
51aecdc5 7344 need_pad = NULL;
3f764659 7345 }
b4f4e59f
AM
7346 wptr = new_contents;
7347 rptr = sec->contents;
1e2f5b6e 7348 write_rel = relstart;
51aecdc5 7349 for (rel = relstart; rel < relend; )
1e2f5b6e 7350 {
50bc7936
AM
7351 unsigned long r_symndx;
7352 asection *sym_sec;
7353 struct elf_link_hash_entry *h;
51aecdc5 7354 struct ppc_link_hash_entry *fdh = NULL;
50bc7936 7355 Elf_Internal_Sym *sym;
51aecdc5
AM
7356 long opd_ent_size;
7357 Elf_Internal_Rela *next_rel;
7358 bfd_boolean skip;
50bc7936
AM
7359
7360 r_symndx = ELF64_R_SYM (rel->r_info);
7361 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
d37c89e5 7362 r_symndx, ibfd))
50bc7936
AM
7363 goto error_ret;
7364
51aecdc5
AM
7365 next_rel = rel + 2;
7366 if (next_rel + 1 == relend
7367 || (next_rel + 2 < relend
7368 && ELF64_R_TYPE (next_rel[2].r_info) == R_PPC64_TOC))
7369 ++next_rel;
7370
7371 /* See if the .opd entry is full 24 byte or
7372 16 byte (with fd_aux entry overlapped with next
7373 fd_func). */
7374 opd_ent_size = 24;
7375 if (next_rel == relend)
1e2f5b6e 7376 {
51aecdc5 7377 if (sec->size == rel->r_offset + 16)
3f764659 7378 opd_ent_size = 16;
51aecdc5
AM
7379 }
7380 else if (next_rel->r_offset == rel->r_offset + 16)
7381 opd_ent_size = 16;
3f764659 7382
51aecdc5
AM
7383 if (h != NULL
7384 && h->root.root.string[0] == '.')
7385 {
ed7007c1 7386 fdh = ppc_elf_hash_entry (h)->oh;
8c5b4e52
AM
7387 if (fdh != NULL)
7388 {
7389 fdh = ppc_follow_link (fdh);
7390 if (fdh->elf.root.type != bfd_link_hash_defined
7391 && fdh->elf.root.type != bfd_link_hash_defweak)
7392 fdh = NULL;
7393 }
51aecdc5 7394 }
1e2f5b6e 7395
51aecdc5
AM
7396 skip = (sym_sec->owner != ibfd
7397 || sym_sec->output_section == bfd_abs_section_ptr);
7398 if (skip)
7399 {
7400 if (fdh != NULL && sym_sec->owner == ibfd)
a4aa0fb7 7401 {
51aecdc5
AM
7402 /* Arrange for the function descriptor sym
7403 to be dropped. */
7404 fdh->elf.root.u.def.value = 0;
7405 fdh->elf.root.u.def.section = sym_sec;
a4aa0fb7 7406 }
51aecdc5 7407 opd->adjust[OPD_NDX (rel->r_offset)] = -1;
1e2f5b6e 7408
0e1862bb 7409 if (NO_OPD_RELOCS || bfd_link_relocatable (info))
51aecdc5
AM
7410 rel = next_rel;
7411 else
7412 while (1)
7413 {
7414 if (!dec_dynrel_count (rel->r_info, sec, info,
7415 NULL, h, sym))
7416 goto error_ret;
754021d0 7417
51aecdc5
AM
7418 if (++rel == next_rel)
7419 break;
1e2f5b6e 7420
51aecdc5
AM
7421 r_symndx = ELF64_R_SYM (rel->r_info);
7422 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7423 r_symndx, ibfd))
7424 goto error_ret;
7425 }
50bc7936
AM
7426 }
7427 else
1e2f5b6e 7428 {
51aecdc5
AM
7429 /* We'll be keeping this opd entry. */
7430 long adjust;
7431
7432 if (fdh != NULL)
7433 {
7434 /* Redefine the function descriptor symbol to
7435 this location in the opd section. It is
7436 necessary to update the value here rather
7437 than using an array of adjustments as we do
7438 for local symbols, because various places
7439 in the generic ELF code use the value
7440 stored in u.def.value. */
7441 fdh->elf.root.u.def.value = wptr - new_contents;
7442 fdh->adjust_done = 1;
7443 }
7444
7445 /* Local syms are a bit tricky. We could
7446 tweak them as they can be cached, but
7447 we'd need to look through the local syms
7448 for the function descriptor sym which we
7449 don't have at the moment. So keep an
7450 array of adjustments. */
7451 adjust = (wptr - new_contents) - (rptr - sec->contents);
7452 opd->adjust[OPD_NDX (rel->r_offset)] = adjust;
7453
7454 if (wptr != rptr)
7455 memcpy (wptr, rptr, opd_ent_size);
7456 wptr += opd_ent_size;
7457 if (add_aux_fields && opd_ent_size == 16)
7458 {
7459 memset (wptr, '\0', 8);
7460 wptr += 8;
7461 }
7462
50bc7936 7463 /* We need to adjust any reloc offsets to point to the
51aecdc5
AM
7464 new opd entries. */
7465 for ( ; rel != next_rel; ++rel)
7466 {
7467 rel->r_offset += adjust;
7468 if (write_rel != rel)
7469 memcpy (write_rel, rel, sizeof (*rel));
7470 ++write_rel;
7471 }
1e2f5b6e 7472 }
51aecdc5
AM
7473
7474 rptr += opd_ent_size;
1e2f5b6e
AM
7475 }
7476
3f764659 7477 sec->size = wptr - new_contents;
1e2f5b6e 7478 sec->reloc_count = write_rel - relstart;
3f764659
JJ
7479 if (add_aux_fields)
7480 {
7481 free (sec->contents);
7482 sec->contents = new_contents;
7483 }
7484
05bf9422 7485 /* Fudge the header size too, as this is used later in
cdcf6e38 7486 elf_bfd_final_link if we are emitting relocs. */
d4730f92
BS
7487 rel_hdr = _bfd_elf_single_rel_hdr (sec);
7488 rel_hdr->sh_size = sec->reloc_count * rel_hdr->sh_entsize;
754021d0 7489 some_edited = TRUE;
1e2f5b6e 7490 }
6cdc0ccc 7491 else if (elf_section_data (sec)->relocs != relstart)
1e2f5b6e 7492 free (relstart);
6cdc0ccc 7493
411e1bfb
AM
7494 if (local_syms != NULL
7495 && symtab_hdr->contents != (unsigned char *) local_syms)
7496 {
7497 if (!info->keep_memory)
7498 free (local_syms);
7499 else
7500 symtab_hdr->contents = (unsigned char *) local_syms;
7501 }
7502 }
7503
754021d0
AM
7504 if (some_edited)
7505 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
7506
3f764659
JJ
7507 /* If we are doing a final link and the last .opd entry is just 16 byte
7508 long, add a 8 byte padding after it. */
0e1862bb 7509 if (need_pad != NULL && !bfd_link_relocatable (info))
3f764659
JJ
7510 {
7511 bfd_byte *p;
7512
7513 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
7514 {
7515 BFD_ASSERT (need_pad->size > 0);
7516
7517 p = bfd_malloc (need_pad->size + 8);
7518 if (p == NULL)
7519 return FALSE;
699733f6 7520
2cdcc330
AM
7521 if (!bfd_get_section_contents (need_pad->owner, need_pad,
7522 p, 0, need_pad->size))
3f764659
JJ
7523 return FALSE;
7524
7525 need_pad->contents = p;
7526 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
7527 }
7528 else
7529 {
7530 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
7531 if (p == NULL)
7532 return FALSE;
7533
7534 need_pad->contents = p;
7535 }
7536
7537 memset (need_pad->contents + need_pad->size, 0, 8);
7538 need_pad->size += 8;
7539 }
7540
411e1bfb
AM
7541 return TRUE;
7542}
7543
3e04d765
AM
7544/* Analyze inline PLT call relocations to see whether calls to locally
7545 defined functions can be converted to direct calls. */
7546
7547bfd_boolean
7548ppc64_elf_inline_plt (struct bfd_link_info *info)
7549{
7550 struct ppc_link_hash_table *htab;
7551 bfd *ibfd;
7552 asection *sec;
7553 bfd_vma low_vma, high_vma, limit;
7554
7555 htab = ppc_hash_table (info);
7556 if (htab == NULL)
7557 return FALSE;
7558
7559 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
7560 reduced somewhat to cater for possible stubs that might be added
7561 between the call and its destination. */
7562 if (htab->params->group_size < 0)
7563 {
7564 limit = -htab->params->group_size;
7565 if (limit == 1)
7566 limit = 0x1e00000;
7567 }
7568 else
7569 {
7570 limit = htab->params->group_size;
7571 if (limit == 1)
7572 limit = 0x1c00000;
7573 }
7574
7575 low_vma = -1;
7576 high_vma = 0;
7577 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
7578 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
7579 {
7580 if (low_vma > sec->vma)
7581 low_vma = sec->vma;
7582 if (high_vma < sec->vma + sec->size)
7583 high_vma = sec->vma + sec->size;
7584 }
7585
7586 /* If a "bl" can reach anywhere in local code sections, then we can
7587 convert all inline PLT sequences to direct calls when the symbol
7588 is local. */
7589 if (high_vma - low_vma < limit)
7590 {
7591 htab->can_convert_all_inline_plt = 1;
7592 return TRUE;
7593 }
7594
7595 /* Otherwise, go looking through relocs for cases where a direct
7596 call won't reach. Mark the symbol on any such reloc to disable
7597 the optimization and keep the PLT entry as it seems likely that
7598 this will be better than creating trampolines. Note that this
7599 will disable the optimization for all inline PLT calls to a
7600 particular symbol, not just those that won't reach. The
7601 difficulty in doing a more precise optimization is that the
7602 linker needs to make a decision depending on whether a
7603 particular R_PPC64_PLTCALL insn can be turned into a direct
7604 call, for each of the R_PPC64_PLTSEQ and R_PPC64_PLT16* insns in
7605 the sequence, and there is nothing that ties those relocs
7606 together except their symbol. */
7607
7608 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
7609 {
7610 Elf_Internal_Shdr *symtab_hdr;
7611 Elf_Internal_Sym *local_syms;
7612
7613 if (!is_ppc64_elf (ibfd))
7614 continue;
7615
7616 local_syms = NULL;
7617 symtab_hdr = &elf_symtab_hdr (ibfd);
7618
7619 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7620 if (ppc64_elf_section_data (sec)->has_pltcall
7621 && !bfd_is_abs_section (sec->output_section))
7622 {
7623 Elf_Internal_Rela *relstart, *rel, *relend;
7624
7625 /* Read the relocations. */
7626 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7627 info->keep_memory);
7628 if (relstart == NULL)
7629 return FALSE;
7630
7631 relend = relstart + sec->reloc_count;
435edf0b 7632 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
7633 {
7634 enum elf_ppc64_reloc_type r_type;
7635 unsigned long r_symndx;
7636 asection *sym_sec;
7637 struct elf_link_hash_entry *h;
7638 Elf_Internal_Sym *sym;
7639 unsigned char *tls_maskp;
7640
7641 r_type = ELF64_R_TYPE (rel->r_info);
5663e321
AM
7642 if (r_type != R_PPC64_PLTCALL
7643 && r_type != R_PPC64_PLTCALL_NOTOC)
3e04d765
AM
7644 continue;
7645
7646 r_symndx = ELF64_R_SYM (rel->r_info);
7647 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
7648 r_symndx, ibfd))
7649 {
7650 if (elf_section_data (sec)->relocs != relstart)
7651 free (relstart);
c9594989 7652 if (symtab_hdr->contents != (bfd_byte *) local_syms)
3e04d765
AM
7653 free (local_syms);
7654 return FALSE;
7655 }
7656
7657 if (sym_sec != NULL && sym_sec->output_section != NULL)
7658 {
7659 bfd_vma from, to;
7660 if (h != NULL)
7661 to = h->root.u.def.value;
7662 else
7663 to = sym->st_value;
7664 to += (rel->r_addend
7665 + sym_sec->output_offset
7666 + sym_sec->output_section->vma);
7667 from = (rel->r_offset
7668 + sec->output_offset
7669 + sec->output_section->vma);
5663e321
AM
7670 if (to - from + limit < 2 * limit
7671 && !(r_type == R_PPC64_PLTCALL_NOTOC
7672 && (((h ? h->other : sym->st_other)
7673 & STO_PPC64_LOCAL_MASK)
4a4e7361 7674 > 1 << STO_PPC64_LOCAL_BIT)))
3e04d765
AM
7675 *tls_maskp &= ~PLT_KEEP;
7676 }
7677 }
7678 if (elf_section_data (sec)->relocs != relstart)
7679 free (relstart);
7680 }
7681
7682 if (local_syms != NULL
7683 && symtab_hdr->contents != (unsigned char *) local_syms)
7684 {
7685 if (!info->keep_memory)
7686 free (local_syms);
7687 else
7688 symtab_hdr->contents = (unsigned char *) local_syms;
7689 }
7690 }
7691
7692 return TRUE;
7693}
7694
e1918d23 7695/* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
411e1bfb 7696
e1918d23 7697asection *
e7d1c40c 7698ppc64_elf_tls_setup (struct bfd_link_info *info)
411e1bfb 7699{
411e1bfb 7700 struct ppc_link_hash_table *htab;
9e7028aa 7701 struct elf_link_hash_entry *tga, *tga_fd, *desc, *desc_fd;
411e1bfb 7702
411e1bfb 7703 htab = ppc_hash_table (info);
4dfe6ac6
NC
7704 if (htab == NULL)
7705 return NULL;
7706
ee67d69a
AM
7707 if (abiversion (info->output_bfd) == 1)
7708 htab->opd_abi = 1;
7709
e7d1c40c 7710 if (htab->params->no_multi_toc)
33c0ec9d
AM
7711 htab->do_multi_toc = 0;
7712 else if (!htab->do_multi_toc)
e7d1c40c 7713 htab->params->no_multi_toc = 1;
33c0ec9d 7714
8b5f1ed8
AM
7715 /* Default to --no-plt-localentry, as this option can cause problems
7716 with symbol interposition. For example, glibc libpthread.so and
7717 libc.so duplicate many pthread symbols, with a fallback
7718 implementation in libc.so. In some cases the fallback does more
7719 work than the pthread implementation. __pthread_condattr_destroy
7720 is one such symbol: the libpthread.so implementation is
7721 localentry:0 while the libc.so implementation is localentry:8.
7722 An app that "cleverly" uses dlopen to only load necessary
7723 libraries at runtime may omit loading libpthread.so when not
7724 running multi-threaded, which then results in the libc.so
7725 fallback symbols being used and ld.so complaining. Now there
7726 are workarounds in ld (see non_zero_localentry) to detect the
7727 pthread situation, but that may not be the only case where
7728 --plt-localentry can cause trouble. */
f378ab09 7729 if (htab->params->plt_localentry0 < 0)
8b5f1ed8 7730 htab->params->plt_localentry0 = 0;
d44c746a
AM
7731 if (htab->params->plt_localentry0
7732 && elf_link_hash_lookup (&htab->elf, "GLIBC_2.26",
7733 FALSE, FALSE, FALSE) == NULL)
cf97bcb0
AM
7734 _bfd_error_handler
7735 (_("warning: --plt-localentry is especially dangerous without "
7736 "ld.so support to detect ABI violations"));
f378ab09 7737
9e7028aa
AM
7738 tga = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr",
7739 FALSE, FALSE, TRUE);
7740 htab->tls_get_addr = ppc_elf_hash_entry (tga);
7741
a7f2871e 7742 /* Move dynamic linking info to the function descriptor sym. */
9e7028aa
AM
7743 if (tga != NULL)
7744 func_desc_adjust (tga, info);
7745 tga_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
7746 FALSE, FALSE, TRUE);
7747 htab->tls_get_addr_fd = ppc_elf_hash_entry (tga_fd);
7748
7749 desc = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_desc",
7750 FALSE, FALSE, TRUE);
7751 htab->tga_desc = ppc_elf_hash_entry (desc);
7752 if (desc != NULL)
7753 func_desc_adjust (desc, info);
7754 desc_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_desc",
7755 FALSE, FALSE, TRUE);
7756 htab->tga_desc_fd = ppc_elf_hash_entry (desc_fd);
7757
7c9cf415 7758 if (htab->params->tls_get_addr_opt)
a7f2871e 7759 {
9e7028aa 7760 struct elf_link_hash_entry *opt, *opt_fd;
a7f2871e
AM
7761
7762 opt = elf_link_hash_lookup (&htab->elf, ".__tls_get_addr_opt",
7763 FALSE, FALSE, TRUE);
7764 if (opt != NULL)
7765 func_desc_adjust (opt, info);
7766 opt_fd = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
7767 FALSE, FALSE, TRUE);
7768 if (opt_fd != NULL
7769 && (opt_fd->root.type == bfd_link_hash_defined
7770 || opt_fd->root.type == bfd_link_hash_defweak))
7771 {
7772 /* If glibc supports an optimized __tls_get_addr call stub,
7773 signalled by the presence of __tls_get_addr_opt, and we'll
7774 be calling __tls_get_addr via a plt call stub, then
7775 make __tls_get_addr point to __tls_get_addr_opt. */
9e7028aa
AM
7776 if (!(htab->elf.dynamic_sections_created
7777 && tga_fd != NULL
7778 && (tga_fd->type == STT_FUNC
7779 || tga_fd->needs_plt)
7780 && !(SYMBOL_CALLS_LOCAL (info, tga_fd)
7781 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga_fd))))
7782 tga_fd = NULL;
7783 if (!(htab->elf.dynamic_sections_created
7784 && desc_fd != NULL
7785 && (desc_fd->type == STT_FUNC
7786 || desc_fd->needs_plt)
7787 && !(SYMBOL_CALLS_LOCAL (info, desc_fd)
7788 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, desc_fd))))
7789 desc_fd = NULL;
7790
7791 if (tga_fd != NULL || desc_fd != NULL)
7792 {
7793 struct plt_entry *ent = NULL;
7794
7795 if (tga_fd != NULL)
7796 for (ent = tga_fd->plt.plist; ent != NULL; ent = ent->next)
7797 if (ent->plt.refcount > 0)
7798 break;
7799 if (ent == NULL && desc_fd != NULL)
7800 for (ent = desc_fd->plt.plist; ent != NULL; ent = ent->next)
7801 if (ent->plt.refcount > 0)
7802 break;
a7f2871e
AM
7803 if (ent != NULL)
7804 {
9e7028aa
AM
7805 if (tga_fd != NULL)
7806 {
7807 tga_fd->root.type = bfd_link_hash_indirect;
7808 tga_fd->root.u.i.link = &opt_fd->root;
7809 tga_fd->root.u.i.warning = NULL;
7810 ppc64_elf_copy_indirect_symbol (info, opt_fd, tga_fd);
7811 }
7812 if (desc_fd != NULL)
7813 {
7814 desc_fd->root.type = bfd_link_hash_indirect;
7815 desc_fd->root.u.i.link = &opt_fd->root;
7816 desc_fd->root.u.i.warning = NULL;
7817 ppc64_elf_copy_indirect_symbol (info, opt_fd, desc_fd);
7818 }
b531344c 7819 opt_fd->mark = 1;
a7f2871e
AM
7820 if (opt_fd->dynindx != -1)
7821 {
7822 /* Use __tls_get_addr_opt in dynamic relocations. */
7823 opt_fd->dynindx = -1;
7824 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
7825 opt_fd->dynstr_index);
7826 if (!bfd_elf_link_record_dynamic_symbol (info, opt_fd))
854b41e7 7827 return NULL;
a7f2871e 7828 }
9e7028aa 7829 if (tga_fd != NULL)
a7f2871e 7830 {
9e7028aa
AM
7831 htab->tls_get_addr_fd = ppc_elf_hash_entry (opt_fd);
7832 tga = &htab->tls_get_addr->elf;
7833 if (opt != NULL && tga != NULL)
7834 {
7835 tga->root.type = bfd_link_hash_indirect;
7836 tga->root.u.i.link = &opt->root;
7837 tga->root.u.i.warning = NULL;
7838 ppc64_elf_copy_indirect_symbol (info, opt, tga);
7839 opt->mark = 1;
7840 _bfd_elf_link_hash_hide_symbol (info, opt,
7841 tga->forced_local);
7842 htab->tls_get_addr = ppc_elf_hash_entry (opt);
7843 }
7844 htab->tls_get_addr_fd->oh = htab->tls_get_addr;
7845 htab->tls_get_addr_fd->is_func_descriptor = 1;
7846 if (htab->tls_get_addr != NULL)
7847 {
7848 htab->tls_get_addr->oh = htab->tls_get_addr_fd;
7849 htab->tls_get_addr->is_func = 1;
7850 }
a7f2871e 7851 }
9e7028aa 7852 if (desc_fd != NULL)
a7f2871e 7853 {
9e7028aa
AM
7854 htab->tga_desc_fd = ppc_elf_hash_entry (opt_fd);
7855 if (opt != NULL && desc != NULL)
7856 {
7857 desc->root.type = bfd_link_hash_indirect;
7858 desc->root.u.i.link = &opt->root;
7859 desc->root.u.i.warning = NULL;
7860 ppc64_elf_copy_indirect_symbol (info, opt, desc);
7861 opt->mark = 1;
7862 _bfd_elf_link_hash_hide_symbol (info, opt,
7863 desc->forced_local);
7864 htab->tga_desc = ppc_elf_hash_entry (opt);
7865 }
7866 htab->tga_desc_fd->oh = htab->tga_desc;
7867 htab->tga_desc_fd->is_func_descriptor = 1;
7868 if (htab->tga_desc != NULL)
7869 {
7870 htab->tga_desc->oh = htab->tga_desc_fd;
7871 htab->tga_desc->is_func = 1;
7872 }
a7f2871e
AM
7873 }
7874 }
7875 }
7876 }
7c9cf415
AM
7877 else if (htab->params->tls_get_addr_opt < 0)
7878 htab->params->tls_get_addr_opt = 0;
a7f2871e 7879 }
9e7028aa
AM
7880
7881 if (htab->tga_desc_fd != NULL
7882 && htab->params->tls_get_addr_opt
7883 && htab->params->no_tls_get_addr_regsave == -1)
7884 htab->params->no_tls_get_addr_regsave = 0;
7885
33c0ec9d 7886 return _bfd_elf_tls_setup (info->output_bfd, info);
3a71aa26 7887}
8387904d 7888
3a71aa26 7889/* Return TRUE iff REL is a branch reloc with a global symbol matching
9e7028aa 7890 any of HASH1, HASH2, HASH3, or HASH4. */
8387904d 7891
3a71aa26
AM
7892static bfd_boolean
7893branch_reloc_hash_match (const bfd *ibfd,
7894 const Elf_Internal_Rela *rel,
7895 const struct ppc_link_hash_entry *hash1,
9e7028aa
AM
7896 const struct ppc_link_hash_entry *hash2,
7897 const struct ppc_link_hash_entry *hash3,
7898 const struct ppc_link_hash_entry *hash4)
3a71aa26
AM
7899{
7900 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
7901 enum elf_ppc64_reloc_type r_type = ELF64_R_TYPE (rel->r_info);
7902 unsigned int r_symndx = ELF64_R_SYM (rel->r_info);
7903
e054468f 7904 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
8387904d 7905 {
3a71aa26
AM
7906 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
7907 struct elf_link_hash_entry *h;
8387904d 7908
3a71aa26 7909 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
b31867b6 7910 h = elf_follow_link (h);
9e7028aa
AM
7911 if (h == &hash1->elf || h == &hash2->elf
7912 || h == &hash3->elf || h == &hash4->elf)
3a71aa26 7913 return TRUE;
a48ebf4d 7914 }
3a71aa26 7915 return FALSE;
951fd09b 7916}
411e1bfb 7917
951fd09b
AM
7918/* Run through all the TLS relocs looking for optimization
7919 opportunities. The linker has been hacked (see ppc64elf.em) to do
7920 a preliminary section layout so that we know the TLS segment
7921 offsets. We can't optimize earlier because some optimizations need
7922 to know the tp offset, and we need to optimize before allocating
7923 dynamic relocations. */
7924
7925bfd_boolean
33c0ec9d 7926ppc64_elf_tls_optimize (struct bfd_link_info *info)
951fd09b
AM
7927{
7928 bfd *ibfd;
7929 asection *sec;
7930 struct ppc_link_hash_table *htab;
663a1470 7931 unsigned char *toc_ref;
102890f0 7932 int pass;
951fd09b 7933
3cbc1e5e 7934 if (!bfd_link_executable (info))
411e1bfb
AM
7935 return TRUE;
7936
951fd09b 7937 htab = ppc_hash_table (info);
4dfe6ac6
NC
7938 if (htab == NULL)
7939 return FALSE;
7940
663a1470
AM
7941 /* Make two passes over the relocs. On the first pass, mark toc
7942 entries involved with tls relocs, and check that tls relocs
7943 involved in setting up a tls_get_addr call are indeed followed by
7944 such a call. If they are not, we can't do any tls optimization.
7945 On the second pass twiddle tls_mask flags to notify
7946 relocate_section that optimization can be done, and adjust got
7947 and plt refcounts. */
7948 toc_ref = NULL;
7949 for (pass = 0; pass < 2; ++pass)
c72f2fb2 7950 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
663a1470
AM
7951 {
7952 Elf_Internal_Sym *locsyms = NULL;
7953 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
7954
102890f0
AM
7955 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7956 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7957 {
7958 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 7959 bfd_boolean found_tls_get_addr_arg = 0;
411e1bfb 7960
102890f0
AM
7961 /* Read the relocations. */
7962 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7963 info->keep_memory);
7964 if (relstart == NULL)
2915c55b
JK
7965 {
7966 free (toc_ref);
7967 return FALSE;
7968 }
411e1bfb 7969
102890f0
AM
7970 relend = relstart + sec->reloc_count;
7971 for (rel = relstart; rel < relend; rel++)
7972 {
7973 enum elf_ppc64_reloc_type r_type;
7974 unsigned long r_symndx;
7975 struct elf_link_hash_entry *h;
7976 Elf_Internal_Sym *sym;
7977 asection *sym_sec;
f961d9dd 7978 unsigned char *tls_mask;
46e9995a 7979 unsigned int tls_set, tls_clear, tls_type = 0;
102890f0
AM
7980 bfd_vma value;
7981 bfd_boolean ok_tprel, is_local;
7982 long toc_ref_index = 0;
7983 int expecting_tls_get_addr = 0;
663a1470 7984 bfd_boolean ret = FALSE;
411e1bfb 7985
102890f0
AM
7986 r_symndx = ELF64_R_SYM (rel->r_info);
7987 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
7988 r_symndx, ibfd))
7989 {
7990 err_free_rel:
7991 if (elf_section_data (sec)->relocs != relstart)
7992 free (relstart);
c9594989
AM
7993 free (toc_ref);
7994 if (elf_symtab_hdr (ibfd).contents
7995 != (unsigned char *) locsyms)
102890f0 7996 free (locsyms);
663a1470 7997 return ret;
102890f0 7998 }
411e1bfb 7999
102890f0
AM
8000 if (h != NULL)
8001 {
766bc656
AM
8002 if (h->root.type == bfd_link_hash_defined
8003 || h->root.type == bfd_link_hash_defweak)
8004 value = h->root.u.def.value;
8005 else if (h->root.type == bfd_link_hash_undefweak)
8006 value = 0;
8007 else
663a1470
AM
8008 {
8009 found_tls_get_addr_arg = 0;
8010 continue;
8011 }
102890f0
AM
8012 }
8013 else
8014 /* Symbols referenced by TLS relocs must be of type
8015 STT_TLS. So no need for .opd local sym adjust. */
8016 value = sym->st_value;
8017
8018 ok_tprel = FALSE;
f749f26e
AM
8019 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
8020 if (is_local)
102890f0 8021 {
766bc656
AM
8022 if (h != NULL
8023 && h->root.type == bfd_link_hash_undefweak)
8024 ok_tprel = TRUE;
c27b8c2a
AM
8025 else if (sym_sec != NULL
8026 && sym_sec->output_section != NULL)
766bc656
AM
8027 {
8028 value += sym_sec->output_offset;
8029 value += sym_sec->output_section->vma;
0b147428 8030 value -= htab->elf.tls_sec->vma + TP_OFFSET;
c213164a
AM
8031 /* Note that even though the prefix insns
8032 allow a 1<<33 offset we use the same test
8033 as for addis;addi. There may be a mix of
8034 pcrel and non-pcrel code and the decision
8035 to optimise is per symbol, not per TLS
8036 sequence. */
0b147428 8037 ok_tprel = value + 0x80008000ULL < 1ULL << 32;
766bc656 8038 }
102890f0 8039 }
951fd09b 8040
102890f0 8041 r_type = ELF64_R_TYPE (rel->r_info);
663a1470
AM
8042 /* If this section has old-style __tls_get_addr calls
8043 without marker relocs, then check that each
8044 __tls_get_addr call reloc is preceded by a reloc
8045 that conceivably belongs to the __tls_get_addr arg
8046 setup insn. If we don't find matching arg setup
8047 relocs, don't do any tls optimization. */
8048 if (pass == 0
9737e8af 8049 && sec->nomark_tls_get_addr
663a1470 8050 && h != NULL
ed7007c1 8051 && is_tls_get_addr (h, htab)
663a1470
AM
8052 && !found_tls_get_addr_arg
8053 && is_branch_reloc (r_type))
8054 {
25f53a85 8055 info->callbacks->minfo (_("%H __tls_get_addr lost arg, "
663a1470
AM
8056 "TLS optimization disabled\n"),
8057 ibfd, sec, rel->r_offset);
8058 ret = TRUE;
8059 goto err_free_rel;
8060 }
8061
8062 found_tls_get_addr_arg = 0;
102890f0
AM
8063 switch (r_type)
8064 {
8065 case R_PPC64_GOT_TLSLD16:
8066 case R_PPC64_GOT_TLSLD16_LO:
87c69f97 8067 case R_PPC64_GOT_TLSLD_PCREL34:
102890f0 8068 expecting_tls_get_addr = 1;
663a1470 8069 found_tls_get_addr_arg = 1;
1a0670f3 8070 /* Fall through. */
102890f0
AM
8071
8072 case R_PPC64_GOT_TLSLD16_HI:
8073 case R_PPC64_GOT_TLSLD16_HA:
8074 /* These relocs should never be against a symbol
8075 defined in a shared lib. Leave them alone if
8076 that turns out to be the case. */
8077 if (!is_local)
8078 continue;
411e1bfb 8079
102890f0 8080 /* LD -> LE */
411e1bfb 8081 tls_set = 0;
102890f0
AM
8082 tls_clear = TLS_LD;
8083 tls_type = TLS_TLS | TLS_LD;
8084 break;
411e1bfb 8085
102890f0
AM
8086 case R_PPC64_GOT_TLSGD16:
8087 case R_PPC64_GOT_TLSGD16_LO:
87c69f97 8088 case R_PPC64_GOT_TLSGD_PCREL34:
102890f0 8089 expecting_tls_get_addr = 1;
663a1470 8090 found_tls_get_addr_arg = 1;
1a0670f3 8091 /* Fall through. */
102890f0
AM
8092
8093 case R_PPC64_GOT_TLSGD16_HI:
8094 case R_PPC64_GOT_TLSGD16_HA:
8095 if (ok_tprel)
8096 /* GD -> LE */
411e1bfb 8097 tls_set = 0;
102890f0
AM
8098 else
8099 /* GD -> IE */
b00a0a86 8100 tls_set = TLS_TLS | TLS_GDIE;
102890f0
AM
8101 tls_clear = TLS_GD;
8102 tls_type = TLS_TLS | TLS_GD;
8103 break;
8104
87c69f97 8105 case R_PPC64_GOT_TPREL_PCREL34:
102890f0
AM
8106 case R_PPC64_GOT_TPREL16_DS:
8107 case R_PPC64_GOT_TPREL16_LO_DS:
8108 case R_PPC64_GOT_TPREL16_HI:
8109 case R_PPC64_GOT_TPREL16_HA:
8110 if (ok_tprel)
8111 {
8112 /* IE -> LE */
8113 tls_set = 0;
8114 tls_clear = TLS_TPREL;
8115 tls_type = TLS_TLS | TLS_TPREL;
8116 break;
8117 }
411e1bfb
AM
8118 continue;
8119
727fc41e 8120 case R_PPC64_TLSLD:
7d04a20a
AM
8121 if (!is_local)
8122 continue;
8123 /* Fall through. */
8124 case R_PPC64_TLSGD:
23cedd1d
AM
8125 if (rel + 1 < relend
8126 && is_plt_seq_reloc (ELF64_R_TYPE (rel[1].r_info)))
8127 {
8128 if (pass != 0
2cdcc330 8129 && (ELF64_R_TYPE (rel[1].r_info)
5663e321
AM
8130 != R_PPC64_PLTSEQ)
8131 && (ELF64_R_TYPE (rel[1].r_info)
8132 != R_PPC64_PLTSEQ_NOTOC))
23cedd1d
AM
8133 {
8134 r_symndx = ELF64_R_SYM (rel[1].r_info);
8135 if (!get_sym_h (&h, NULL, NULL, NULL, &locsyms,
2cdcc330 8136 r_symndx, ibfd))
23cedd1d
AM
8137 goto err_free_rel;
8138 if (h != NULL)
8139 {
8140 struct plt_entry *ent = NULL;
8141
8142 for (ent = h->plt.plist;
8143 ent != NULL;
8144 ent = ent->next)
8145 if (ent->addend == rel[1].r_addend)
8146 break;
8147
8148 if (ent != NULL
8149 && ent->plt.refcount > 0)
8150 ent->plt.refcount -= 1;
8151 }
8152 }
8153 continue;
8154 }
663a1470 8155 found_tls_get_addr_arg = 1;
1a0670f3 8156 /* Fall through. */
663a1470
AM
8157
8158 case R_PPC64_TLS:
8159 case R_PPC64_TOC16:
8160 case R_PPC64_TOC16_LO:
102890f0
AM
8161 if (sym_sec == NULL || sym_sec != toc)
8162 continue;
8163
8164 /* Mark this toc entry as referenced by a TLS
8165 code sequence. We can do that now in the
8166 case of R_PPC64_TLS, and after checking for
8167 tls_get_addr for the TOC16 relocs. */
8168 if (toc_ref == NULL)
2cdcc330
AM
8169 toc_ref
8170 = bfd_zmalloc (toc->output_section->rawsize / 8);
663a1470
AM
8171 if (toc_ref == NULL)
8172 goto err_free_rel;
8173
102890f0
AM
8174 if (h != NULL)
8175 value = h->root.u.def.value;
8176 else
8177 value = sym->st_value;
8178 value += rel->r_addend;
73242275
AM
8179 if (value % 8 != 0)
8180 continue;
8181 BFD_ASSERT (value < toc->size
8182 && toc->output_offset % 8 == 0);
663a1470 8183 toc_ref_index = (value + toc->output_offset) / 8;
727fc41e
AM
8184 if (r_type == R_PPC64_TLS
8185 || r_type == R_PPC64_TLSGD
8186 || r_type == R_PPC64_TLSLD)
102890f0
AM
8187 {
8188 toc_ref[toc_ref_index] = 1;
8189 continue;
8190 }
8191
8192 if (pass != 0 && toc_ref[toc_ref_index] == 0)
8193 continue;
8194
8195 tls_set = 0;
8196 tls_clear = 0;
8197 expecting_tls_get_addr = 2;
8198 break;
8199
8200 case R_PPC64_TPREL64:
8201 if (pass == 0
8202 || sec != toc
8203 || toc_ref == NULL
663a1470 8204 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8205 continue;
8206 if (ok_tprel)
8207 {
8208 /* IE -> LE */
8209 tls_set = TLS_EXPLICIT;
8210 tls_clear = TLS_TPREL;
8211 break;
8212 }
8213 continue;
8214
8215 case R_PPC64_DTPMOD64:
8216 if (pass == 0
8217 || sec != toc
8218 || toc_ref == NULL
663a1470 8219 || !toc_ref[(rel->r_offset + toc->output_offset) / 8])
102890f0
AM
8220 continue;
8221 if (rel + 1 < relend
8222 && (rel[1].r_info
8223 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
8224 && rel[1].r_offset == rel->r_offset + 8)
8225 {
8226 if (ok_tprel)
8227 /* GD -> LE */
8228 tls_set = TLS_EXPLICIT | TLS_GD;
8229 else
8230 /* GD -> IE */
b00a0a86 8231 tls_set = TLS_EXPLICIT | TLS_GD | TLS_GDIE;
102890f0
AM
8232 tls_clear = TLS_GD;
8233 }
8234 else
8235 {
8236 if (!is_local)
8237 continue;
8238
8239 /* LD -> LE */
8240 tls_set = TLS_EXPLICIT;
8241 tls_clear = TLS_LD;
8242 }
8243 break;
8244
8245 default:
8246 continue;
8247 }
8248
8249 if (pass == 0)
8250 {
727fc41e 8251 if (!expecting_tls_get_addr
9737e8af 8252 || !sec->nomark_tls_get_addr)
102890f0
AM
8253 continue;
8254
3a71aa26
AM
8255 if (rel + 1 < relend
8256 && branch_reloc_hash_match (ibfd, rel + 1,
9e7028aa
AM
8257 htab->tls_get_addr_fd,
8258 htab->tga_desc_fd,
3a71aa26 8259 htab->tls_get_addr,
9e7028aa 8260 htab->tga_desc))
102890f0 8261 {
3a71aa26 8262 if (expecting_tls_get_addr == 2)
102890f0 8263 {
3a71aa26 8264 /* Check for toc tls entries. */
f961d9dd 8265 unsigned char *toc_tls;
3a71aa26
AM
8266 int retval;
8267
8268 retval = get_tls_mask (&toc_tls, NULL, NULL,
8269 &locsyms,
8270 rel, ibfd);
8271 if (retval == 0)
8272 goto err_free_rel;
663a1470
AM
8273 if (toc_tls != NULL)
8274 {
37da22e5
AM
8275 if ((*toc_tls & TLS_TLS) != 0
8276 && ((*toc_tls & (TLS_GD | TLS_LD)) != 0))
663a1470
AM
8277 found_tls_get_addr_arg = 1;
8278 if (retval > 1)
8279 toc_ref[toc_ref_index] = 1;
8280 }
102890f0 8281 }
3a71aa26 8282 continue;
102890f0
AM
8283 }
8284
102890f0
AM
8285 /* Uh oh, we didn't find the expected call. We
8286 could just mark this symbol to exclude it
8287 from tls optimization but it's safer to skip
663a1470 8288 the entire optimization. */
695344c0 8289 /* xgettext:c-format */
25f53a85 8290 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
8291 "TLS optimization disabled\n"),
8292 ibfd, sec, rel->r_offset);
8293 ret = TRUE;
8294 goto err_free_rel;
102890f0
AM
8295 }
8296
37da22e5
AM
8297 /* If we don't have old-style __tls_get_addr calls
8298 without TLSGD/TLSLD marker relocs, and we haven't
8299 found a new-style __tls_get_addr call with a
8300 marker for this symbol, then we either have a
8301 broken object file or an -mlongcall style
8302 indirect call to __tls_get_addr without a marker.
8303 Disable optimization in this case. */
8304 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
8305 && (tls_set & TLS_EXPLICIT) == 0
9737e8af 8306 && !sec->nomark_tls_get_addr
37da22e5
AM
8307 && ((*tls_mask & (TLS_TLS | TLS_MARK))
8308 != (TLS_TLS | TLS_MARK)))
8309 continue;
8310
7d04a20a 8311 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
102890f0 8312 {
23cedd1d
AM
8313 struct plt_entry *ent = NULL;
8314
9e7028aa
AM
8315 if (htab->tls_get_addr_fd != NULL)
8316 for (ent = htab->tls_get_addr_fd->elf.plt.plist;
8317 ent != NULL;
8318 ent = ent->next)
8319 if (ent->addend == 0)
8320 break;
8321
8322 if (ent == NULL && htab->tga_desc_fd != NULL)
8323 for (ent = htab->tga_desc_fd->elf.plt.plist;
8324 ent != NULL;
8325 ent = ent->next)
8326 if (ent->addend == 0)
8327 break;
8328
8329 if (ent == NULL && htab->tls_get_addr != NULL)
23cedd1d
AM
8330 for (ent = htab->tls_get_addr->elf.plt.plist;
8331 ent != NULL;
8332 ent = ent->next)
8333 if (ent->addend == 0)
102890f0 8334 break;
411e1bfb 8335
9e7028aa
AM
8336 if (ent == NULL && htab->tga_desc != NULL)
8337 for (ent = htab->tga_desc->elf.plt.plist;
23cedd1d
AM
8338 ent != NULL;
8339 ent = ent->next)
8340 if (ent->addend == 0)
102890f0 8341 break;
23cedd1d
AM
8342
8343 if (ent != NULL
8344 && ent->plt.refcount > 0)
8345 ent->plt.refcount -= 1;
102890f0 8346 }
411e1bfb 8347
102890f0 8348 if (tls_clear == 0)
30038c59
AM
8349 continue;
8350
102890f0
AM
8351 if ((tls_set & TLS_EXPLICIT) == 0)
8352 {
8353 struct got_entry *ent;
411e1bfb 8354
102890f0
AM
8355 /* Adjust got entry for this reloc. */
8356 if (h != NULL)
8357 ent = h->got.glist;
8358 else
8359 ent = elf_local_got_ents (ibfd)[r_symndx];
411e1bfb 8360
102890f0
AM
8361 for (; ent != NULL; ent = ent->next)
8362 if (ent->addend == rel->r_addend
8363 && ent->owner == ibfd
8364 && ent->tls_type == tls_type)
8365 break;
8366 if (ent == NULL)
8367 abort ();
411e1bfb 8368
102890f0
AM
8369 if (tls_set == 0)
8370 {
8371 /* We managed to get rid of a got entry. */
8372 if (ent->got.refcount > 0)
8373 ent->got.refcount -= 1;
8374 }
8375 }
8376 else
8377 {
8378 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8379 we'll lose one or two dyn relocs. */
8380 if (!dec_dynrel_count (rel->r_info, sec, info,
19e08130 8381 NULL, h, sym))
102890f0 8382 return FALSE;
411e1bfb 8383
102890f0
AM
8384 if (tls_set == (TLS_EXPLICIT | TLS_GD))
8385 {
8386 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
19e08130 8387 NULL, h, sym))
102890f0
AM
8388 return FALSE;
8389 }
8390 }
411e1bfb 8391
46e9995a 8392 *tls_mask |= tls_set & 0xff;
102890f0
AM
8393 *tls_mask &= ~tls_clear;
8394 }
8c1d1bb8 8395
102890f0
AM
8396 if (elf_section_data (sec)->relocs != relstart)
8397 free (relstart);
8398 }
411e1bfb 8399
663a1470
AM
8400 if (locsyms != NULL
8401 && (elf_symtab_hdr (ibfd).contents != (unsigned char *) locsyms))
8402 {
8403 if (!info->keep_memory)
8404 free (locsyms);
8405 else
8406 elf_symtab_hdr (ibfd).contents = (unsigned char *) locsyms;
8407 }
8408 }
411e1bfb 8409
c9594989 8410 free (toc_ref);
9a23f96e 8411 htab->do_tls_opt = 1;
b34976b6 8412 return TRUE;
1e2f5b6e 8413}
b34976b6 8414
c5614fa4
AM
8415/* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8416 the values of any global symbols in a toc section that has been
8417 edited. Globals in toc sections should be a rarity, so this function
8418 sets a flag if any are found in toc sections other than the one just
de194d85 8419 edited, so that further hash table traversals can be avoided. */
c5614fa4
AM
8420
8421struct adjust_toc_info
8422{
8423 asection *toc;
8424 unsigned long *skip;
8425 bfd_boolean global_toc_syms;
8426};
8427
ba761f19
AM
8428enum toc_skip_enum { ref_from_discarded = 1, can_optimize = 2 };
8429
c5614fa4
AM
8430static bfd_boolean
8431adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
8432{
8433 struct ppc_link_hash_entry *eh;
8434 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
854b41e7 8435 unsigned long i;
c5614fa4 8436
c5614fa4
AM
8437 if (h->root.type != bfd_link_hash_defined
8438 && h->root.type != bfd_link_hash_defweak)
8439 return TRUE;
8440
ed7007c1 8441 eh = ppc_elf_hash_entry (h);
c5614fa4
AM
8442 if (eh->adjust_done)
8443 return TRUE;
8444
8445 if (eh->elf.root.u.def.section == toc_inf->toc)
8446 {
854b41e7
AM
8447 if (eh->elf.root.u.def.value > toc_inf->toc->rawsize)
8448 i = toc_inf->toc->rawsize >> 3;
c5614fa4 8449 else
854b41e7
AM
8450 i = eh->elf.root.u.def.value >> 3;
8451
ba761f19 8452 if ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0)
c5614fa4 8453 {
4eca0228 8454 _bfd_error_handler
854b41e7
AM
8455 (_("%s defined on removed toc entry"), eh->elf.root.root.string);
8456 do
8457 ++i;
ba761f19 8458 while ((toc_inf->skip[i] & (ref_from_discarded | can_optimize)) != 0);
854b41e7 8459 eh->elf.root.u.def.value = (bfd_vma) i << 3;
c5614fa4 8460 }
854b41e7
AM
8461
8462 eh->elf.root.u.def.value -= toc_inf->skip[i];
c5614fa4
AM
8463 eh->adjust_done = 1;
8464 }
8465 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
8466 toc_inf->global_toc_syms = TRUE;
8467
8468 return TRUE;
8469}
8470
39eeab25
AM
8471/* Return TRUE iff INSN with a relocation of R_TYPE is one we expect
8472 on a _LO variety toc/got reloc. */
560c8763
AM
8473
8474static bfd_boolean
39eeab25 8475ok_lo_toc_insn (unsigned int insn, enum elf_ppc64_reloc_type r_type)
560c8763 8476{
2365f8d7
AM
8477 return ((insn & (0x3fu << 26)) == 12u << 26 /* addic */
8478 || (insn & (0x3fu << 26)) == 14u << 26 /* addi */
8479 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
8480 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
8481 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
8482 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
8483 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
8484 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
8485 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
8486 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
8487 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
8488 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
8489 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
8490 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
8491 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
8492 || (insn & (0x3fu << 26)) == 56u << 26 /* lq,lfq */
8493 || ((insn & (0x3fu << 26)) == 57u << 26 /* lxsd,lxssp,lfdp */
39eeab25
AM
8494 /* Exclude lfqu by testing reloc. If relocs are ever
8495 defined for the reduced D field in psq_lu then those
8496 will need testing too. */
8497 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8498 || ((insn & (0x3fu << 26)) == 58u << 26 /* ld,lwa */
39eeab25 8499 && (insn & 1) == 0)
2365f8d7
AM
8500 || (insn & (0x3fu << 26)) == 60u << 26 /* stfq */
8501 || ((insn & (0x3fu << 26)) == 61u << 26 /* lxv,stx{v,sd,ssp},stfdp */
39eeab25
AM
8502 /* Exclude stfqu. psq_stu as above for psq_lu. */
8503 && r_type != R_PPC64_TOC16_LO && r_type != R_PPC64_GOT16_LO)
2365f8d7 8504 || ((insn & (0x3fu << 26)) == 62u << 26 /* std,stq */
39eeab25 8505 && (insn & 1) == 0));
560c8763
AM
8506}
8507
4a421c53
AM
8508/* PCREL_OPT in one instance flags to the linker that a pair of insns:
8509 pld ra,symbol@got@pcrel
dd9b12c2 8510 load/store rt,off(ra)
4a421c53 8511 or
d4b87b1e 8512 pla ra,symbol@pcrel
dd9b12c2 8513 load/store rt,off(ra)
4a421c53 8514 may be translated to
dd9b12c2 8515 pload/pstore rt,symbol+off@pcrel
4a421c53
AM
8516 nop.
8517 This function returns true if the optimization is possible, placing
dd9b12c2 8518 the prefix insn in *PINSN1, a NOP in *PINSN2 and the offset in *POFF.
4a421c53
AM
8519
8520 On entry to this function, the linker has already determined that
d4b87b1e 8521 the pld can be replaced with pla: *PINSN1 is that pla insn,
4a421c53
AM
8522 while *PINSN2 is the second instruction. */
8523
8524static bfd_boolean
dd9b12c2 8525xlate_pcrel_opt (uint64_t *pinsn1, uint64_t *pinsn2, bfd_signed_vma *poff)
4a421c53 8526{
77486630
AM
8527 uint64_t insn1 = *pinsn1;
8528 uint64_t insn2 = *pinsn2;
dd9b12c2 8529 bfd_signed_vma off;
4a421c53 8530
77486630
AM
8531 if ((insn2 & (63ULL << 58)) == 1ULL << 58)
8532 {
8533 /* Check that regs match. */
8534 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
8535 return FALSE;
8536
8537 /* P8LS or PMLS form, non-pcrel. */
8538 if ((insn2 & (-1ULL << 50) & ~(1ULL << 56)) != (1ULL << 58))
8539 return FALSE;
8540
8541 *pinsn1 = (insn2 & ~(31 << 16) & ~0x3ffff0000ffffULL) | (1ULL << 52);
8542 *pinsn2 = PNOP;
8543 off = ((insn2 >> 16) & 0x3ffff0000ULL) | (insn2 & 0xffff);
8544 *poff = (off ^ 0x200000000ULL) - 0x200000000ULL;
8545 return TRUE;
8546 }
8547
8548 insn2 >>= 32;
8549
4a421c53 8550 /* Check that regs match. */
77486630 8551 if (((insn2 >> 16) & 31) != ((insn1 >> 21) & 31))
4a421c53
AM
8552 return FALSE;
8553
8554 switch ((insn2 >> 26) & 63)
8555 {
8556 default:
8557 return FALSE;
8558
8559 case 32: /* lwz */
8560 case 34: /* lbz */
8561 case 36: /* stw */
8562 case 38: /* stb */
8563 case 40: /* lhz */
8564 case 42: /* lha */
8565 case 44: /* sth */
8566 case 48: /* lfs */
8567 case 50: /* lfd */
8568 case 52: /* stfs */
8569 case 54: /* stfd */
8570 /* These are the PMLS cases, where we just need to tack a prefix
dd9b12c2 8571 on the insn. */
77486630 8572 insn1 = ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
4a421c53 8573 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8574 off = insn2 & 0xffff;
4a421c53
AM
8575 break;
8576
8577 case 58: /* lwa, ld */
dd9b12c2 8578 if ((insn2 & 1) != 0)
4a421c53 8579 return FALSE;
77486630 8580 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8581 | (insn2 & 2 ? 41ULL << 26 : 57ULL << 26)
8582 | (insn2 & (31ULL << 21)));
dd9b12c2 8583 off = insn2 & 0xfffc;
4a421c53
AM
8584 break;
8585
8586 case 57: /* lxsd, lxssp */
dd9b12c2 8587 if ((insn2 & 3) < 2)
4a421c53 8588 return FALSE;
77486630 8589 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8590 | ((40ULL | (insn2 & 3)) << 26)
8591 | (insn2 & (31ULL << 21)));
dd9b12c2 8592 off = insn2 & 0xfffc;
4a421c53
AM
8593 break;
8594
8595 case 61: /* stxsd, stxssp, lxv, stxv */
8596 if ((insn2 & 3) == 0)
8597 return FALSE;
8598 else if ((insn2 & 3) >= 2)
8599 {
77486630 8600 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8601 | ((44ULL | (insn2 & 3)) << 26)
8602 | (insn2 & (31ULL << 21)));
dd9b12c2 8603 off = insn2 & 0xfffc;
4a421c53
AM
8604 }
8605 else
8606 {
77486630 8607 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8608 | ((50ULL | (insn2 & 4) | ((insn2 & 8) >> 3)) << 26)
8609 | (insn2 & (31ULL << 21)));
dd9b12c2 8610 off = insn2 & 0xfff0;
4a421c53
AM
8611 }
8612 break;
8613
8614 case 56: /* lq */
77486630 8615 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53 8616 | (insn2 & ((63ULL << 26) | (31ULL << 21))));
dd9b12c2 8617 off = insn2 & 0xffff;
4a421c53
AM
8618 break;
8619
94ba9882
AM
8620 case 6: /* lxvp, stxvp */
8621 if ((insn2 & 0xe) != 0)
8622 return FALSE;
8623 insn1 = ((1ULL << 58) | (1ULL << 52)
8624 | ((insn2 & 1) == 0 ? 58ULL << 26 : 62ULL << 26)
8625 | (insn2 & (31ULL << 21)));
8626 off = insn2 & 0xfff0;
8627 break;
8628
4a421c53 8629 case 62: /* std, stq */
dd9b12c2 8630 if ((insn2 & 1) != 0)
4a421c53 8631 return FALSE;
77486630 8632 insn1 = ((1ULL << 58) | (1ULL << 52)
4a421c53
AM
8633 | ((insn2 & 2) == 0 ? 61ULL << 26 : 60ULL << 26)
8634 | (insn2 & (31ULL << 21)));
dd9b12c2 8635 off = insn2 & 0xfffc;
4a421c53
AM
8636 break;
8637 }
8638
77486630 8639 *pinsn1 = insn1;
4a421c53 8640 *pinsn2 = (uint64_t) NOP << 32;
dd9b12c2 8641 *poff = (off ^ 0x8000) - 0x8000;
4a421c53
AM
8642 return TRUE;
8643}
8644
c5614fa4
AM
8645/* Examine all relocs referencing .toc sections in order to remove
8646 unused .toc entries. */
8647
8648bfd_boolean
33c0ec9d 8649ppc64_elf_edit_toc (struct bfd_link_info *info)
c5614fa4
AM
8650{
8651 bfd *ibfd;
8652 struct adjust_toc_info toc_inf;
67f0cbdb 8653 struct ppc_link_hash_table *htab = ppc_hash_table (info);
c5614fa4 8654
67f0cbdb 8655 htab->do_toc_opt = 1;
c5614fa4 8656 toc_inf.global_toc_syms = TRUE;
c72f2fb2 8657 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
c5614fa4
AM
8658 {
8659 asection *toc, *sec;
8660 Elf_Internal_Shdr *symtab_hdr;
8661 Elf_Internal_Sym *local_syms;
425b145b 8662 Elf_Internal_Rela *relstart, *rel, *toc_relocs;
c5614fa4
AM
8663 unsigned long *skip, *drop;
8664 unsigned char *used;
8665 unsigned char *keep, last, some_unused;
8666
854b41e7
AM
8667 if (!is_ppc64_elf (ibfd))
8668 continue;
8669
c5614fa4
AM
8670 toc = bfd_get_section_by_name (ibfd, ".toc");
8671 if (toc == NULL
92b7a70f 8672 || toc->size == 0
dbaa2011
AM
8673 || toc->sec_info_type == SEC_INFO_TYPE_JUST_SYMS
8674 || discarded_section (toc))
c5614fa4
AM
8675 continue;
8676
425b145b 8677 toc_relocs = NULL;
c5614fa4 8678 local_syms = NULL;
0ffa91dd 8679 symtab_hdr = &elf_symtab_hdr (ibfd);
c5614fa4
AM
8680
8681 /* Look at sections dropped from the final link. */
8682 skip = NULL;
8683 relstart = NULL;
8684 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
8685 {
8686 if (sec->reloc_count == 0
dbaa2011 8687 || !discarded_section (sec)
c5614fa4
AM
8688 || get_opd_info (sec)
8689 || (sec->flags & SEC_ALLOC) == 0
8690 || (sec->flags & SEC_DEBUGGING) != 0)
8691 continue;
8692
8693 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
8694 if (relstart == NULL)
8695 goto error_ret;
8696
8697 /* Run through the relocs to see which toc entries might be
8698 unused. */
8699 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8700 {
8701 enum elf_ppc64_reloc_type r_type;
8702 unsigned long r_symndx;
8703 asection *sym_sec;
8704 struct elf_link_hash_entry *h;
8705 Elf_Internal_Sym *sym;
8706 bfd_vma val;
8707
8708 r_type = ELF64_R_TYPE (rel->r_info);
8709 switch (r_type)
8710 {
8711 default:
8712 continue;
8713
8714 case R_PPC64_TOC16:
8715 case R_PPC64_TOC16_LO:
8716 case R_PPC64_TOC16_HI:
8717 case R_PPC64_TOC16_HA:
8718 case R_PPC64_TOC16_DS:
8719 case R_PPC64_TOC16_LO_DS:
8720 break;
8721 }
8722
8723 r_symndx = ELF64_R_SYM (rel->r_info);
8724 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8725 r_symndx, ibfd))
8726 goto error_ret;
8727
8728 if (sym_sec != toc)
8729 continue;
8730
8731 if (h != NULL)
8732 val = h->root.u.def.value;
8733 else
8734 val = sym->st_value;
8735 val += rel->r_addend;
8736
8737 if (val >= toc->size)
8738 continue;
8739
8740 /* Anything in the toc ought to be aligned to 8 bytes.
8741 If not, don't mark as unused. */
8742 if (val & 7)
8743 continue;
8744
8745 if (skip == NULL)
8746 {
854b41e7 8747 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
c5614fa4
AM
8748 if (skip == NULL)
8749 goto error_ret;
8750 }
8751
ba761f19 8752 skip[val >> 3] = ref_from_discarded;
c5614fa4
AM
8753 }
8754
8755 if (elf_section_data (sec)->relocs != relstart)
8756 free (relstart);
8757 }
8758
ba761f19
AM
8759 /* For largetoc loads of address constants, we can convert
8760 . addis rx,2,addr@got@ha
8761 . ld ry,addr@got@l(rx)
8762 to
8763 . addis rx,2,addr@toc@ha
8764 . addi ry,rx,addr@toc@l
8765 when addr is within 2G of the toc pointer. This then means
8766 that the word storing "addr" in the toc is no longer needed. */
68ffbac6 8767
ba761f19
AM
8768 if (!ppc64_elf_tdata (ibfd)->has_small_toc_reloc
8769 && toc->output_section->rawsize < (bfd_vma) 1 << 31
8770 && toc->reloc_count != 0)
8771 {
8772 /* Read toc relocs. */
425b145b
AM
8773 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
8774 info->keep_memory);
8775 if (toc_relocs == NULL)
ba761f19
AM
8776 goto error_ret;
8777
425b145b 8778 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
8779 {
8780 enum elf_ppc64_reloc_type r_type;
8781 unsigned long r_symndx;
8782 asection *sym_sec;
8783 struct elf_link_hash_entry *h;
8784 Elf_Internal_Sym *sym;
8785 bfd_vma val, addr;
8786
8787 r_type = ELF64_R_TYPE (rel->r_info);
8788 if (r_type != R_PPC64_ADDR64)
8789 continue;
8790
8791 r_symndx = ELF64_R_SYM (rel->r_info);
8792 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8793 r_symndx, ibfd))
8794 goto error_ret;
8795
425b145b 8796 if (sym_sec == NULL
c27b8c2a 8797 || sym_sec->output_section == NULL
dbaa2011 8798 || discarded_section (sym_sec))
425b145b
AM
8799 continue;
8800
afe397ea 8801 if (!SYMBOL_REFERENCES_LOCAL (info, h))
ba761f19
AM
8802 continue;
8803
8804 if (h != NULL)
bddc25c9
AM
8805 {
8806 if (h->type == STT_GNU_IFUNC)
8807 continue;
8808 val = h->root.u.def.value;
8809 }
ba761f19 8810 else
bddc25c9
AM
8811 {
8812 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8813 continue;
8814 val = sym->st_value;
8815 }
ba761f19
AM
8816 val += rel->r_addend;
8817 val += sym_sec->output_section->vma + sym_sec->output_offset;
8818
8819 /* We don't yet know the exact toc pointer value, but we
8820 know it will be somewhere in the toc section. Don't
8821 optimize if the difference from any possible toc
8822 pointer is outside [ff..f80008000, 7fff7fff]. */
8823 addr = toc->output_section->vma + TOC_BASE_OFF;
8824 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8825 continue;
8826
8827 addr = toc->output_section->vma + toc->output_section->rawsize;
8828 if (val - addr + (bfd_vma) 0x80008000 >= (bfd_vma) 1 << 32)
8829 continue;
8830
8831 if (skip == NULL)
8832 {
8833 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 15) / 8);
8834 if (skip == NULL)
8835 goto error_ret;
8836 }
8837
8838 skip[rel->r_offset >> 3]
425b145b 8839 |= can_optimize | ((rel - toc_relocs) << 2);
ba761f19 8840 }
ba761f19
AM
8841 }
8842
c5614fa4
AM
8843 if (skip == NULL)
8844 continue;
8845
8846 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
8847 if (used == NULL)
8848 {
8849 error_ret:
c9594989 8850 if (symtab_hdr->contents != (unsigned char *) local_syms)
c5614fa4
AM
8851 free (local_syms);
8852 if (sec != NULL
c5614fa4
AM
8853 && elf_section_data (sec)->relocs != relstart)
8854 free (relstart);
c9594989 8855 if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 8856 free (toc_relocs);
c9594989 8857 free (skip);
c5614fa4
AM
8858 return FALSE;
8859 }
8860
30038c59
AM
8861 /* Now check all kept sections that might reference the toc.
8862 Check the toc itself last. */
8863 for (sec = (ibfd->sections == toc && toc->next ? toc->next
8864 : ibfd->sections);
c5614fa4 8865 sec != NULL;
c5614fa4 8866 sec = (sec == toc ? NULL
c5614fa4 8867 : sec->next == NULL ? toc
30038c59 8868 : sec->next == toc && toc->next ? toc->next
c5614fa4
AM
8869 : sec->next))
8870 {
8871 int repeat;
8872
8873 if (sec->reloc_count == 0
dbaa2011 8874 || discarded_section (sec)
c5614fa4
AM
8875 || get_opd_info (sec)
8876 || (sec->flags & SEC_ALLOC) == 0
8877 || (sec->flags & SEC_DEBUGGING) != 0)
8878 continue;
8879
854b41e7
AM
8880 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
8881 info->keep_memory);
c5614fa4 8882 if (relstart == NULL)
2915c55b
JK
8883 {
8884 free (used);
8885 goto error_ret;
8886 }
c5614fa4
AM
8887
8888 /* Mark toc entries referenced as used. */
c5614fa4 8889 do
d4f1ee75
AM
8890 {
8891 repeat = 0;
8892 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
8893 {
8894 enum elf_ppc64_reloc_type r_type;
8895 unsigned long r_symndx;
8896 asection *sym_sec;
8897 struct elf_link_hash_entry *h;
8898 Elf_Internal_Sym *sym;
8899 bfd_vma val;
98528052 8900
d4f1ee75 8901 r_type = ELF64_R_TYPE (rel->r_info);
d4f1ee75
AM
8902 switch (r_type)
8903 {
8904 case R_PPC64_TOC16:
8905 case R_PPC64_TOC16_LO:
8906 case R_PPC64_TOC16_HI:
8907 case R_PPC64_TOC16_HA:
8908 case R_PPC64_TOC16_DS:
8909 case R_PPC64_TOC16_LO_DS:
8910 /* In case we're taking addresses of toc entries. */
8911 case R_PPC64_ADDR64:
8912 break;
c5614fa4 8913
d4f1ee75
AM
8914 default:
8915 continue;
8916 }
c5614fa4 8917
d4f1ee75
AM
8918 r_symndx = ELF64_R_SYM (rel->r_info);
8919 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
8920 r_symndx, ibfd))
8921 {
8922 free (used);
8923 goto error_ret;
8924 }
c5614fa4 8925
d4f1ee75
AM
8926 if (sym_sec != toc)
8927 continue;
c5614fa4 8928
d4f1ee75
AM
8929 if (h != NULL)
8930 val = h->root.u.def.value;
8931 else
8932 val = sym->st_value;
8933 val += rel->r_addend;
ba761f19 8934
d4f1ee75
AM
8935 if (val >= toc->size)
8936 continue;
ba761f19 8937
d4f1ee75
AM
8938 if ((skip[val >> 3] & can_optimize) != 0)
8939 {
8940 bfd_vma off;
8941 unsigned char opc;
8942
8943 switch (r_type)
8944 {
8945 case R_PPC64_TOC16_HA:
ba761f19 8946 break;
ba761f19 8947
d4f1ee75
AM
8948 case R_PPC64_TOC16_LO_DS:
8949 off = rel->r_offset;
8950 off += (bfd_big_endian (ibfd) ? -2 : 3);
8951 if (!bfd_get_section_contents (ibfd, sec, &opc,
8952 off, 1))
8953 {
8954 free (used);
8955 goto error_ret;
8956 }
8957 if ((opc & (0x3f << 2)) == (58u << 2))
8958 break;
1a0670f3 8959 /* Fall through. */
ba761f19 8960
d4f1ee75
AM
8961 default:
8962 /* Wrong sort of reloc, or not a ld. We may
8963 as well clear ref_from_discarded too. */
8964 skip[val >> 3] = 0;
8965 }
8966 }
8967
8968 if (sec != toc)
8969 used[val >> 3] = 1;
8970 /* For the toc section, we only mark as used if this
8971 entry itself isn't unused. */
8972 else if ((used[rel->r_offset >> 3]
8973 || !(skip[rel->r_offset >> 3] & ref_from_discarded))
8974 && !used[val >> 3])
8975 {
8976 /* Do all the relocs again, to catch reference
8977 chains. */
8978 repeat = 1;
8979 used[val >> 3] = 1;
8980 }
8981 }
8982 }
c5614fa4 8983 while (repeat);
854b41e7
AM
8984
8985 if (elf_section_data (sec)->relocs != relstart)
8986 free (relstart);
c5614fa4
AM
8987 }
8988
8989 /* Merge the used and skip arrays. Assume that TOC
8990 doublewords not appearing as either used or unused belong
de194d85 8991 to an entry more than one doubleword in size. */
c5614fa4
AM
8992 for (drop = skip, keep = used, last = 0, some_unused = 0;
8993 drop < skip + (toc->size + 7) / 8;
8994 ++drop, ++keep)
8995 {
8996 if (*keep)
8997 {
ba761f19
AM
8998 *drop &= ~ref_from_discarded;
8999 if ((*drop & can_optimize) != 0)
9000 some_unused = 1;
c5614fa4
AM
9001 last = 0;
9002 }
b140b010 9003 else if ((*drop & ref_from_discarded) != 0)
c5614fa4
AM
9004 {
9005 some_unused = 1;
ba761f19 9006 last = ref_from_discarded;
c5614fa4
AM
9007 }
9008 else
9009 *drop = last;
9010 }
9011
9012 free (used);
9013
9014 if (some_unused)
9015 {
9016 bfd_byte *contents, *src;
9017 unsigned long off;
d62b3684 9018 Elf_Internal_Sym *sym;
ba761f19 9019 bfd_boolean local_toc_syms = FALSE;
c5614fa4
AM
9020
9021 /* Shuffle the toc contents, and at the same time convert the
9022 skip array from booleans into offsets. */
9023 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
9024 goto error_ret;
9025
9026 elf_section_data (toc)->this_hdr.contents = contents;
9027
9028 for (src = contents, off = 0, drop = skip;
9029 src < contents + toc->size;
9030 src += 8, ++drop)
9031 {
ba761f19
AM
9032 if ((*drop & (can_optimize | ref_from_discarded)) != 0)
9033 off += 8;
c5614fa4
AM
9034 else if (off != 0)
9035 {
9036 *drop = off;
9037 memcpy (src - off, src, 8);
9038 }
9039 }
854b41e7 9040 *drop = off;
c5614fa4
AM
9041 toc->rawsize = toc->size;
9042 toc->size = src - contents - off;
9043
ba761f19
AM
9044 /* Adjust addends for relocs against the toc section sym,
9045 and optimize any accesses we can. */
c5614fa4
AM
9046 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9047 {
9048 if (sec->reloc_count == 0
dbaa2011 9049 || discarded_section (sec))
c5614fa4
AM
9050 continue;
9051
9052 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
854b41e7 9053 info->keep_memory);
c5614fa4
AM
9054 if (relstart == NULL)
9055 goto error_ret;
9056
9057 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9058 {
9059 enum elf_ppc64_reloc_type r_type;
9060 unsigned long r_symndx;
9061 asection *sym_sec;
9062 struct elf_link_hash_entry *h;
854b41e7 9063 bfd_vma val;
c5614fa4
AM
9064
9065 r_type = ELF64_R_TYPE (rel->r_info);
9066 switch (r_type)
9067 {
9068 default:
9069 continue;
9070
9071 case R_PPC64_TOC16:
9072 case R_PPC64_TOC16_LO:
9073 case R_PPC64_TOC16_HI:
9074 case R_PPC64_TOC16_HA:
9075 case R_PPC64_TOC16_DS:
9076 case R_PPC64_TOC16_LO_DS:
9077 case R_PPC64_ADDR64:
9078 break;
9079 }
9080
9081 r_symndx = ELF64_R_SYM (rel->r_info);
9082 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9083 r_symndx, ibfd))
9084 goto error_ret;
9085
ba761f19 9086 if (sym_sec != toc)
c5614fa4
AM
9087 continue;
9088
ba761f19
AM
9089 if (h != NULL)
9090 val = h->root.u.def.value;
9091 else
9092 {
9093 val = sym->st_value;
9094 if (val != 0)
9095 local_toc_syms = TRUE;
9096 }
9097
9098 val += rel->r_addend;
854b41e7
AM
9099
9100 if (val > toc->rawsize)
9101 val = toc->rawsize;
ba761f19
AM
9102 else if ((skip[val >> 3] & ref_from_discarded) != 0)
9103 continue;
9104 else if ((skip[val >> 3] & can_optimize) != 0)
9105 {
9106 Elf_Internal_Rela *tocrel
425b145b 9107 = toc_relocs + (skip[val >> 3] >> 2);
ba761f19
AM
9108 unsigned long tsym = ELF64_R_SYM (tocrel->r_info);
9109
9110 switch (r_type)
9111 {
9112 case R_PPC64_TOC16_HA:
9113 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_TOC16_HA);
9114 break;
9115
9116 case R_PPC64_TOC16_LO_DS:
9117 rel->r_info = ELF64_R_INFO (tsym, R_PPC64_LO_DS_OPT);
9118 break;
9119
9120 default:
28942f62
AM
9121 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9122 ppc_howto_init ();
b140b010 9123 info->callbacks->einfo
695344c0 9124 /* xgettext:c-format */
174d0a74 9125 (_("%H: %s references "
b140b010
AM
9126 "optimized away TOC entry\n"),
9127 ibfd, sec, rel->r_offset,
9128 ppc64_elf_howto_table[r_type]->name);
9129 bfd_set_error (bfd_error_bad_value);
9130 goto error_ret;
ba761f19
AM
9131 }
9132 rel->r_addend = tocrel->r_addend;
9133 elf_section_data (sec)->relocs = relstart;
9134 continue;
9135 }
9136
9137 if (h != NULL || sym->st_value != 0)
9138 continue;
854b41e7
AM
9139
9140 rel->r_addend -= skip[val >> 3];
9141 elf_section_data (sec)->relocs = relstart;
c5614fa4 9142 }
854b41e7
AM
9143
9144 if (elf_section_data (sec)->relocs != relstart)
9145 free (relstart);
c5614fa4
AM
9146 }
9147
9148 /* We shouldn't have local or global symbols defined in the TOC,
9149 but handle them anyway. */
df22d223
AM
9150 if (local_syms != NULL)
9151 for (sym = local_syms;
9152 sym < local_syms + symtab_hdr->sh_info;
9153 ++sym)
9154 if (sym->st_value != 0
9155 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
9156 {
9157 unsigned long i;
854b41e7 9158
df22d223
AM
9159 if (sym->st_value > toc->rawsize)
9160 i = toc->rawsize >> 3;
9161 else
9162 i = sym->st_value >> 3;
854b41e7 9163
df22d223
AM
9164 if ((skip[i] & (ref_from_discarded | can_optimize)) != 0)
9165 {
9166 if (local_toc_syms)
4eca0228 9167 _bfd_error_handler
df22d223
AM
9168 (_("%s defined on removed toc entry"),
9169 bfd_elf_sym_name (ibfd, symtab_hdr, sym, NULL));
9170 do
9171 ++i;
9172 while ((skip[i] & (ref_from_discarded | can_optimize)));
9173 sym->st_value = (bfd_vma) i << 3;
9174 }
d62b3684 9175
df22d223
AM
9176 sym->st_value -= skip[i];
9177 symtab_hdr->contents = (unsigned char *) local_syms;
9178 }
c5614fa4 9179
854b41e7 9180 /* Adjust any global syms defined in this toc input section. */
c5614fa4
AM
9181 if (toc_inf.global_toc_syms)
9182 {
9183 toc_inf.toc = toc;
9184 toc_inf.skip = skip;
9185 toc_inf.global_toc_syms = FALSE;
9186 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
9187 &toc_inf);
9188 }
854b41e7
AM
9189
9190 if (toc->reloc_count != 0)
9191 {
d4730f92 9192 Elf_Internal_Shdr *rel_hdr;
854b41e7
AM
9193 Elf_Internal_Rela *wrel;
9194 bfd_size_type sz;
9195
854b41e7 9196 /* Remove unused toc relocs, and adjust those we keep. */
28be611c
AM
9197 if (toc_relocs == NULL)
9198 toc_relocs = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
9199 info->keep_memory);
9200 if (toc_relocs == NULL)
9201 goto error_ret;
9202
425b145b
AM
9203 wrel = toc_relocs;
9204 for (rel = toc_relocs; rel < toc_relocs + toc->reloc_count; ++rel)
ba761f19
AM
9205 if ((skip[rel->r_offset >> 3]
9206 & (ref_from_discarded | can_optimize)) == 0)
854b41e7
AM
9207 {
9208 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
9209 wrel->r_info = rel->r_info;
9210 wrel->r_addend = rel->r_addend;
9211 ++wrel;
9212 }
9213 else if (!dec_dynrel_count (rel->r_info, toc, info,
9214 &local_syms, NULL, NULL))
9215 goto error_ret;
9216
425b145b
AM
9217 elf_section_data (toc)->relocs = toc_relocs;
9218 toc->reloc_count = wrel - toc_relocs;
d4730f92
BS
9219 rel_hdr = _bfd_elf_single_rel_hdr (toc);
9220 sz = rel_hdr->sh_entsize;
9221 rel_hdr->sh_size = toc->reloc_count * sz;
854b41e7 9222 }
c5614fa4 9223 }
c9594989 9224 else if (elf_section_data (toc)->relocs != toc_relocs)
425b145b 9225 free (toc_relocs);
c5614fa4
AM
9226
9227 if (local_syms != NULL
9228 && symtab_hdr->contents != (unsigned char *) local_syms)
9229 {
9230 if (!info->keep_memory)
9231 free (local_syms);
9232 else
9233 symtab_hdr->contents = (unsigned char *) local_syms;
9234 }
9235 free (skip);
9236 }
9237
066f4018 9238 /* Look for cases where we can change an indirect GOT access to
4a421c53
AM
9239 a GOT relative or PC relative access, possibly reducing the
9240 number of GOT entries. */
066f4018
AM
9241 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9242 {
9243 asection *sec;
9244 Elf_Internal_Shdr *symtab_hdr;
9245 Elf_Internal_Sym *local_syms;
9246 Elf_Internal_Rela *relstart, *rel;
9247 bfd_vma got;
9248
9249 if (!is_ppc64_elf (ibfd))
9250 continue;
9251
903b777d 9252 if (!ppc64_elf_tdata (ibfd)->has_optrel)
066f4018
AM
9253 continue;
9254
9255 sec = ppc64_elf_tdata (ibfd)->got;
903b777d
AM
9256 got = 0;
9257 if (sec != NULL)
9258 got = sec->output_section->vma + sec->output_offset + 0x8000;
066f4018
AM
9259
9260 local_syms = NULL;
9261 symtab_hdr = &elf_symtab_hdr (ibfd);
9262
9263 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
9264 {
9265 if (sec->reloc_count == 0
903b777d 9266 || !ppc64_elf_section_data (sec)->has_optrel
066f4018
AM
9267 || discarded_section (sec))
9268 continue;
9269
9270 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
9271 info->keep_memory);
9272 if (relstart == NULL)
9273 {
9274 got_error_ret:
c9594989 9275 if (symtab_hdr->contents != (unsigned char *) local_syms)
066f4018
AM
9276 free (local_syms);
9277 if (sec != NULL
066f4018
AM
9278 && elf_section_data (sec)->relocs != relstart)
9279 free (relstart);
9280 return FALSE;
9281 }
9282
9283 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
9284 {
9285 enum elf_ppc64_reloc_type r_type;
9286 unsigned long r_symndx;
9287 Elf_Internal_Sym *sym;
9288 asection *sym_sec;
9289 struct elf_link_hash_entry *h;
9290 struct got_entry *ent;
133a1f60 9291 bfd_vma val, pc;
4a421c53 9292 unsigned char buf[8];
066f4018 9293 unsigned int insn;
903b777d 9294 enum {no_check, check_lo, check_ha} insn_check;
066f4018
AM
9295
9296 r_type = ELF64_R_TYPE (rel->r_info);
903b777d
AM
9297 switch (r_type)
9298 {
9299 default:
9300 insn_check = no_check;
9301 break;
9302
9303 case R_PPC64_PLT16_HA:
9304 case R_PPC64_GOT_TLSLD16_HA:
9305 case R_PPC64_GOT_TLSGD16_HA:
9306 case R_PPC64_GOT_TPREL16_HA:
9307 case R_PPC64_GOT_DTPREL16_HA:
9308 case R_PPC64_GOT16_HA:
9309 case R_PPC64_TOC16_HA:
9310 insn_check = check_ha;
9311 break;
9312
9313 case R_PPC64_PLT16_LO:
9314 case R_PPC64_PLT16_LO_DS:
9315 case R_PPC64_GOT_TLSLD16_LO:
9316 case R_PPC64_GOT_TLSGD16_LO:
9317 case R_PPC64_GOT_TPREL16_LO_DS:
9318 case R_PPC64_GOT_DTPREL16_LO_DS:
9319 case R_PPC64_GOT16_LO:
9320 case R_PPC64_GOT16_LO_DS:
9321 case R_PPC64_TOC16_LO:
9322 case R_PPC64_TOC16_LO_DS:
9323 insn_check = check_lo;
9324 break;
9325 }
9326
9327 if (insn_check != no_check)
9328 {
9329 bfd_vma off = rel->r_offset & ~3;
9330
9331 if (!bfd_get_section_contents (ibfd, sec, buf, off, 4))
9332 goto got_error_ret;
9333
9334 insn = bfd_get_32 (ibfd, buf);
9335 if (insn_check == check_lo
9336 ? !ok_lo_toc_insn (insn, r_type)
2365f8d7 9337 : ((insn & ((0x3fu << 26) | 0x1f << 16))
903b777d
AM
9338 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9339 {
9340 char str[12];
9341
9342 ppc64_elf_tdata (ibfd)->unexpected_toc_insn = 1;
9343 sprintf (str, "%#08x", insn);
9344 info->callbacks->einfo
9345 /* xgettext:c-format */
9346 (_("%H: got/toc optimization is not supported for"
9347 " %s instruction\n"),
9348 ibfd, sec, rel->r_offset & ~3, str);
9349 continue;
9350 }
9351 }
9352
066f4018
AM
9353 switch (r_type)
9354 {
bb22a418
AM
9355 /* Note that we don't delete GOT entries for
9356 R_PPC64_GOT16_DS since we'd need a lot more
9357 analysis. For starters, the preliminary layout is
9358 before the GOT, PLT, dynamic sections and stubs are
9359 laid out. Then we'd need to allow for changes in
9360 distance between sections caused by alignment. */
066f4018
AM
9361 default:
9362 continue;
9363
066f4018
AM
9364 case R_PPC64_GOT16_HA:
9365 case R_PPC64_GOT16_LO_DS:
4a421c53 9366 case R_PPC64_GOT_PCREL34:
066f4018
AM
9367 break;
9368 }
9369
9370 r_symndx = ELF64_R_SYM (rel->r_info);
9371 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9372 r_symndx, ibfd))
9373 goto got_error_ret;
9374
6d5554a6
AM
9375 if (sym_sec == NULL
9376 || sym_sec->output_section == NULL
9377 || discarded_section (sym_sec))
9378 continue;
9379
06507dab
AM
9380 if ((h ? h->type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
9381 continue;
9382
066f4018
AM
9383 if (!SYMBOL_REFERENCES_LOCAL (info, h))
9384 continue;
9385
9386 if (h != NULL)
9387 val = h->root.u.def.value;
9388 else
9389 val = sym->st_value;
133a1f60 9390 val += rel->r_addend;
066f4018
AM
9391 val += sym_sec->output_section->vma + sym_sec->output_offset;
9392
bb22a418
AM
9393/* Fudge factor to allow for the fact that the preliminary layout
9394 isn't exact. Reduce limits by this factor. */
9395#define LIMIT_ADJUST(LIMIT) ((LIMIT) - (LIMIT) / 16)
9396
066f4018
AM
9397 switch (r_type)
9398 {
9399 default:
9400 continue;
9401
066f4018 9402 case R_PPC64_GOT16_HA:
bb22a418
AM
9403 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9404 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9405 continue;
9406
9407 if (!bfd_get_section_contents (ibfd, sec, buf,
9408 rel->r_offset & ~3, 4))
9409 goto got_error_ret;
9410 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9411 if (((insn & ((0x3fu << 26) | 0x1f << 16))
066f4018
AM
9412 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9413 continue;
9414 break;
9415
9416 case R_PPC64_GOT16_LO_DS:
bb22a418
AM
9417 if (val - got + LIMIT_ADJUST (0x80008000ULL)
9418 >= LIMIT_ADJUST (0x100000000ULL))
066f4018
AM
9419 continue;
9420 if (!bfd_get_section_contents (ibfd, sec, buf,
9421 rel->r_offset & ~3, 4))
9422 goto got_error_ret;
9423 insn = bfd_get_32 (ibfd, buf);
2365f8d7 9424 if ((insn & (0x3fu << 26 | 0x3)) != 58u << 26 /* ld */)
066f4018
AM
9425 continue;
9426 break;
4a421c53
AM
9427
9428 case R_PPC64_GOT_PCREL34:
9429 pc = rel->r_offset;
9430 pc += sec->output_section->vma + sec->output_offset;
bb22a418
AM
9431 if (val - pc + LIMIT_ADJUST (1ULL << 33)
9432 >= LIMIT_ADJUST (1ULL << 34))
4a421c53
AM
9433 continue;
9434 if (!bfd_get_section_contents (ibfd, sec, buf,
9435 rel->r_offset & ~3, 8))
9436 goto got_error_ret;
9437 insn = bfd_get_32 (ibfd, buf);
9438 if ((insn & (-1u << 18)) != ((1u << 26) | (1u << 20)))
9439 continue;
9440 insn = bfd_get_32 (ibfd, buf + 4);
2365f8d7 9441 if ((insn & (0x3fu << 26)) != 57u << 26)
4a421c53
AM
9442 continue;
9443 break;
066f4018 9444 }
bb22a418 9445#undef LIMIT_ADJUST
066f4018
AM
9446
9447 if (h != NULL)
9448 ent = h->got.glist;
9449 else
9450 {
9451 struct got_entry **local_got_ents = elf_local_got_ents (ibfd);
9452 ent = local_got_ents[r_symndx];
9453 }
9454 for (; ent != NULL; ent = ent->next)
133a1f60 9455 if (ent->addend == rel->r_addend
066f4018
AM
9456 && ent->owner == ibfd
9457 && ent->tls_type == 0)
9458 break;
9459 BFD_ASSERT (ent && ent->got.refcount > 0);
9460 ent->got.refcount -= 1;
9461 }
9462
9463 if (elf_section_data (sec)->relocs != relstart)
9464 free (relstart);
9465 }
9466
9467 if (local_syms != NULL
9468 && symtab_hdr->contents != (unsigned char *) local_syms)
9469 {
9470 if (!info->keep_memory)
9471 free (local_syms);
9472 else
9473 symtab_hdr->contents = (unsigned char *) local_syms;
9474 }
9475 }
9476
c5614fa4
AM
9477 return TRUE;
9478}
9479
1bbe0902
AM
9480/* Return true iff input section I references the TOC using
9481 instructions limited to +/-32k offsets. */
9482
9483bfd_boolean
9484ppc64_elf_has_small_toc_reloc (asection *i)
9485{
9486 return (is_ppc64_elf (i->owner)
9487 && ppc64_elf_tdata (i->owner)->has_small_toc_reloc);
9488}
9489
927be08e
AM
9490/* Allocate space for one GOT entry. */
9491
9492static void
9493allocate_got (struct elf_link_hash_entry *h,
9494 struct bfd_link_info *info,
9495 struct got_entry *gent)
9496{
9497 struct ppc_link_hash_table *htab = ppc_hash_table (info);
ed7007c1 9498 struct ppc_link_hash_entry *eh = ppc_elf_hash_entry (h);
927be08e
AM
9499 int entsize = (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)
9500 ? 16 : 8);
9501 int rentsize = (gent->tls_type & eh->tls_mask & TLS_GD
9502 ? 2 : 1) * sizeof (Elf64_External_Rela);
9503 asection *got = ppc64_elf_tdata (gent->owner)->got;
9504
9505 gent->got.offset = got->size;
9506 got->size += entsize;
9507
19e08130 9508 if (h->type == STT_GNU_IFUNC)
927be08e 9509 {
33e44f2e 9510 htab->elf.irelplt->size += rentsize;
19e08130 9511 htab->got_reli_size += rentsize;
927be08e 9512 }
f15d0b54 9513 else if (((bfd_link_pic (info)
f749f26e 9514 && !(gent->tls_type != 0
f15d0b54
AM
9515 && bfd_link_executable (info)
9516 && SYMBOL_REFERENCES_LOCAL (info, h)))
f0158f44
AM
9517 || (htab->elf.dynamic_sections_created
9518 && h->dynindx != -1
9519 && !SYMBOL_REFERENCES_LOCAL (info, h)))
21d68fcd 9520 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
927be08e 9521 {
19e08130 9522 asection *relgot = ppc64_elf_tdata (gent->owner)->relgot;
927be08e 9523 relgot->size += rentsize;
927be08e
AM
9524 }
9525}
9526
7865406b
AM
9527/* This function merges got entries in the same toc group. */
9528
9529static void
9530merge_got_entries (struct got_entry **pent)
9531{
9532 struct got_entry *ent, *ent2;
9533
9534 for (ent = *pent; ent != NULL; ent = ent->next)
9535 if (!ent->is_indirect)
9536 for (ent2 = ent->next; ent2 != NULL; ent2 = ent2->next)
9537 if (!ent2->is_indirect
9538 && ent2->addend == ent->addend
9539 && ent2->tls_type == ent->tls_type
9540 && elf_gp (ent2->owner) == elf_gp (ent->owner))
9541 {
9542 ent2->is_indirect = TRUE;
9543 ent2->got.ent = ent;
9544 }
9545}
9546
46434633 9547/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
9548
9549static bfd_boolean
46434633
AM
9550ensure_undef_dynamic (struct bfd_link_info *info,
9551 struct elf_link_hash_entry *h)
f0158f44
AM
9552{
9553 struct elf_link_hash_table *htab = elf_hash_table (info);
9554
9555 if (htab->dynamic_sections_created
46434633
AM
9556 && ((info->dynamic_undefined_weak != 0
9557 && h->root.type == bfd_link_hash_undefweak)
9558 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
9559 && h->dynindx == -1
9560 && !h->forced_local
9561 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
9562 return bfd_elf_link_record_dynamic_symbol (info, h);
9563 return TRUE;
9564}
9565
65f38f15
AM
9566/* Allocate space in .plt, .got and associated reloc sections for
9567 dynamic relocs. */
5bd4f169 9568
b34976b6 9569static bfd_boolean
4ce794b7 9570allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5bd4f169 9571{
65f38f15
AM
9572 struct bfd_link_info *info;
9573 struct ppc_link_hash_table *htab;
5bd4f169 9574 asection *s;
65f38f15 9575 struct ppc_link_hash_entry *eh;
0b8bcf0d 9576 struct got_entry **pgent, *gent;
5bd4f169 9577
e92d460e 9578 if (h->root.type == bfd_link_hash_indirect)
b34976b6 9579 return TRUE;
5bd4f169 9580
65f38f15
AM
9581 info = (struct bfd_link_info *) inf;
9582 htab = ppc_hash_table (info);
4dfe6ac6
NC
9583 if (htab == NULL)
9584 return FALSE;
5bd4f169 9585
ed7007c1 9586 eh = ppc_elf_hash_entry (h);
951fd09b
AM
9587 /* Run through the TLS GD got entries first if we're changing them
9588 to TPREL. */
b00a0a86 9589 if ((eh->tls_mask & (TLS_TLS | TLS_GDIE)) == (TLS_TLS | TLS_GDIE))
951fd09b
AM
9590 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9591 if (gent->got.refcount > 0
9592 && (gent->tls_type & TLS_GD) != 0)
9593 {
9594 /* This was a GD entry that has been converted to TPREL. If
9595 there happens to be a TPREL entry we can use that one. */
9596 struct got_entry *ent;
9597 for (ent = h->got.glist; ent != NULL; ent = ent->next)
9598 if (ent->got.refcount > 0
9599 && (ent->tls_type & TLS_TPREL) != 0
e717da7e
AM
9600 && ent->addend == gent->addend
9601 && ent->owner == gent->owner)
951fd09b
AM
9602 {
9603 gent->got.refcount = 0;
9604 break;
9605 }
9606
9607 /* If not, then we'll be using our own TPREL entry. */
9608 if (gent->got.refcount != 0)
9609 gent->tls_type = TLS_TLS | TLS_TPREL;
9610 }
9611
7865406b
AM
9612 /* Remove any list entry that won't generate a word in the GOT before
9613 we call merge_got_entries. Otherwise we risk merging to empty
9614 entries. */
0b8bcf0d
AM
9615 pgent = &h->got.glist;
9616 while ((gent = *pgent) != NULL)
411e1bfb 9617 if (gent->got.refcount > 0)
7865406b
AM
9618 {
9619 if ((gent->tls_type & TLS_LD) != 0
f749f26e 9620 && SYMBOL_REFERENCES_LOCAL (info, h))
7865406b
AM
9621 {
9622 ppc64_tlsld_got (gent->owner)->got.refcount += 1;
9623 *pgent = gent->next;
9624 }
9625 else
9626 pgent = &gent->next;
9627 }
9628 else
9629 *pgent = gent->next;
9630
9631 if (!htab->do_multi_toc)
9632 merge_got_entries (&h->got.glist);
9633
9634 for (gent = h->got.glist; gent != NULL; gent = gent->next)
9635 if (!gent->is_indirect)
411e1bfb 9636 {
ec73ddcd
AM
9637 /* Ensure we catch all the cases where this symbol should
9638 be made dynamic. */
46434633 9639 if (!ensure_undef_dynamic (info, h))
f0158f44 9640 return FALSE;
65f38f15 9641
0c8d6e5c 9642 if (!is_ppc64_elf (gent->owner))
927be08e 9643 abort ();
0ffa91dd 9644
927be08e 9645 allocate_got (h, info, gent);
411e1bfb 9646 }
65f38f15 9647
954b63d4
AM
9648 /* If no dynamic sections we can't have dynamic relocs, except for
9649 IFUNCs which are handled even in static executables. */
8a2058b5
AM
9650 if (!htab->elf.dynamic_sections_created
9651 && h->type != STT_GNU_IFUNC)
190eb1dd 9652 h->dyn_relocs = NULL;
8a2058b5 9653
529fe20e
AM
9654 /* Discard relocs on undefined symbols that must be local. */
9655 else if (h->root.type == bfd_link_hash_undefined
9656 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 9657 h->dyn_relocs = NULL;
529fe20e 9658
954b63d4
AM
9659 /* Also discard relocs on undefined weak syms with non-default
9660 visibility, or when dynamic_undefined_weak says so. */
21d68fcd 9661 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 9662 h->dyn_relocs = NULL;
954b63d4 9663
190eb1dd 9664 if (h->dyn_relocs != NULL)
65f38f15 9665 {
8a2058b5
AM
9666 struct elf_dyn_relocs *p, **pp;
9667
57e7d118
AM
9668 /* In the shared -Bsymbolic case, discard space allocated for
9669 dynamic pc-relative relocs against symbols which turn out to
9670 be defined in regular objects. For the normal shared case,
9671 discard space for relocs that have become local due to symbol
9672 visibility changes. */
57e7d118 9673 if (bfd_link_pic (info))
65f38f15 9674 {
57e7d118
AM
9675 /* Relocs that use pc_count are those that appear on a call
9676 insn, or certain REL relocs (see must_be_dyn_reloc) that
9677 can be generated via assembly. We want calls to
9678 protected symbols to resolve directly to the function
9679 rather than going via the plt. If people want function
9680 pointer comparisons to work as expected then they should
9681 avoid writing weird assembly. */
9682 if (SYMBOL_CALLS_LOCAL (info, h))
9683 {
190eb1dd 9684 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
57e7d118
AM
9685 {
9686 p->count -= p->pc_count;
9687 p->pc_count = 0;
9688 if (p->count == 0)
9689 *pp = p->next;
9690 else
9691 pp = &p->next;
9692 }
9693 }
65f38f15 9694
190eb1dd 9695 if (h->dyn_relocs != NULL)
5bd4f169 9696 {
ec73ddcd
AM
9697 /* Ensure we catch all the cases where this symbol
9698 should be made dynamic. */
46434633 9699 if (!ensure_undef_dynamic (info, h))
f0158f44 9700 return FALSE;
5bd4f169 9701 }
65f38f15 9702 }
ec73ddcd
AM
9703
9704 /* For a fixed position executable, discard space for
9705 relocs against symbols which are not dynamic. */
9706 else if (h->type != STT_GNU_IFUNC)
57e7d118 9707 {
529fe20e
AM
9708 if (h->dynamic_adjusted
9709 && !h->def_regular
9710 && !ELF_COMMON_DEF_P (h))
f0158f44 9711 {
ec73ddcd
AM
9712 /* Ensure we catch all the cases where this symbol
9713 should be made dynamic. */
46434633 9714 if (!ensure_undef_dynamic (info, h))
f0158f44 9715 return FALSE;
dfbb6ac9 9716
ec73ddcd 9717 /* But if that didn't work out, discard dynamic relocs. */
f0158f44 9718 if (h->dynindx == -1)
190eb1dd 9719 h->dyn_relocs = NULL;
f0158f44
AM
9720 }
9721 else
190eb1dd 9722 h->dyn_relocs = NULL;
57e7d118
AM
9723 }
9724
9725 /* Finally, allocate space. */
190eb1dd 9726 for (p = h->dyn_relocs; p != NULL; p = p->next)
57e7d118
AM
9727 {
9728 asection *sreloc = elf_section_data (p->sec)->sreloc;
9729 if (eh->elf.type == STT_GNU_IFUNC)
9730 sreloc = htab->elf.irelplt;
9731 sreloc->size += p->count * sizeof (Elf64_External_Rela);
dfbb6ac9 9732 }
65f38f15 9733 }
57e7d118 9734
2d7ad24e
AM
9735 /* We might need a PLT entry when the symbol
9736 a) is dynamic, or
9737 b) is an ifunc, or
9738 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
9739 d) has plt16 relocs and we are linking statically. */
9740 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
9741 || h->type == STT_GNU_IFUNC
9742 || (h->needs_plt && h->dynamic_adjusted)
9743 || (h->needs_plt
9744 && h->def_regular
9745 && !htab->elf.dynamic_sections_created
3e04d765 9746 && !htab->can_convert_all_inline_plt
ed7007c1 9747 && (ppc_elf_hash_entry (h)->tls_mask
2d7ad24e 9748 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
65f38f15 9749 {
57e7d118
AM
9750 struct plt_entry *pent;
9751 bfd_boolean doneone = FALSE;
9752 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9753 if (pent->plt.refcount > 0)
9754 {
9755 if (!htab->elf.dynamic_sections_created
9756 || h->dynindx == -1)
9757 {
2d7ad24e
AM
9758 if (h->type == STT_GNU_IFUNC)
9759 {
9760 s = htab->elf.iplt;
9761 pent->plt.offset = s->size;
9762 s->size += PLT_ENTRY_SIZE (htab);
9763 s = htab->elf.irelplt;
9764 }
9765 else
9766 {
9767 s = htab->pltlocal;
9768 pent->plt.offset = s->size;
9769 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
9770 s = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9771 }
57e7d118
AM
9772 }
9773 else
9774 {
9775 /* If this is the first .plt entry, make room for the special
9776 first entry. */
9777 s = htab->elf.splt;
9778 if (s->size == 0)
9779 s->size += PLT_INITIAL_ENTRY_SIZE (htab);
65f38f15 9780
57e7d118 9781 pent->plt.offset = s->size;
65f38f15 9782
57e7d118
AM
9783 /* Make room for this entry. */
9784 s->size += PLT_ENTRY_SIZE (htab);
65f38f15 9785
57e7d118
AM
9786 /* Make room for the .glink code. */
9787 s = htab->glink;
9788 if (s->size == 0)
9e390558 9789 s->size += GLINK_PLTRESOLVE_SIZE (htab);
57e7d118
AM
9790 if (htab->opd_abi)
9791 {
9792 /* We need bigger stubs past index 32767. */
9e390558 9793 if (s->size >= GLINK_PLTRESOLVE_SIZE (htab) + 32768*2*4)
57e7d118
AM
9794 s->size += 4;
9795 s->size += 2*4;
9796 }
9797 else
9798 s->size += 4;
65f38f15 9799
57e7d118
AM
9800 /* We also need to make an entry in the .rela.plt section. */
9801 s = htab->elf.srelplt;
9802 }
2d7ad24e
AM
9803 if (s != NULL)
9804 s->size += sizeof (Elf64_External_Rela);
57e7d118
AM
9805 doneone = TRUE;
9806 }
9807 else
9808 pent->plt.offset = (bfd_vma) -1;
9809 if (!doneone)
9810 {
9811 h->plt.plist = NULL;
9812 h->needs_plt = 0;
9813 }
65f38f15 9814 }
57e7d118 9815 else
65f38f15 9816 {
57e7d118
AM
9817 h->plt.plist = NULL;
9818 h->needs_plt = 0;
65f38f15
AM
9819 }
9820
b34976b6 9821 return TRUE;
65f38f15
AM
9822}
9823
9e390558
AM
9824#define PPC_LO(v) ((v) & 0xffff)
9825#define PPC_HI(v) (((v) >> 16) & 0xffff)
9826#define PPC_HA(v) PPC_HI ((v) + 0x8000)
04bdff6a
AM
9827#define D34(v) \
9828 ((((v) & 0x3ffff0000ULL) << 16) | (v & 0xffff))
9829#define HA34(v) ((v + (1ULL << 33)) >> 34)
9e390558 9830
a345bc8d
AM
9831/* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9832 to set up space for global entry stubs. These are put in glink,
9833 after the branch table. */
65f38f15 9834
b34976b6 9835static bfd_boolean
a345bc8d 9836size_global_entry_stubs (struct elf_link_hash_entry *h, void *inf)
65f38f15 9837{
a345bc8d
AM
9838 struct bfd_link_info *info;
9839 struct ppc_link_hash_table *htab;
9840 struct plt_entry *pent;
9e390558 9841 asection *s, *plt;
65f38f15 9842
a345bc8d
AM
9843 if (h->root.type == bfd_link_hash_indirect)
9844 return TRUE;
65f38f15 9845
a345bc8d
AM
9846 if (!h->pointer_equality_needed)
9847 return TRUE;
65f38f15 9848
a345bc8d
AM
9849 if (h->def_regular)
9850 return TRUE;
65f38f15 9851
a345bc8d
AM
9852 info = inf;
9853 htab = ppc_hash_table (info);
9854 if (htab == NULL)
9855 return FALSE;
9856
9e390558
AM
9857 s = htab->global_entry;
9858 plt = htab->elf.splt;
a345bc8d
AM
9859 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
9860 if (pent->plt.offset != (bfd_vma) -1
9861 && pent->addend == 0)
9862 {
afe397ea
AM
9863 /* For ELFv2, if this symbol is not defined in a regular file
9864 and we are not generating a shared library or pie, then we
9865 need to define the symbol in the executable on a call stub.
9866 This is to avoid text relocations. */
9e390558
AM
9867 bfd_vma off, stub_align, stub_off, stub_size;
9868 unsigned int align_power;
9869
9870 stub_size = 16;
9871 stub_off = s->size;
9872 if (htab->params->plt_stub_align >= 0)
9873 align_power = htab->params->plt_stub_align;
9874 else
9875 align_power = -htab->params->plt_stub_align;
9876 /* Setting section alignment is delayed until we know it is
9877 non-empty. Otherwise the .text output section will be
9878 aligned at least to plt_stub_align even when no global
9879 entry stubs are needed. */
9880 if (s->alignment_power < align_power)
9881 s->alignment_power = align_power;
9882 stub_align = (bfd_vma) 1 << align_power;
9883 if (htab->params->plt_stub_align >= 0
9884 || ((((stub_off + stub_size - 1) & -stub_align)
9885 - (stub_off & -stub_align))
9886 > ((stub_size - 1) & -stub_align)))
9887 stub_off = (stub_off + stub_align - 1) & -stub_align;
9888 off = pent->plt.offset + plt->output_offset + plt->output_section->vma;
9889 off -= stub_off + s->output_offset + s->output_section->vma;
9890 /* Note that for --plt-stub-align negative we have a possible
9891 dependency between stub offset and size. Break that
9892 dependency by assuming the max stub size when calculating
9893 the stub offset. */
9894 if (PPC_HA (off) == 0)
9895 stub_size -= 4;
8a2058b5 9896 h->root.type = bfd_link_hash_defined;
afe397ea 9897 h->root.u.def.section = s;
9e390558
AM
9898 h->root.u.def.value = stub_off;
9899 s->size = stub_off + stub_size;
a345bc8d
AM
9900 break;
9901 }
9902 return TRUE;
9903}
9904
65f38f15
AM
9905/* Set the sizes of the dynamic sections. */
9906
b34976b6 9907static bfd_boolean
ee67d69a 9908ppc64_elf_size_dynamic_sections (bfd *output_bfd,
4ce794b7 9909 struct bfd_link_info *info)
65f38f15
AM
9910{
9911 struct ppc_link_hash_table *htab;
9912 bfd *dynobj;
9913 asection *s;
b34976b6 9914 bfd_boolean relocs;
65f38f15 9915 bfd *ibfd;
7865406b 9916 struct got_entry *first_tlsld;
65f38f15
AM
9917
9918 htab = ppc_hash_table (info);
4dfe6ac6
NC
9919 if (htab == NULL)
9920 return FALSE;
9921
65f38f15
AM
9922 dynobj = htab->elf.dynobj;
9923 if (dynobj == NULL)
9924 abort ();
9925
9926 if (htab->elf.dynamic_sections_created)
9927 {
9928 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 9929 if (bfd_link_executable (info) && !info->nointerp)
65f38f15 9930 {
3d4d4302 9931 s = bfd_get_linker_section (dynobj, ".interp");
65f38f15
AM
9932 if (s == NULL)
9933 abort ();
eea6121a 9934 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
65f38f15
AM
9935 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
9936 }
9937 }
9938
9939 /* Set up .got offsets for local syms, and space for local dynamic
9940 relocs. */
c72f2fb2 9941 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
65f38f15 9942 {
411e1bfb
AM
9943 struct got_entry **lgot_ents;
9944 struct got_entry **end_lgot_ents;
e054468f
AM
9945 struct plt_entry **local_plt;
9946 struct plt_entry **end_local_plt;
f961d9dd 9947 unsigned char *lgot_masks;
65f38f15
AM
9948 bfd_size_type locsymcount;
9949 Elf_Internal_Shdr *symtab_hdr;
65f38f15 9950
0c8d6e5c 9951 if (!is_ppc64_elf (ibfd))
65f38f15
AM
9952 continue;
9953
9954 for (s = ibfd->sections; s != NULL; s = s->next)
9955 {
19e08130 9956 struct ppc_dyn_relocs *p;
65f38f15 9957
6edfbbad 9958 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
65f38f15 9959 {
ec338859
AM
9960 if (!bfd_is_abs_section (p->sec)
9961 && bfd_is_abs_section (p->sec->output_section))
9962 {
9963 /* Input section has been discarded, either because
9964 it is a copy of a linkonce section or due to
9965 linker script /DISCARD/, so we'll be discarding
9966 the relocs too. */
9967 }
248866a8 9968 else if (p->count != 0)
ec338859 9969 {
19e08130
AM
9970 asection *srel = elf_section_data (p->sec)->sreloc;
9971 if (p->ifunc)
33e44f2e 9972 srel = htab->elf.irelplt;
eea6121a 9973 srel->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
9974 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
9975 info->flags |= DF_TEXTREL;
ec338859 9976 }
65f38f15
AM
9977 }
9978 }
9979
411e1bfb
AM
9980 lgot_ents = elf_local_got_ents (ibfd);
9981 if (!lgot_ents)
65f38f15
AM
9982 continue;
9983
0ffa91dd 9984 symtab_hdr = &elf_symtab_hdr (ibfd);
65f38f15 9985 locsymcount = symtab_hdr->sh_info;
411e1bfb 9986 end_lgot_ents = lgot_ents + locsymcount;
e054468f
AM
9987 local_plt = (struct plt_entry **) end_lgot_ents;
9988 end_local_plt = local_plt + locsymcount;
f961d9dd 9989 lgot_masks = (unsigned char *) end_local_plt;
e717da7e 9990 s = ppc64_elf_tdata (ibfd)->got;
e7b938ca 9991 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
65f38f15 9992 {
0b8bcf0d 9993 struct got_entry **pent, *ent;
411e1bfb 9994
0b8bcf0d
AM
9995 pent = lgot_ents;
9996 while ((ent = *pent) != NULL)
411e1bfb
AM
9997 if (ent->got.refcount > 0)
9998 {
e7b938ca 9999 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
411e1bfb 10000 {
927be08e 10001 ppc64_tlsld_got (ibfd)->got.refcount += 1;
0b8bcf0d 10002 *pent = ent->next;
411e1bfb
AM
10003 }
10004 else
10005 {
19e08130
AM
10006 unsigned int ent_size = 8;
10007 unsigned int rel_size = sizeof (Elf64_External_Rela);
10008
eea6121a 10009 ent->got.offset = s->size;
e7b938ca 10010 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
927be08e 10011 {
19e08130
AM
10012 ent_size *= 2;
10013 rel_size *= 2;
10014 }
10015 s->size += ent_size;
37da22e5 10016 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 10017 {
33e44f2e 10018 htab->elf.irelplt->size += rel_size;
19e08130
AM
10019 htab->got_reli_size += rel_size;
10020 }
93370e8e
AM
10021 else if (bfd_link_pic (info)
10022 && !(ent->tls_type != 0
10023 && bfd_link_executable (info)))
19e08130
AM
10024 {
10025 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10026 srel->size += rel_size;
927be08e 10027 }
0b8bcf0d 10028 pent = &ent->next;
411e1bfb
AM
10029 }
10030 }
10031 else
0b8bcf0d 10032 *pent = ent->next;
65f38f15 10033 }
e054468f 10034
2d7ad24e
AM
10035 /* Allocate space for plt calls to local syms. */
10036 lgot_masks = (unsigned char *) end_local_plt;
10037 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
10038 {
10039 struct plt_entry *ent;
10040
10041 for (ent = *local_plt; ent != NULL; ent = ent->next)
10042 if (ent->plt.refcount > 0)
10043 {
2d7ad24e
AM
10044 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
10045 {
10046 s = htab->elf.iplt;
10047 ent->plt.offset = s->size;
10048 s->size += PLT_ENTRY_SIZE (htab);
10049 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
10050 }
3e04d765
AM
10051 else if (htab->can_convert_all_inline_plt
10052 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
10053 ent->plt.offset = (bfd_vma) -1;
10054 else
10055 {
10056 s = htab->pltlocal;
10057 ent->plt.offset = s->size;
10058 s->size += LOCAL_PLT_ENTRY_SIZE (htab);
10059 if (bfd_link_pic (info))
10060 htab->relpltlocal->size += sizeof (Elf64_External_Rela);
10061 }
e054468f
AM
10062 }
10063 else
10064 ent->plt.offset = (bfd_vma) -1;
10065 }
65f38f15
AM
10066 }
10067
10068 /* Allocate global sym .plt and .got entries, and space for global
10069 sym dynamic relocs. */
4ce794b7 10070 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
a345bc8d 10071
0e1862bb 10072 if (!htab->opd_abi && !bfd_link_pic (info))
a345bc8d 10073 elf_link_hash_traverse (&htab->elf, size_global_entry_stubs, info);
65f38f15 10074
7865406b 10075 first_tlsld = NULL;
c72f2fb2 10076 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
102890f0 10077 {
7865406b
AM
10078 struct got_entry *ent;
10079
0c8d6e5c 10080 if (!is_ppc64_elf (ibfd))
102890f0
AM
10081 continue;
10082
7865406b
AM
10083 ent = ppc64_tlsld_got (ibfd);
10084 if (ent->got.refcount > 0)
102890f0 10085 {
7865406b 10086 if (!htab->do_multi_toc && first_tlsld != NULL)
102890f0 10087 {
7865406b
AM
10088 ent->is_indirect = TRUE;
10089 ent->got.ent = first_tlsld;
10090 }
10091 else
10092 {
10093 if (first_tlsld == NULL)
10094 first_tlsld = ent;
10095 s = ppc64_elf_tdata (ibfd)->got;
10096 ent->got.offset = s->size;
10097 ent->owner = ibfd;
10098 s->size += 16;
f749f26e 10099 if (bfd_link_dll (info))
7865406b
AM
10100 {
10101 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
10102 srel->size += sizeof (Elf64_External_Rela);
10103 }
102890f0
AM
10104 }
10105 }
10106 else
7865406b 10107 ent->got.offset = (bfd_vma) -1;
102890f0
AM
10108 }
10109
65f38f15
AM
10110 /* We now have determined the sizes of the various dynamic sections.
10111 Allocate memory for them. */
b34976b6 10112 relocs = FALSE;
65f38f15
AM
10113 for (s = dynobj->sections; s != NULL; s = s->next)
10114 {
10115 if ((s->flags & SEC_LINKER_CREATED) == 0)
10116 continue;
10117
4ce794b7 10118 if (s == htab->brlt || s == htab->relbrlt)
721956f4
AM
10119 /* These haven't been allocated yet; don't strip. */
10120 continue;
33e44f2e
AM
10121 else if (s == htab->elf.sgot
10122 || s == htab->elf.splt
10123 || s == htab->elf.iplt
2d7ad24e 10124 || s == htab->pltlocal
c456f082 10125 || s == htab->glink
9e390558 10126 || s == htab->global_entry
5474d94f
AM
10127 || s == htab->elf.sdynbss
10128 || s == htab->elf.sdynrelro)
65f38f15
AM
10129 {
10130 /* Strip this section if we don't need it; see the
10131 comment below. */
5bd4f169 10132 }
58d180e8
AM
10133 else if (s == htab->glink_eh_frame)
10134 {
10135 if (!bfd_is_abs_section (s->output_section))
10136 /* Not sized yet. */
10137 continue;
10138 }
70cc837d 10139 else if (CONST_STRNEQ (s->name, ".rela"))
5bd4f169 10140 {
c456f082 10141 if (s->size != 0)
5bd4f169 10142 {
33e44f2e 10143 if (s != htab->elf.srelplt)
b34976b6 10144 relocs = TRUE;
5bd4f169
AM
10145
10146 /* We use the reloc_count field as a counter if we need
10147 to copy relocs into the output file. */
10148 s->reloc_count = 0;
10149 }
10150 }
65f38f15 10151 else
5bd4f169
AM
10152 {
10153 /* It's not one of our sections, so don't allocate space. */
10154 continue;
10155 }
10156
eea6121a 10157 if (s->size == 0)
5bd4f169 10158 {
c456f082
AM
10159 /* If we don't need this section, strip it from the
10160 output file. This is mostly to handle .rela.bss and
10161 .rela.plt. We must create both sections in
10162 create_dynamic_sections, because they must be created
10163 before the linker maps input sections to output
10164 sections. The linker does that before
10165 adjust_dynamic_symbol is called, and it is that
10166 function which decides whether anything needs to go
10167 into these sections. */
8423293d 10168 s->flags |= SEC_EXCLUDE;
5bd4f169
AM
10169 continue;
10170 }
10171
06bcf541
AM
10172 if (bfd_is_abs_section (s->output_section))
10173 _bfd_error_handler (_("warning: discarding dynamic section %s"),
10174 s->name);
10175
c456f082 10176 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5f333394
AM
10177 continue;
10178
65f38f15
AM
10179 /* Allocate memory for the section contents. We use bfd_zalloc
10180 here in case unused entries are not reclaimed before the
10181 section's contents are written out. This should not happen,
411e1bfb
AM
10182 but this way if it does we get a R_PPC64_NONE reloc in .rela
10183 sections instead of garbage.
10184 We also rely on the section contents being zero when writing
5474d94f 10185 the GOT and .dynrelro. */
eea6121a 10186 s->contents = bfd_zalloc (dynobj, s->size);
65f38f15 10187 if (s->contents == NULL)
b34976b6 10188 return FALSE;
5bd4f169
AM
10189 }
10190
c72f2fb2 10191 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
e717da7e 10192 {
0c8d6e5c 10193 if (!is_ppc64_elf (ibfd))
7b53ace3
AM
10194 continue;
10195
e717da7e 10196 s = ppc64_elf_tdata (ibfd)->got;
33e44f2e 10197 if (s != NULL && s != htab->elf.sgot)
e717da7e 10198 {
eea6121a 10199 if (s->size == 0)
8423293d 10200 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10201 else
10202 {
eea6121a 10203 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10204 if (s->contents == NULL)
10205 return FALSE;
10206 }
10207 }
10208 s = ppc64_elf_tdata (ibfd)->relgot;
10209 if (s != NULL)
10210 {
eea6121a 10211 if (s->size == 0)
8423293d 10212 s->flags |= SEC_EXCLUDE;
e717da7e
AM
10213 else
10214 {
eea6121a 10215 s->contents = bfd_zalloc (ibfd, s->size);
e717da7e
AM
10216 if (s->contents == NULL)
10217 return FALSE;
10218 relocs = TRUE;
10219 s->reloc_count = 0;
10220 }
10221 }
10222 }
10223
e86ce104 10224 if (htab->elf.dynamic_sections_created)
5bd4f169 10225 {
e8910a83
AM
10226 bfd_boolean tls_opt;
10227
5bd4f169
AM
10228 /* Add some entries to the .dynamic section. We fill in the
10229 values later, in ppc64_elf_finish_dynamic_sections, but we
10230 must add the entries now so that we get the correct size for
10231 the .dynamic section. The DT_DEBUG entry is filled in by the
10232 dynamic linker and used by the debugger. */
dc810e39 10233#define add_dynamic_entry(TAG, VAL) \
5a580b3a 10234 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 10235
0e1862bb 10236 if (bfd_link_executable (info))
5bd4f169 10237 {
dc810e39 10238 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 10239 return FALSE;
5bd4f169
AM
10240 }
10241
33e44f2e 10242 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
5bd4f169 10243 {
dc810e39
AM
10244 if (!add_dynamic_entry (DT_PLTGOT, 0)
10245 || !add_dynamic_entry (DT_PLTRELSZ, 0)
10246 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5d1634d7
AM
10247 || !add_dynamic_entry (DT_JMPREL, 0)
10248 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
b34976b6 10249 return FALSE;
5bd4f169
AM
10250 }
10251
ee67d69a 10252 if (NO_OPD_RELOCS && abiversion (output_bfd) <= 1)
19397422
AM
10253 {
10254 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
10255 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
b34976b6 10256 return FALSE;
19397422
AM
10257 }
10258
7c9cf415 10259 tls_opt = (htab->params->tls_get_addr_opt
9e7028aa
AM
10260 && ((htab->tls_get_addr_fd != NULL
10261 && htab->tls_get_addr_fd->elf.plt.plist != NULL)
10262 || (htab->tga_desc_fd != NULL
10263 && htab->tga_desc_fd->elf.plt.plist != NULL)));
e8910a83
AM
10264 if (tls_opt || !htab->opd_abi)
10265 {
10266 if (!add_dynamic_entry (DT_PPC64_OPT, tls_opt ? PPC64_OPT_TLS : 0))
10267 return FALSE;
10268 }
a7f2871e 10269
5bd4f169
AM
10270 if (relocs)
10271 {
dc810e39
AM
10272 if (!add_dynamic_entry (DT_RELA, 0)
10273 || !add_dynamic_entry (DT_RELASZ, 0)
10274 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 10275 return FALSE;
5bd4f169 10276
65f38f15
AM
10277 /* If any dynamic relocs apply to a read-only section,
10278 then we need a DT_TEXTREL entry. */
248866a8 10279 if ((info->flags & DF_TEXTREL) == 0)
d49e5065
L
10280 elf_link_hash_traverse (&htab->elf,
10281 _bfd_elf_maybe_set_textrel, info);
5bd4f169 10282
65f38f15 10283 if ((info->flags & DF_TEXTREL) != 0)
5bd4f169 10284 {
65f38f15 10285 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 10286 return FALSE;
5bd4f169 10287 }
5bd4f169 10288 }
5bd4f169 10289 }
65f38f15 10290#undef add_dynamic_entry
5bd4f169 10291
b34976b6 10292 return TRUE;
5bd4f169
AM
10293}
10294
a345bc8d
AM
10295/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10296
10297static bfd_boolean
10298ppc64_elf_hash_symbol (struct elf_link_hash_entry *h)
10299{
10300 if (h->plt.plist != NULL
10301 && !h->def_regular
10302 && !h->pointer_equality_needed)
10303 return FALSE;
10304
10305 return _bfd_elf_hash_symbol (h);
10306}
10307
721956f4 10308/* Determine the type of stub needed, if any, for a call. */
5bd4f169 10309
4ce794b7
AM
10310static inline enum ppc_stub_type
10311ppc_type_of_stub (asection *input_sec,
10312 const Elf_Internal_Rela *rel,
10313 struct ppc_link_hash_entry **hash,
e054468f 10314 struct plt_entry **plt_ent,
6911b7dc
AM
10315 bfd_vma destination,
10316 unsigned long local_off)
5bd4f169 10317{
721956f4
AM
10318 struct ppc_link_hash_entry *h = *hash;
10319 bfd_vma location;
10320 bfd_vma branch_offset;
10321 bfd_vma max_branch_offset;
4ce794b7 10322 enum elf_ppc64_reloc_type r_type;
5bd4f169 10323
721956f4
AM
10324 if (h != NULL)
10325 {
e054468f 10326 struct plt_entry *ent;
7fe2b9a6 10327 struct ppc_link_hash_entry *fdh = h;
b31867b6
AM
10328 if (h->oh != NULL
10329 && h->oh->is_func_descriptor)
7b8f6675
AM
10330 {
10331 fdh = ppc_follow_link (h->oh);
10332 *hash = fdh;
10333 }
8387904d 10334
e054468f
AM
10335 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
10336 if (ent->addend == rel->r_addend
10337 && ent->plt.offset != (bfd_vma) -1)
10338 {
e054468f
AM
10339 *plt_ent = ent;
10340 return ppc_stub_plt_call;
10341 }
5bd4f169 10342
7fe2b9a6
AM
10343 /* Here, we know we don't have a plt entry. If we don't have a
10344 either a defined function descriptor or a defined entry symbol
10345 in a regular object file, then it is pointless trying to make
10346 any other type of stub. */
854b41e7
AM
10347 if (!is_static_defined (&fdh->elf)
10348 && !is_static_defined (&h->elf))
721956f4 10349 return ppc_stub_none;
5d1634d7 10350 }
e054468f
AM
10351 else if (elf_local_got_ents (input_sec->owner) != NULL)
10352 {
10353 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (input_sec->owner);
10354 struct plt_entry **local_plt = (struct plt_entry **)
10355 elf_local_got_ents (input_sec->owner) + symtab_hdr->sh_info;
10356 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
10357
10358 if (local_plt[r_symndx] != NULL)
10359 {
10360 struct plt_entry *ent;
10361
10362 for (ent = local_plt[r_symndx]; ent != NULL; ent = ent->next)
10363 if (ent->addend == rel->r_addend
10364 && ent->plt.offset != (bfd_vma) -1)
10365 {
10366 *plt_ent = ent;
10367 return ppc_stub_plt_call;
10368 }
10369 }
10370 }
5d1634d7 10371
721956f4
AM
10372 /* Determine where the call point is. */
10373 location = (input_sec->output_offset
10374 + input_sec->output_section->vma
10375 + rel->r_offset);
5d1634d7 10376
721956f4
AM
10377 branch_offset = destination - location;
10378 r_type = ELF64_R_TYPE (rel->r_info);
5d1634d7 10379
721956f4
AM
10380 /* Determine if a long branch stub is needed. */
10381 max_branch_offset = 1 << 25;
23cedd1d
AM
10382 if (r_type == R_PPC64_REL14
10383 || r_type == R_PPC64_REL14_BRTAKEN
10384 || r_type == R_PPC64_REL14_BRNTAKEN)
721956f4 10385 max_branch_offset = 1 << 15;
5d1634d7 10386
6911b7dc 10387 if (branch_offset + max_branch_offset >= 2 * max_branch_offset - local_off)
721956f4
AM
10388 /* We need a stub. Figure out whether a long_branch or plt_branch
10389 is needed later. */
10390 return ppc_stub_long_branch;
5d1634d7 10391
721956f4 10392 return ppc_stub_none;
5d1634d7
AM
10393}
10394
f891966f
AM
10395/* Gets the address of a label (1:) in r11 and builds an offset in r12,
10396 then adds it to r11 (LOAD false) or loads r12 from r11+r12 (LOAD true).
10397 . mflr %r12
10398 . bcl 20,31,1f
10399 .1: mflr %r11
10400 . mtlr %r12
05d0e962 10401 . lis %r12,xxx-1b@highest
f891966f 10402 . ori %r12,%r12,xxx-1b@higher
05d0e962 10403 . sldi %r12,%r12,32
f891966f 10404 . oris %r12,%r12,xxx-1b@high
05d0e962 10405 . ori %r12,%r12,xxx-1b@l
f891966f 10406 . add/ldx %r12,%r11,%r12 */
05d0e962
AM
10407
10408static bfd_byte *
10409build_offset (bfd *abfd, bfd_byte *p, bfd_vma off, bfd_boolean load)
10410{
f891966f
AM
10411 bfd_put_32 (abfd, MFLR_R12, p);
10412 p += 4;
10413 bfd_put_32 (abfd, BCL_20_31, p);
10414 p += 4;
10415 bfd_put_32 (abfd, MFLR_R11, p);
10416 p += 4;
10417 bfd_put_32 (abfd, MTLR_R12, p);
10418 p += 4;
05d0e962
AM
10419 if (off + 0x8000 < 0x10000)
10420 {
10421 if (load)
10422 bfd_put_32 (abfd, LD_R12_0R11 + PPC_LO (off), p);
10423 else
10424 bfd_put_32 (abfd, ADDI_R12_R11 + PPC_LO (off), p);
10425 p += 4;
10426 }
10427 else if (off + 0x80008000ULL < 0x100000000ULL)
10428 {
10429 bfd_put_32 (abfd, ADDIS_R12_R11 + PPC_HA (off), p);
10430 p += 4;
10431 if (load)
10432 bfd_put_32 (abfd, LD_R12_0R12 + PPC_LO (off), p);
10433 else
10434 bfd_put_32 (abfd, ADDI_R12_R12 + PPC_LO (off), p);
10435 p += 4;
10436 }
10437 else
10438 {
10439 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10440 {
10441 bfd_put_32 (abfd, LI_R12_0 + ((off >> 32) & 0xffff), p);
10442 p += 4;
10443 }
10444 else
10445 {
10446 bfd_put_32 (abfd, LIS_R12 + ((off >> 48) & 0xffff), p);
10447 p += 4;
10448 if (((off >> 32) & 0xffff) != 0)
10449 {
10450 bfd_put_32 (abfd, ORI_R12_R12_0 + ((off >> 32) & 0xffff), p);
10451 p += 4;
10452 }
10453 }
10454 if (((off >> 32) & 0xffffffffULL) != 0)
10455 {
10456 bfd_put_32 (abfd, SLDI_R12_R12_32, p);
10457 p += 4;
10458 }
10459 if (PPC_HI (off) != 0)
10460 {
10461 bfd_put_32 (abfd, ORIS_R12_R12_0 + PPC_HI (off), p);
10462 p += 4;
10463 }
10464 if (PPC_LO (off) != 0)
10465 {
10466 bfd_put_32 (abfd, ORI_R12_R12_0 + PPC_LO (off), p);
10467 p += 4;
10468 }
10469 if (load)
10470 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10471 else
10472 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10473 p += 4;
10474 }
10475 return p;
10476}
10477
10478static unsigned int
10479size_offset (bfd_vma off)
10480{
10481 unsigned int size;
10482 if (off + 0x8000 < 0x10000)
10483 size = 4;
10484 else if (off + 0x80008000ULL < 0x100000000ULL)
10485 size = 8;
10486 else
10487 {
10488 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10489 size = 4;
10490 else
10491 {
10492 size = 4;
10493 if (((off >> 32) & 0xffff) != 0)
10494 size += 4;
10495 }
10496 if (((off >> 32) & 0xffffffffULL) != 0)
10497 size += 4;
10498 if (PPC_HI (off) != 0)
10499 size += 4;
10500 if (PPC_LO (off) != 0)
10501 size += 4;
10502 size += 4;
10503 }
f891966f 10504 return size + 16;
05d0e962
AM
10505}
10506
3d58e1fc
AM
10507static unsigned int
10508num_relocs_for_offset (bfd_vma off)
10509{
10510 unsigned int num_rel;
10511 if (off + 0x8000 < 0x10000)
10512 num_rel = 1;
10513 else if (off + 0x80008000ULL < 0x100000000ULL)
10514 num_rel = 2;
10515 else
10516 {
10517 num_rel = 1;
10518 if (off + 0x800000000000ULL >= 0x1000000000000ULL
10519 && ((off >> 32) & 0xffff) != 0)
10520 num_rel += 1;
10521 if (PPC_HI (off) != 0)
10522 num_rel += 1;
10523 if (PPC_LO (off) != 0)
10524 num_rel += 1;
10525 }
10526 return num_rel;
10527}
10528
10529static Elf_Internal_Rela *
10530emit_relocs_for_offset (struct bfd_link_info *info, Elf_Internal_Rela *r,
10531 bfd_vma roff, bfd_vma targ, bfd_vma off)
10532{
10533 bfd_vma relative_targ = targ - (roff - 8);
10534 if (bfd_big_endian (info->output_bfd))
10535 roff += 2;
10536 r->r_offset = roff;
10537 r->r_addend = relative_targ + roff;
10538 if (off + 0x8000 < 0x10000)
10539 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16);
10540 else if (off + 0x80008000ULL < 0x100000000ULL)
10541 {
10542 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HA);
10543 ++r;
10544 roff += 4;
10545 r->r_offset = roff;
10546 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10547 r->r_addend = relative_targ + roff;
10548 }
10549 else
10550 {
10551 if (off + 0x800000000000ULL < 0x1000000000000ULL)
10552 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10553 else
10554 {
10555 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHEST);
10556 if (((off >> 32) & 0xffff) != 0)
10557 {
10558 ++r;
10559 roff += 4;
10560 r->r_offset = roff;
10561 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHER);
10562 r->r_addend = relative_targ + roff;
10563 }
10564 }
10565 if (((off >> 32) & 0xffffffffULL) != 0)
10566 roff += 4;
10567 if (PPC_HI (off) != 0)
10568 {
10569 ++r;
10570 roff += 4;
10571 r->r_offset = roff;
10572 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGH);
10573 r->r_addend = relative_targ + roff;
10574 }
10575 if (PPC_LO (off) != 0)
10576 {
10577 ++r;
10578 roff += 4;
10579 r->r_offset = roff;
10580 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_LO);
10581 r->r_addend = relative_targ + roff;
10582 }
10583 }
10584 return r;
10585}
10586
04bdff6a 10587static bfd_byte *
7c1f4227 10588build_power10_offset (bfd *abfd, bfd_byte *p, bfd_vma off, int odd,
04bdff6a
AM
10589 bfd_boolean load)
10590{
10591 uint64_t insn;
10592 if (off - odd + (1ULL << 33) < 1ULL << 34)
10593 {
10594 off -= odd;
10595 if (odd)
10596 {
10597 bfd_put_32 (abfd, NOP, p);
10598 p += 4;
10599 }
10600 if (load)
10601 insn = PLD_R12_PC;
10602 else
10603 insn = PADDI_R12_PC;
10604 insn |= D34 (off);
10605 bfd_put_32 (abfd, insn >> 32, p);
10606 p += 4;
10607 bfd_put_32 (abfd, insn, p);
10608 }
10609 /* The minimum value for paddi is -0x200000000. The minimum value
10610 for li is -0x8000, which when shifted by 34 and added gives a
10611 minimum value of -0x2000200000000. The maximum value is
10612 0x1ffffffff+0x7fff<<34 which is 0x2000200000000-1. */
10613 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10614 {
10615 off -= 8 - odd;
10616 bfd_put_32 (abfd, LI_R11_0 | (HA34 (off) & 0xffff), p);
10617 p += 4;
10618 if (!odd)
10619 {
10620 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10621 p += 4;
10622 }
10623 insn = PADDI_R12_PC | D34 (off);
10624 bfd_put_32 (abfd, insn >> 32, p);
10625 p += 4;
10626 bfd_put_32 (abfd, insn, p);
10627 p += 4;
10628 if (odd)
10629 {
10630 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10631 p += 4;
10632 }
10633 if (load)
10634 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10635 else
10636 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10637 }
10638 else
10639 {
10640 off -= odd + 8;
10641 bfd_put_32 (abfd, LIS_R11 | ((HA34 (off) >> 16) & 0x3fff), p);
10642 p += 4;
10643 bfd_put_32 (abfd, ORI_R11_R11_0 | (HA34 (off) & 0xffff), p);
10644 p += 4;
10645 if (odd)
10646 {
10647 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10648 p += 4;
10649 }
10650 insn = PADDI_R12_PC | D34 (off);
10651 bfd_put_32 (abfd, insn >> 32, p);
10652 p += 4;
10653 bfd_put_32 (abfd, insn, p);
10654 p += 4;
10655 if (!odd)
10656 {
10657 bfd_put_32 (abfd, SLDI_R11_R11_34, p);
10658 p += 4;
10659 }
10660 if (load)
10661 bfd_put_32 (abfd, LDX_R12_R11_R12, p);
10662 else
10663 bfd_put_32 (abfd, ADD_R12_R11_R12, p);
10664 }
10665 p += 4;
10666 return p;
10667}
10668
10669static unsigned int
7c1f4227 10670size_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10671{
10672 if (off - odd + (1ULL << 33) < 1ULL << 34)
10673 return odd + 8;
10674 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10675 return 20;
10676 else
10677 return 24;
10678}
10679
10680static unsigned int
7c1f4227 10681num_relocs_for_power10_offset (bfd_vma off, int odd)
04bdff6a
AM
10682{
10683 if (off - odd + (1ULL << 33) < 1ULL << 34)
10684 return 1;
10685 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10686 return 2;
10687 else
10688 return 3;
10689}
10690
10691static Elf_Internal_Rela *
7c1f4227 10692emit_relocs_for_power10_offset (struct bfd_link_info *info,
04bdff6a
AM
10693 Elf_Internal_Rela *r, bfd_vma roff,
10694 bfd_vma targ, bfd_vma off, int odd)
10695{
10696 if (off - odd + (1ULL << 33) < 1ULL << 34)
10697 roff += odd;
10698 else if (off - (8 - odd) + (0x20002ULL << 32) < 0x40004ULL << 32)
10699 {
10700 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10701 r->r_offset = roff + d_offset;
10702 r->r_addend = targ + 8 - odd - d_offset;
10703 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10704 ++r;
10705 roff += 8 - odd;
10706 }
10707 else
10708 {
10709 int d_offset = bfd_big_endian (info->output_bfd) ? 2 : 0;
10710 r->r_offset = roff + d_offset;
10711 r->r_addend = targ + 8 + odd - d_offset;
10712 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHESTA34);
10713 ++r;
10714 roff += 4;
10715 r->r_offset = roff + d_offset;
10716 r->r_addend = targ + 4 + odd - d_offset;
10717 r->r_info = ELF64_R_INFO (0, R_PPC64_REL16_HIGHERA34);
10718 ++r;
10719 roff += 4 + odd;
10720 }
10721 r->r_offset = roff;
10722 r->r_addend = targ;
10723 r->r_info = ELF64_R_INFO (0, R_PPC64_PCREL34);
10724 return r;
10725}
10726
df136d64
AM
10727/* Emit .eh_frame opcode to advance pc by DELTA. */
10728
10729static bfd_byte *
10730eh_advance (bfd *abfd, bfd_byte *eh, unsigned int delta)
10731{
10732 delta /= 4;
10733 if (delta < 64)
10734 *eh++ = DW_CFA_advance_loc + delta;
10735 else if (delta < 256)
10736 {
10737 *eh++ = DW_CFA_advance_loc1;
10738 *eh++ = delta;
10739 }
10740 else if (delta < 65536)
10741 {
10742 *eh++ = DW_CFA_advance_loc2;
10743 bfd_put_16 (abfd, delta, eh);
10744 eh += 2;
10745 }
10746 else
10747 {
10748 *eh++ = DW_CFA_advance_loc4;
10749 bfd_put_32 (abfd, delta, eh);
10750 eh += 4;
10751 }
10752 return eh;
10753}
10754
10755/* Size of required .eh_frame opcode to advance pc by DELTA. */
10756
10757static unsigned int
10758eh_advance_size (unsigned int delta)
10759{
10760 if (delta < 64 * 4)
10761 /* DW_CFA_advance_loc+[1..63]. */
10762 return 1;
10763 if (delta < 256 * 4)
10764 /* DW_CFA_advance_loc1, byte. */
10765 return 2;
10766 if (delta < 65536 * 4)
10767 /* DW_CFA_advance_loc2, 2 bytes. */
10768 return 3;
10769 /* DW_CFA_advance_loc4, 4 bytes. */
10770 return 5;
10771}
10772
794e51c0
AM
10773/* With power7 weakly ordered memory model, it is possible for ld.so
10774 to update a plt entry in one thread and have another thread see a
10775 stale zero toc entry. To avoid this we need some sort of acquire
10776 barrier in the call stub. One solution is to make the load of the
10777 toc word seem to appear to depend on the load of the function entry
10778 word. Another solution is to test for r2 being zero, and branch to
10779 the appropriate glink entry if so.
10780
10781 . fake dep barrier compare
71a39c98
AM
10782 . ld 12,xxx(2) ld 12,xxx(2)
10783 . mtctr 12 mtctr 12
10784 . xor 11,12,12 ld 2,xxx+8(2)
794e51c0
AM
10785 . add 2,2,11 cmpldi 2,0
10786 . ld 2,xxx+8(2) bnectr+
10787 . bctr b <glink_entry>
10788
10789 The solution involving the compare turns out to be faster, so
10790 that's what we use unless the branch won't reach. */
10791
10792#define ALWAYS_USE_FAKE_DEP 0
10793#define ALWAYS_EMIT_R2SAVE 0
5d1634d7 10794
794e51c0
AM
10795static inline unsigned int
10796plt_stub_size (struct ppc_link_hash_table *htab,
10797 struct ppc_stub_hash_entry *stub_entry,
10798 bfd_vma off)
10799{
05d0e962 10800 unsigned size;
b9e5796b 10801
05d0e962
AM
10802 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
10803 {
d349c8e2 10804 if (htab->params->power10_stubs != 0)
04bdff6a
AM
10805 {
10806 bfd_vma start = (stub_entry->stub_offset
10807 + stub_entry->group->stub_sec->output_offset
10808 + stub_entry->group->stub_sec->output_section->vma);
10809 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10810 start += 4;
7c1f4227 10811 size = 8 + size_power10_offset (off, start & 4);
04bdff6a
AM
10812 }
10813 else
10814 size = 8 + size_offset (off - 8);
05d0e962
AM
10815 if (stub_entry->stub_type > ppc_stub_plt_call_notoc)
10816 size += 4;
10817 return size;
10818 }
10819
10820 size = 12;
b9e5796b
AM
10821 if (ALWAYS_EMIT_R2SAVE
10822 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10823 size += 4;
10824 if (PPC_HA (off) != 0)
794e51c0 10825 size += 4;
b9e5796b
AM
10826 if (htab->opd_abi)
10827 {
10828 size += 4;
e7d1c40c 10829 if (htab->params->plt_static_chain)
b9e5796b 10830 size += 4;
bd4d2eaa
AM
10831 if (htab->params->plt_thread_safe
10832 && htab->elf.dynamic_sections_created
10833 && stub_entry->h != NULL
10834 && stub_entry->h->elf.dynindx != -1)
b9e5796b 10835 size += 8;
e7d1c40c 10836 if (PPC_HA (off + 8 + 8 * htab->params->plt_static_chain) != PPC_HA (off))
b9e5796b
AM
10837 size += 4;
10838 }
794e51c0 10839 if (stub_entry->h != NULL
ed7007c1 10840 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10841 && htab->params->tls_get_addr_opt)
f378ab09 10842 {
9e7028aa
AM
10843 if (htab->params->no_tls_get_addr_regsave)
10844 {
10845 size += 7 * 4;
10846 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10847 size += 6 * 4;
10848 }
10849 else
10850 {
10851 size += 30 * 4;
10852 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
10853 size += 4;
10854 }
f378ab09 10855 }
794e51c0
AM
10856 return size;
10857}
10858
2420fff6
AM
10859/* Depending on the sign of plt_stub_align:
10860 If positive, return the padding to align to a 2**plt_stub_align
10861 boundary.
10862 If negative, if this stub would cross fewer 2**plt_stub_align
10863 boundaries if we align, then return the padding needed to do so. */
10864
794e51c0
AM
10865static inline unsigned int
10866plt_stub_pad (struct ppc_link_hash_table *htab,
10867 struct ppc_stub_hash_entry *stub_entry,
10868 bfd_vma plt_off)
10869{
2420fff6 10870 int stub_align;
1aa42141 10871 unsigned stub_size;
6f20ed8a 10872 bfd_vma stub_off = stub_entry->group->stub_sec->size;
794e51c0 10873
2420fff6
AM
10874 if (htab->params->plt_stub_align >= 0)
10875 {
10876 stub_align = 1 << htab->params->plt_stub_align;
10877 if ((stub_off & (stub_align - 1)) != 0)
10878 return stub_align - (stub_off & (stub_align - 1));
10879 return 0;
10880 }
10881
10882 stub_align = 1 << -htab->params->plt_stub_align;
1aa42141 10883 stub_size = plt_stub_size (htab, stub_entry, plt_off);
794e51c0 10884 if (((stub_off + stub_size - 1) & -stub_align) - (stub_off & -stub_align)
e05fa0ba 10885 > ((stub_size - 1) & -stub_align))
794e51c0
AM
10886 return stub_align - (stub_off & (stub_align - 1));
10887 return 0;
10888}
10889
10890/* Build a .plt call stub. */
10891
10892static inline bfd_byte *
10893build_plt_stub (struct ppc_link_hash_table *htab,
10894 struct ppc_stub_hash_entry *stub_entry,
10895 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
10896{
e7d1c40c 10897 bfd *obfd = htab->params->stub_bfd;
b9e5796b 10898 bfd_boolean plt_load_toc = htab->opd_abi;
e7d1c40c 10899 bfd_boolean plt_static_chain = htab->params->plt_static_chain;
bd4d2eaa
AM
10900 bfd_boolean plt_thread_safe = (htab->params->plt_thread_safe
10901 && htab->elf.dynamic_sections_created
10902 && stub_entry->h != NULL
10903 && stub_entry->h->elf.dynindx != -1);
794e51c0
AM
10904 bfd_boolean use_fake_dep = plt_thread_safe;
10905 bfd_vma cmp_branch_off = 0;
10906
10907 if (!ALWAYS_USE_FAKE_DEP
b9e5796b 10908 && plt_load_toc
794e51c0 10909 && plt_thread_safe
ed7007c1 10910 && !(is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 10911 && htab->params->tls_get_addr_opt))
794e51c0
AM
10912 {
10913 bfd_vma pltoff = stub_entry->plt_ent->plt.offset & ~1;
b9e5796b
AM
10914 bfd_vma pltindex = ((pltoff - PLT_INITIAL_ENTRY_SIZE (htab))
10915 / PLT_ENTRY_SIZE (htab));
9e390558 10916 bfd_vma glinkoff = GLINK_PLTRESOLVE_SIZE (htab) + pltindex * 8;
794e51c0
AM
10917 bfd_vma to, from;
10918
68d62958
AM
10919 if (pltindex > 32768)
10920 glinkoff += (pltindex - 32768) * 4;
794e51c0
AM
10921 to = (glinkoff
10922 + htab->glink->output_offset
10923 + htab->glink->output_section->vma);
6f20ed8a 10924 from = (p - stub_entry->group->stub_sec->contents
794e51c0
AM
10925 + 4 * (ALWAYS_EMIT_R2SAVE
10926 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10927 + 4 * (PPC_HA (offset) != 0)
10928 + 4 * (PPC_HA (offset + 8 + 8 * plt_static_chain)
10929 != PPC_HA (offset))
10930 + 4 * (plt_static_chain != 0)
10931 + 20
6f20ed8a
AM
10932 + stub_entry->group->stub_sec->output_offset
10933 + stub_entry->group->stub_sec->output_section->vma);
794e51c0
AM
10934 cmp_branch_off = to - from;
10935 use_fake_dep = cmp_branch_off + (1 << 25) >= (1 << 26);
10936 }
10937
ac2df442
AM
10938 if (PPC_HA (offset) != 0)
10939 {
176a0d42
AM
10940 if (r != NULL)
10941 {
794e51c0
AM
10942 if (ALWAYS_EMIT_R2SAVE
10943 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
10944 r[0].r_offset += 4;
176a0d42 10945 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
3b421ab3 10946 r[1].r_offset = r[0].r_offset + 4;
176a0d42
AM
10947 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10948 r[1].r_addend = r[0].r_addend;
b9e5796b 10949 if (plt_load_toc)
176a0d42 10950 {
b9e5796b 10951 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 10952 {
b9e5796b
AM
10953 r[2].r_offset = r[1].r_offset + 4;
10954 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO);
10955 r[2].r_addend = r[0].r_addend;
10956 }
10957 else
10958 {
10959 r[2].r_offset = r[1].r_offset + 8 + 8 * use_fake_dep;
10960 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10961 r[2].r_addend = r[0].r_addend + 8;
10962 if (plt_static_chain)
10963 {
10964 r[3].r_offset = r[2].r_offset + 4;
10965 r[3].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
10966 r[3].r_addend = r[0].r_addend + 16;
10967 }
c7131b65 10968 }
176a0d42
AM
10969 }
10970 }
794e51c0
AM
10971 if (ALWAYS_EMIT_R2SAVE
10972 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 10973 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
397998fc
AM
10974 if (plt_load_toc)
10975 {
10976 bfd_put_32 (obfd, ADDIS_R11_R2 | PPC_HA (offset), p), p += 4;
10977 bfd_put_32 (obfd, LD_R12_0R11 | PPC_LO (offset), p), p += 4;
10978 }
10979 else
10980 {
10981 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
10982 bfd_put_32 (obfd, LD_R12_0R12 | PPC_LO (offset), p), p += 4;
10983 }
b9e5796b
AM
10984 if (plt_load_toc
10985 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442 10986 {
71a39c98 10987 bfd_put_32 (obfd, ADDI_R11_R11 | PPC_LO (offset), p), p += 4;
ac2df442
AM
10988 offset = 0;
10989 }
71a39c98 10990 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 10991 if (plt_load_toc)
794e51c0 10992 {
b9e5796b
AM
10993 if (use_fake_dep)
10994 {
10995 bfd_put_32 (obfd, XOR_R2_R12_R12, p), p += 4;
10996 bfd_put_32 (obfd, ADD_R11_R11_R2, p), p += 4;
10997 }
10998 bfd_put_32 (obfd, LD_R2_0R11 | PPC_LO (offset + 8), p), p += 4;
10999 if (plt_static_chain)
11000 bfd_put_32 (obfd, LD_R11_0R11 | PPC_LO (offset + 16), p), p += 4;
794e51c0 11001 }
ac2df442
AM
11002 }
11003 else
11004 {
176a0d42
AM
11005 if (r != NULL)
11006 {
794e51c0
AM
11007 if (ALWAYS_EMIT_R2SAVE
11008 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
11009 r[0].r_offset += 4;
176a0d42 11010 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
b9e5796b 11011 if (plt_load_toc)
176a0d42 11012 {
b9e5796b 11013 if (PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
c7131b65 11014 {
b9e5796b
AM
11015 r[1].r_offset = r[0].r_offset + 4;
11016 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16);
11017 r[1].r_addend = r[0].r_addend;
11018 }
11019 else
11020 {
11021 r[1].r_offset = r[0].r_offset + 8 + 8 * use_fake_dep;
11022 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11023 r[1].r_addend = r[0].r_addend + 8 + 8 * plt_static_chain;
11024 if (plt_static_chain)
11025 {
11026 r[2].r_offset = r[1].r_offset + 4;
11027 r[2].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
11028 r[2].r_addend = r[0].r_addend + 8;
11029 }
c7131b65 11030 }
176a0d42
AM
11031 }
11032 }
794e51c0
AM
11033 if (ALWAYS_EMIT_R2SAVE
11034 || stub_entry->stub_type == ppc_stub_plt_call_r2save)
a078d95a 11035 bfd_put_32 (obfd, STD_R2_0R1 + STK_TOC (htab), p), p += 4;
71a39c98 11036 bfd_put_32 (obfd, LD_R12_0R2 | PPC_LO (offset), p), p += 4;
b9e5796b
AM
11037 if (plt_load_toc
11038 && PPC_HA (offset + 8 + 8 * plt_static_chain) != PPC_HA (offset))
ac2df442
AM
11039 {
11040 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
11041 offset = 0;
11042 }
71a39c98 11043 bfd_put_32 (obfd, MTCTR_R12, p), p += 4;
b9e5796b 11044 if (plt_load_toc)
794e51c0 11045 {
b9e5796b
AM
11046 if (use_fake_dep)
11047 {
11048 bfd_put_32 (obfd, XOR_R11_R12_R12, p), p += 4;
11049 bfd_put_32 (obfd, ADD_R2_R2_R11, p), p += 4;
11050 }
11051 if (plt_static_chain)
11052 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
11053 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
794e51c0 11054 }
ac2df442 11055 }
b9e5796b 11056 if (plt_load_toc && plt_thread_safe && !use_fake_dep)
794e51c0
AM
11057 {
11058 bfd_put_32 (obfd, CMPLDI_R2_0, p), p += 4;
11059 bfd_put_32 (obfd, BNECTR_P4, p), p += 4;
22aa0c7e 11060 bfd_put_32 (obfd, B_DOT | (cmp_branch_off & 0x3fffffc), p), p += 4;
794e51c0
AM
11061 }
11062 else
407aa07c 11063 bfd_put_32 (obfd, BCTR, p), p += 4;
5d1634d7
AM
11064 return p;
11065}
11066
a7f2871e
AM
11067/* Build a special .plt call stub for __tls_get_addr. */
11068
b9ca1af6 11069#define LD_R0_0R3 0xe8030000
a7f2871e
AM
11070#define LD_R12_0R3 0xe9830000
11071#define MR_R0_R3 0x7c601b78
b9ca1af6 11072#define CMPDI_R0_0 0x2c200000
a7f2871e
AM
11073#define ADD_R3_R12_R13 0x7c6c6a14
11074#define BEQLR 0x4d820020
11075#define MR_R3_R0 0x7c030378
a7f2871e 11076#define BCTRL 0x4e800421
a7f2871e
AM
11077
11078static inline bfd_byte *
794e51c0
AM
11079build_tls_get_addr_stub (struct ppc_link_hash_table *htab,
11080 struct ppc_stub_hash_entry *stub_entry,
11081 bfd_byte *p, bfd_vma offset, Elf_Internal_Rela *r)
a7f2871e 11082{
e7d1c40c 11083 bfd *obfd = htab->params->stub_bfd;
df136d64 11084 bfd_byte *loc = p;
9e7028aa 11085 unsigned int i;
794e51c0 11086
b9ca1af6 11087 bfd_put_32 (obfd, LD_R0_0R3 + 0, p), p += 4;
a7f2871e 11088 bfd_put_32 (obfd, LD_R12_0R3 + 8, p), p += 4;
b9ca1af6 11089 bfd_put_32 (obfd, CMPDI_R0_0, p), p += 4;
a7f2871e 11090 bfd_put_32 (obfd, MR_R0_R3, p), p += 4;
a7f2871e
AM
11091 bfd_put_32 (obfd, ADD_R3_R12_R13, p), p += 4;
11092 bfd_put_32 (obfd, BEQLR, p), p += 4;
11093 bfd_put_32 (obfd, MR_R3_R0, p), p += 4;
9e7028aa
AM
11094 if (htab->params->no_tls_get_addr_regsave)
11095 {
11096 if (r != NULL)
11097 r[0].r_offset += 7 * 4;
11098 if (stub_entry->stub_type != ppc_stub_plt_call_r2save)
11099 return build_plt_stub (htab, stub_entry, p, offset, r);
11100
11101 bfd_put_32 (obfd, MFLR_R0, p);
11102 p += 4;
11103 bfd_put_32 (obfd, STD_R0_0R1 + STK_LINKER (htab), p);
11104 p += 4;
11105
11106 if (r != NULL)
11107 r[0].r_offset += 2 * 4;
11108 p = build_plt_stub (htab, stub_entry, p, offset, r);
11109 bfd_put_32 (obfd, BCTRL, p - 4);
11110
11111 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11112 p += 4;
11113 bfd_put_32 (obfd, LD_R0_0R1 + STK_LINKER (htab), p);
11114 p += 4;
11115 bfd_put_32 (obfd, MTLR_R0, p);
11116 p += 4;
11117 bfd_put_32 (obfd, BLR, p);
11118 p += 4;
11119 }
11120 else
11121 {
11122 p = tls_get_addr_prologue (obfd, p, htab);
f378ab09 11123
9e7028aa
AM
11124 if (r != NULL)
11125 r[0].r_offset += 18 * 4;
a7f2871e 11126
9e7028aa
AM
11127 p = build_plt_stub (htab, stub_entry, p, offset, r);
11128 bfd_put_32 (obfd, BCTRL, p - 4);
11129
11130 if (stub_entry->stub_type == ppc_stub_plt_call_r2save)
11131 {
11132 bfd_put_32 (obfd, LD_R2_0R1 + STK_TOC (htab), p);
11133 p += 4;
11134 }
a7f2871e 11135
9e7028aa
AM
11136 p = tls_get_addr_epilogue (obfd, p, htab);
11137 }
a7f2871e 11138
df136d64
AM
11139 if (htab->glink_eh_frame != NULL
11140 && htab->glink_eh_frame->size != 0)
11141 {
11142 bfd_byte *base, *eh;
df136d64
AM
11143
11144 base = htab->glink_eh_frame->contents + stub_entry->group->eh_base + 17;
11145 eh = base + stub_entry->group->eh_size;
9e7028aa
AM
11146 if (htab->params->no_tls_get_addr_regsave)
11147 {
11148 unsigned int lr_used, delta;
11149 lr_used = stub_entry->stub_offset + (p - 20 - loc);
11150 delta = lr_used - stub_entry->group->lr_restore;
11151 stub_entry->group->lr_restore = lr_used + 16;
11152 eh = eh_advance (htab->elf.dynobj, eh, delta);
11153 *eh++ = DW_CFA_offset_extended_sf;
11154 *eh++ = 65;
11155 *eh++ = -(STK_LINKER (htab) / 8) & 0x7f;
11156 *eh++ = DW_CFA_advance_loc + 4;
11157 }
11158 else
11159 {
11160 unsigned int cfa_updt, delta;
11161 /* After the bctrl, lr has been modified so we need to emit
11162 .eh_frame info saying the return address is on the stack. In
11163 fact we must put the EH info at or before the call rather
11164 than after it, because the EH info for a call needs to be
11165 specified by that point.
11166 See libgcc/unwind-dw2.c execute_cfa_program.
11167 Any stack pointer update must be described immediately after
11168 the instruction making the change, and since the stdu occurs
11169 after saving regs we put all the reg saves and the cfa
11170 change there. */
11171 cfa_updt = stub_entry->stub_offset + 18 * 4;
11172 delta = cfa_updt - stub_entry->group->lr_restore;
11173 stub_entry->group->lr_restore
11174 = stub_entry->stub_offset + (p - loc) - 4;
11175 eh = eh_advance (htab->elf.dynobj, eh, delta);
11176 *eh++ = DW_CFA_def_cfa_offset;
11177 if (htab->opd_abi)
11178 {
11179 *eh++ = 128;
11180 *eh++ = 1;
11181 }
11182 else
11183 *eh++ = 96;
11184 *eh++ = DW_CFA_offset_extended_sf;
11185 *eh++ = 65;
11186 *eh++ = (-16 / 8) & 0x7f;
11187 for (i = 4; i < 12; i++)
11188 {
11189 *eh++ = DW_CFA_offset + i;
11190 *eh++ = (htab->opd_abi ? 13 : 12) - i;
11191 }
11192 *eh++ = (DW_CFA_advance_loc
11193 + (stub_entry->group->lr_restore - 8 - cfa_updt) / 4);
11194 *eh++ = DW_CFA_def_cfa_offset;
11195 *eh++ = 0;
11196 for (i = 4; i < 12; i++)
11197 *eh++ = DW_CFA_restore + i;
11198 *eh++ = DW_CFA_advance_loc + 2;
11199 }
df136d64
AM
11200 *eh++ = DW_CFA_restore_extended;
11201 *eh++ = 65;
11202 stub_entry->group->eh_size = eh - base;
11203 }
a7f2871e
AM
11204 return p;
11205}
11206
176a0d42
AM
11207static Elf_Internal_Rela *
11208get_relocs (asection *sec, int count)
11209{
11210 Elf_Internal_Rela *relocs;
11211 struct bfd_elf_section_data *elfsec_data;
11212
11213 elfsec_data = elf_section_data (sec);
11214 relocs = elfsec_data->relocs;
11215 if (relocs == NULL)
11216 {
11217 bfd_size_type relsize;
11218 relsize = sec->reloc_count * sizeof (*relocs);
11219 relocs = bfd_alloc (sec->owner, relsize);
11220 if (relocs == NULL)
11221 return NULL;
11222 elfsec_data->relocs = relocs;
d4730f92
BS
11223 elfsec_data->rela.hdr = bfd_zalloc (sec->owner,
11224 sizeof (Elf_Internal_Shdr));
11225 if (elfsec_data->rela.hdr == NULL)
11226 return NULL;
11227 elfsec_data->rela.hdr->sh_size = (sec->reloc_count
11228 * sizeof (Elf64_External_Rela));
11229 elfsec_data->rela.hdr->sh_entsize = sizeof (Elf64_External_Rela);
176a0d42
AM
11230 sec->reloc_count = 0;
11231 }
11232 relocs += sec->reloc_count;
11233 sec->reloc_count += count;
11234 return relocs;
11235}
11236
3d58e1fc
AM
11237/* Convert the relocs R[0] thru R[-NUM_REL+1], which are all no-symbol
11238 forms, to the equivalent relocs against the global symbol given by
11239 STUB_ENTRY->H. */
11240
11241static bfd_boolean
11242use_global_in_relocs (struct ppc_link_hash_table *htab,
11243 struct ppc_stub_hash_entry *stub_entry,
11244 Elf_Internal_Rela *r, unsigned int num_rel)
11245{
11246 struct elf_link_hash_entry **hashes;
11247 unsigned long symndx;
11248 struct ppc_link_hash_entry *h;
11249 bfd_vma symval;
11250
11251 /* Relocs are always against symbols in their own object file. Fake
11252 up global sym hashes for the stub bfd (which has no symbols). */
11253 hashes = elf_sym_hashes (htab->params->stub_bfd);
11254 if (hashes == NULL)
11255 {
11256 bfd_size_type hsize;
11257
11258 /* When called the first time, stub_globals will contain the
11259 total number of symbols seen during stub sizing. After
11260 allocating, stub_globals is used as an index to fill the
11261 hashes array. */
11262 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
11263 hashes = bfd_zalloc (htab->params->stub_bfd, hsize);
11264 if (hashes == NULL)
11265 return FALSE;
11266 elf_sym_hashes (htab->params->stub_bfd) = hashes;
11267 htab->stub_globals = 1;
11268 }
11269 symndx = htab->stub_globals++;
11270 h = stub_entry->h;
11271 hashes[symndx] = &h->elf;
11272 if (h->oh != NULL && h->oh->is_func)
11273 h = ppc_follow_link (h->oh);
11274 BFD_ASSERT (h->elf.root.type == bfd_link_hash_defined
11275 || h->elf.root.type == bfd_link_hash_defweak);
ed7007c1 11276 symval = defined_sym_val (&h->elf);
3d58e1fc
AM
11277 while (num_rel-- != 0)
11278 {
11279 r->r_info = ELF64_R_INFO (symndx, ELF64_R_TYPE (r->r_info));
11280 if (h->elf.root.u.def.section != stub_entry->target_section)
11281 {
11282 /* H is an opd symbol. The addend must be zero, and the
11283 branch reloc is the only one we can convert. */
11284 r->r_addend = 0;
11285 break;
11286 }
11287 else
11288 r->r_addend -= symval;
11289 --r;
11290 }
11291 return TRUE;
11292}
11293
aa374f67 11294static bfd_vma
25f53a85 11295get_r2off (struct bfd_link_info *info,
aa374f67
AM
11296 struct ppc_stub_hash_entry *stub_entry)
11297{
25f53a85 11298 struct ppc_link_hash_table *htab = ppc_hash_table (info);
6f20ed8a 11299 bfd_vma r2off = htab->sec_info[stub_entry->target_section->id].toc_off;
aa374f67
AM
11300
11301 if (r2off == 0)
11302 {
11303 /* Support linking -R objects. Get the toc pointer from the
11304 opd entry. */
11305 char buf[8];
b9e5796b
AM
11306 if (!htab->opd_abi)
11307 return r2off;
aa374f67
AM
11308 asection *opd = stub_entry->h->elf.root.u.def.section;
11309 bfd_vma opd_off = stub_entry->h->elf.root.u.def.value;
11310
11311 if (strcmp (opd->name, ".opd") != 0
11312 || opd->reloc_count != 0)
11313 {
2cdcc330
AM
11314 info->callbacks->einfo
11315 (_("%P: cannot find opd entry toc for `%pT'\n"),
11316 stub_entry->h->elf.root.root.string);
aa374f67 11317 bfd_set_error (bfd_error_bad_value);
a7c49797 11318 return (bfd_vma) -1;
aa374f67
AM
11319 }
11320 if (!bfd_get_section_contents (opd->owner, opd, buf, opd_off + 8, 8))
a7c49797 11321 return (bfd_vma) -1;
aa374f67 11322 r2off = bfd_get_64 (opd->owner, buf);
25f53a85 11323 r2off -= elf_gp (info->output_bfd);
aa374f67 11324 }
6f20ed8a 11325 r2off -= htab->sec_info[stub_entry->group->link_sec->id].toc_off;
aa374f67
AM
11326 return r2off;
11327}
11328
b34976b6 11329static bfd_boolean
4ce794b7 11330ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
5d1634d7 11331{
721956f4
AM
11332 struct ppc_stub_hash_entry *stub_entry;
11333 struct ppc_branch_hash_entry *br_entry;
5d1634d7
AM
11334 struct bfd_link_info *info;
11335 struct ppc_link_hash_table *htab;
721956f4 11336 bfd_byte *loc;
3d58e1fc 11337 bfd_byte *p, *relp;
1aa42141 11338 bfd_vma targ, off;
176a0d42 11339 Elf_Internal_Rela *r;
e054468f 11340 asection *plt;
3d58e1fc 11341 int num_rel;
04bdff6a 11342 int odd;
5d1634d7 11343
721956f4
AM
11344 /* Massage our args to the form they really have. */
11345 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
4ce794b7 11346 info = in_arg;
5d1634d7 11347
abf874aa
CL
11348 /* Fail if the target section could not be assigned to an output
11349 section. The user should fix his linker script. */
11350 if (stub_entry->target_section != NULL
11351 && stub_entry->target_section->output_section == NULL
11352 && info->non_contiguous_regions)
53215f21
CL
11353 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output section. "
11354 "Retry without --enable-non-contiguous-regions.\n"),
11355 stub_entry->target_section);
abf874aa
CL
11356
11357 /* Same for the group. */
11358 if (stub_entry->group->stub_sec != NULL
11359 && stub_entry->group->stub_sec->output_section == NULL
11360 && info->non_contiguous_regions)
53215f21
CL
11361 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11362 "output section. Retry without "
11363 "--enable-non-contiguous-regions.\n"),
11364 stub_entry->group->stub_sec,
11365 stub_entry->target_section);
abf874aa 11366
5d1634d7 11367 htab = ppc_hash_table (info);
4dfe6ac6
NC
11368 if (htab == NULL)
11369 return FALSE;
5d1634d7 11370
1aa42141 11371 BFD_ASSERT (stub_entry->stub_offset >= stub_entry->group->stub_sec->size);
6f20ed8a 11372 loc = stub_entry->group->stub_sec->contents + stub_entry->stub_offset;
721956f4 11373
4ce794b7 11374 htab->stub_count[stub_entry->stub_type - 1] += 1;
721956f4 11375 switch (stub_entry->stub_type)
5d1634d7 11376 {
721956f4 11377 case ppc_stub_long_branch:
ad8e1ba5 11378 case ppc_stub_long_branch_r2off:
721956f4 11379 /* Branches are relative. This is where we are going to. */
1aa42141 11380 targ = (stub_entry->target_value
6911b7dc
AM
11381 + stub_entry->target_section->output_offset
11382 + stub_entry->target_section->output_section->vma);
1aa42141 11383 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
5d1634d7 11384
721956f4 11385 /* And this is where we are coming from. */
1aa42141
AM
11386 off = (stub_entry->stub_offset
11387 + stub_entry->group->stub_sec->output_offset
11388 + stub_entry->group->stub_sec->output_section->vma);
11389 off = targ - off;
e86ce104 11390
9e390558 11391 p = loc;
ac2df442 11392 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
ad8e1ba5 11393 {
25f53a85 11394 bfd_vma r2off = get_r2off (info, stub_entry);
ad8e1ba5 11395
a7c49797 11396 if (r2off == (bfd_vma) -1)
aa374f67
AM
11397 {
11398 htab->stub_error = TRUE;
11399 return FALSE;
11400 }
9e390558
AM
11401 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11402 p += 4;
ac2df442
AM
11403 if (PPC_HA (r2off) != 0)
11404 {
e7d1c40c 11405 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11406 ADDIS_R2_R2 | PPC_HA (r2off), p);
11407 p += 4;
a7c49797
AM
11408 }
11409 if (PPC_LO (r2off) != 0)
11410 {
11411 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11412 ADDI_R2_R2 | PPC_LO (r2off), p);
11413 p += 4;
ac2df442 11414 }
9e390558 11415 off -= p - loc;
ad8e1ba5 11416 }
9e390558
AM
11417 bfd_put_32 (htab->params->stub_bfd, B_DOT | (off & 0x3fffffc), p);
11418 p += 4;
ad8e1ba5 11419
5c3dead3
AM
11420 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
11421 {
cf97bcb0
AM
11422 _bfd_error_handler
11423 (_("long branch stub `%s' offset overflow"),
bc30df16 11424 stub_entry->root.string);
5c3dead3
AM
11425 htab->stub_error = TRUE;
11426 return FALSE;
11427 }
ee75fd95
AM
11428
11429 if (info->emitrelocations)
11430 {
6f20ed8a 11431 r = get_relocs (stub_entry->group->stub_sec, 1);
176a0d42
AM
11432 if (r == NULL)
11433 return FALSE;
9e390558 11434 r->r_offset = p - 4 - stub_entry->group->stub_sec->contents;
ee75fd95 11435 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
1aa42141 11436 r->r_addend = targ;
3d58e1fc
AM
11437 if (stub_entry->h != NULL
11438 && !use_global_in_relocs (htab, stub_entry, r, 1))
11439 return FALSE;
ee75fd95 11440 }
721956f4 11441 break;
e86ce104 11442
721956f4 11443 case ppc_stub_plt_branch:
ad8e1ba5 11444 case ppc_stub_plt_branch_r2off:
721956f4
AM
11445 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11446 stub_entry->root.string + 9,
b34976b6 11447 FALSE, FALSE);
721956f4
AM
11448 if (br_entry == NULL)
11449 {
cf97bcb0
AM
11450 _bfd_error_handler (_("can't find branch stub `%s'"),
11451 stub_entry->root.string);
b34976b6
AM
11452 htab->stub_error = TRUE;
11453 return FALSE;
721956f4
AM
11454 }
11455
1aa42141 11456 targ = (stub_entry->target_value
176a0d42
AM
11457 + stub_entry->target_section->output_offset
11458 + stub_entry->target_section->output_section->vma);
6911b7dc 11459 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
1aa42141 11460 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
721956f4 11461
1aa42141 11462 bfd_put_64 (htab->brlt->owner, targ,
4ce794b7 11463 htab->brlt->contents + br_entry->offset);
721956f4 11464
f94498ff 11465 if (br_entry->iter == htab->stub_iteration)
721956f4 11466 {
f94498ff 11467 br_entry->iter = 0;
84f5d08e 11468
f94498ff 11469 if (htab->relbrlt != NULL)
84f5d08e 11470 {
f94498ff
AM
11471 /* Create a reloc for the branch lookup table entry. */
11472 Elf_Internal_Rela rela;
11473 bfd_byte *rl;
11474
11475 rela.r_offset = (br_entry->offset
11476 + htab->brlt->output_offset
11477 + htab->brlt->output_section->vma);
11478 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11479 rela.r_addend = targ;
f94498ff
AM
11480
11481 rl = htab->relbrlt->contents;
11482 rl += (htab->relbrlt->reloc_count++
11483 * sizeof (Elf64_External_Rela));
11484 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
11485 }
11486 else if (info->emitrelocations)
11487 {
176a0d42
AM
11488 r = get_relocs (htab->brlt, 1);
11489 if (r == NULL)
11490 return FALSE;
11491 /* brlt, being SEC_LINKER_CREATED does not go through the
11492 normal reloc processing. Symbols and offsets are not
11493 translated from input file to output file form, so
11494 set up the offset per the output file. */
f94498ff
AM
11495 r->r_offset = (br_entry->offset
11496 + htab->brlt->output_offset
11497 + htab->brlt->output_section->vma);
11498 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
1aa42141 11499 r->r_addend = targ;
84f5d08e 11500 }
84f5d08e 11501 }
721956f4 11502
1aa42141 11503 targ = (br_entry->offset
176a0d42
AM
11504 + htab->brlt->output_offset
11505 + htab->brlt->output_section->vma);
11506
1aa42141
AM
11507 off = (elf_gp (info->output_bfd)
11508 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11509 off = targ - off;
721956f4 11510
ad8e1ba5 11511 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
5d1634d7 11512 {
25f53a85 11513 info->callbacks->einfo
c1c8c1ef 11514 (_("%P: linkage table error against `%pT'\n"),
721956f4 11515 stub_entry->root.string);
5d1634d7 11516 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11517 htab->stub_error = TRUE;
11518 return FALSE;
5d1634d7 11519 }
41bd81ab 11520
176a0d42
AM
11521 if (info->emitrelocations)
11522 {
6f20ed8a 11523 r = get_relocs (stub_entry->group->stub_sec, 1 + (PPC_HA (off) != 0));
176a0d42
AM
11524 if (r == NULL)
11525 return FALSE;
6f20ed8a 11526 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11527 if (bfd_big_endian (info->output_bfd))
11528 r[0].r_offset += 2;
00f412ee 11529 if (stub_entry->stub_type == ppc_stub_plt_branch_r2off)
176a0d42
AM
11530 r[0].r_offset += 4;
11531 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_DS);
1aa42141 11532 r[0].r_addend = targ;
176a0d42
AM
11533 if (PPC_HA (off) != 0)
11534 {
11535 r[0].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_HA);
11536 r[1].r_offset = r[0].r_offset + 4;
11537 r[1].r_info = ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS);
11538 r[1].r_addend = r[0].r_addend;
11539 }
11540 }
11541
9e390558 11542 p = loc;
00f412ee 11543 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
ad8e1ba5 11544 {
176a0d42 11545 if (PPC_HA (off) != 0)
ac2df442 11546 {
e7d1c40c 11547 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11548 ADDIS_R12_R2 | PPC_HA (off), p);
11549 p += 4;
e7d1c40c 11550 bfd_put_32 (htab->params->stub_bfd,
9e390558 11551 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11552 }
11553 else
9e390558
AM
11554 bfd_put_32 (htab->params->stub_bfd,
11555 LD_R12_0R2 | PPC_LO (off), p);
ad8e1ba5
AM
11556 }
11557 else
11558 {
25f53a85 11559 bfd_vma r2off = get_r2off (info, stub_entry);
aa374f67 11560
a7c49797 11561 if (r2off == (bfd_vma) -1)
aa374f67
AM
11562 {
11563 htab->stub_error = TRUE;
11564 return FALSE;
11565 }
ad8e1ba5 11566
9e390558
AM
11567 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11568 p += 4;
176a0d42 11569 if (PPC_HA (off) != 0)
ac2df442 11570 {
e7d1c40c 11571 bfd_put_32 (htab->params->stub_bfd,
9e390558
AM
11572 ADDIS_R12_R2 | PPC_HA (off), p);
11573 p += 4;
e7d1c40c 11574 bfd_put_32 (htab->params->stub_bfd,
9e390558 11575 LD_R12_0R12 | PPC_LO (off), p);
ac2df442
AM
11576 }
11577 else
9e390558 11578 bfd_put_32 (htab->params->stub_bfd, LD_R12_0R2 | PPC_LO (off), p);
ac2df442
AM
11579
11580 if (PPC_HA (r2off) != 0)
11581 {
9e390558 11582 p += 4;
e7d1c40c 11583 bfd_put_32 (htab->params->stub_bfd,
9e390558 11584 ADDIS_R2_R2 | PPC_HA (r2off), p);
00f412ee
AM
11585 }
11586 if (PPC_LO (r2off) != 0)
11587 {
9e390558 11588 p += 4;
e7d1c40c 11589 bfd_put_32 (htab->params->stub_bfd,
9e390558 11590 ADDI_R2_R2 | PPC_LO (r2off), p);
ac2df442 11591 }
ad8e1ba5 11592 }
9e390558
AM
11593 p += 4;
11594 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11595 p += 4;
407aa07c
AM
11596 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11597 p += 4;
721956f4 11598 break;
5d1634d7 11599
05d0e962
AM
11600 case ppc_stub_long_branch_notoc:
11601 case ppc_stub_long_branch_both:
11602 case ppc_stub_plt_branch_notoc:
11603 case ppc_stub_plt_branch_both:
11604 case ppc_stub_plt_call_notoc:
11605 case ppc_stub_plt_call_both:
11606 p = loc;
f891966f 11607 off = (stub_entry->stub_offset
05d0e962
AM
11608 + stub_entry->group->stub_sec->output_offset
11609 + stub_entry->group->stub_sec->output_section->vma);
11610 if (stub_entry->stub_type == ppc_stub_long_branch_both
11611 || stub_entry->stub_type == ppc_stub_plt_branch_both
11612 || stub_entry->stub_type == ppc_stub_plt_call_both)
11613 {
11614 off += 4;
11615 bfd_put_32 (htab->params->stub_bfd, STD_R2_0R1 + STK_TOC (htab), p);
11616 p += 4;
11617 }
11618 if (stub_entry->stub_type >= ppc_stub_plt_call_notoc)
11619 {
11620 targ = stub_entry->plt_ent->plt.offset & ~1;
11621 if (targ >= (bfd_vma) -2)
11622 abort ();
11623
11624 plt = htab->elf.splt;
11625 if (!htab->elf.dynamic_sections_created
11626 || stub_entry->h == NULL
11627 || stub_entry->h->elf.dynindx == -1)
11628 {
11629 if (stub_entry->symtype == STT_GNU_IFUNC)
11630 plt = htab->elf.iplt;
11631 else
11632 plt = htab->pltlocal;
11633 }
11634 targ += plt->output_offset + plt->output_section->vma;
11635 }
11636 else
11637 targ = (stub_entry->target_value
11638 + stub_entry->target_section->output_offset
11639 + stub_entry->target_section->output_section->vma);
04bdff6a 11640 odd = off & 4;
05d0e962 11641 off = targ - off;
f891966f 11642
3d58e1fc
AM
11643 relp = p;
11644 num_rel = 0;
d349c8e2 11645 if (htab->params->power10_stubs != 0)
04bdff6a
AM
11646 {
11647 bfd_boolean load = stub_entry->stub_type >= ppc_stub_plt_call_notoc;
7c1f4227 11648 p = build_power10_offset (htab->params->stub_bfd, p, off, odd, load);
04bdff6a
AM
11649 }
11650 else
11651 {
11652 /* The notoc stubs calculate their target (either a PLT entry or
11653 the global entry point of a function) relative to the PC
11654 returned by the "bcl" two instructions past the start of the
11655 sequence emitted by build_offset. The offset is therefore 8
11656 less than calculated from the start of the sequence. */
11657 off -= 8;
11658 p = build_offset (htab->params->stub_bfd, p, off,
11659 stub_entry->stub_type >= ppc_stub_plt_call_notoc);
11660 }
11661
f891966f 11662 if (stub_entry->stub_type <= ppc_stub_long_branch_both)
05d0e962 11663 {
f891966f 11664 bfd_vma from;
3d58e1fc 11665 num_rel = 1;
f891966f
AM
11666 from = (stub_entry->stub_offset
11667 + stub_entry->group->stub_sec->output_offset
11668 + stub_entry->group->stub_sec->output_section->vma
11669 + (p - loc));
05d0e962 11670 bfd_put_32 (htab->params->stub_bfd,
f891966f 11671 B_DOT | ((targ - from) & 0x3fffffc), p);
05d0e962
AM
11672 }
11673 else
11674 {
11675 bfd_put_32 (htab->params->stub_bfd, MTCTR_R12, p);
11676 p += 4;
11677 bfd_put_32 (htab->params->stub_bfd, BCTR, p);
11678 }
11679 p += 4;
df136d64 11680
3d58e1fc
AM
11681 if (info->emitrelocations)
11682 {
04bdff6a 11683 bfd_vma roff = relp - stub_entry->group->stub_sec->contents;
d349c8e2 11684 if (htab->params->power10_stubs != 0)
7c1f4227 11685 num_rel += num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
11686 else
11687 {
11688 num_rel += num_relocs_for_offset (off);
11689 roff += 16;
11690 }
3d58e1fc
AM
11691 r = get_relocs (stub_entry->group->stub_sec, num_rel);
11692 if (r == NULL)
11693 return FALSE;
d349c8e2 11694 if (htab->params->power10_stubs != 0)
7c1f4227 11695 r = emit_relocs_for_power10_offset (info, r, roff, targ, off, odd);
04bdff6a
AM
11696 else
11697 r = emit_relocs_for_offset (info, r, roff, targ, off);
3d58e1fc
AM
11698 if (stub_entry->stub_type == ppc_stub_long_branch_notoc
11699 || stub_entry->stub_type == ppc_stub_long_branch_both)
11700 {
11701 ++r;
11702 roff = p - 4 - stub_entry->group->stub_sec->contents;
11703 r->r_offset = roff;
11704 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
11705 r->r_addend = targ;
11706 if (stub_entry->h != NULL
11707 && !use_global_in_relocs (htab, stub_entry, r, num_rel))
11708 return FALSE;
11709 }
11710 }
11711
d349c8e2 11712 if (htab->params->power10_stubs == 0
04bdff6a
AM
11713 && htab->glink_eh_frame != NULL
11714 && htab->glink_eh_frame->size != 0)
df136d64
AM
11715 {
11716 bfd_byte *base, *eh;
11717 unsigned int lr_used, delta;
11718
11719 base = (htab->glink_eh_frame->contents
11720 + stub_entry->group->eh_base + 17);
11721 eh = base + stub_entry->group->eh_size;
11722 lr_used = stub_entry->stub_offset + 8;
11723 if (stub_entry->stub_type == ppc_stub_long_branch_both
11724 || stub_entry->stub_type == ppc_stub_plt_branch_both
11725 || stub_entry->stub_type == ppc_stub_plt_call_both)
11726 lr_used += 4;
11727 delta = lr_used - stub_entry->group->lr_restore;
11728 stub_entry->group->lr_restore = lr_used + 8;
11729 eh = eh_advance (htab->elf.dynobj, eh, delta);
11730 *eh++ = DW_CFA_register;
11731 *eh++ = 65;
11732 *eh++ = 12;
11733 *eh++ = DW_CFA_advance_loc + 2;
11734 *eh++ = DW_CFA_restore_extended;
11735 *eh++ = 65;
11736 stub_entry->group->eh_size = eh - base;
11737 }
05d0e962
AM
11738 break;
11739
721956f4 11740 case ppc_stub_plt_call:
794e51c0 11741 case ppc_stub_plt_call_r2save:
e054468f 11742 if (stub_entry->h != NULL
b31867b6
AM
11743 && stub_entry->h->is_func_descriptor
11744 && stub_entry->h->oh != NULL)
c862ae31 11745 {
b31867b6
AM
11746 struct ppc_link_hash_entry *fh = ppc_follow_link (stub_entry->h->oh);
11747
11748 /* If the old-ABI "dot-symbol" is undefined make it weak so
6f20ed8a 11749 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
8c5b4e52
AM
11750 if (fh->elf.root.type == bfd_link_hash_undefined
11751 && (stub_entry->h->elf.root.type == bfd_link_hash_defined
11752 || stub_entry->h->elf.root.type == bfd_link_hash_defweak))
b31867b6 11753 fh->elf.root.type = bfd_link_hash_undefweak;
c862ae31
AM
11754 }
11755
721956f4 11756 /* Now build the stub. */
1aa42141
AM
11757 targ = stub_entry->plt_ent->plt.offset & ~1;
11758 if (targ >= (bfd_vma) -2)
721956f4
AM
11759 abort ();
11760
33e44f2e 11761 plt = htab->elf.splt;
25f23106
AM
11762 if (!htab->elf.dynamic_sections_created
11763 || stub_entry->h == NULL
11764 || stub_entry->h->elf.dynindx == -1)
2d7ad24e
AM
11765 {
11766 if (stub_entry->symtype == STT_GNU_IFUNC)
11767 plt = htab->elf.iplt;
11768 else
11769 plt = htab->pltlocal;
11770 }
1aa42141 11771 targ += plt->output_offset + plt->output_section->vma;
e054468f 11772
1aa42141
AM
11773 off = (elf_gp (info->output_bfd)
11774 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
11775 off = targ - off;
721956f4 11776
ad8e1ba5 11777 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
721956f4 11778 {
25f53a85 11779 info->callbacks->einfo
695344c0 11780 /* xgettext:c-format */
c1c8c1ef 11781 (_("%P: linkage table error against `%pT'\n"),
e054468f
AM
11782 stub_entry->h != NULL
11783 ? stub_entry->h->elf.root.root.string
11784 : "<local sym>");
721956f4 11785 bfd_set_error (bfd_error_bad_value);
b34976b6
AM
11786 htab->stub_error = TRUE;
11787 return FALSE;
721956f4
AM
11788 }
11789
176a0d42
AM
11790 r = NULL;
11791 if (info->emitrelocations)
11792 {
6f20ed8a 11793 r = get_relocs (stub_entry->group->stub_sec,
3ba720c7
AM
11794 ((PPC_HA (off) != 0)
11795 + (htab->opd_abi
e7d1c40c 11796 ? 2 + (htab->params->plt_static_chain
3ba720c7
AM
11797 && PPC_HA (off + 16) == PPC_HA (off))
11798 : 1)));
176a0d42
AM
11799 if (r == NULL)
11800 return FALSE;
6f20ed8a 11801 r[0].r_offset = loc - stub_entry->group->stub_sec->contents;
7cfbafbc
AM
11802 if (bfd_big_endian (info->output_bfd))
11803 r[0].r_offset += 2;
1aa42141 11804 r[0].r_addend = targ;
176a0d42 11805 }
a7f2871e 11806 if (stub_entry->h != NULL
ed7007c1 11807 && is_tls_get_addr (&stub_entry->h->elf, htab)
7c9cf415 11808 && htab->params->tls_get_addr_opt)
794e51c0 11809 p = build_tls_get_addr_stub (htab, stub_entry, loc, off, r);
a7f2871e 11810 else
794e51c0 11811 p = build_plt_stub (htab, stub_entry, loc, off, r);
721956f4
AM
11812 break;
11813
a4b6fadd
AM
11814 case ppc_stub_save_res:
11815 return TRUE;
11816
721956f4
AM
11817 default:
11818 BFD_FAIL ();
b34976b6 11819 return FALSE;
721956f4
AM
11820 }
11821
1aa42141 11822 stub_entry->group->stub_sec->size = stub_entry->stub_offset + (p - loc);
97b639ba 11823
e7d1c40c 11824 if (htab->params->emit_stub_syms)
97b639ba
AM
11825 {
11826 struct elf_link_hash_entry *h;
ee75fd95
AM
11827 size_t len1, len2;
11828 char *name;
11829 const char *const stub_str[] = { "long_branch",
05d0e962
AM
11830 "long_branch",
11831 "long_branch",
3f6ff479
AM
11832 "long_branch",
11833 "plt_branch",
ee75fd95 11834 "plt_branch",
05d0e962
AM
11835 "plt_branch",
11836 "plt_branch",
11837 "plt_call",
11838 "plt_call",
794e51c0 11839 "plt_call",
ee75fd95
AM
11840 "plt_call" };
11841
11842 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
11843 len2 = strlen (stub_entry->root.string);
11844 name = bfd_malloc (len1 + len2 + 2);
11845 if (name == NULL)
11846 return FALSE;
11847 memcpy (name, stub_entry->root.string, 9);
11848 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
11849 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
11850 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
97b639ba
AM
11851 if (h == NULL)
11852 return FALSE;
11853 if (h->root.type == bfd_link_hash_new)
11854 {
11855 h->root.type = bfd_link_hash_defined;
6f20ed8a 11856 h->root.u.def.section = stub_entry->group->stub_sec;
97b639ba 11857 h->root.u.def.value = stub_entry->stub_offset;
f5385ebf
AM
11858 h->ref_regular = 1;
11859 h->def_regular = 1;
11860 h->ref_regular_nonweak = 1;
11861 h->forced_local = 1;
11862 h->non_elf = 0;
2ec55de3 11863 h->root.linker_def = 1;
97b639ba
AM
11864 }
11865 }
11866
b34976b6 11867 return TRUE;
721956f4
AM
11868}
11869
11870/* As above, but don't actually build the stub. Just bump offset so
11871 we know stub section sizes, and select plt_branch stubs where
11872 long_branch stubs won't do. */
11873
b34976b6 11874static bfd_boolean
4ce794b7 11875ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
721956f4
AM
11876{
11877 struct ppc_stub_hash_entry *stub_entry;
63bc6f6c 11878 struct bfd_link_info *info;
721956f4 11879 struct ppc_link_hash_table *htab;
f891966f
AM
11880 asection *plt;
11881 bfd_vma targ, off, r2off;
04bdff6a 11882 unsigned int size, extra, lr_used, delta, odd;
721956f4
AM
11883
11884 /* Massage our args to the form they really have. */
11885 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
63bc6f6c
AM
11886 info = in_arg;
11887
11888 htab = ppc_hash_table (info);
4dfe6ac6
NC
11889 if (htab == NULL)
11890 return FALSE;
721956f4 11891
abf874aa
CL
11892 /* Fail if the target section could not be assigned to an output
11893 section. The user should fix his linker script. */
11894 if (stub_entry->target_section != NULL
11895 && stub_entry->target_section->output_section == NULL
11896 && info->non_contiguous_regions)
53215f21
CL
11897 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output section. "
11898 "Retry without --enable-non-contiguous-regions.\n"),
11899 stub_entry->target_section);
abf874aa
CL
11900
11901 /* Same for the group. */
11902 if (stub_entry->group->stub_sec != NULL
11903 && stub_entry->group->stub_sec->output_section == NULL
11904 && info->non_contiguous_regions)
53215f21
CL
11905 info->callbacks->einfo (_("%F%P: Could not assign group %pA target %pA to an "
11906 "output section. Retry without "
11907 "--enable-non-contiguous-regions.\n"),
11908 stub_entry->group->stub_sec,
11909 stub_entry->target_section);
abf874aa 11910
1aa42141
AM
11911 /* Make a note of the offset within the stubs for this entry. */
11912 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
11913
a4b6fadd
AM
11914 if (stub_entry->h != NULL
11915 && stub_entry->h->save_res
11916 && stub_entry->h->elf.root.type == bfd_link_hash_defined
11917 && stub_entry->h->elf.root.u.def.section == htab->sfpr)
11918 {
11919 /* Don't make stubs to out-of-line register save/restore
11920 functions. Instead, emit copies of the functions. */
11921 stub_entry->group->needs_save_res = 1;
11922 stub_entry->stub_type = ppc_stub_save_res;
11923 return TRUE;
11924 }
11925
f891966f 11926 switch (stub_entry->stub_type)
721956f4 11927 {
f891966f
AM
11928 case ppc_stub_plt_branch:
11929 case ppc_stub_plt_branch_r2off:
11930 /* Reset the stub type from the plt branch variant in case we now
11931 can reach with a shorter stub. */
11932 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
11933 /* Fall through. */
11934 case ppc_stub_long_branch:
11935 case ppc_stub_long_branch_r2off:
1aa42141
AM
11936 targ = (stub_entry->target_value
11937 + stub_entry->target_section->output_offset
11938 + stub_entry->target_section->output_section->vma);
f891966f 11939 targ += PPC64_LOCAL_ENTRY_OFFSET (stub_entry->other);
1aa42141
AM
11940 off = (stub_entry->stub_offset
11941 + stub_entry->group->stub_sec->output_offset
11942 + stub_entry->group->stub_sec->output_section->vma);
721956f4 11943
ad8e1ba5 11944 size = 4;
f891966f 11945 r2off = 0;
ad8e1ba5
AM
11946 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
11947 {
25f53a85 11948 r2off = get_r2off (info, stub_entry);
a7c49797 11949 if (r2off == (bfd_vma) -1)
aa374f67
AM
11950 {
11951 htab->stub_error = TRUE;
11952 return FALSE;
11953 }
a7c49797 11954 size = 8;
ac2df442 11955 if (PPC_HA (r2off) != 0)
a7c49797
AM
11956 size += 4;
11957 if (PPC_LO (r2off) != 0)
11958 size += 4;
1aa42141 11959 off += size - 4;
ad8e1ba5 11960 }
1aa42141 11961 off = targ - off;
ad8e1ba5 11962
f891966f
AM
11963 /* If the branch offset is too big, use a ppc_stub_plt_branch.
11964 Do the same for -R objects without function descriptors. */
11965 if ((stub_entry->stub_type == ppc_stub_long_branch_r2off
11966 && r2off == 0
11967 && htab->sec_info[stub_entry->target_section->id].toc_off == 0)
11968 || off + (1 << 25) >= (bfd_vma) (1 << 26))
721956f4 11969 {
f891966f 11970 struct ppc_branch_hash_entry *br_entry;
df136d64 11971
f891966f
AM
11972 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
11973 stub_entry->root.string + 9,
11974 TRUE, FALSE);
11975 if (br_entry == NULL)
721956f4 11976 {
f891966f
AM
11977 _bfd_error_handler (_("can't build branch stub `%s'"),
11978 stub_entry->root.string);
11979 htab->stub_error = TRUE;
11980 return FALSE;
721956f4
AM
11981 }
11982
f891966f 11983 if (br_entry->iter != htab->stub_iteration)
721956f4 11984 {
f891966f
AM
11985 br_entry->iter = htab->stub_iteration;
11986 br_entry->offset = htab->brlt->size;
11987 htab->brlt->size += 8;
63bc6f6c 11988
f891966f
AM
11989 if (htab->relbrlt != NULL)
11990 htab->relbrlt->size += sizeof (Elf64_External_Rela);
11991 else if (info->emitrelocations)
84f5d08e 11992 {
f891966f
AM
11993 htab->brlt->reloc_count += 1;
11994 htab->brlt->flags |= SEC_RELOC;
05d0e962 11995 }
f891966f 11996 }
ac2df442 11997
f891966f
AM
11998 targ = (br_entry->offset
11999 + htab->brlt->output_offset
12000 + htab->brlt->output_section->vma);
12001 off = (elf_gp (info->output_bfd)
12002 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12003 off = targ - off;
176a0d42 12004
f891966f
AM
12005 if (info->emitrelocations)
12006 {
12007 stub_entry->group->stub_sec->reloc_count
12008 += 1 + (PPC_HA (off) != 0);
12009 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12010 }
05d0e962 12011
f891966f
AM
12012 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
12013 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
12014 {
12015 size = 12;
12016 if (PPC_HA (off) != 0)
12017 size = 16;
ac2df442 12018 }
f891966f 12019 else
ac2df442 12020 {
f891966f
AM
12021 size = 16;
12022 if (PPC_HA (off) != 0)
12023 size += 4;
12024
12025 if (PPC_HA (r2off) != 0)
12026 size += 4;
12027 if (PPC_LO (r2off) != 0)
12028 size += 4;
ac2df442 12029 }
721956f4 12030 }
f891966f
AM
12031 else if (info->emitrelocations)
12032 {
12033 stub_entry->group->stub_sec->reloc_count += 1;
12034 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12035 }
12036 break;
12037
12038 case ppc_stub_plt_branch_notoc:
12039 case ppc_stub_plt_branch_both:
12040 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
12041 /* Fall through. */
12042 case ppc_stub_long_branch_notoc:
12043 case ppc_stub_long_branch_both:
12044 off = (stub_entry->stub_offset
12045 + stub_entry->group->stub_sec->output_offset
12046 + stub_entry->group->stub_sec->output_section->vma);
12047 size = 0;
12048 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12049 size = 4;
12050 off += size;
12051 targ = (stub_entry->target_value
12052 + stub_entry->target_section->output_offset
12053 + stub_entry->target_section->output_section->vma);
04bdff6a 12054 odd = off & 4;
f891966f
AM
12055 off = targ - off;
12056
3d58e1fc
AM
12057 if (info->emitrelocations)
12058 {
04bdff6a 12059 unsigned int num_rel;
d349c8e2 12060 if (htab->params->power10_stubs != 0)
7c1f4227 12061 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12062 else
12063 num_rel = num_relocs_for_offset (off - 8);
12064 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12065 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12066 }
12067
d349c8e2 12068 if (htab->params->power10_stubs != 0)
7c1f4227 12069 extra = size_power10_offset (off, odd);
04bdff6a
AM
12070 else
12071 extra = size_offset (off - 8);
f891966f
AM
12072 /* Include branch insn plus those in the offset sequence. */
12073 size += 4 + extra;
12074 /* The branch insn is at the end, or "extra" bytes along. So
12075 its offset will be "extra" bytes less that that already
12076 calculated. */
12077 off -= extra;
12078
d349c8e2 12079 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12080 {
12081 /* After the bcl, lr has been modified so we need to emit
12082 .eh_frame info saying the return address is in r12. */
12083 lr_used = stub_entry->stub_offset + 8;
12084 if (stub_entry->stub_type == ppc_stub_long_branch_both)
12085 lr_used += 4;
12086 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12087 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12088 DW_CFA_restore_extended 65. */
12089 delta = lr_used - stub_entry->group->lr_restore;
12090 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12091 stub_entry->group->lr_restore = lr_used + 8;
12092 }
f891966f
AM
12093
12094 /* If the branch can't reach, use a plt_branch. */
12095 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
12096 {
12097 stub_entry->stub_type += (ppc_stub_plt_branch_notoc
12098 - ppc_stub_long_branch_notoc);
12099 size += 4;
12100 }
3d58e1fc
AM
12101 else if (info->emitrelocations)
12102 stub_entry->group->stub_sec->reloc_count +=1;
f891966f
AM
12103 break;
12104
12105 case ppc_stub_plt_call_notoc:
12106 case ppc_stub_plt_call_both:
12107 off = (stub_entry->stub_offset
12108 + stub_entry->group->stub_sec->output_offset
12109 + stub_entry->group->stub_sec->output_section->vma);
12110 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12111 off += 4;
12112 targ = stub_entry->plt_ent->plt.offset & ~1;
12113 if (targ >= (bfd_vma) -2)
12114 abort ();
12115
12116 plt = htab->elf.splt;
12117 if (!htab->elf.dynamic_sections_created
12118 || stub_entry->h == NULL
12119 || stub_entry->h->elf.dynindx == -1)
12120 {
12121 if (stub_entry->symtype == STT_GNU_IFUNC)
12122 plt = htab->elf.iplt;
12123 else
12124 plt = htab->pltlocal;
12125 }
12126 targ += plt->output_offset + plt->output_section->vma;
04bdff6a 12127 odd = off & 4;
f891966f
AM
12128 off = targ - off;
12129
12130 if (htab->params->plt_stub_align != 0)
12131 {
12132 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12133
12134 stub_entry->group->stub_sec->size += pad;
12135 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12136 off -= pad;
12137 }
12138
3d58e1fc
AM
12139 if (info->emitrelocations)
12140 {
04bdff6a 12141 unsigned int num_rel;
d349c8e2 12142 if (htab->params->power10_stubs != 0)
7c1f4227 12143 num_rel = num_relocs_for_power10_offset (off, odd);
04bdff6a
AM
12144 else
12145 num_rel = num_relocs_for_offset (off - 8);
12146 stub_entry->group->stub_sec->reloc_count += num_rel;
3d58e1fc
AM
12147 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12148 }
12149
f891966f
AM
12150 size = plt_stub_size (htab, stub_entry, off);
12151
d349c8e2 12152 if (htab->params->power10_stubs == 0)
04bdff6a
AM
12153 {
12154 /* After the bcl, lr has been modified so we need to emit
12155 .eh_frame info saying the return address is in r12. */
12156 lr_used = stub_entry->stub_offset + 8;
12157 if (stub_entry->stub_type == ppc_stub_plt_call_both)
12158 lr_used += 4;
12159 /* The eh_frame info will consist of a DW_CFA_advance_loc or
12160 variant, DW_CFA_register, 65, 12, DW_CFA_advance_loc+2,
12161 DW_CFA_restore_extended 65. */
12162 delta = lr_used - stub_entry->group->lr_restore;
12163 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12164 stub_entry->group->lr_restore = lr_used + 8;
12165 }
f891966f
AM
12166 break;
12167
12168 case ppc_stub_plt_call:
12169 case ppc_stub_plt_call_r2save:
12170 targ = stub_entry->plt_ent->plt.offset & ~(bfd_vma) 1;
12171 if (targ >= (bfd_vma) -2)
12172 abort ();
12173 plt = htab->elf.splt;
12174 if (!htab->elf.dynamic_sections_created
12175 || stub_entry->h == NULL
12176 || stub_entry->h->elf.dynindx == -1)
12177 {
12178 if (stub_entry->symtype == STT_GNU_IFUNC)
12179 plt = htab->elf.iplt;
12180 else
12181 plt = htab->pltlocal;
12182 }
12183 targ += plt->output_offset + plt->output_section->vma;
12184
12185 off = (elf_gp (info->output_bfd)
12186 + htab->sec_info[stub_entry->group->link_sec->id].toc_off);
12187 off = targ - off;
12188
12189 if (htab->params->plt_stub_align != 0)
12190 {
12191 unsigned pad = plt_stub_pad (htab, stub_entry, off);
12192
12193 stub_entry->group->stub_sec->size += pad;
12194 stub_entry->stub_offset = stub_entry->group->stub_sec->size;
12195 }
12196
12197 if (info->emitrelocations)
12198 {
12199 stub_entry->group->stub_sec->reloc_count
12200 += ((PPC_HA (off) != 0)
12201 + (htab->opd_abi
12202 ? 2 + (htab->params->plt_static_chain
12203 && PPC_HA (off + 16) == PPC_HA (off))
12204 : 1));
12205 stub_entry->group->stub_sec->flags |= SEC_RELOC;
12206 }
12207
12208 size = plt_stub_size (htab, stub_entry, off);
12209
12210 if (stub_entry->h != NULL
ed7007c1 12211 && is_tls_get_addr (&stub_entry->h->elf, htab)
f891966f
AM
12212 && htab->params->tls_get_addr_opt
12213 && stub_entry->stub_type == ppc_stub_plt_call_r2save)
12214 {
9e7028aa
AM
12215 if (htab->params->no_tls_get_addr_regsave)
12216 {
12217 lr_used = stub_entry->stub_offset + size - 20;
12218 /* The eh_frame info will consist of a DW_CFA_advance_loc
12219 or variant, DW_CFA_offset_externed_sf, 65, -stackoff,
12220 DW_CFA_advance_loc+4, DW_CFA_restore_extended, 65. */
12221 delta = lr_used - stub_entry->group->lr_restore;
12222 stub_entry->group->eh_size += eh_advance_size (delta) + 6;
12223 }
12224 else
12225 {
12226 /* Adjustments to r1 need to be described. */
12227 unsigned int cfa_updt = stub_entry->stub_offset + 18 * 4;
12228 delta = cfa_updt - stub_entry->group->lr_restore;
12229 stub_entry->group->eh_size += eh_advance_size (delta);
12230 stub_entry->group->eh_size += htab->opd_abi ? 36 : 35;
12231 }
f891966f
AM
12232 stub_entry->group->lr_restore = size - 4;
12233 }
12234 break;
12235
12236 default:
12237 BFD_FAIL ();
12238 return FALSE;
721956f4
AM
12239 }
12240
6f20ed8a 12241 stub_entry->group->stub_sec->size += size;
b34976b6 12242 return TRUE;
721956f4
AM
12243}
12244
12245/* Set up various things so that we can make a list of input sections
12246 for each output section included in the link. Returns -1 on error,
cedb70c5 12247 0 when no stubs will be needed, and 1 on success. */
721956f4
AM
12248
12249int
e7d1c40c 12250ppc64_elf_setup_section_lists (struct bfd_link_info *info)
721956f4 12251{
6f20ed8a 12252 unsigned int id;
986f0783 12253 size_t amt;
721956f4
AM
12254 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12255
4dfe6ac6
NC
12256 if (htab == NULL)
12257 return -1;
4c52953f 12258
7cf7fcc8 12259 htab->sec_info_arr_size = _bfd_section_id;
6f20ed8a
AM
12260 amt = sizeof (*htab->sec_info) * (htab->sec_info_arr_size);
12261 htab->sec_info = bfd_zmalloc (amt);
12262 if (htab->sec_info == NULL)
721956f4
AM
12263 return -1;
12264
3d6f9012
AM
12265 /* Set toc_off for com, und, abs and ind sections. */
12266 for (id = 0; id < 3; id++)
6f20ed8a 12267 htab->sec_info[id].toc_off = TOC_BASE_OFF;
734b6cf9 12268
721956f4
AM
12269 return 1;
12270}
12271
927be08e
AM
12272/* Set up for first pass at multitoc partitioning. */
12273
12274void
12275ppc64_elf_start_multitoc_partition (struct bfd_link_info *info)
12276{
12277 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12278
1c865ab2 12279 htab->toc_curr = ppc64_elf_set_toc (info, info->output_bfd);
927be08e
AM
12280 htab->toc_bfd = NULL;
12281 htab->toc_first_sec = NULL;
12282}
12283
e717da7e
AM
12284/* The linker repeatedly calls this function for each TOC input section
12285 and linker generated GOT section. Group input bfds such that the toc
927be08e 12286 within a group is less than 64k in size. */
ad8e1ba5 12287
927be08e 12288bfd_boolean
4ce794b7 12289ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
ad8e1ba5
AM
12290{
12291 struct ppc_link_hash_table *htab = ppc_hash_table (info);
d77c8a4b 12292 bfd_vma addr, off, limit;
ad8e1ba5 12293
4dfe6ac6
NC
12294 if (htab == NULL)
12295 return FALSE;
12296
927be08e 12297 if (!htab->second_toc_pass)
4c52953f 12298 {
927be08e 12299 /* Keep track of the first .toc or .got section for this input bfd. */
a4fd3de5
AM
12300 bfd_boolean new_bfd = htab->toc_bfd != isec->owner;
12301
12302 if (new_bfd)
bf102f86
AM
12303 {
12304 htab->toc_bfd = isec->owner;
12305 htab->toc_first_sec = isec;
12306 }
927be08e 12307
bf102f86
AM
12308 addr = isec->output_offset + isec->output_section->vma;
12309 off = addr - htab->toc_curr;
d77c8a4b
AM
12310 limit = 0x80008000;
12311 if (ppc64_elf_tdata (isec->owner)->has_small_toc_reloc)
12312 limit = 0x10000;
12313 if (off + isec->size > limit)
bf102f86
AM
12314 {
12315 addr = (htab->toc_first_sec->output_offset
12316 + htab->toc_first_sec->output_section->vma);
12317 htab->toc_curr = addr;
a27e685f 12318 htab->toc_curr &= -TOC_BASE_ALIGN;
bf102f86 12319 }
99877b66 12320
927be08e
AM
12321 /* toc_curr is the base address of this toc group. Set elf_gp
12322 for the input section to be the offset relative to the
12323 output toc base plus 0x8000. Making the input elf_gp an
12324 offset allows us to move the toc as a whole without
12325 recalculating input elf_gp. */
06bcf541 12326 off = htab->toc_curr - elf_gp (info->output_bfd);
927be08e
AM
12327 off += TOC_BASE_OFF;
12328
12329 /* Die if someone uses a linker script that doesn't keep input
12330 file .toc and .got together. */
a4fd3de5
AM
12331 if (new_bfd
12332 && elf_gp (isec->owner) != 0
927be08e
AM
12333 && elf_gp (isec->owner) != off)
12334 return FALSE;
12335
12336 elf_gp (isec->owner) = off;
12337 return TRUE;
4c52953f 12338 }
927be08e
AM
12339
12340 /* During the second pass toc_first_sec points to the start of
12341 a toc group, and toc_curr is used to track the old elf_gp.
12342 We use toc_bfd to ensure we only look at each bfd once. */
12343 if (htab->toc_bfd == isec->owner)
12344 return TRUE;
12345 htab->toc_bfd = isec->owner;
12346
12347 if (htab->toc_first_sec == NULL
12348 || htab->toc_curr != elf_gp (isec->owner))
12349 {
12350 htab->toc_curr = elf_gp (isec->owner);
12351 htab->toc_first_sec = isec;
12352 }
12353 addr = (htab->toc_first_sec->output_offset
12354 + htab->toc_first_sec->output_section->vma);
06bcf541 12355 off = addr - elf_gp (info->output_bfd) + TOC_BASE_OFF;
927be08e
AM
12356 elf_gp (isec->owner) = off;
12357
12358 return TRUE;
ad8e1ba5
AM
12359}
12360
927be08e
AM
12361/* Called via elf_link_hash_traverse to merge GOT entries for global
12362 symbol H. */
12363
12364static bfd_boolean
12365merge_global_got (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
12366{
12367 if (h->root.type == bfd_link_hash_indirect)
12368 return TRUE;
12369
927be08e
AM
12370 merge_got_entries (&h->got.glist);
12371
12372 return TRUE;
12373}
12374
12375/* Called via elf_link_hash_traverse to allocate GOT entries for global
12376 symbol H. */
12377
12378static bfd_boolean
12379reallocate_got (struct elf_link_hash_entry *h, void *inf)
12380{
12381 struct got_entry *gent;
12382
12383 if (h->root.type == bfd_link_hash_indirect)
12384 return TRUE;
12385
927be08e
AM
12386 for (gent = h->got.glist; gent != NULL; gent = gent->next)
12387 if (!gent->is_indirect)
12388 allocate_got (h, (struct bfd_link_info *) inf, gent);
12389 return TRUE;
12390}
12391
12392/* Called on the first multitoc pass after the last call to
12393 ppc64_elf_next_toc_section. This function removes duplicate GOT
12394 entries. */
12395
12396bfd_boolean
12397ppc64_elf_layout_multitoc (struct bfd_link_info *info)
ad8e1ba5
AM
12398{
12399 struct ppc_link_hash_table *htab = ppc_hash_table (info);
927be08e
AM
12400 struct bfd *ibfd, *ibfd2;
12401 bfd_boolean done_something;
12402
12403 htab->multi_toc_needed = htab->toc_curr != elf_gp (info->output_bfd);
ad8e1ba5 12404
7865406b
AM
12405 if (!htab->do_multi_toc)
12406 return FALSE;
12407
d0fae19d 12408 /* Merge global sym got entries within a toc group. */
927be08e
AM
12409 elf_link_hash_traverse (&htab->elf, merge_global_got, info);
12410
12411 /* And tlsld_got. */
c72f2fb2 12412 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12413 {
12414 struct got_entry *ent, *ent2;
12415
12416 if (!is_ppc64_elf (ibfd))
12417 continue;
12418
12419 ent = ppc64_tlsld_got (ibfd);
12420 if (!ent->is_indirect
12421 && ent->got.offset != (bfd_vma) -1)
12422 {
c72f2fb2 12423 for (ibfd2 = ibfd->link.next; ibfd2 != NULL; ibfd2 = ibfd2->link.next)
927be08e
AM
12424 {
12425 if (!is_ppc64_elf (ibfd2))
12426 continue;
12427
12428 ent2 = ppc64_tlsld_got (ibfd2);
12429 if (!ent2->is_indirect
12430 && ent2->got.offset != (bfd_vma) -1
12431 && elf_gp (ibfd2) == elf_gp (ibfd))
12432 {
12433 ent2->is_indirect = TRUE;
12434 ent2->got.ent = ent;
12435 }
12436 }
12437 }
12438 }
12439
12440 /* Zap sizes of got sections. */
33e44f2e
AM
12441 htab->elf.irelplt->rawsize = htab->elf.irelplt->size;
12442 htab->elf.irelplt->size -= htab->got_reli_size;
927be08e
AM
12443 htab->got_reli_size = 0;
12444
c72f2fb2 12445 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12446 {
12447 asection *got, *relgot;
12448
12449 if (!is_ppc64_elf (ibfd))
12450 continue;
12451
12452 got = ppc64_elf_tdata (ibfd)->got;
12453 if (got != NULL)
12454 {
12455 got->rawsize = got->size;
12456 got->size = 0;
12457 relgot = ppc64_elf_tdata (ibfd)->relgot;
12458 relgot->rawsize = relgot->size;
12459 relgot->size = 0;
12460 }
12461 }
12462
12463 /* Now reallocate the got, local syms first. We don't need to
12464 allocate section contents again since we never increase size. */
c72f2fb2 12465 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12466 {
12467 struct got_entry **lgot_ents;
12468 struct got_entry **end_lgot_ents;
12469 struct plt_entry **local_plt;
12470 struct plt_entry **end_local_plt;
f961d9dd 12471 unsigned char *lgot_masks;
927be08e
AM
12472 bfd_size_type locsymcount;
12473 Elf_Internal_Shdr *symtab_hdr;
19e08130 12474 asection *s;
927be08e
AM
12475
12476 if (!is_ppc64_elf (ibfd))
12477 continue;
12478
12479 lgot_ents = elf_local_got_ents (ibfd);
12480 if (!lgot_ents)
12481 continue;
12482
12483 symtab_hdr = &elf_symtab_hdr (ibfd);
12484 locsymcount = symtab_hdr->sh_info;
12485 end_lgot_ents = lgot_ents + locsymcount;
12486 local_plt = (struct plt_entry **) end_lgot_ents;
12487 end_local_plt = local_plt + locsymcount;
f961d9dd 12488 lgot_masks = (unsigned char *) end_local_plt;
927be08e 12489 s = ppc64_elf_tdata (ibfd)->got;
927be08e
AM
12490 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
12491 {
12492 struct got_entry *ent;
12493
12494 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
d0fae19d 12495 {
19e08130
AM
12496 unsigned int ent_size = 8;
12497 unsigned int rel_size = sizeof (Elf64_External_Rela);
12498
d0fae19d
AM
12499 ent->got.offset = s->size;
12500 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
d0fae19d 12501 {
19e08130
AM
12502 ent_size *= 2;
12503 rel_size *= 2;
12504 }
12505 s->size += ent_size;
37da22e5 12506 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
19e08130 12507 {
33e44f2e 12508 htab->elf.irelplt->size += rel_size;
19e08130
AM
12509 htab->got_reli_size += rel_size;
12510 }
6a3858a6 12511 else if (bfd_link_pic (info)
f749f26e 12512 && !(ent->tls_type != 0
6a3858a6 12513 && bfd_link_executable (info)))
19e08130
AM
12514 {
12515 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12516 srel->size += rel_size;
d0fae19d
AM
12517 }
12518 }
927be08e
AM
12519 }
12520 }
12521
12522 elf_link_hash_traverse (&htab->elf, reallocate_got, info);
12523
c72f2fb2 12524 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12525 {
12526 struct got_entry *ent;
12527
12528 if (!is_ppc64_elf (ibfd))
12529 continue;
12530
12531 ent = ppc64_tlsld_got (ibfd);
12532 if (!ent->is_indirect
12533 && ent->got.offset != (bfd_vma) -1)
12534 {
12535 asection *s = ppc64_elf_tdata (ibfd)->got;
12536 ent->got.offset = s->size;
12537 s->size += 16;
f749f26e 12538 if (bfd_link_dll (info))
927be08e
AM
12539 {
12540 asection *srel = ppc64_elf_tdata (ibfd)->relgot;
12541 srel->size += sizeof (Elf64_External_Rela);
12542 }
12543 }
12544 }
12545
33e44f2e 12546 done_something = htab->elf.irelplt->rawsize != htab->elf.irelplt->size;
927be08e 12547 if (!done_something)
c72f2fb2 12548 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
927be08e
AM
12549 {
12550 asection *got;
12551
12552 if (!is_ppc64_elf (ibfd))
12553 continue;
12554
12555 got = ppc64_elf_tdata (ibfd)->got;
12556 if (got != NULL)
12557 {
12558 done_something = got->rawsize != got->size;
12559 if (done_something)
12560 break;
12561 }
12562 }
12563
12564 if (done_something)
e7d1c40c 12565 (*htab->params->layout_sections_again) ();
927be08e
AM
12566
12567 /* Set up for second pass over toc sections to recalculate elf_gp
12568 on input sections. */
12569 htab->toc_bfd = NULL;
12570 htab->toc_first_sec = NULL;
12571 htab->second_toc_pass = TRUE;
12572 return done_something;
12573}
12574
12575/* Called after second pass of multitoc partitioning. */
12576
12577void
12578ppc64_elf_finish_multitoc_partition (struct bfd_link_info *info)
12579{
12580 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12581
12582 /* After the second pass, toc_curr tracks the TOC offset used
12583 for code sections below in ppc64_elf_next_input_section. */
3d6f9012 12584 htab->toc_curr = TOC_BASE_OFF;
ad8e1ba5
AM
12585}
12586
9b5ecbd0
AM
12587/* No toc references were found in ISEC. If the code in ISEC makes no
12588 calls, then there's no need to use toc adjusting stubs when branching
12589 into ISEC. Actually, indirect calls from ISEC are OK as they will
4c52953f
AM
12590 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
12591 needed, and 2 if a cyclical call-graph was found but no other reason
12592 for a stub was detected. If called from the top level, a return of
12593 2 means the same as a return of 0. */
9b5ecbd0
AM
12594
12595static int
4ce794b7 12596toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
9b5ecbd0 12597{
9b5ecbd0 12598 int ret;
70cc837d
AM
12599
12600 /* Mark this section as checked. */
12601 isec->call_check_done = 1;
9b5ecbd0 12602
772119ce
AM
12603 /* We know none of our code bearing sections will need toc stubs. */
12604 if ((isec->flags & SEC_LINKER_CREATED) != 0)
12605 return 0;
12606
eea6121a 12607 if (isec->size == 0)
082c50f8
AM
12608 return 0;
12609
4c52953f
AM
12610 if (isec->output_section == NULL)
12611 return 0;
12612
4c52953f 12613 ret = 0;
70cc837d 12614 if (isec->reloc_count != 0)
9b5ecbd0 12615 {
70cc837d
AM
12616 Elf_Internal_Rela *relstart, *rel;
12617 Elf_Internal_Sym *local_syms;
12618 struct ppc_link_hash_table *htab;
2917689a 12619
70cc837d
AM
12620 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
12621 info->keep_memory);
12622 if (relstart == NULL)
12623 return -1;
90aecf7a 12624
70cc837d
AM
12625 /* Look for branches to outside of this section. */
12626 local_syms = NULL;
12627 htab = ppc_hash_table (info);
12628 if (htab == NULL)
12629 return -1;
4c52953f 12630
70cc837d 12631 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
4c52953f 12632 {
70cc837d
AM
12633 enum elf_ppc64_reloc_type r_type;
12634 unsigned long r_symndx;
12635 struct elf_link_hash_entry *h;
12636 struct ppc_link_hash_entry *eh;
12637 Elf_Internal_Sym *sym;
12638 asection *sym_sec;
12639 struct _opd_sec_data *opd;
12640 bfd_vma sym_value;
12641 bfd_vma dest;
12642
12643 r_type = ELF64_R_TYPE (rel->r_info);
12644 if (r_type != R_PPC64_REL24
05d0e962 12645 && r_type != R_PPC64_REL24_NOTOC
70cc837d
AM
12646 && r_type != R_PPC64_REL14
12647 && r_type != R_PPC64_REL14_BRTAKEN
23cedd1d 12648 && r_type != R_PPC64_REL14_BRNTAKEN
5663e321
AM
12649 && r_type != R_PPC64_PLTCALL
12650 && r_type != R_PPC64_PLTCALL_NOTOC)
70cc837d 12651 continue;
4c52953f 12652
70cc837d
AM
12653 r_symndx = ELF64_R_SYM (rel->r_info);
12654 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
12655 isec->owner))
4c52953f 12656 {
70cc837d
AM
12657 ret = -1;
12658 break;
12659 }
4c52953f 12660
70cc837d
AM
12661 /* Calls to dynamic lib functions go through a plt call stub
12662 that uses r2. */
ed7007c1 12663 eh = ppc_elf_hash_entry (h);
70cc837d
AM
12664 if (eh != NULL
12665 && (eh->elf.plt.plist != NULL
12666 || (eh->oh != NULL
12667 && ppc_follow_link (eh->oh)->elf.plt.plist != NULL)))
12668 {
12669 ret = 1;
12670 break;
4c52953f
AM
12671 }
12672
70cc837d
AM
12673 if (sym_sec == NULL)
12674 /* Ignore other undefined symbols. */
4c52953f 12675 continue;
4c52953f 12676
70cc837d
AM
12677 /* Assume branches to other sections not included in the
12678 link need stubs too, to cover -R and absolute syms. */
12679 if (sym_sec->output_section == NULL)
12680 {
12681 ret = 1;
12682 break;
12683 }
4c52953f 12684
70cc837d
AM
12685 if (h == NULL)
12686 sym_value = sym->st_value;
12687 else
12688 {
12689 if (h->root.type != bfd_link_hash_defined
12690 && h->root.type != bfd_link_hash_defweak)
12691 abort ();
12692 sym_value = h->root.u.def.value;
12693 }
12694 sym_value += rel->r_addend;
4c52953f 12695
70cc837d
AM
12696 /* If this branch reloc uses an opd sym, find the code section. */
12697 opd = get_opd_info (sym_sec);
12698 if (opd != NULL)
12699 {
12700 if (h == NULL && opd->adjust != NULL)
12701 {
12702 long adjust;
4c52953f 12703
92a9c616 12704 adjust = opd->adjust[OPD_NDX (sym_value)];
70cc837d
AM
12705 if (adjust == -1)
12706 /* Assume deleted functions won't ever be called. */
12707 continue;
12708 sym_value += adjust;
12709 }
4c52953f 12710
aef36ac1
AM
12711 dest = opd_entry_value (sym_sec, sym_value,
12712 &sym_sec, NULL, FALSE);
70cc837d
AM
12713 if (dest == (bfd_vma) -1)
12714 continue;
12715 }
12716 else
12717 dest = (sym_value
12718 + sym_sec->output_offset
12719 + sym_sec->output_section->vma);
4c52953f 12720
70cc837d
AM
12721 /* Ignore branch to self. */
12722 if (sym_sec == isec)
12723 continue;
4c52953f 12724
70cc837d
AM
12725 /* If the called function uses the toc, we need a stub. */
12726 if (sym_sec->has_toc_reloc
12727 || sym_sec->makes_toc_func_call)
4c52953f 12728 {
70cc837d 12729 ret = 1;
4c52953f
AM
12730 break;
12731 }
70cc837d
AM
12732
12733 /* Assume any branch that needs a long branch stub might in fact
12734 need a plt_branch stub. A plt_branch stub uses r2. */
12735 else if (dest - (isec->output_offset
12736 + isec->output_section->vma
6911b7dc
AM
12737 + rel->r_offset) + (1 << 25)
12738 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
12739 ? h->other
12740 : sym->st_other))
4c52953f 12741 {
70cc837d
AM
12742 ret = 1;
12743 break;
12744 }
12745
12746 /* If calling back to a section in the process of being
12747 tested, we can't say for sure that no toc adjusting stubs
12748 are needed, so don't return zero. */
12749 else if (sym_sec->call_check_in_progress)
12750 ret = 2;
12751
12752 /* Branches to another section that itself doesn't have any TOC
12753 references are OK. Recursively call ourselves to check. */
12754 else if (!sym_sec->call_check_done)
12755 {
12756 int recur;
12757
12758 /* Mark current section as indeterminate, so that other
12759 sections that call back to current won't be marked as
12760 known. */
12761 isec->call_check_in_progress = 1;
12762 recur = toc_adjusting_stub_needed (info, sym_sec);
12763 isec->call_check_in_progress = 0;
12764
4c52953f
AM
12765 if (recur != 0)
12766 {
70cc837d
AM
12767 ret = recur;
12768 if (recur != 2)
12769 break;
4c52953f
AM
12770 }
12771 }
4c52953f 12772 }
70cc837d 12773
c9594989
AM
12774 if (elf_symtab_hdr (isec->owner).contents
12775 != (unsigned char *) local_syms)
70cc837d
AM
12776 free (local_syms);
12777 if (elf_section_data (isec)->relocs != relstart)
12778 free (relstart);
9b5ecbd0
AM
12779 }
12780
70cc837d
AM
12781 if ((ret & 1) == 0
12782 && isec->map_head.s != NULL
12783 && (strcmp (isec->output_section->name, ".init") == 0
12784 || strcmp (isec->output_section->name, ".fini") == 0))
12785 {
12786 if (isec->map_head.s->has_toc_reloc
12787 || isec->map_head.s->makes_toc_func_call)
12788 ret = 1;
12789 else if (!isec->map_head.s->call_check_done)
12790 {
12791 int recur;
12792 isec->call_check_in_progress = 1;
12793 recur = toc_adjusting_stub_needed (info, isec->map_head.s);
12794 isec->call_check_in_progress = 0;
12795 if (recur != 0)
12796 ret = recur;
12797 }
12798 }
12799
12800 if (ret == 1)
12801 isec->makes_toc_func_call = 1;
4c52953f 12802
9b5ecbd0
AM
12803 return ret;
12804}
12805
721956f4
AM
12806/* The linker repeatedly calls this function for each input section,
12807 in the order that input sections are linked into output sections.
12808 Build lists of input sections to determine groupings between which
12809 we may insert linker stubs. */
12810
9b5ecbd0 12811bfd_boolean
4ce794b7 12812ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
721956f4
AM
12813{
12814 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12815
4dfe6ac6
NC
12816 if (htab == NULL)
12817 return FALSE;
12818
734b6cf9 12819 if ((isec->output_section->flags & SEC_CODE) != 0
6f20ed8a 12820 && isec->output_section->id < htab->sec_info_arr_size)
721956f4 12821 {
3d6f9012
AM
12822 /* This happens to make the list in reverse order,
12823 which is what we want. */
6f20ed8a
AM
12824 htab->sec_info[isec->id].u.list
12825 = htab->sec_info[isec->output_section->id].u.list;
12826 htab->sec_info[isec->output_section->id].u.list = isec;
721956f4 12827 }
ad8e1ba5 12828
4c52953f 12829 if (htab->multi_toc_needed)
9b5ecbd0 12830 {
8b974ba3
AM
12831 /* Analyse sections that aren't already flagged as needing a
12832 valid toc pointer. Exclude .fixup for the linux kernel.
12833 .fixup contains branches, but only back to the function that
12834 hit an exception. */
12835 if (!(isec->has_toc_reloc
12836 || (isec->flags & SEC_CODE) == 0
12837 || strcmp (isec->name, ".fixup") == 0
12838 || isec->call_check_done))
12839 {
12840 if (toc_adjusting_stub_needed (info, isec) < 0)
6683a28d 12841 return FALSE;
8b974ba3
AM
12842 }
12843 /* Make all sections use the TOC assigned for this object file.
12844 This will be wrong for pasted sections; We fix that in
12845 check_pasted_section(). */
12846 if (elf_gp (isec->owner) != 0)
12847 htab->toc_curr = elf_gp (isec->owner);
12848 }
12849
6f20ed8a 12850 htab->sec_info[isec->id].toc_off = htab->toc_curr;
9b5ecbd0 12851 return TRUE;
721956f4
AM
12852}
12853
70cc837d
AM
12854/* Check that all .init and .fini sections use the same toc, if they
12855 have toc relocs. */
12856
12857static bfd_boolean
12858check_pasted_section (struct bfd_link_info *info, const char *name)
12859{
12860 asection *o = bfd_get_section_by_name (info->output_bfd, name);
12861
12862 if (o != NULL)
12863 {
12864 struct ppc_link_hash_table *htab = ppc_hash_table (info);
12865 bfd_vma toc_off = 0;
12866 asection *i;
12867
12868 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12869 if (i->has_toc_reloc)
12870 {
12871 if (toc_off == 0)
6f20ed8a
AM
12872 toc_off = htab->sec_info[i->id].toc_off;
12873 else if (toc_off != htab->sec_info[i->id].toc_off)
70cc837d
AM
12874 return FALSE;
12875 }
6683a28d
AM
12876
12877 if (toc_off == 0)
12878 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
12879 if (i->makes_toc_func_call)
12880 {
6f20ed8a 12881 toc_off = htab->sec_info[i->id].toc_off;
6683a28d
AM
12882 break;
12883 }
12884
70cc837d
AM
12885 /* Make sure the whole pasted function uses the same toc offset. */
12886 if (toc_off != 0)
12887 for (i = o->map_head.s; i != NULL; i = i->map_head.s)
6f20ed8a 12888 htab->sec_info[i->id].toc_off = toc_off;
70cc837d
AM
12889 }
12890 return TRUE;
12891}
12892
12893bfd_boolean
12894ppc64_elf_check_init_fini (struct bfd_link_info *info)
12895{
12896 return (check_pasted_section (info, ".init")
12897 & check_pasted_section (info, ".fini"));
12898}
12899
721956f4
AM
12900/* See whether we can group stub sections together. Grouping stub
12901 sections may result in fewer stubs. More importantly, we need to
12902 put all .init* and .fini* stubs at the beginning of the .init or
12903 .fini output sections respectively, because glibc splits the
12904 _init and _fini functions into multiple parts. Putting a stub in
12905 the middle of a function is not a good idea. */
12906
6f20ed8a
AM
12907static bfd_boolean
12908group_sections (struct bfd_link_info *info,
4ce794b7
AM
12909 bfd_size_type stub_group_size,
12910 bfd_boolean stubs_always_before_branch)
721956f4 12911{
6f20ed8a
AM
12912 struct ppc_link_hash_table *htab;
12913 asection *osec;
7c8fe5c4
AM
12914 bfd_boolean suppress_size_errors;
12915
6f20ed8a
AM
12916 htab = ppc_hash_table (info);
12917 if (htab == NULL)
12918 return FALSE;
12919
7c8fe5c4 12920 suppress_size_errors = FALSE;
7c8fe5c4
AM
12921 if (stub_group_size == 1)
12922 {
12923 /* Default values. */
12924 if (stubs_always_before_branch)
09f92717 12925 stub_group_size = 0x1e00000;
7c8fe5c4 12926 else
09f92717 12927 stub_group_size = 0x1c00000;
7c8fe5c4
AM
12928 suppress_size_errors = TRUE;
12929 }
12930
6f20ed8a 12931 for (osec = info->output_bfd->sections; osec != NULL; osec = osec->next)
721956f4 12932 {
6f20ed8a
AM
12933 asection *tail;
12934
12935 if (osec->id >= htab->sec_info_arr_size)
12936 continue;
12937
12938 tail = htab->sec_info[osec->id].u.list;
734b6cf9 12939 while (tail != NULL)
721956f4 12940 {
734b6cf9
AM
12941 asection *curr;
12942 asection *prev;
12943 bfd_size_type total;
12944 bfd_boolean big_sec;
12945 bfd_vma curr_toc;
6f20ed8a 12946 struct map_stub *group;
09f92717 12947 bfd_size_type group_size;
734b6cf9
AM
12948
12949 curr = tail;
eea6121a 12950 total = tail->size;
09f92717
AM
12951 group_size = (ppc64_elf_section_data (tail) != NULL
12952 && ppc64_elf_section_data (tail)->has_14bit_branch
12953 ? stub_group_size >> 10 : stub_group_size);
12954
12955 big_sec = total > group_size;
7c8fe5c4 12956 if (big_sec && !suppress_size_errors)
695344c0 12957 /* xgettext:c-format */
871b3ab2 12958 _bfd_error_handler (_("%pB section %pA exceeds stub group size"),
4eca0228 12959 tail->owner, tail);
6f20ed8a 12960 curr_toc = htab->sec_info[tail->id].toc_off;
734b6cf9 12961
6f20ed8a 12962 while ((prev = htab->sec_info[curr->id].u.list) != NULL
734b6cf9 12963 && ((total += curr->output_offset - prev->output_offset)
6bee8834
AM
12964 < (ppc64_elf_section_data (prev) != NULL
12965 && ppc64_elf_section_data (prev)->has_14bit_branch
09f92717 12966 ? (group_size = stub_group_size >> 10) : group_size))
6f20ed8a 12967 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
12968 curr = prev;
12969
12970 /* OK, the size from the start of CURR to the end is less
09f92717 12971 than group_size and thus can be handled by one stub
734b6cf9 12972 section. (or the tail section is itself larger than
09f92717
AM
12973 group_size, in which case we may be toast.) We should
12974 really be keeping track of the total size of stubs added
12975 here, as stubs contribute to the final output section
12976 size. That's a little tricky, and this way will only
12977 break if stubs added make the total size more than 2^25,
12978 ie. for the default stub_group_size, if stubs total more
12979 than 2097152 bytes, or nearly 75000 plt call stubs. */
6f20ed8a
AM
12980 group = bfd_alloc (curr->owner, sizeof (*group));
12981 if (group == NULL)
12982 return FALSE;
12983 group->link_sec = curr;
12984 group->stub_sec = NULL;
a4b6fadd 12985 group->needs_save_res = 0;
df136d64
AM
12986 group->lr_restore = 0;
12987 group->eh_size = 0;
12988 group->eh_base = 0;
a4b6fadd
AM
12989 group->next = htab->group;
12990 htab->group = group;
734b6cf9 12991 do
721956f4 12992 {
6f20ed8a 12993 prev = htab->sec_info[tail->id].u.list;
734b6cf9 12994 /* Set up this stub group. */
6f20ed8a 12995 htab->sec_info[tail->id].u.group = group;
721956f4 12996 }
734b6cf9
AM
12997 while (tail != curr && (tail = prev) != NULL);
12998
09f92717 12999 /* But wait, there's more! Input sections up to group_size
734b6cf9
AM
13000 bytes before the stub section can be handled by it too.
13001 Don't do this if we have a really large section after the
13002 stubs, as adding more stubs increases the chance that
13003 branches may not reach into the stub section. */
13004 if (!stubs_always_before_branch && !big_sec)
13005 {
13006 total = 0;
13007 while (prev != NULL
13008 && ((total += tail->output_offset - prev->output_offset)
6bee8834
AM
13009 < (ppc64_elf_section_data (prev) != NULL
13010 && ppc64_elf_section_data (prev)->has_14bit_branch
2cdcc330
AM
13011 ? (group_size = stub_group_size >> 10)
13012 : group_size))
6f20ed8a 13013 && htab->sec_info[prev->id].toc_off == curr_toc)
734b6cf9
AM
13014 {
13015 tail = prev;
6f20ed8a
AM
13016 prev = htab->sec_info[tail->id].u.list;
13017 htab->sec_info[tail->id].u.group = group;
734b6cf9
AM
13018 }
13019 }
13020 tail = prev;
721956f4
AM
13021 }
13022 }
6f20ed8a 13023 return TRUE;
721956f4
AM
13024}
13025
58d180e8
AM
13026static const unsigned char glink_eh_frame_cie[] =
13027{
13028 0, 0, 0, 16, /* length. */
13029 0, 0, 0, 0, /* id. */
13030 1, /* CIE version. */
13031 'z', 'R', 0, /* Augmentation string. */
13032 4, /* Code alignment. */
13033 0x78, /* Data alignment. */
13034 65, /* RA reg. */
13035 1, /* Augmentation size. */
13036 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
2e0ce1c8 13037 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
58d180e8
AM
13038};
13039
d969d15f
AM
13040/* Stripping output sections is normally done before dynamic section
13041 symbols have been allocated. This function is called later, and
13042 handles cases like htab->brlt which is mapped to its own output
13043 section. */
13044
13045static void
13046maybe_strip_output (struct bfd_link_info *info, asection *isec)
13047{
13048 if (isec->size == 0
13049 && isec->output_section->size == 0
53d8967a 13050 && !(isec->output_section->flags & SEC_KEEP)
d969d15f
AM
13051 && !bfd_section_removed_from_list (info->output_bfd,
13052 isec->output_section)
13053 && elf_section_data (isec->output_section)->dynindx == 0)
13054 {
13055 isec->output_section->flags |= SEC_EXCLUDE;
13056 bfd_section_list_remove (info->output_bfd, isec->output_section);
13057 info->output_bfd->section_count--;
13058 }
13059}
13060
721956f4
AM
13061/* Determine and set the size of the stub section for a final link.
13062
13063 The basic idea here is to examine all the relocations looking for
13064 PC-relative calls to a target that is unreachable with a "bl"
13065 instruction. */
13066
b34976b6 13067bfd_boolean
e7d1c40c 13068ppc64_elf_size_stubs (struct bfd_link_info *info)
721956f4
AM
13069{
13070 bfd_size_type stub_group_size;
b34976b6 13071 bfd_boolean stubs_always_before_branch;
721956f4
AM
13072 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13073
4dfe6ac6
NC
13074 if (htab == NULL)
13075 return FALSE;
13076
d349c8e2
AM
13077 if (htab->params->power10_stubs == -1 && !htab->has_power10_relocs)
13078 htab->params->power10_stubs = 0;
13079
0e1862bb 13080 if (htab->params->plt_thread_safe == -1 && !bfd_link_executable (info))
e7d1c40c 13081 htab->params->plt_thread_safe = 1;
b9e5796b 13082 if (!htab->opd_abi)
e7d1c40c
AM
13083 htab->params->plt_thread_safe = 0;
13084 else if (htab->params->plt_thread_safe == -1)
794e51c0 13085 {
e2458743 13086 static const char *const thread_starter[] =
794e51c0
AM
13087 {
13088 "pthread_create",
13089 /* libstdc++ */
13090 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
13091 /* librt */
13092 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
13093 "mq_notify", "create_timer",
13094 /* libanl */
13095 "getaddrinfo_a",
13096 /* libgomp */
2300b5a1 13097 "GOMP_parallel",
794e51c0 13098 "GOMP_parallel_start",
2300b5a1 13099 "GOMP_parallel_loop_static",
794e51c0 13100 "GOMP_parallel_loop_static_start",
2300b5a1 13101 "GOMP_parallel_loop_dynamic",
794e51c0 13102 "GOMP_parallel_loop_dynamic_start",
2300b5a1 13103 "GOMP_parallel_loop_guided",
794e51c0 13104 "GOMP_parallel_loop_guided_start",
2300b5a1 13105 "GOMP_parallel_loop_runtime",
794e51c0 13106 "GOMP_parallel_loop_runtime_start",
2300b5a1 13107 "GOMP_parallel_sections",
68ffbac6 13108 "GOMP_parallel_sections_start",
f9dffbf0
AM
13109 /* libgo */
13110 "__go_go",
794e51c0
AM
13111 };
13112 unsigned i;
13113
a4b6fadd 13114 for (i = 0; i < ARRAY_SIZE (thread_starter); i++)
794e51c0
AM
13115 {
13116 struct elf_link_hash_entry *h;
13117 h = elf_link_hash_lookup (&htab->elf, thread_starter[i],
13118 FALSE, FALSE, TRUE);
e7d1c40c
AM
13119 htab->params->plt_thread_safe = h != NULL && h->ref_regular;
13120 if (htab->params->plt_thread_safe)
794e51c0
AM
13121 break;
13122 }
13123 }
e7d1c40c
AM
13124 stubs_always_before_branch = htab->params->group_size < 0;
13125 if (htab->params->group_size < 0)
13126 stub_group_size = -htab->params->group_size;
721956f4 13127 else
e7d1c40c 13128 stub_group_size = htab->params->group_size;
721956f4 13129
6f20ed8a
AM
13130 if (!group_sections (info, stub_group_size, stubs_always_before_branch))
13131 return FALSE;
721956f4 13132
a804e476
AM
13133 htab->tga_group = NULL;
13134 if (!htab->params->no_tls_get_addr_regsave
13135 && htab->tga_desc_fd != NULL
13136 && (htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefined
13137 || htab->tga_desc_fd->elf.root.type == bfd_link_hash_undefweak)
13138 && htab->tls_get_addr_fd != NULL
13139 && is_static_defined (&htab->tls_get_addr_fd->elf))
13140 {
13141 asection *sym_sec, *code_sec, *stub_sec;
13142 bfd_vma sym_value;
13143 struct _opd_sec_data *opd;
13144
13145 sym_sec = htab->tls_get_addr_fd->elf.root.u.def.section;
13146 sym_value = defined_sym_val (&htab->tls_get_addr_fd->elf);
13147 code_sec = sym_sec;
13148 opd = get_opd_info (sym_sec);
13149 if (opd != NULL)
13150 opd_entry_value (sym_sec, sym_value, &code_sec, NULL, FALSE);
13151 htab->tga_group = htab->sec_info[code_sec->id].u.group;
13152 stub_sec = (*htab->params->add_stub_section) (".tga_desc.stub",
13153 htab->tga_group->link_sec);
13154 if (stub_sec == NULL)
13155 return FALSE;
13156 htab->tga_group->stub_sec = stub_sec;
13157
13158 htab->tga_desc_fd->elf.root.type = bfd_link_hash_defined;
13159 htab->tga_desc_fd->elf.root.u.def.section = stub_sec;
13160 htab->tga_desc_fd->elf.root.u.def.value = 0;
13161 htab->tga_desc_fd->elf.type = STT_FUNC;
13162 htab->tga_desc_fd->elf.def_regular = 1;
13163 htab->tga_desc_fd->elf.non_elf = 0;
13164 _bfd_elf_link_hash_hide_symbol (info, &htab->tga_desc_fd->elf, TRUE);
13165 }
13166
c9301e31
AM
13167#define STUB_SHRINK_ITER 20
13168 /* Loop until no stubs added. After iteration 20 of this loop we may
13169 exit on a stub section shrinking. This is to break out of a
13170 pathological case where adding stubs on one iteration decreases
13171 section gaps (perhaps due to alignment), which then requires
13172 fewer or smaller stubs on the next iteration. */
13173
721956f4
AM
13174 while (1)
13175 {
13176 bfd *input_bfd;
13177 unsigned int bfd_indx;
a4b6fadd 13178 struct map_stub *group;
721956f4
AM
13179
13180 htab->stub_iteration += 1;
721956f4
AM
13181
13182 for (input_bfd = info->input_bfds, bfd_indx = 0;
13183 input_bfd != NULL;
c72f2fb2 13184 input_bfd = input_bfd->link.next, bfd_indx++)
721956f4
AM
13185 {
13186 Elf_Internal_Shdr *symtab_hdr;
13187 asection *section;
6cdc0ccc 13188 Elf_Internal_Sym *local_syms = NULL;
721956f4 13189
0c8d6e5c 13190 if (!is_ppc64_elf (input_bfd))
67f93c31
AM
13191 continue;
13192
721956f4 13193 /* We'll need the symbol table in a second. */
0ffa91dd 13194 symtab_hdr = &elf_symtab_hdr (input_bfd);
721956f4
AM
13195 if (symtab_hdr->sh_info == 0)
13196 continue;
13197
721956f4
AM
13198 /* Walk over each section attached to the input bfd. */
13199 for (section = input_bfd->sections;
13200 section != NULL;
13201 section = section->next)
13202 {
721956f4 13203 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
721956f4
AM
13204
13205 /* If there aren't any relocs, then there's nothing more
13206 to do. */
13207 if ((section->flags & SEC_RELOC) == 0
12c0f757
AM
13208 || (section->flags & SEC_ALLOC) == 0
13209 || (section->flags & SEC_LOAD) == 0
13210 || (section->flags & SEC_CODE) == 0
721956f4
AM
13211 || section->reloc_count == 0)
13212 continue;
13213
13214 /* If this section is a link-once section that will be
13215 discarded, then don't create any stubs. */
13216 if (section->output_section == NULL
927be08e 13217 || section->output_section->owner != info->output_bfd)
721956f4
AM
13218 continue;
13219
1e2f5b6e
AM
13220 /* Get the relocs. */
13221 internal_relocs
4ce794b7 13222 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 13223 info->keep_memory);
721956f4 13224 if (internal_relocs == NULL)
1e2f5b6e 13225 goto error_ret_free_local;
721956f4
AM
13226
13227 /* Now examine each relocation. */
13228 irela = internal_relocs;
13229 irelaend = irela + section->reloc_count;
13230 for (; irela < irelaend; irela++)
13231 {
4ce794b7
AM
13232 enum elf_ppc64_reloc_type r_type;
13233 unsigned int r_indx;
721956f4
AM
13234 enum ppc_stub_type stub_type;
13235 struct ppc_stub_hash_entry *stub_entry;
8387904d 13236 asection *sym_sec, *code_sec;
e054468f 13237 bfd_vma sym_value, code_value;
721956f4 13238 bfd_vma destination;
6911b7dc 13239 unsigned long local_off;
8843416a 13240 bfd_boolean ok_dest;
721956f4 13241 struct ppc_link_hash_entry *hash;
8387904d 13242 struct ppc_link_hash_entry *fdh;
411e1bfb
AM
13243 struct elf_link_hash_entry *h;
13244 Elf_Internal_Sym *sym;
721956f4
AM
13245 char *stub_name;
13246 const asection *id_sec;
74f0fb50 13247 struct _opd_sec_data *opd;
e054468f 13248 struct plt_entry *plt_ent;
721956f4
AM
13249
13250 r_type = ELF64_R_TYPE (irela->r_info);
13251 r_indx = ELF64_R_SYM (irela->r_info);
13252
4ce794b7 13253 if (r_type >= R_PPC64_max)
721956f4
AM
13254 {
13255 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 13256 goto error_ret_free_internal;
721956f4
AM
13257 }
13258
13259 /* Only look for stubs on branch instructions. */
4ce794b7 13260 if (r_type != R_PPC64_REL24
05d0e962 13261 && r_type != R_PPC64_REL24_NOTOC
4ce794b7
AM
13262 && r_type != R_PPC64_REL14
13263 && r_type != R_PPC64_REL14_BRTAKEN
13264 && r_type != R_PPC64_REL14_BRNTAKEN)
721956f4
AM
13265 continue;
13266
13267 /* Now determine the call target, its name, value,
13268 section. */
411e1bfb
AM
13269 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
13270 r_indx, input_bfd))
13271 goto error_ret_free_internal;
ed7007c1 13272 hash = ppc_elf_hash_entry (h);
411e1bfb 13273
8843416a 13274 ok_dest = FALSE;
8387904d 13275 fdh = NULL;
7fe2b9a6 13276 sym_value = 0;
411e1bfb 13277 if (hash == NULL)
721956f4 13278 {
411e1bfb 13279 sym_value = sym->st_value;
c27b8c2a
AM
13280 if (sym_sec != NULL
13281 && sym_sec->output_section != NULL)
13282 ok_dest = TRUE;
721956f4 13283 }
7fe2b9a6
AM
13284 else if (hash->elf.root.type == bfd_link_hash_defined
13285 || hash->elf.root.type == bfd_link_hash_defweak)
13286 {
13287 sym_value = hash->elf.root.u.def.value;
13288 if (sym_sec->output_section != NULL)
13289 ok_dest = TRUE;
13290 }
13291 else if (hash->elf.root.type == bfd_link_hash_undefweak
13292 || hash->elf.root.type == bfd_link_hash_undefined)
721956f4 13293 {
99877b66 13294 /* Recognise an old ABI func code entry sym, and
7fe2b9a6
AM
13295 use the func descriptor sym instead if it is
13296 defined. */
ceb1f1ef 13297 if (hash->elf.root.root.string[0] == '.'
8c5b4e52 13298 && hash->oh != NULL)
8387904d 13299 {
8c5b4e52 13300 fdh = ppc_follow_link (hash->oh);
8387904d
AM
13301 if (fdh->elf.root.type == bfd_link_hash_defined
13302 || fdh->elf.root.type == bfd_link_hash_defweak)
13303 {
13304 sym_sec = fdh->elf.root.u.def.section;
13305 sym_value = fdh->elf.root.u.def.value;
13306 if (sym_sec->output_section != NULL)
13307 ok_dest = TRUE;
13308 }
99877b66
AM
13309 else
13310 fdh = NULL;
8387904d 13311 }
7fe2b9a6
AM
13312 }
13313 else
13314 {
13315 bfd_set_error (bfd_error_bad_value);
13316 goto error_ret_free_internal;
721956f4
AM
13317 }
13318
8843416a 13319 destination = 0;
6911b7dc 13320 local_off = 0;
8843416a
AM
13321 if (ok_dest)
13322 {
13323 sym_value += irela->r_addend;
13324 destination = (sym_value
13325 + sym_sec->output_offset
13326 + sym_sec->output_section->vma);
6911b7dc
AM
13327 local_off = PPC64_LOCAL_ENTRY_OFFSET (hash
13328 ? hash->elf.other
13329 : sym->st_other);
8843416a
AM
13330 }
13331
8387904d 13332 code_sec = sym_sec;
e054468f 13333 code_value = sym_value;
74f0fb50
AM
13334 opd = get_opd_info (sym_sec);
13335 if (opd != NULL)
8387904d
AM
13336 {
13337 bfd_vma dest;
13338
74f0fb50 13339 if (hash == NULL && opd->adjust != NULL)
8387904d 13340 {
51aecdc5 13341 long adjust = opd->adjust[OPD_NDX (sym_value)];
8387904d
AM
13342 if (adjust == -1)
13343 continue;
e054468f 13344 code_value += adjust;
8387904d
AM
13345 sym_value += adjust;
13346 }
13347 dest = opd_entry_value (sym_sec, sym_value,
aef36ac1 13348 &code_sec, &code_value, FALSE);
8387904d
AM
13349 if (dest != (bfd_vma) -1)
13350 {
13351 destination = dest;
13352 if (fdh != NULL)
13353 {
13354 /* Fixup old ABI sym to point at code
13355 entry. */
99877b66 13356 hash->elf.root.type = bfd_link_hash_defweak;
8387904d 13357 hash->elf.root.u.def.section = code_sec;
e054468f 13358 hash->elf.root.u.def.value = code_value;
8387904d
AM
13359 }
13360 }
13361 }
13362
721956f4 13363 /* Determine what (if any) linker stub is needed. */
e054468f 13364 plt_ent = NULL;
721956f4 13365 stub_type = ppc_type_of_stub (section, irela, &hash,
6911b7dc
AM
13366 &plt_ent, destination,
13367 local_off);
ad8e1ba5 13368
05d0e962
AM
13369 if (r_type == R_PPC64_REL24_NOTOC)
13370 {
13371 if (stub_type == ppc_stub_plt_call)
13372 stub_type = ppc_stub_plt_call_notoc;
13373 else if (stub_type == ppc_stub_long_branch
13374 || (code_sec != NULL
13375 && code_sec->output_section != NULL
13376 && (((hash ? hash->elf.other : sym->st_other)
13377 & STO_PPC64_LOCAL_MASK)
4a4e7361 13378 > 1 << STO_PPC64_LOCAL_BIT)))
05d0e962
AM
13379 stub_type = ppc_stub_long_branch_notoc;
13380 }
13381 else if (stub_type != ppc_stub_plt_call)
ad8e1ba5
AM
13382 {
13383 /* Check whether we need a TOC adjusting stub.
13384 Since the linker pastes together pieces from
13385 different object files when creating the
13386 _init and _fini functions, it may be that a
13387 call to what looks like a local sym is in
13388 fact a call needing a TOC adjustment. */
33cb30a1
AM
13389 if ((code_sec != NULL
13390 && code_sec->output_section != NULL
13391 && (htab->sec_info[code_sec->id].toc_off
13392 != htab->sec_info[section->id].toc_off)
13393 && (code_sec->has_toc_reloc
13394 || code_sec->makes_toc_func_call))
13395 || (((hash ? hash->elf.other : sym->st_other)
13396 & STO_PPC64_LOCAL_MASK)
13397 == 1 << STO_PPC64_LOCAL_BIT))
ad8e1ba5
AM
13398 stub_type = ppc_stub_long_branch_r2off;
13399 }
13400
721956f4
AM
13401 if (stub_type == ppc_stub_none)
13402 continue;
13403
411e1bfb
AM
13404 /* __tls_get_addr calls might be eliminated. */
13405 if (stub_type != ppc_stub_plt_call
05d0e962 13406 && stub_type != ppc_stub_plt_call_notoc
411e1bfb 13407 && hash != NULL
ed7007c1 13408 && is_tls_get_addr (&hash->elf, htab)
411e1bfb
AM
13409 && section->has_tls_reloc
13410 && irela != internal_relocs)
13411 {
13412 /* Get tls info. */
f961d9dd 13413 unsigned char *tls_mask;
411e1bfb 13414
3a71aa26 13415 if (!get_tls_mask (&tls_mask, NULL, NULL, &local_syms,
411e1bfb
AM
13416 irela - 1, input_bfd))
13417 goto error_ret_free_internal;
abc489c6
AM
13418 if ((*tls_mask & TLS_TLS) != 0
13419 && (*tls_mask & (TLS_GD | TLS_LD)) == 0)
411e1bfb
AM
13420 continue;
13421 }
13422
f378ab09 13423 if (stub_type == ppc_stub_plt_call)
794e51c0 13424 {
6e1816be
AM
13425 if (!htab->opd_abi
13426 && htab->params->plt_localentry0 != 0
13427 && is_elfv2_localentry0 (&hash->elf))
13428 htab->has_plt_localentry0 = 1;
13429 else if (irela + 1 < irelaend
13430 && irela[1].r_offset == irela->r_offset + 4
13431 && (ELF64_R_TYPE (irela[1].r_info)
13432 == R_PPC64_TOCSAVE))
f378ab09
AM
13433 {
13434 if (!tocsave_find (htab, INSERT,
13435 &local_syms, irela + 1, input_bfd))
13436 goto error_ret_free_internal;
13437 }
f378ab09
AM
13438 else
13439 stub_type = ppc_stub_plt_call_r2save;
794e51c0 13440 }
3b421ab3 13441
721956f4 13442 /* Support for grouping stub sections. */
6f20ed8a 13443 id_sec = htab->sec_info[section->id].u.group->link_sec;
721956f4
AM
13444
13445 /* Get the name of this stub. */
13446 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
13447 if (!stub_name)
13448 goto error_ret_free_internal;
13449
13450 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 13451 stub_name, FALSE, FALSE);
721956f4
AM
13452 if (stub_entry != NULL)
13453 {
05d0e962 13454 enum ppc_stub_type old_type;
d349c8e2 13455
05d0e962
AM
13456 /* A stub has already been created, but it may
13457 not be the required type. We shouldn't be
13458 transitioning from plt_call to long_branch
13459 stubs or vice versa, but we might be
13460 upgrading from plt_call to plt_call_r2save or
13461 from long_branch to long_branch_r2off. */
721956f4 13462 free (stub_name);
d349c8e2
AM
13463 if (htab->params->power10_stubs == -1)
13464 {
13465 /* For --power10-stubs=auto, don't merge _notoc
13466 and other varieties of stubs. (The _both
13467 variety won't be created.) */
13468 bfd_boolean notoc = r_type == R_PPC64_REL24_NOTOC;
13469 struct ppc_stub_hash_entry *alt_stub
13470 = select_alt_stub (stub_entry, notoc);
13471
13472 if (alt_stub == NULL)
13473 {
13474 alt_stub = (struct ppc_stub_hash_entry *)
13475 stub_hash_newfunc (NULL,
13476 &htab->stub_hash_table,
13477 stub_entry->root.string);
13478 if (alt_stub == NULL)
13479 {
13480 /* xgettext:c-format */
13481 _bfd_error_handler
13482 (_("%pB: cannot create stub entry %s"),
13483 section->owner, stub_entry->root.string);
13484 goto error_ret_free_internal;
13485 }
13486 *alt_stub = *stub_entry;
13487 stub_entry->root.next = &alt_stub->root;
13488 if (notoc)
13489 /* Sort notoc stubs first, for no good
13490 reason. */
13491 alt_stub = stub_entry;
13492 alt_stub->stub_type = stub_type;
13493 }
13494 stub_entry = alt_stub;
13495 }
05d0e962
AM
13496 old_type = stub_entry->stub_type;
13497 switch (old_type)
13498 {
13499 default:
13500 abort ();
13501
13502 case ppc_stub_save_res:
13503 continue;
13504
13505 case ppc_stub_plt_call:
13506 case ppc_stub_plt_call_r2save:
13507 case ppc_stub_plt_call_notoc:
13508 case ppc_stub_plt_call_both:
13509 if (stub_type == ppc_stub_plt_call)
13510 continue;
13511 else if (stub_type == ppc_stub_plt_call_r2save)
13512 {
13513 if (old_type == ppc_stub_plt_call_notoc)
13514 stub_type = ppc_stub_plt_call_both;
13515 }
13516 else if (stub_type == ppc_stub_plt_call_notoc)
13517 {
13518 if (old_type == ppc_stub_plt_call_r2save)
13519 stub_type = ppc_stub_plt_call_both;
13520 }
13521 else
13522 abort ();
13523 break;
13524
13525 case ppc_stub_plt_branch:
13526 case ppc_stub_plt_branch_r2off:
13527 case ppc_stub_plt_branch_notoc:
13528 case ppc_stub_plt_branch_both:
13529 old_type += (ppc_stub_long_branch
13530 - ppc_stub_plt_branch);
13531 /* Fall through. */
13532 case ppc_stub_long_branch:
13533 case ppc_stub_long_branch_r2off:
13534 case ppc_stub_long_branch_notoc:
13535 case ppc_stub_long_branch_both:
13536 if (stub_type == ppc_stub_long_branch)
13537 continue;
13538 else if (stub_type == ppc_stub_long_branch_r2off)
13539 {
13540 if (old_type == ppc_stub_long_branch_notoc)
13541 stub_type = ppc_stub_long_branch_both;
13542 }
13543 else if (stub_type == ppc_stub_long_branch_notoc)
13544 {
13545 if (old_type == ppc_stub_long_branch_r2off)
13546 stub_type = ppc_stub_long_branch_both;
13547 }
13548 else
13549 abort ();
13550 break;
13551 }
13552 if (old_type < stub_type)
794e51c0 13553 stub_entry->stub_type = stub_type;
721956f4
AM
13554 continue;
13555 }
13556
25f53a85 13557 stub_entry = ppc_add_stub (stub_name, section, info);
721956f4
AM
13558 if (stub_entry == NULL)
13559 {
13560 free (stub_name);
6cdc0ccc
AM
13561 error_ret_free_internal:
13562 if (elf_section_data (section)->relocs == NULL)
13563 free (internal_relocs);
13564 error_ret_free_local:
c9594989
AM
13565 if (symtab_hdr->contents
13566 != (unsigned char *) local_syms)
6cdc0ccc 13567 free (local_syms);
b34976b6 13568 return FALSE;
721956f4
AM
13569 }
13570
ad8e1ba5 13571 stub_entry->stub_type = stub_type;
05d0e962
AM
13572 if (stub_type >= ppc_stub_plt_call
13573 && stub_type <= ppc_stub_plt_call_both)
e054468f 13574 {
05d0e962
AM
13575 stub_entry->target_value = sym_value;
13576 stub_entry->target_section = sym_sec;
e054468f
AM
13577 }
13578 else
13579 {
05d0e962
AM
13580 stub_entry->target_value = code_value;
13581 stub_entry->target_section = code_sec;
e054468f 13582 }
721956f4 13583 stub_entry->h = hash;
e054468f 13584 stub_entry->plt_ent = plt_ent;
2d7ad24e
AM
13585 stub_entry->symtype
13586 = hash ? hash->elf.type : ELF_ST_TYPE (sym->st_info);
6911b7dc 13587 stub_entry->other = hash ? hash->elf.other : sym->st_other;
ee75fd95 13588
3d58e1fc
AM
13589 if (hash != NULL
13590 && (hash->elf.root.type == bfd_link_hash_defined
13591 || hash->elf.root.type == bfd_link_hash_defweak))
ee75fd95 13592 htab->stub_globals += 1;
721956f4
AM
13593 }
13594
13595 /* We're done with the internal relocs, free them. */
6cdc0ccc 13596 if (elf_section_data (section)->relocs != internal_relocs)
1e2f5b6e 13597 free (internal_relocs);
721956f4 13598 }
6cdc0ccc
AM
13599
13600 if (local_syms != NULL
13601 && symtab_hdr->contents != (unsigned char *) local_syms)
13602 {
13603 if (!info->keep_memory)
13604 free (local_syms);
13605 else
13606 symtab_hdr->contents = (unsigned char *) local_syms;
13607 }
721956f4
AM
13608 }
13609
5c3dead3 13610 /* We may have added some stubs. Find out the new size of the
721956f4 13611 stub sections. */
d4aaa2a0 13612 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13613 {
13614 group->lr_restore = 0;
13615 group->eh_size = 0;
13616 if (group->stub_sec != NULL)
13617 {
13618 asection *stub_sec = group->stub_sec;
13619
13620 if (htab->stub_iteration <= STUB_SHRINK_ITER
13621 || stub_sec->rawsize < stub_sec->size)
13622 /* Past STUB_SHRINK_ITER, rawsize is the max size seen. */
13623 stub_sec->rawsize = stub_sec->size;
13624 stub_sec->size = 0;
13625 stub_sec->reloc_count = 0;
13626 stub_sec->flags &= ~SEC_RELOC;
13627 }
13628 }
a804e476
AM
13629 if (htab->tga_group != NULL)
13630 {
13631 /* See emit_tga_desc and emit_tga_desc_eh_frame. */
13632 htab->tga_group->eh_size
13633 = 1 + 2 + (htab->opd_abi != 0) + 3 + 8 * 2 + 3 + 8 + 3;
13634 htab->tga_group->lr_restore = 23 * 4;
13635 htab->tga_group->stub_sec->size = 24 * 4;
13636 }
eea6121a 13637
ba21f564
AM
13638 if (htab->stub_iteration <= STUB_SHRINK_ITER
13639 || htab->brlt->rawsize < htab->brlt->size)
13640 htab->brlt->rawsize = htab->brlt->size;
eea6121a 13641 htab->brlt->size = 0;
84f5d08e
AM
13642 htab->brlt->reloc_count = 0;
13643 htab->brlt->flags &= ~SEC_RELOC;
ee75fd95 13644 if (htab->relbrlt != NULL)
eea6121a 13645 htab->relbrlt->size = 0;
721956f4 13646
63bc6f6c 13647 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
721956f4 13648
a4b6fadd
AM
13649 for (group = htab->group; group != NULL; group = group->next)
13650 if (group->needs_save_res)
13651 group->stub_sec->size += htab->sfpr->size;
13652
176a0d42
AM
13653 if (info->emitrelocations
13654 && htab->glink != NULL && htab->glink->size != 0)
13655 {
13656 htab->glink->reloc_count = 1;
13657 htab->glink->flags |= SEC_RELOC;
13658 }
13659
58d180e8
AM
13660 if (htab->glink_eh_frame != NULL
13661 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
2d0d44d5 13662 && htab->glink_eh_frame->output_section->size > 8)
58d180e8 13663 {
2e0ce1c8 13664 size_t size = 0, align = 4;
58d180e8 13665
d4aaa2a0 13666 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
13667 if (group->eh_size != 0)
13668 size += (group->eh_size + 17 + align - 1) & -align;
58d180e8 13669 if (htab->glink != NULL && htab->glink->size != 0)
2e0ce1c8 13670 size += (24 + align - 1) & -align;
58d180e8 13671 if (size != 0)
2e0ce1c8
AM
13672 size += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
13673 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
13674 size = (size + align - 1) & -align;
58d180e8
AM
13675 htab->glink_eh_frame->rawsize = htab->glink_eh_frame->size;
13676 htab->glink_eh_frame->size = size;
13677 }
13678
e7d1c40c 13679 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
13680 for (group = htab->group; group != NULL; group = group->next)
13681 if (group->stub_sec != NULL)
691d2e9a
AM
13682 {
13683 int align = abs (htab->params->plt_stub_align);
13684 group->stub_sec->size
13685 = (group->stub_sec->size + (1 << align) - 1) & -(1 << align);
13686 }
d4aaa2a0
AM
13687
13688 for (group = htab->group; group != NULL; group = group->next)
13689 if (group->stub_sec != NULL
13690 && group->stub_sec->rawsize != group->stub_sec->size
c9301e31 13691 && (htab->stub_iteration <= STUB_SHRINK_ITER
d4aaa2a0 13692 || group->stub_sec->rawsize < group->stub_sec->size))
5c3dead3
AM
13693 break;
13694
d4aaa2a0 13695 if (group == NULL
ba21f564
AM
13696 && (htab->brlt->rawsize == htab->brlt->size
13697 || (htab->stub_iteration > STUB_SHRINK_ITER
13698 && htab->brlt->rawsize > htab->brlt->size))
58d180e8 13699 && (htab->glink_eh_frame == NULL
a804e476
AM
13700 || htab->glink_eh_frame->rawsize == htab->glink_eh_frame->size)
13701 && (htab->tga_group == NULL
13702 || htab->stub_iteration > 1))
5c3dead3
AM
13703 break;
13704
721956f4 13705 /* Ask the linker to do its stuff. */
e7d1c40c 13706 (*htab->params->layout_sections_again) ();
721956f4
AM
13707 }
13708
da44f4e5
AM
13709 if (htab->glink_eh_frame != NULL
13710 && htab->glink_eh_frame->size != 0)
13711 {
13712 bfd_vma val;
13713 bfd_byte *p, *last_fde;
13714 size_t last_fde_len, size, align, pad;
d4aaa2a0 13715 struct map_stub *group;
da44f4e5 13716
df136d64
AM
13717 /* It is necessary to at least have a rough outline of the
13718 linker generated CIEs and FDEs written before
13719 bfd_elf_discard_info is run, in order for these FDEs to be
13720 indexed in .eh_frame_hdr. */
da44f4e5
AM
13721 p = bfd_zalloc (htab->glink_eh_frame->owner, htab->glink_eh_frame->size);
13722 if (p == NULL)
13723 return FALSE;
13724 htab->glink_eh_frame->contents = p;
13725 last_fde = p;
2e0ce1c8 13726 align = 4;
da44f4e5
AM
13727
13728 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
13729 /* CIE length (rewrite in case little-endian). */
2e0ce1c8 13730 last_fde_len = ((sizeof (glink_eh_frame_cie) + align - 1) & -align) - 4;
da44f4e5 13731 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
2e0ce1c8 13732 p += last_fde_len + 4;
da44f4e5 13733
d4aaa2a0 13734 for (group = htab->group; group != NULL; group = group->next)
df136d64 13735 if (group->eh_size != 0)
da44f4e5 13736 {
df136d64 13737 group->eh_base = p - htab->glink_eh_frame->contents;
da44f4e5 13738 last_fde = p;
df136d64 13739 last_fde_len = ((group->eh_size + 17 + align - 1) & -align) - 4;
da44f4e5 13740 /* FDE length. */
2e0ce1c8 13741 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13742 p += 4;
13743 /* CIE pointer. */
13744 val = p - htab->glink_eh_frame->contents;
13745 bfd_put_32 (htab->elf.dynobj, val, p);
13746 p += 4;
13747 /* Offset to stub section, written later. */
13748 p += 4;
13749 /* stub section size. */
d4aaa2a0 13750 bfd_put_32 (htab->elf.dynobj, group->stub_sec->size, p);
da44f4e5
AM
13751 p += 4;
13752 /* Augmentation. */
13753 p += 1;
df136d64
AM
13754 /* Make sure we don't have all nops. This is enough for
13755 elf-eh-frame.c to detect the last non-nop opcode. */
13756 p[group->eh_size - 1] = DW_CFA_advance_loc + 1;
d4aaa2a0 13757 p = last_fde + last_fde_len + 4;
da44f4e5
AM
13758 }
13759 if (htab->glink != NULL && htab->glink->size != 0)
13760 {
13761 last_fde = p;
2e0ce1c8 13762 last_fde_len = ((24 + align - 1) & -align) - 4;
da44f4e5 13763 /* FDE length. */
2e0ce1c8 13764 bfd_put_32 (htab->elf.dynobj, last_fde_len, p);
da44f4e5
AM
13765 p += 4;
13766 /* CIE pointer. */
13767 val = p - htab->glink_eh_frame->contents;
13768 bfd_put_32 (htab->elf.dynobj, val, p);
13769 p += 4;
13770 /* Offset to .glink, written later. */
13771 p += 4;
13772 /* .glink size. */
13773 bfd_put_32 (htab->elf.dynobj, htab->glink->size - 8, p);
13774 p += 4;
13775 /* Augmentation. */
13776 p += 1;
13777
13778 *p++ = DW_CFA_advance_loc + 1;
13779 *p++ = DW_CFA_register;
13780 *p++ = 65;
9f08fa5c 13781 *p++ = htab->opd_abi ? 12 : 0;
15a3a14f 13782 *p++ = DW_CFA_advance_loc + (htab->opd_abi ? 5 : 7);
da44f4e5
AM
13783 *p++ = DW_CFA_restore_extended;
13784 *p++ = 65;
2e0ce1c8 13785 p += ((24 + align - 1) & -align) - 24;
da44f4e5
AM
13786 }
13787 /* Subsume any padding into the last FDE if user .eh_frame
13788 sections are aligned more than glink_eh_frame. Otherwise any
13789 zero padding will be seen as a terminator. */
2e0ce1c8 13790 align = 1ul << htab->glink_eh_frame->output_section->alignment_power;
da44f4e5 13791 size = p - htab->glink_eh_frame->contents;
2e0ce1c8 13792 pad = ((size + align - 1) & -align) - size;
da44f4e5
AM
13793 htab->glink_eh_frame->size = size + pad;
13794 bfd_put_32 (htab->elf.dynobj, last_fde_len + pad, last_fde);
13795 }
13796
d969d15f 13797 maybe_strip_output (info, htab->brlt);
2efec98b
AM
13798 if (htab->relbrlt != NULL)
13799 maybe_strip_output (info, htab->relbrlt);
d969d15f
AM
13800 if (htab->glink_eh_frame != NULL)
13801 maybe_strip_output (info, htab->glink_eh_frame);
721956f4 13802
b34976b6 13803 return TRUE;
721956f4
AM
13804}
13805
13806/* Called after we have determined section placement. If sections
805fc799 13807 move, we'll be called again. Provide a value for TOCstart. */
721956f4 13808
805fc799 13809bfd_vma
1c865ab2 13810ppc64_elf_set_toc (struct bfd_link_info *info, bfd *obfd)
721956f4 13811{
805fc799 13812 asection *s;
a27e685f 13813 bfd_vma TOCstart, adjust;
721956f4 13814
43417696
AM
13815 if (info != NULL)
13816 {
13817 struct elf_link_hash_entry *h;
13818 struct elf_link_hash_table *htab = elf_hash_table (info);
13819
13820 if (is_elf_hash_table (htab)
13821 && htab->hgot != NULL)
13822 h = htab->hgot;
13823 else
13824 {
13825 h = elf_link_hash_lookup (htab, ".TOC.", FALSE, FALSE, TRUE);
13826 if (is_elf_hash_table (htab))
13827 htab->hgot = h;
13828 }
13829 if (h != NULL
13830 && h->root.type == bfd_link_hash_defined
13831 && !h->root.linker_def
13832 && (!is_elf_hash_table (htab)
13833 || h->def_regular))
13834 {
ed7007c1 13835 TOCstart = defined_sym_val (h) - TOC_BASE_OFF;
43417696
AM
13836 _bfd_set_gp_value (obfd, TOCstart);
13837 return TOCstart;
13838 }
13839 }
13840
805fc799
AM
13841 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
13842 order. The TOC starts where the first of these sections starts. */
13843 s = bfd_get_section_by_name (obfd, ".got");
e054468f 13844 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13845 s = bfd_get_section_by_name (obfd, ".toc");
e054468f 13846 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13847 s = bfd_get_section_by_name (obfd, ".tocbss");
e054468f 13848 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799 13849 s = bfd_get_section_by_name (obfd, ".plt");
e054468f 13850 if (s == NULL || (s->flags & SEC_EXCLUDE) != 0)
805fc799
AM
13851 {
13852 /* This may happen for
13853 o references to TOC base (SYM@toc / TOC[tc0]) without a
13854 .toc directive
13855 o bad linker script
13856 o --gc-sections and empty TOC sections
13857
13858 FIXME: Warn user? */
13859
13860 /* Look for a likely section. We probably won't even be
13861 using TOCstart. */
13862 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13863 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY
13864 | SEC_EXCLUDE))
805fc799
AM
13865 == (SEC_ALLOC | SEC_SMALL_DATA))
13866 break;
721956f4 13867 if (s == NULL)
805fc799 13868 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13869 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_EXCLUDE))
805fc799
AM
13870 == (SEC_ALLOC | SEC_SMALL_DATA))
13871 break;
721956f4 13872 if (s == NULL)
805fc799 13873 for (s = obfd->sections; s != NULL; s = s->next)
e054468f
AM
13874 if ((s->flags & (SEC_ALLOC | SEC_READONLY | SEC_EXCLUDE))
13875 == SEC_ALLOC)
805fc799 13876 break;
721956f4 13877 if (s == NULL)
805fc799 13878 for (s = obfd->sections; s != NULL; s = s->next)
e054468f 13879 if ((s->flags & (SEC_ALLOC | SEC_EXCLUDE)) == SEC_ALLOC)
805fc799
AM
13880 break;
13881 }
721956f4 13882
805fc799
AM
13883 TOCstart = 0;
13884 if (s != NULL)
13885 TOCstart = s->output_section->vma + s->output_offset;
721956f4 13886
a27e685f
AM
13887 /* Force alignment. */
13888 adjust = TOCstart & (TOC_BASE_ALIGN - 1);
13889 TOCstart -= adjust;
1c865ab2
AM
13890 _bfd_set_gp_value (obfd, TOCstart);
13891
810d4e75 13892 if (info != NULL && s != NULL)
1c865ab2
AM
13893 {
13894 struct ppc_link_hash_table *htab = ppc_hash_table (info);
13895
810d4e75
AM
13896 if (htab != NULL)
13897 {
13898 if (htab->elf.hgot != NULL)
13899 {
a27e685f 13900 htab->elf.hgot->root.u.def.value = TOC_BASE_OFF - adjust;
810d4e75
AM
13901 htab->elf.hgot->root.u.def.section = s;
13902 }
13903 }
13904 else
1c865ab2 13905 {
810d4e75
AM
13906 struct bfd_link_hash_entry *bh = NULL;
13907 _bfd_generic_link_add_one_symbol (info, obfd, ".TOC.", BSF_GLOBAL,
a27e685f
AM
13908 s, TOC_BASE_OFF - adjust,
13909 NULL, FALSE, FALSE, &bh);
1c865ab2
AM
13910 }
13911 }
805fc799 13912 return TOCstart;
721956f4
AM
13913}
13914
a345bc8d 13915/* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
49c09209 13916 write out any global entry stubs, and PLT relocations. */
a345bc8d
AM
13917
13918static bfd_boolean
49c09209 13919build_global_entry_stubs_and_plt (struct elf_link_hash_entry *h, void *inf)
a345bc8d
AM
13920{
13921 struct bfd_link_info *info;
13922 struct ppc_link_hash_table *htab;
49c09209 13923 struct plt_entry *ent;
a345bc8d
AM
13924 asection *s;
13925
13926 if (h->root.type == bfd_link_hash_indirect)
13927 return TRUE;
13928
49c09209
AM
13929 info = inf;
13930 htab = ppc_hash_table (info);
13931 if (htab == NULL)
13932 return FALSE;
13933
13934 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
13935 if (ent->plt.offset != (bfd_vma) -1)
13936 {
13937 /* This symbol has an entry in the procedure linkage
13938 table. Set it up. */
13939 Elf_Internal_Rela rela;
2d7ad24e 13940 asection *plt, *relplt;
49c09209
AM
13941 bfd_byte *loc;
13942
13943 if (!htab->elf.dynamic_sections_created
13944 || h->dynindx == -1)
13945 {
13946 if (!(h->def_regular
13947 && (h->root.type == bfd_link_hash_defined
13948 || h->root.type == bfd_link_hash_defweak)))
13949 continue;
2d7ad24e
AM
13950 if (h->type == STT_GNU_IFUNC)
13951 {
13952 plt = htab->elf.iplt;
13953 relplt = htab->elf.irelplt;
cebd6b8a 13954 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
13955 if (htab->opd_abi)
13956 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
13957 else
13958 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
13959 }
49c09209 13960 else
2d7ad24e
AM
13961 {
13962 plt = htab->pltlocal;
13963 if (bfd_link_pic (info))
13964 {
13965 relplt = htab->relpltlocal;
13966 if (htab->opd_abi)
13967 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
13968 else
13969 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
13970 }
13971 else
13972 relplt = NULL;
13973 }
ed7007c1 13974 rela.r_addend = defined_sym_val (h) + ent->addend;
2d7ad24e
AM
13975
13976 if (relplt == NULL)
13977 {
13978 loc = plt->contents + ent->plt.offset;
13979 bfd_put_64 (info->output_bfd, rela.r_addend, loc);
13980 if (htab->opd_abi)
13981 {
13982 bfd_vma toc = elf_gp (info->output_bfd);
13983 toc += htab->sec_info[h->root.u.def.section->id].toc_off;
13984 bfd_put_64 (info->output_bfd, toc, loc + 8);
13985 }
13986 }
13987 else
13988 {
13989 rela.r_offset = (plt->output_section->vma
13990 + plt->output_offset
13991 + ent->plt.offset);
13992 loc = relplt->contents + (relplt->reloc_count++
13993 * sizeof (Elf64_External_Rela));
13994 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
13995 }
49c09209
AM
13996 }
13997 else
13998 {
13999 rela.r_offset = (htab->elf.splt->output_section->vma
14000 + htab->elf.splt->output_offset
14001 + ent->plt.offset);
14002 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
14003 rela.r_addend = ent->addend;
14004 loc = (htab->elf.srelplt->contents
14005 + ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE (htab))
14006 / PLT_ENTRY_SIZE (htab) * sizeof (Elf64_External_Rela)));
14007 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
cebd6b8a 14008 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e 14009 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 14010 }
49c09209
AM
14011 }
14012
a345bc8d
AM
14013 if (!h->pointer_equality_needed)
14014 return TRUE;
14015
14016 if (h->def_regular)
14017 return TRUE;
14018
9e390558 14019 s = htab->global_entry;
49c09209
AM
14020 if (s == NULL || s->size == 0)
14021 return TRUE;
14022
14023 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
14024 if (ent->plt.offset != (bfd_vma) -1
14025 && ent->addend == 0)
a345bc8d
AM
14026 {
14027 bfd_byte *p;
14028 asection *plt;
14029 bfd_vma off;
14030
a345bc8d 14031 p = s->contents + h->root.u.def.value;
33e44f2e 14032 plt = htab->elf.splt;
a345bc8d
AM
14033 if (!htab->elf.dynamic_sections_created
14034 || h->dynindx == -1)
2d7ad24e
AM
14035 {
14036 if (h->type == STT_GNU_IFUNC)
14037 plt = htab->elf.iplt;
14038 else
14039 plt = htab->pltlocal;
14040 }
49c09209 14041 off = ent->plt.offset + plt->output_offset + plt->output_section->vma;
a345bc8d
AM
14042 off -= h->root.u.def.value + s->output_offset + s->output_section->vma;
14043
14044 if (off + 0x80008000 > 0xffffffff || (off & 3) != 0)
14045 {
14046 info->callbacks->einfo
c1c8c1ef 14047 (_("%P: linkage table error against `%pT'\n"),
a345bc8d
AM
14048 h->root.root.string);
14049 bfd_set_error (bfd_error_bad_value);
14050 htab->stub_error = TRUE;
14051 }
14052
7341d5e2
AM
14053 htab->stub_count[ppc_stub_global_entry - 1] += 1;
14054 if (htab->params->emit_stub_syms)
14055 {
14056 size_t len = strlen (h->root.root.string);
14057 char *name = bfd_malloc (sizeof "12345678.global_entry." + len);
14058
14059 if (name == NULL)
14060 return FALSE;
14061
14062 sprintf (name, "%08x.global_entry.%s", s->id, h->root.root.string);
14063 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
14064 if (h == NULL)
14065 return FALSE;
14066 if (h->root.type == bfd_link_hash_new)
14067 {
14068 h->root.type = bfd_link_hash_defined;
14069 h->root.u.def.section = s;
14070 h->root.u.def.value = p - s->contents;
14071 h->ref_regular = 1;
14072 h->def_regular = 1;
14073 h->ref_regular_nonweak = 1;
14074 h->forced_local = 1;
14075 h->non_elf = 0;
2ec55de3 14076 h->root.linker_def = 1;
7341d5e2
AM
14077 }
14078 }
14079
a345bc8d
AM
14080 if (PPC_HA (off) != 0)
14081 {
14082 bfd_put_32 (s->owner, ADDIS_R12_R12 | PPC_HA (off), p);
14083 p += 4;
14084 }
14085 bfd_put_32 (s->owner, LD_R12_0R12 | PPC_LO (off), p);
14086 p += 4;
14087 bfd_put_32 (s->owner, MTCTR_R12, p);
14088 p += 4;
407aa07c 14089 bfd_put_32 (s->owner, BCTR, p);
a345bc8d
AM
14090 break;
14091 }
14092 return TRUE;
14093}
14094
49c09209
AM
14095/* Write PLT relocs for locals. */
14096
14097static bfd_boolean
14098write_plt_relocs_for_local_syms (struct bfd_link_info *info)
14099{
14100 struct ppc_link_hash_table *htab = ppc_hash_table (info);
14101 bfd *ibfd;
14102
14103 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
14104 {
14105 struct got_entry **lgot_ents, **end_lgot_ents;
14106 struct plt_entry **local_plt, **lplt, **end_local_plt;
14107 Elf_Internal_Shdr *symtab_hdr;
14108 bfd_size_type locsymcount;
14109 Elf_Internal_Sym *local_syms = NULL;
14110 struct plt_entry *ent;
14111
14112 if (!is_ppc64_elf (ibfd))
14113 continue;
14114
14115 lgot_ents = elf_local_got_ents (ibfd);
14116 if (!lgot_ents)
14117 continue;
14118
14119 symtab_hdr = &elf_symtab_hdr (ibfd);
14120 locsymcount = symtab_hdr->sh_info;
14121 end_lgot_ents = lgot_ents + locsymcount;
14122 local_plt = (struct plt_entry **) end_lgot_ents;
14123 end_local_plt = local_plt + locsymcount;
14124 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
14125 for (ent = *lplt; ent != NULL; ent = ent->next)
14126 if (ent->plt.offset != (bfd_vma) -1)
14127 {
14128 Elf_Internal_Sym *sym;
14129 asection *sym_sec;
14130 asection *plt, *relplt;
14131 bfd_byte *loc;
14132 bfd_vma val;
49c09209
AM
14133
14134 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
14135 lplt - local_plt, ibfd))
14136 {
c9594989 14137 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
14138 free (local_syms);
14139 return FALSE;
14140 }
14141
14142 val = sym->st_value + ent->addend;
ba85c15d
AM
14143 if (ELF_ST_TYPE (sym->st_info) != STT_GNU_IFUNC)
14144 val += PPC64_LOCAL_ENTRY_OFFSET (sym->st_other);
49c09209
AM
14145 if (sym_sec != NULL && sym_sec->output_section != NULL)
14146 val += sym_sec->output_offset + sym_sec->output_section->vma;
14147
2d7ad24e
AM
14148 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14149 {
cebd6b8a 14150 htab->elf.ifunc_resolvers = TRUE;
2d7ad24e
AM
14151 plt = htab->elf.iplt;
14152 relplt = htab->elf.irelplt;
14153 }
14154 else
14155 {
14156 plt = htab->pltlocal;
14157 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
14158 }
49c09209 14159
2d7ad24e
AM
14160 if (relplt == NULL)
14161 {
14162 loc = plt->contents + ent->plt.offset;
14163 bfd_put_64 (info->output_bfd, val, loc);
14164 if (htab->opd_abi)
14165 {
14166 bfd_vma toc = elf_gp (ibfd);
14167 bfd_put_64 (info->output_bfd, toc, loc + 8);
14168 }
14169 }
49c09209 14170 else
2d7ad24e
AM
14171 {
14172 Elf_Internal_Rela rela;
14173 rela.r_offset = (ent->plt.offset
14174 + plt->output_offset
14175 + plt->output_section->vma);
14176 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
14177 {
14178 if (htab->opd_abi)
14179 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_IREL);
14180 else
14181 rela.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
14182 }
14183 else
14184 {
14185 if (htab->opd_abi)
14186 rela.r_info = ELF64_R_INFO (0, R_PPC64_JMP_SLOT);
14187 else
14188 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
14189 }
14190 rela.r_addend = val;
14191 loc = relplt->contents + (relplt->reloc_count++
14192 * sizeof (Elf64_External_Rela));
14193 bfd_elf64_swap_reloca_out (info->output_bfd, &rela, loc);
14194 }
49c09209
AM
14195 }
14196
14197 if (local_syms != NULL
14198 && symtab_hdr->contents != (unsigned char *) local_syms)
14199 {
14200 if (!info->keep_memory)
14201 free (local_syms);
14202 else
14203 symtab_hdr->contents = (unsigned char *) local_syms;
14204 }
14205 }
14206 return TRUE;
14207}
14208
a804e476
AM
14209/* Emit the static wrapper function preserving registers around a
14210 __tls_get_addr_opt call. */
14211
14212static bfd_boolean
14213emit_tga_desc (struct ppc_link_hash_table *htab)
14214{
14215 asection *stub_sec = htab->tga_group->stub_sec;
14216 unsigned int cfa_updt = 11 * 4;
14217 bfd_byte *p;
14218 bfd_vma to, from, delta;
14219
14220 BFD_ASSERT (htab->tga_desc_fd->elf.root.type == bfd_link_hash_defined
14221 && htab->tga_desc_fd->elf.root.u.def.section == stub_sec
14222 && htab->tga_desc_fd->elf.root.u.def.value == 0);
14223 to = defined_sym_val (&htab->tls_get_addr_fd->elf);
14224 from = defined_sym_val (&htab->tga_desc_fd->elf) + cfa_updt;
14225 delta = to - from;
14226 if (delta + (1 << 25) >= 1 << 26)
14227 {
14228 _bfd_error_handler (_("__tls_get_addr call offset overflow"));
14229 htab->stub_error = TRUE;
14230 return FALSE;
14231 }
14232
14233 p = stub_sec->contents;
14234 p = tls_get_addr_prologue (htab->elf.dynobj, p, htab);
14235 bfd_put_32 (stub_sec->owner, B_DOT | 1 | (delta & 0x3fffffc), p);
14236 p += 4;
14237 p = tls_get_addr_epilogue (htab->elf.dynobj, p, htab);
14238 return stub_sec->size == (bfd_size_type) (p - stub_sec->contents);
14239}
14240
14241/* Emit eh_frame describing the static wrapper function. */
14242
14243static bfd_byte *
14244emit_tga_desc_eh_frame (struct ppc_link_hash_table *htab, bfd_byte *p)
14245{
14246 unsigned int cfa_updt = 11 * 4;
14247 unsigned int i;
14248
14249 *p++ = DW_CFA_advance_loc + cfa_updt / 4;
14250 *p++ = DW_CFA_def_cfa_offset;
14251 if (htab->opd_abi)
14252 {
14253 *p++ = 128;
14254 *p++ = 1;
14255 }
14256 else
14257 *p++ = 96;
14258 *p++ = DW_CFA_offset_extended_sf;
14259 *p++ = 65;
14260 *p++ = (-16 / 8) & 0x7f;
14261 for (i = 4; i < 12; i++)
14262 {
14263 *p++ = DW_CFA_offset + i;
14264 *p++ = (htab->opd_abi ? 13 : 12) - i;
14265 }
14266 *p++ = DW_CFA_advance_loc + 10;
14267 *p++ = DW_CFA_def_cfa_offset;
14268 *p++ = 0;
14269 for (i = 4; i < 12; i++)
14270 *p++ = DW_CFA_restore + i;
14271 *p++ = DW_CFA_advance_loc + 2;
14272 *p++ = DW_CFA_restore_extended;
14273 *p++ = 65;
14274 return p;
14275}
14276
721956f4
AM
14277/* Build all the stubs associated with the current output file.
14278 The stubs are kept in a hash table attached to the main linker
14279 hash table. This function is called via gldelf64ppc_finish. */
14280
b34976b6 14281bfd_boolean
e7d1c40c 14282ppc64_elf_build_stubs (struct bfd_link_info *info,
4ce794b7 14283 char **stats)
5d1634d7
AM
14284{
14285 struct ppc_link_hash_table *htab = ppc_hash_table (info);
a4b6fadd 14286 struct map_stub *group;
721956f4 14287 asection *stub_sec;
5d1634d7 14288 bfd_byte *p;
e717da7e 14289 int stub_sec_count = 0;
5d1634d7 14290
4dfe6ac6
NC
14291 if (htab == NULL)
14292 return FALSE;
14293
eea6121a 14294 /* Allocate memory to hold the linker stubs. */
d4aaa2a0 14295 for (group = htab->group; group != NULL; group = group->next)
df136d64
AM
14296 {
14297 group->eh_size = 0;
14298 group->lr_restore = 0;
14299 if ((stub_sec = group->stub_sec) != NULL
14300 && stub_sec->size != 0)
14301 {
14302 stub_sec->contents = bfd_zalloc (htab->params->stub_bfd,
14303 stub_sec->size);
14304 if (stub_sec->contents == NULL)
14305 return FALSE;
14306 stub_sec->size = 0;
14307 }
14308 }
5d1634d7 14309
23eb7e01 14310 if (htab->glink != NULL && htab->glink->size != 0)
5d1634d7 14311 {
9f951329 14312 unsigned int indx;
ad8e1ba5 14313 bfd_vma plt0;
9f951329 14314
721956f4 14315 /* Build the .glink plt call stub. */
e7d1c40c 14316 if (htab->params->emit_stub_syms)
97b639ba
AM
14317 {
14318 struct elf_link_hash_entry *h;
468392fb
AM
14319 h = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
14320 TRUE, FALSE, FALSE);
97b639ba
AM
14321 if (h == NULL)
14322 return FALSE;
14323 if (h->root.type == bfd_link_hash_new)
14324 {
14325 h->root.type = bfd_link_hash_defined;
14326 h->root.u.def.section = htab->glink;
ee4bf8d2 14327 h->root.u.def.value = 8;
f5385ebf
AM
14328 h->ref_regular = 1;
14329 h->def_regular = 1;
14330 h->ref_regular_nonweak = 1;
14331 h->forced_local = 1;
14332 h->non_elf = 0;
2ec55de3 14333 h->root.linker_def = 1;
97b639ba
AM
14334 }
14335 }
33e44f2e
AM
14336 plt0 = (htab->elf.splt->output_section->vma
14337 + htab->elf.splt->output_offset
14338 - 16);
176a0d42
AM
14339 if (info->emitrelocations)
14340 {
14341 Elf_Internal_Rela *r = get_relocs (htab->glink, 1);
14342 if (r == NULL)
14343 return FALSE;
14344 r->r_offset = (htab->glink->output_offset
14345 + htab->glink->output_section->vma);
14346 r->r_info = ELF64_R_INFO (0, R_PPC64_REL64);
14347 r->r_addend = plt0;
14348 }
4ce794b7 14349 p = htab->glink->contents;
176a0d42 14350 plt0 -= htab->glink->output_section->vma + htab->glink->output_offset;
ee4bf8d2
AM
14351 bfd_put_64 (htab->glink->owner, plt0, p);
14352 p += 8;
b9e5796b
AM
14353 if (htab->opd_abi)
14354 {
14355 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
14356 p += 4;
14357 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14358 p += 4;
14359 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14360 p += 4;
14361 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14362 p += 4;
14363 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
14364 p += 4;
14365 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14366 p += 4;
14367 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14368 p += 4;
14369 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | 8, p);
14370 p += 4;
14371 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14372 p += 4;
14373 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 16, p);
14374 p += 4;
14375 }
14376 else
14377 {
14378 bfd_put_32 (htab->glink->owner, MFLR_R0, p);
14379 p += 4;
14380 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
14381 p += 4;
14382 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
14383 p += 4;
f378ab09
AM
14384 bfd_put_32 (htab->glink->owner, STD_R2_0R1 + 24, p);
14385 p += 4;
b9e5796b
AM
14386 bfd_put_32 (htab->glink->owner, LD_R2_0R11 | (-16 & 0xfffc), p);
14387 p += 4;
14388 bfd_put_32 (htab->glink->owner, MTLR_R0, p);
14389 p += 4;
14390 bfd_put_32 (htab->glink->owner, SUB_R12_R12_R11, p);
14391 p += 4;
14392 bfd_put_32 (htab->glink->owner, ADD_R11_R2_R11, p);
14393 p += 4;
14394 bfd_put_32 (htab->glink->owner, ADDI_R0_R12 | (-48 & 0xffff), p);
14395 p += 4;
14396 bfd_put_32 (htab->glink->owner, LD_R12_0R11, p);
14397 p += 4;
14398 bfd_put_32 (htab->glink->owner, SRDI_R0_R0_2, p);
14399 p += 4;
14400 bfd_put_32 (htab->glink->owner, MTCTR_R12, p);
14401 p += 4;
14402 bfd_put_32 (htab->glink->owner, LD_R11_0R11 | 8, p);
14403 p += 4;
14404 }
407aa07c
AM
14405 bfd_put_32 (htab->glink->owner, BCTR, p);
14406 p += 4;
c75bc4f7 14407 BFD_ASSERT (p == htab->glink->contents + GLINK_PLTRESOLVE_SIZE (htab));
ad8e1ba5 14408
9f951329
AM
14409 /* Build the .glink lazy link call stubs. */
14410 indx = 0;
9e390558 14411 while (p < htab->glink->contents + htab->glink->size)
9f951329 14412 {
b9e5796b 14413 if (htab->opd_abi)
9f951329 14414 {
b9e5796b
AM
14415 if (indx < 0x8000)
14416 {
14417 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
14418 p += 4;
14419 }
14420 else
14421 {
14422 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
14423 p += 4;
14424 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx),
14425 p);
14426 p += 4;
14427 }
9f951329 14428 }
4ce794b7 14429 bfd_put_32 (htab->glink->owner,
ee4bf8d2 14430 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
a16d5acb 14431 indx++;
9f951329
AM
14432 p += 4;
14433 }
5d1634d7 14434 }
5d1634d7 14435
a804e476
AM
14436 if (htab->tga_group != NULL)
14437 {
14438 htab->tga_group->lr_restore = 23 * 4;
14439 htab->tga_group->stub_sec->size = 24 * 4;
14440 if (!emit_tga_desc (htab))
14441 return FALSE;
14442 if (htab->glink_eh_frame != NULL
14443 && htab->glink_eh_frame->size != 0)
14444 {
14445 size_t align = 4;
14446
14447 p = htab->glink_eh_frame->contents;
14448 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14449 p += 17;
14450 htab->tga_group->eh_size = emit_tga_desc_eh_frame (htab, p) - p;
14451 }
14452 }
14453
49c09209
AM
14454 /* Build .glink global entry stubs, and PLT relocs for globals. */
14455 elf_link_hash_traverse (&htab->elf, build_global_entry_stubs_and_plt, info);
14456
14457 if (!write_plt_relocs_for_local_syms (info))
14458 return FALSE;
9e390558 14459
7341d5e2 14460 if (htab->brlt != NULL && htab->brlt->size != 0)
721956f4 14461 {
4ce794b7 14462 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
eea6121a 14463 htab->brlt->size);
4ce794b7 14464 if (htab->brlt->contents == NULL)
b34976b6 14465 return FALSE;
721956f4 14466 }
ee75fd95 14467 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
63bc6f6c
AM
14468 {
14469 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
eea6121a 14470 htab->relbrlt->size);
63bc6f6c
AM
14471 if (htab->relbrlt->contents == NULL)
14472 return FALSE;
14473 }
5d1634d7 14474
721956f4
AM
14475 /* Build the stubs as directed by the stub hash table. */
14476 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
5d1634d7 14477
a4b6fadd
AM
14478 for (group = htab->group; group != NULL; group = group->next)
14479 if (group->needs_save_res)
7dda8d3c 14480 group->stub_sec->size += htab->sfpr->size;
a4b6fadd 14481
aa8a7074
AM
14482 if (htab->relbrlt != NULL)
14483 htab->relbrlt->reloc_count = 0;
14484
e7d1c40c 14485 if (htab->params->plt_stub_align != 0)
d4aaa2a0
AM
14486 for (group = htab->group; group != NULL; group = group->next)
14487 if ((stub_sec = group->stub_sec) != NULL)
691d2e9a
AM
14488 {
14489 int align = abs (htab->params->plt_stub_align);
14490 stub_sec->size = (stub_sec->size + (1 << align) - 1) & -(1 << align);
14491 }
794e51c0 14492
7dda8d3c
AM
14493 for (group = htab->group; group != NULL; group = group->next)
14494 if (group->needs_save_res)
14495 {
14496 stub_sec = group->stub_sec;
14497 memcpy (stub_sec->contents + stub_sec->size - htab->sfpr->size,
14498 htab->sfpr->contents, htab->sfpr->size);
14499 if (htab->params->emit_stub_syms)
14500 {
14501 unsigned int i;
14502
14503 for (i = 0; i < ARRAY_SIZE (save_res_funcs); i++)
14504 if (!sfpr_define (info, &save_res_funcs[i], stub_sec))
14505 return FALSE;
14506 }
14507 }
14508
df136d64
AM
14509 if (htab->glink_eh_frame != NULL
14510 && htab->glink_eh_frame->size != 0)
14511 {
14512 bfd_vma val;
14513 size_t align = 4;
14514
14515 p = htab->glink_eh_frame->contents;
14516 p += (sizeof (glink_eh_frame_cie) + align - 1) & -align;
14517
14518 for (group = htab->group; group != NULL; group = group->next)
14519 if (group->eh_size != 0)
14520 {
14521 /* Offset to stub section. */
14522 val = (group->stub_sec->output_section->vma
14523 + group->stub_sec->output_offset);
14524 val -= (htab->glink_eh_frame->output_section->vma
14525 + htab->glink_eh_frame->output_offset
14526 + (p + 8 - htab->glink_eh_frame->contents));
14527 if (val + 0x80000000 > 0xffffffff)
14528 {
14529 _bfd_error_handler
14530 (_("%s offset too large for .eh_frame sdata4 encoding"),
14531 group->stub_sec->name);
14532 return FALSE;
14533 }
14534 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14535 p += (group->eh_size + 17 + 3) & -4;
14536 }
14537 if (htab->glink != NULL && htab->glink->size != 0)
14538 {
14539 /* Offset to .glink. */
14540 val = (htab->glink->output_section->vma
14541 + htab->glink->output_offset
14542 + 8);
14543 val -= (htab->glink_eh_frame->output_section->vma
14544 + htab->glink_eh_frame->output_offset
14545 + (p + 8 - htab->glink_eh_frame->contents));
14546 if (val + 0x80000000 > 0xffffffff)
14547 {
14548 _bfd_error_handler
14549 (_("%s offset too large for .eh_frame sdata4 encoding"),
14550 htab->glink->name);
14551 return FALSE;
14552 }
14553 bfd_put_32 (htab->elf.dynobj, val, p + 8);
14554 p += (24 + align - 1) & -align;
14555 }
14556 }
14557
d4aaa2a0
AM
14558 for (group = htab->group; group != NULL; group = group->next)
14559 if ((stub_sec = group->stub_sec) != NULL)
e717da7e
AM
14560 {
14561 stub_sec_count += 1;
c9301e31
AM
14562 if (stub_sec->rawsize != stub_sec->size
14563 && (htab->stub_iteration <= STUB_SHRINK_ITER
14564 || stub_sec->rawsize < stub_sec->size))
e717da7e
AM
14565 break;
14566 }
5d1634d7 14567
25516cc5 14568 if (group != NULL)
5d1634d7 14569 {
b34976b6 14570 htab->stub_error = TRUE;
cf97bcb0 14571 _bfd_error_handler (_("stubs don't match calculated size"));
5d1634d7 14572 }
721956f4 14573
d2a300cf
AM
14574 if (htab->stub_error)
14575 return FALSE;
14576
14577 if (stats != NULL)
14578 {
988b7300
AM
14579 char *groupmsg;
14580 if (asprintf (&groupmsg,
14581 ngettext ("linker stubs in %u group\n",
14582 "linker stubs in %u groups\n",
14583 stub_sec_count),
14584 stub_sec_count) < 0)
14585 *stats = NULL;
14586 else
14587 {
14588 if (asprintf (stats, _("%s"
14589 " branch %lu\n"
14590 " branch toc adj %lu\n"
14591 " branch notoc %lu\n"
14592 " branch both %lu\n"
14593 " long branch %lu\n"
14594 " long toc adj %lu\n"
14595 " long notoc %lu\n"
14596 " long both %lu\n"
14597 " plt call %lu\n"
14598 " plt call save %lu\n"
14599 " plt call notoc %lu\n"
14600 " plt call both %lu\n"
14601 " global entry %lu"),
14602 groupmsg,
14603 htab->stub_count[ppc_stub_long_branch - 1],
14604 htab->stub_count[ppc_stub_long_branch_r2off - 1],
14605 htab->stub_count[ppc_stub_long_branch_notoc - 1],
14606 htab->stub_count[ppc_stub_long_branch_both - 1],
14607 htab->stub_count[ppc_stub_plt_branch - 1],
14608 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
14609 htab->stub_count[ppc_stub_plt_branch_notoc - 1],
14610 htab->stub_count[ppc_stub_plt_branch_both - 1],
14611 htab->stub_count[ppc_stub_plt_call - 1],
14612 htab->stub_count[ppc_stub_plt_call_r2save - 1],
14613 htab->stub_count[ppc_stub_plt_call_notoc - 1],
14614 htab->stub_count[ppc_stub_plt_call_both - 1],
14615 htab->stub_count[ppc_stub_global_entry - 1]) < 0)
14616 *stats = NULL;
14617 free (groupmsg);
14618 }
d2a300cf
AM
14619 }
14620 return TRUE;
5bd4f169
AM
14621}
14622
60124e18
AM
14623/* What to do when ld finds relocations against symbols defined in
14624 discarded sections. */
14625
14626static unsigned int
14627ppc64_elf_action_discarded (asection *sec)
14628{
14629 if (strcmp (".opd", sec->name) == 0)
14630 return 0;
14631
14632 if (strcmp (".toc", sec->name) == 0)
14633 return 0;
14634
bce50a28
JJ
14635 if (strcmp (".toc1", sec->name) == 0)
14636 return 0;
14637
60124e18
AM
14638 return _bfd_elf_default_action_discarded (sec);
14639}
14640
e59a1001
AM
14641/* These are the dynamic relocations supported by glibc. */
14642
14643static bfd_boolean
14644ppc64_glibc_dynamic_reloc (enum elf_ppc64_reloc_type r_type)
14645{
14646 switch (r_type)
14647 {
14648 case R_PPC64_RELATIVE:
14649 case R_PPC64_NONE:
14650 case R_PPC64_ADDR64:
14651 case R_PPC64_GLOB_DAT:
14652 case R_PPC64_IRELATIVE:
14653 case R_PPC64_JMP_IREL:
14654 case R_PPC64_JMP_SLOT:
14655 case R_PPC64_DTPMOD64:
14656 case R_PPC64_DTPREL64:
14657 case R_PPC64_TPREL64:
14658 case R_PPC64_TPREL16_LO_DS:
14659 case R_PPC64_TPREL16_DS:
14660 case R_PPC64_TPREL16:
14661 case R_PPC64_TPREL16_LO:
14662 case R_PPC64_TPREL16_HI:
14663 case R_PPC64_TPREL16_HIGH:
14664 case R_PPC64_TPREL16_HA:
14665 case R_PPC64_TPREL16_HIGHA:
14666 case R_PPC64_TPREL16_HIGHER:
14667 case R_PPC64_TPREL16_HIGHEST:
14668 case R_PPC64_TPREL16_HIGHERA:
14669 case R_PPC64_TPREL16_HIGHESTA:
14670 case R_PPC64_ADDR16_LO_DS:
14671 case R_PPC64_ADDR16_LO:
14672 case R_PPC64_ADDR16_HI:
14673 case R_PPC64_ADDR16_HIGH:
14674 case R_PPC64_ADDR16_HA:
14675 case R_PPC64_ADDR16_HIGHA:
14676 case R_PPC64_REL30:
14677 case R_PPC64_COPY:
14678 case R_PPC64_UADDR64:
14679 case R_PPC64_UADDR32:
14680 case R_PPC64_ADDR32:
14681 case R_PPC64_ADDR24:
14682 case R_PPC64_ADDR16:
14683 case R_PPC64_UADDR16:
14684 case R_PPC64_ADDR16_DS:
14685 case R_PPC64_ADDR16_HIGHER:
14686 case R_PPC64_ADDR16_HIGHEST:
14687 case R_PPC64_ADDR16_HIGHERA:
14688 case R_PPC64_ADDR16_HIGHESTA:
14689 case R_PPC64_ADDR14:
14690 case R_PPC64_ADDR14_BRTAKEN:
14691 case R_PPC64_ADDR14_BRNTAKEN:
14692 case R_PPC64_REL32:
14693 case R_PPC64_REL64:
14694 return TRUE;
14695
14696 default:
14697 return FALSE;
14698 }
14699}
14700
5bd4f169
AM
14701/* The RELOCATE_SECTION function is called by the ELF backend linker
14702 to handle the relocations for a section.
14703
14704 The relocs are always passed as Rela structures; if the section
14705 actually uses Rel structures, the r_addend field will always be
14706 zero.
14707
14708 This function is responsible for adjust the section contents as
14709 necessary, and (if using Rela relocs and generating a
1049f94e 14710 relocatable output file) adjusting the reloc addend as
5bd4f169
AM
14711 necessary.
14712
14713 This function does not have to worry about setting the reloc
14714 address or the reloc symbol index.
14715
14716 LOCAL_SYMS is a pointer to the swapped in local symbols.
14717
14718 LOCAL_SECTIONS is an array giving the section in the input file
14719 corresponding to the st_shndx field of each local symbol.
14720
14721 The global hash table entry for the global symbols can be found
14722 via elf_sym_hashes (input_bfd).
14723
1049f94e 14724 When generating relocatable output, this function must handle
5bd4f169
AM
14725 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
14726 going to be the section symbol corresponding to the output
14727 section, which means that the addend must be adjusted
14728 accordingly. */
14729
b34976b6 14730static bfd_boolean
4ce794b7
AM
14731ppc64_elf_relocate_section (bfd *output_bfd,
14732 struct bfd_link_info *info,
14733 bfd *input_bfd,
14734 asection *input_section,
14735 bfd_byte *contents,
14736 Elf_Internal_Rela *relocs,
14737 Elf_Internal_Sym *local_syms,
14738 asection **local_sections)
5bd4f169 14739{
65f38f15 14740 struct ppc_link_hash_table *htab;
5bd4f169
AM
14741 Elf_Internal_Shdr *symtab_hdr;
14742 struct elf_link_hash_entry **sym_hashes;
5bd4f169 14743 Elf_Internal_Rela *rel;
c316a17c 14744 Elf_Internal_Rela *wrel;
5bd4f169 14745 Elf_Internal_Rela *relend;
411e1bfb
AM
14746 Elf_Internal_Rela outrel;
14747 bfd_byte *loc;
411e1bfb 14748 struct got_entry **local_got_ents;
5bd4f169 14749 bfd_vma TOCstart;
b34976b6
AM
14750 bfd_boolean ret = TRUE;
14751 bfd_boolean is_opd;
794e51c0
AM
14752 /* Assume 'at' branch hints. */
14753 bfd_boolean is_isa_v2 = TRUE;
e59a1001 14754 bfd_boolean warned_dynamic = FALSE;
95f0d0d2 14755 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
5bd4f169 14756
65f38f15 14757 /* Initialize howto table if needed. */
5bd4f169 14758 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
5bd4f169
AM
14759 ppc_howto_init ();
14760
65f38f15 14761 htab = ppc_hash_table (info);
4dfe6ac6
NC
14762 if (htab == NULL)
14763 return FALSE;
ee75fd95
AM
14764
14765 /* Don't relocate stub sections. */
e7d1c40c 14766 if (input_section->owner == htab->params->stub_bfd)
ee75fd95
AM
14767 return TRUE;
14768
7af5d5c4
AM
14769 if (!is_ppc64_elf (input_bfd))
14770 {
14771 bfd_set_error (bfd_error_wrong_format);
14772 return FALSE;
14773 }
0ffa91dd 14774
411e1bfb 14775 local_got_ents = elf_local_got_ents (input_bfd);
5bd4f169 14776 TOCstart = elf_gp (output_bfd);
0ffa91dd 14777 symtab_hdr = &elf_symtab_hdr (input_bfd);
5bd4f169 14778 sym_hashes = elf_sym_hashes (input_bfd);
7c8fe5c4 14779 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
65f38f15 14780
c316a17c 14781 rel = wrel = relocs;
5bd4f169 14782 relend = relocs + input_section->reloc_count;
c316a17c 14783 for (; rel < relend; wrel++, rel++)
5bd4f169 14784 {
04c9666a 14785 enum elf_ppc64_reloc_type r_type;
31c76678 14786 bfd_vma addend;
5bd4f169
AM
14787 bfd_reloc_status_type r;
14788 Elf_Internal_Sym *sym;
14789 asection *sec;
039b3fef
AM
14790 struct elf_link_hash_entry *h_elf;
14791 struct ppc_link_hash_entry *h;
14792 struct ppc_link_hash_entry *fdh;
5bd4f169 14793 const char *sym_name;
0d4792f7 14794 unsigned long r_symndx, toc_symndx;
3a71aa26 14795 bfd_vma toc_addend;
f961d9dd
AM
14796 unsigned char tls_mask, tls_gd, tls_type;
14797 unsigned char sym_type;
5bd4f169 14798 bfd_vma relocation;
23cedd1d 14799 bfd_boolean unresolved_reloc, save_unresolved_reloc;
b34976b6 14800 bfd_boolean warned;
bc30df16 14801 enum { DEST_NORMAL, DEST_OPD, DEST_STUB } reloc_dest;
67f0cbdb 14802 unsigned int insn;
e11840f9 14803 unsigned int mask;
721956f4
AM
14804 struct ppc_stub_hash_entry *stub_entry;
14805 bfd_vma max_br_offset;
14806 bfd_vma from;
c316a17c 14807 Elf_Internal_Rela orig_rel;
b80eed39
AM
14808 reloc_howto_type *howto;
14809 struct reloc_howto_struct alt_howto;
4a421c53
AM
14810 uint64_t pinsn;
14811 bfd_vma offset;
5bd4f169 14812
c316a17c
AM
14813 again:
14814 orig_rel = *rel;
14815
4ce794b7 14816 r_type = ELF64_R_TYPE (rel->r_info);
5bd4f169 14817 r_symndx = ELF64_R_SYM (rel->r_info);
ee87f2da
AM
14818
14819 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
14820 symbol of the previous ADDR64 reloc. The symbol gives us the
14821 proper TOC base to use. */
14822 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
c316a17c
AM
14823 && wrel != relocs
14824 && ELF64_R_TYPE (wrel[-1].r_info) == R_PPC64_ADDR64
ee87f2da 14825 && is_opd)
c316a17c 14826 r_symndx = ELF64_R_SYM (wrel[-1].r_info);
ee87f2da 14827
4ce794b7
AM
14828 sym = NULL;
14829 sec = NULL;
039b3fef 14830 h_elf = NULL;
4ce794b7 14831 sym_name = NULL;
b34976b6
AM
14832 unresolved_reloc = FALSE;
14833 warned = FALSE;
65f38f15 14834
0b13192e 14835 if (r_symndx < symtab_hdr->sh_info)
5bd4f169
AM
14836 {
14837 /* It's a local symbol. */
74f0fb50 14838 struct _opd_sec_data *opd;
4025353c 14839
5bd4f169
AM
14840 sym = local_syms + r_symndx;
14841 sec = local_sections[r_symndx];
26c61ae5 14842 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
0d4792f7 14843 sym_type = ELF64_ST_TYPE (sym->st_info);
8517fae7 14844 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
74f0fb50
AM
14845 opd = get_opd_info (sec);
14846 if (opd != NULL && opd->adjust != NULL)
1e2f5b6e 14847 {
51aecdc5
AM
14848 long adjust = opd->adjust[OPD_NDX (sym->st_value
14849 + rel->r_addend)];
4025353c
AM
14850 if (adjust == -1)
14851 relocation = 0;
14852 else
4cc603a5
AM
14853 {
14854 /* If this is a relocation against the opd section sym
14855 and we have edited .opd, adjust the reloc addend so
14856 that ld -r and ld --emit-relocs output is correct.
14857 If it is a reloc against some other .opd symbol,
14858 then the symbol value will be adjusted later. */
14859 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
14860 rel->r_addend += adjust;
14861 else
14862 relocation += adjust;
14863 }
1e2f5b6e 14864 }
5bd4f169
AM
14865 }
14866 else
14867 {
62d887d4
L
14868 bfd_boolean ignored;
14869
b2a8e766
AM
14870 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
14871 r_symndx, symtab_hdr, sym_hashes,
039b3fef 14872 h_elf, sec, relocation,
62d887d4 14873 unresolved_reloc, warned, ignored);
039b3fef
AM
14874 sym_name = h_elf->root.root.string;
14875 sym_type = h_elf->type;
b69fdb4e
AM
14876 if (sec != NULL
14877 && sec->owner == output_bfd
14878 && strcmp (sec->name, ".opd") == 0)
14879 {
14880 /* This is a symbol defined in a linker script. All
14881 such are defined in output sections, even those
14882 defined by simple assignment from a symbol defined in
14883 an input section. Transfer the symbol to an
14884 appropriate input .opd section, so that a branch to
14885 this symbol will be mapped to the location specified
14886 by the opd entry. */
14887 struct bfd_link_order *lo;
14888 for (lo = sec->map_head.link_order; lo != NULL; lo = lo->next)
14889 if (lo->type == bfd_indirect_link_order)
14890 {
14891 asection *isec = lo->u.indirect.section;
14892 if (h_elf->root.u.def.value >= isec->output_offset
14893 && h_elf->root.u.def.value < (isec->output_offset
14894 + isec->size))
14895 {
14896 h_elf->root.u.def.value -= isec->output_offset;
14897 h_elf->root.u.def.section = isec;
14898 sec = isec;
14899 break;
14900 }
14901 }
14902 }
5bd4f169 14903 }
ed7007c1 14904 h = ppc_elf_hash_entry (h_elf);
5bd4f169 14905
dbaa2011 14906 if (sec != NULL && discarded_section (sec))
c316a17c
AM
14907 {
14908 _bfd_clear_contents (ppc64_elf_howto_table[r_type],
14909 input_bfd, input_section,
0930cb30 14910 contents, rel->r_offset);
c316a17c
AM
14911 wrel->r_offset = rel->r_offset;
14912 wrel->r_info = 0;
14913 wrel->r_addend = 0;
14914
14915 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 14916 symbols defined in discarded sections. Not done for
c316a17c
AM
14917 non-debug to preserve relocs in .eh_frame which the
14918 eh_frame editing code expects to be present. */
14919 if (bfd_link_relocatable (info)
14920 && (input_section->flags & SEC_DEBUGGING))
14921 wrel--;
14922
14923 continue;
14924 }
ab96bf03 14925
0e1862bb 14926 if (bfd_link_relocatable (info))
c316a17c 14927 goto copy_reloc;
ab96bf03 14928
f40da81b
AM
14929 if (h != NULL && &h->elf == htab->elf.hgot)
14930 {
6f20ed8a 14931 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
f40da81b
AM
14932 sec = bfd_abs_section_ptr;
14933 unresolved_reloc = FALSE;
14934 }
14935
951fd09b
AM
14936 /* TLS optimizations. Replace instruction sequences and relocs
14937 based on information we collected in tls_optimize. We edit
14938 RELOCS so that --emit-relocs will output something sensible
14939 for the final instruction stream. */
14940 tls_mask = 0;
14941 tls_gd = 0;
0d4792f7 14942 toc_symndx = 0;
727fc41e
AM
14943 if (h != NULL)
14944 tls_mask = h->tls_mask;
14945 else if (local_got_ents != NULL)
411e1bfb 14946 {
e054468f
AM
14947 struct plt_entry **local_plt = (struct plt_entry **)
14948 (local_got_ents + symtab_hdr->sh_info);
f961d9dd 14949 unsigned char *lgot_masks = (unsigned char *)
e054468f 14950 (local_plt + symtab_hdr->sh_info);
727fc41e
AM
14951 tls_mask = lgot_masks[r_symndx];
14952 }
37da22e5 14953 if (((tls_mask & TLS_TLS) == 0 || tls_mask == (TLS_TLS | TLS_MARK))
727fc41e
AM
14954 && (r_type == R_PPC64_TLS
14955 || r_type == R_PPC64_TLSGD
14956 || r_type == R_PPC64_TLSLD))
14957 {
14958 /* Check for toc tls entries. */
f961d9dd 14959 unsigned char *toc_tls;
0d4792f7 14960
727fc41e
AM
14961 if (!get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
14962 &local_syms, rel, input_bfd))
14963 return FALSE;
0d4792f7 14964
727fc41e
AM
14965 if (toc_tls)
14966 tls_mask = *toc_tls;
0d4792f7
AM
14967 }
14968
14969 /* Check that tls relocs are used with tls syms, and non-tls
14970 relocs are used with non-tls syms. */
cf35638d 14971 if (r_symndx != STN_UNDEF
0d4792f7
AM
14972 && r_type != R_PPC64_NONE
14973 && (h == NULL
039b3fef
AM
14974 || h->elf.root.type == bfd_link_hash_defined
14975 || h->elf.root.type == bfd_link_hash_defweak)
71c4e95a 14976 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
0d4792f7 14977 {
37da22e5 14978 if ((tls_mask & TLS_TLS) != 0
727fc41e
AM
14979 && (r_type == R_PPC64_TLS
14980 || r_type == R_PPC64_TLSGD
14981 || r_type == R_PPC64_TLSLD))
0d4792f7
AM
14982 /* R_PPC64_TLS is OK against a symbol in the TOC. */
14983 ;
14984 else
25f53a85 14985 info->callbacks->einfo
1d483afe 14986 (!IS_PPC64_TLS_RELOC (r_type)
695344c0 14987 /* xgettext:c-format */
c1c8c1ef 14988 ? _("%H: %s used with TLS symbol `%pT'\n")
695344c0 14989 /* xgettext:c-format */
c1c8c1ef 14990 : _("%H: %s used with non-TLS symbol `%pT'\n"),
25f53a85 14991 input_bfd, input_section, rel->r_offset,
0d4792f7
AM
14992 ppc64_elf_howto_table[r_type]->name,
14993 sym_name);
411e1bfb
AM
14994 }
14995
14996 /* Ensure reloc mapping code below stays sane. */
14997 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
14998 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
14999 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
15000 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
15001 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
15002 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
15003 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
15004 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
15005 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
15006 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
15007 abort ();
0d4792f7 15008
411e1bfb
AM
15009 switch (r_type)
15010 {
15011 default:
411e1bfb
AM
15012 break;
15013
ba761f19 15014 case R_PPC64_LO_DS_OPT:
95f0d0d2 15015 insn = bfd_get_32 (input_bfd, contents + rel->r_offset - d_offset);
2365f8d7 15016 if ((insn & (0x3fu << 26)) != 58u << 26)
ba761f19
AM
15017 abort ();
15018 insn += (14u << 26) - (58u << 26);
95f0d0d2 15019 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - d_offset);
ba761f19
AM
15020 r_type = R_PPC64_TOC16_LO;
15021 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15022 break;
15023
411e1bfb
AM
15024 case R_PPC64_TOC16:
15025 case R_PPC64_TOC16_LO:
15026 case R_PPC64_TOC16_DS:
15027 case R_PPC64_TOC16_LO_DS:
411e1bfb
AM
15028 {
15029 /* Check for toc tls entries. */
f961d9dd 15030 unsigned char *toc_tls;
951fd09b 15031 int retval;
411e1bfb 15032
3a71aa26
AM
15033 retval = get_tls_mask (&toc_tls, &toc_symndx, &toc_addend,
15034 &local_syms, rel, input_bfd);
951fd09b 15035 if (retval == 0)
411e1bfb
AM
15036 return FALSE;
15037
15038 if (toc_tls)
15039 {
951fd09b 15040 tls_mask = *toc_tls;
411e1bfb
AM
15041 if (r_type == R_PPC64_TOC16_DS
15042 || r_type == R_PPC64_TOC16_LO_DS)
81407a69 15043 {
37da22e5 15044 if ((tls_mask & TLS_TLS) != 0
81407a69
AM
15045 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
15046 goto toctprel;
15047 }
411e1bfb 15048 else
951fd09b
AM
15049 {
15050 /* If we found a GD reloc pair, then we might be
15051 doing a GD->IE transition. */
15052 if (retval == 2)
15053 {
b00a0a86 15054 tls_gd = TLS_GDIE;
37da22e5
AM
15055 if ((tls_mask & TLS_TLS) != 0
15056 && (tls_mask & TLS_GD) == 0)
102890f0 15057 goto tls_ldgd_opt;
951fd09b
AM
15058 }
15059 else if (retval == 3)
15060 {
37da22e5
AM
15061 if ((tls_mask & TLS_TLS) != 0
15062 && (tls_mask & TLS_LD) == 0)
102890f0 15063 goto tls_ldgd_opt;
951fd09b
AM
15064 }
15065 }
411e1bfb
AM
15066 }
15067 }
15068 break;
15069
9d6ded02
AM
15070 case R_PPC64_GOT_TPREL16_HI:
15071 case R_PPC64_GOT_TPREL16_HA:
37da22e5 15072 if ((tls_mask & TLS_TLS) != 0
9d6ded02
AM
15073 && (tls_mask & TLS_TPREL) == 0)
15074 {
15075 rel->r_offset -= d_offset;
95f0d0d2 15076 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
9d6ded02
AM
15077 r_type = R_PPC64_NONE;
15078 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15079 }
15080 break;
15081
411e1bfb
AM
15082 case R_PPC64_GOT_TPREL16_DS:
15083 case R_PPC64_GOT_TPREL16_LO_DS:
37da22e5 15084 if ((tls_mask & TLS_TLS) != 0
951fd09b 15085 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15086 {
81407a69 15087 toctprel:
95f0d0d2 15088 insn = bfd_get_32 (input_bfd,
c316a17c 15089 contents + rel->r_offset - d_offset);
411e1bfb
AM
15090 insn &= 31 << 21;
15091 insn |= 0x3c0d0000; /* addis 0,13,0 */
95f0d0d2 15092 bfd_put_32 (input_bfd, insn,
c316a17c 15093 contents + rel->r_offset - d_offset);
411e1bfb 15094 r_type = R_PPC64_TPREL16_HA;
0d4792f7
AM
15095 if (toc_symndx != 0)
15096 {
15097 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
3a71aa26 15098 rel->r_addend = toc_addend;
0d4792f7
AM
15099 /* We changed the symbol. Start over in order to
15100 get h, sym, sec etc. right. */
c316a17c 15101 goto again;
0d4792f7
AM
15102 }
15103 else
15104 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15105 }
15106 break;
15107
87c69f97 15108 case R_PPC64_GOT_TPREL_PCREL34:
c213164a
AM
15109 if ((tls_mask & TLS_TLS) != 0
15110 && (tls_mask & TLS_TPREL) == 0)
15111 {
15112 /* pld ra,sym@got@tprel@pcrel -> paddi ra,r13,sym@tprel */
15113 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15114 pinsn <<= 32;
15115 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15116 pinsn += ((2ULL << 56) + (-1ULL << 52)
15117 + (14ULL << 26) - (57ULL << 26) + (13ULL << 16));
15118 bfd_put_32 (input_bfd, pinsn >> 32,
15119 contents + rel->r_offset);
15120 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15121 contents + rel->r_offset + 4);
15122 r_type = R_PPC64_TPREL34;
15123 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15124 }
15125 break;
15126
411e1bfb 15127 case R_PPC64_TLS:
37da22e5 15128 if ((tls_mask & TLS_TLS) != 0
951fd09b 15129 && (tls_mask & TLS_TPREL) == 0)
411e1bfb 15130 {
c213164a 15131 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2d0f3896
AM
15132 insn = _bfd_elf_ppc_at_tls_transform (insn, 13);
15133 if (insn == 0)
c213164a
AM
15134 break;
15135 if ((rel->r_offset & 3) == 0)
0d4792f7 15136 {
c213164a
AM
15137 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
15138 /* Was PPC64_TLS which sits on insn boundary, now
15139 PPC64_TPREL16_LO which is at low-order half-word. */
15140 rel->r_offset += d_offset;
15141 r_type = R_PPC64_TPREL16_LO;
15142 if (toc_symndx != 0)
15143 {
15144 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
15145 rel->r_addend = toc_addend;
15146 /* We changed the symbol. Start over in order to
15147 get h, sym, sec etc. right. */
15148 goto again;
15149 }
15150 else
15151 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15152 }
15153 else if ((rel->r_offset & 3) == 1)
15154 {
15155 /* For pcrel IE to LE we already have the full
15156 offset and thus don't need an addi here. A nop
15157 or mr will do. */
2365f8d7 15158 if ((insn & (0x3fu << 26)) == 14 << 26)
c213164a
AM
15159 {
15160 /* Extract regs from addi rt,ra,si. */
15161 unsigned int rt = (insn >> 21) & 0x1f;
15162 unsigned int ra = (insn >> 16) & 0x1f;
15163 if (rt == ra)
15164 insn = NOP;
15165 else
15166 {
15167 /* Build or ra,rs,rb with rb==rs, ie. mr ra,rs. */
15168 insn = (rt << 16) | (ra << 21) | (ra << 11);
15169 insn |= (31u << 26) | (444u << 1);
15170 }
15171 }
15172 bfd_put_32 (input_bfd, insn, contents + rel->r_offset - 1);
0d4792f7 15173 }
411e1bfb
AM
15174 }
15175 break;
15176
411e1bfb
AM
15177 case R_PPC64_GOT_TLSGD16_HI:
15178 case R_PPC64_GOT_TLSGD16_HA:
b00a0a86 15179 tls_gd = TLS_GDIE;
37da22e5 15180 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
951fd09b
AM
15181 goto tls_gdld_hi;
15182 break;
15183
411e1bfb
AM
15184 case R_PPC64_GOT_TLSLD16_HI:
15185 case R_PPC64_GOT_TLSLD16_HA:
37da22e5 15186 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
411e1bfb 15187 {
951fd09b
AM
15188 tls_gdld_hi:
15189 if ((tls_mask & tls_gd) != 0)
15190 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
15191 + R_PPC64_GOT_TPREL16_DS);
15192 else
411e1bfb 15193 {
4fe5ca5b 15194 rel->r_offset -= d_offset;
95f0d0d2 15195 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
951fd09b 15196 r_type = R_PPC64_NONE;
411e1bfb 15197 }
951fd09b 15198 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb
AM
15199 }
15200 break;
15201
951fd09b
AM
15202 case R_PPC64_GOT_TLSGD16:
15203 case R_PPC64_GOT_TLSGD16_LO:
b00a0a86 15204 tls_gd = TLS_GDIE;
37da22e5 15205 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
102890f0 15206 goto tls_ldgd_opt;
951fd09b 15207 break;
411e1bfb 15208
951fd09b
AM
15209 case R_PPC64_GOT_TLSLD16:
15210 case R_PPC64_GOT_TLSLD16_LO:
37da22e5 15211 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
951fd09b 15212 {
b9f04fe0 15213 unsigned int insn1, insn2;
102890f0
AM
15214
15215 tls_ldgd_opt:
727fc41e
AM
15216 offset = (bfd_vma) -1;
15217 /* If not using the newer R_PPC64_TLSGD/LD to mark
15218 __tls_get_addr calls, we must trust that the call
15219 stays with its arg setup insns, ie. that the next
15220 reloc is the __tls_get_addr call associated with
15221 the current reloc. Edit both insns. */
9737e8af 15222 if (input_section->nomark_tls_get_addr
727fc41e
AM
15223 && rel + 1 < relend
15224 && branch_reloc_hash_match (input_bfd, rel + 1,
9e7028aa
AM
15225 htab->tls_get_addr_fd,
15226 htab->tga_desc_fd,
727fc41e 15227 htab->tls_get_addr,
9e7028aa 15228 htab->tga_desc))
727fc41e 15229 offset = rel[1].r_offset;
b86ac8e3
AM
15230 /* We read the low GOT_TLS (or TOC16) insn because we
15231 need to keep the destination reg. It may be
15232 something other than the usual r3, and moved to r3
15233 before the call by intervening code. */
95f0d0d2 15234 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 15235 contents + rel->r_offset - d_offset);
102890f0 15236 if ((tls_mask & tls_gd) != 0)
411e1bfb 15237 {
102890f0 15238 /* IE */
b86ac8e3 15239 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 15240 insn1 |= 58u << 26; /* ld */
102890f0 15241 insn2 = 0x7c636a14; /* add 3,3,13 */
727fc41e 15242 if (offset != (bfd_vma) -1)
f58d5a2d 15243 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
46e9995a
AM
15244 if (r_type == R_PPC64_TOC16
15245 || r_type == R_PPC64_TOC16_LO)
102890f0 15246 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
46e9995a
AM
15247 else
15248 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 1)) & 1)
15249 + R_PPC64_GOT_TPREL16_DS);
102890f0
AM
15250 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15251 }
15252 else
15253 {
15254 /* LE */
b86ac8e3
AM
15255 insn1 &= 0x1f << 21;
15256 insn1 |= 0x3c0d0000; /* addis r,13,0 */
102890f0
AM
15257 insn2 = 0x38630000; /* addi 3,3,0 */
15258 if (tls_gd == 0)
951fd09b 15259 {
102890f0 15260 /* Was an LD reloc. */
71c4e95a 15261 r_symndx = STN_UNDEF;
102890f0 15262 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
951fd09b 15263 }
102890f0 15264 else if (toc_symndx != 0)
3a71aa26
AM
15265 {
15266 r_symndx = toc_symndx;
15267 rel->r_addend = toc_addend;
15268 }
102890f0
AM
15269 r_type = R_PPC64_TPREL16_HA;
15270 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15271 if (offset != (bfd_vma) -1)
15272 {
15273 rel[1].r_info = ELF64_R_INFO (r_symndx,
15274 R_PPC64_TPREL16_LO);
15275 rel[1].r_offset = offset + d_offset;
15276 rel[1].r_addend = rel->r_addend;
15277 }
102890f0 15278 }
95f0d0d2 15279 bfd_put_32 (input_bfd, insn1,
3a71aa26 15280 contents + rel->r_offset - d_offset);
727fc41e 15281 if (offset != (bfd_vma) -1)
c96e0573
AM
15282 {
15283 bfd_put_32 (input_bfd, insn2, contents + offset);
15284 if (offset + 8 <= input_section->size)
15285 {
15286 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
15287 if (insn2 == LD_R2_0R1 + STK_TOC (htab))
15288 bfd_put_32 (input_bfd, NOP, contents + offset + 4);
15289 }
15290 }
727fc41e
AM
15291 if ((tls_mask & tls_gd) == 0
15292 && (tls_gd == 0 || toc_symndx != 0))
15293 {
15294 /* We changed the symbol. Start over in order
15295 to get h, sym, sec etc. right. */
c316a17c 15296 goto again;
727fc41e
AM
15297 }
15298 }
15299 break;
15300
87c69f97 15301 case R_PPC64_GOT_TLSGD_PCREL34:
c213164a
AM
15302 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
15303 {
15304 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15305 pinsn <<= 32;
15306 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15307 if ((tls_mask & TLS_GDIE) != 0)
15308 {
15309 /* IE, pla -> pld */
15310 pinsn += (-2ULL << 56) + (57ULL << 26) - (14ULL << 26);
87c69f97 15311 r_type = R_PPC64_GOT_TPREL_PCREL34;
c213164a
AM
15312 }
15313 else
15314 {
15315 /* LE, pla pcrel -> paddi r13 */
15316 pinsn += (-1ULL << 52) + (13ULL << 16);
15317 r_type = R_PPC64_TPREL34;
15318 }
15319 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15320 bfd_put_32 (input_bfd, pinsn >> 32,
15321 contents + rel->r_offset);
15322 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15323 contents + rel->r_offset + 4);
15324 }
15325 break;
15326
87c69f97 15327 case R_PPC64_GOT_TLSLD_PCREL34:
c213164a
AM
15328 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
15329 {
15330 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15331 pinsn <<= 32;
15332 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15333 pinsn += (-1ULL << 52) + (13ULL << 16);
15334 bfd_put_32 (input_bfd, pinsn >> 32,
15335 contents + rel->r_offset);
15336 bfd_put_32 (input_bfd, pinsn & 0xffffffff,
15337 contents + rel->r_offset + 4);
15338 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15339 r_symndx = STN_UNDEF;
15340 r_type = R_PPC64_TPREL34;
15341 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15342 goto again;
15343 }
15344 break;
15345
727fc41e 15346 case R_PPC64_TLSGD:
37da22e5 15347 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
675e2809 15348 && rel + 1 < relend)
727fc41e 15349 {
b9f04fe0 15350 unsigned int insn2;
5663e321 15351 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15352
4a421c53 15353 offset = rel->r_offset;
5663e321 15354 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15355 {
15356 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15357 if (r_type1 == R_PPC64_PLT_PCREL34
15358 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15359 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15360 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15361 break;
15362 }
15363
15364 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15365 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15366
b00a0a86 15367 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
15368 {
15369 /* IE */
15370 r_type = R_PPC64_NONE;
15371 insn2 = 0x7c636a14; /* add 3,3,13 */
15372 }
15373 else
15374 {
15375 /* LE */
15376 if (toc_symndx != 0)
15377 {
15378 r_symndx = toc_symndx;
15379 rel->r_addend = toc_addend;
15380 }
c213164a
AM
15381 if (r_type1 == R_PPC64_REL24_NOTOC
15382 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15383 {
15384 r_type = R_PPC64_NONE;
15385 insn2 = NOP;
15386 }
15387 else
15388 {
15389 rel->r_offset = offset + d_offset;
15390 r_type = R_PPC64_TPREL16_LO;
15391 insn2 = 0x38630000; /* addi 3,3,0 */
15392 }
727fc41e
AM
15393 }
15394 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15395 /* Zap the reloc on the _tls_get_addr call too. */
15396 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15397 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15398 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15399 if ((tls_mask & TLS_GDIE) == 0
15400 && toc_symndx != 0
15401 && r_type != R_PPC64_NONE)
c316a17c 15402 goto again;
411e1bfb 15403 }
411e1bfb
AM
15404 break;
15405
727fc41e 15406 case R_PPC64_TLSLD:
37da22e5 15407 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
675e2809 15408 && rel + 1 < relend)
727fc41e 15409 {
b9f04fe0 15410 unsigned int insn2;
5663e321 15411 enum elf_ppc64_reloc_type r_type1 = ELF64_R_TYPE (rel[1].r_info);
727fc41e 15412
4a421c53 15413 offset = rel->r_offset;
5663e321 15414 if (is_plt_seq_reloc (r_type1))
23cedd1d
AM
15415 {
15416 bfd_put_32 (output_bfd, NOP, contents + offset);
5663e321
AM
15417 if (r_type1 == R_PPC64_PLT_PCREL34
15418 || r_type1 == R_PPC64_PLT_PCREL34_NOTOC)
15419 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
23cedd1d
AM
15420 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
15421 break;
15422 }
15423
15424 if (ELF64_R_TYPE (rel[1].r_info) == R_PPC64_PLTCALL)
15425 bfd_put_32 (output_bfd, NOP, contents + offset + 4);
15426
c213164a
AM
15427 if (r_type1 == R_PPC64_REL24_NOTOC
15428 || r_type1 == R_PPC64_PLTCALL_NOTOC)
15429 {
15430 r_type = R_PPC64_NONE;
15431 insn2 = NOP;
15432 }
15433 else
15434 {
15435 rel->r_offset = offset + d_offset;
15436 r_symndx = STN_UNDEF;
15437 r_type = R_PPC64_TPREL16_LO;
15438 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
15439 insn2 = 0x38630000; /* addi 3,3,0 */
15440 }
727fc41e 15441 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
727fc41e
AM
15442 /* Zap the reloc on the _tls_get_addr call too. */
15443 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 15444 rel[1].r_info = ELF64_R_INFO (STN_UNDEF, R_PPC64_NONE);
95f0d0d2 15445 bfd_put_32 (input_bfd, insn2, contents + offset);
c213164a
AM
15446 if (r_type != R_PPC64_NONE)
15447 goto again;
727fc41e
AM
15448 }
15449 break;
15450
411e1bfb 15451 case R_PPC64_DTPMOD64:
951fd09b
AM
15452 if (rel + 1 < relend
15453 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
15454 && rel[1].r_offset == rel->r_offset + 8)
411e1bfb 15455 {
951fd09b
AM
15456 if ((tls_mask & TLS_GD) == 0)
15457 {
15458 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
b00a0a86 15459 if ((tls_mask & TLS_GDIE) != 0)
951fd09b
AM
15460 r_type = R_PPC64_TPREL64;
15461 else
15462 {
4ce794b7 15463 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
951fd09b
AM
15464 r_type = R_PPC64_NONE;
15465 }
15466 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15467 }
15468 }
15469 else
15470 {
15471 if ((tls_mask & TLS_LD) == 0)
411e1bfb 15472 {
4ce794b7 15473 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
411e1bfb 15474 r_type = R_PPC64_NONE;
951fd09b 15475 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
411e1bfb 15476 }
411e1bfb
AM
15477 }
15478 break;
15479
15480 case R_PPC64_TPREL64:
951fd09b 15481 if ((tls_mask & TLS_TPREL) == 0)
411e1bfb
AM
15482 {
15483 r_type = R_PPC64_NONE;
15484 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15485 }
15486 break;
52a82034 15487
006589cf
AM
15488 case R_PPC64_ENTRY:
15489 relocation = TOCstart + htab->sec_info[input_section->id].toc_off;
15490 if (!bfd_link_pic (info)
15491 && !info->traditional_format
15492 && relocation + 0x80008000 <= 0xffffffff)
15493 {
15494 unsigned int insn1, insn2;
15495
15496 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15497 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15498 if ((insn1 & ~0xfffc) == LD_R2_0R12
15499 && insn2 == ADD_R2_R2_R12)
15500 {
95f0d0d2 15501 bfd_put_32 (input_bfd,
006589cf
AM
15502 LIS_R2 + PPC_HA (relocation),
15503 contents + rel->r_offset);
95f0d0d2 15504 bfd_put_32 (input_bfd,
006589cf
AM
15505 ADDI_R2_R2 + PPC_LO (relocation),
15506 contents + rel->r_offset + 4);
15507 }
15508 }
15509 else
15510 {
15511 relocation -= (rel->r_offset
15512 + input_section->output_offset
15513 + input_section->output_section->vma);
15514 if (relocation + 0x80008000 <= 0xffffffff)
15515 {
15516 unsigned int insn1, insn2;
15517
15518 insn1 = bfd_get_32 (input_bfd, contents + rel->r_offset);
15519 insn2 = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
15520 if ((insn1 & ~0xfffc) == LD_R2_0R12
15521 && insn2 == ADD_R2_R2_R12)
15522 {
95f0d0d2 15523 bfd_put_32 (input_bfd,
006589cf
AM
15524 ADDIS_R2_R12 + PPC_HA (relocation),
15525 contents + rel->r_offset);
95f0d0d2 15526 bfd_put_32 (input_bfd,
006589cf
AM
15527 ADDI_R2_R2 + PPC_LO (relocation),
15528 contents + rel->r_offset + 4);
15529 }
15530 }
15531 }
15532 break;
15533
52a82034
AM
15534 case R_PPC64_REL16_HA:
15535 /* If we are generating a non-PIC executable, edit
15536 . 0: addis 2,12,.TOC.-0b@ha
15537 . addi 2,2,.TOC.-0b@l
15538 used by ELFv2 global entry points to set up r2, to
15539 . lis 2,.TOC.@ha
15540 . addi 2,2,.TOC.@l
15541 if .TOC. is in range. */
0e1862bb 15542 if (!bfd_link_pic (info)
810d4e75 15543 && !info->traditional_format
006589cf 15544 && !htab->opd_abi
4f038ee5 15545 && rel->r_addend == d_offset
52a82034
AM
15546 && h != NULL && &h->elf == htab->elf.hgot
15547 && rel + 1 < relend
15548 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_REL16_LO)
15549 && rel[1].r_offset == rel->r_offset + 4
15550 && rel[1].r_addend == rel->r_addend + 4
15551 && relocation + 0x80008000 <= 0xffffffff)
15552 {
15553 unsigned int insn1, insn2;
4a421c53 15554 offset = rel->r_offset - d_offset;
95f0d0d2
AM
15555 insn1 = bfd_get_32 (input_bfd, contents + offset);
15556 insn2 = bfd_get_32 (input_bfd, contents + offset + 4);
006589cf
AM
15557 if ((insn1 & 0xffff0000) == ADDIS_R2_R12
15558 && (insn2 & 0xffff0000) == ADDI_R2_R2)
52a82034
AM
15559 {
15560 r_type = R_PPC64_ADDR16_HA;
15561 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15562 rel->r_addend -= d_offset;
15563 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_ADDR16_LO);
15564 rel[1].r_addend -= d_offset + 4;
95f0d0d2 15565 bfd_put_32 (input_bfd, LIS_R2, contents + offset);
52a82034
AM
15566 }
15567 }
15568 break;
411e1bfb
AM
15569 }
15570
15571 /* Handle other relocations that tweak non-addend part of insn. */
86c76c7b 15572 insn = 0;
b25116a9
AM
15573 max_br_offset = 1 << 25;
15574 addend = rel->r_addend;
bc30df16 15575 reloc_dest = DEST_NORMAL;
65f38f15 15576 switch (r_type)
5bd4f169
AM
15577 {
15578 default:
65f38f15 15579 break;
5bd4f169 15580
3b421ab3
AM
15581 case R_PPC64_TOCSAVE:
15582 if (relocation + addend == (rel->r_offset
15583 + input_section->output_offset
15584 + input_section->output_section->vma)
15585 && tocsave_find (htab, NO_INSERT,
15586 &local_syms, rel, input_bfd))
15587 {
15588 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
15589 if (insn == NOP
15590 || insn == CROR_151515 || insn == CROR_313131)
a078d95a
AM
15591 bfd_put_32 (input_bfd,
15592 STD_R2_0R1 + STK_TOC (htab),
3b421ab3
AM
15593 contents + rel->r_offset);
15594 }
15595 break;
15596
65f38f15
AM
15597 /* Branch taken prediction relocations. */
15598 case R_PPC64_ADDR14_BRTAKEN:
15599 case R_PPC64_REL14_BRTAKEN:
cedb70c5 15600 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
1a0670f3 15601 /* Fall through. */
65f38f15 15602
86c76c7b 15603 /* Branch not taken prediction relocations. */
65f38f15
AM
15604 case R_PPC64_ADDR14_BRNTAKEN:
15605 case R_PPC64_REL14_BRNTAKEN:
95f0d0d2 15606 insn |= bfd_get_32 (input_bfd,
411e1bfb 15607 contents + rel->r_offset) & ~(0x01 << 21);
1a0670f3 15608 /* Fall through. */
86c76c7b 15609
b25116a9
AM
15610 case R_PPC64_REL14:
15611 max_br_offset = 1 << 15;
1a0670f3 15612 /* Fall through. */
5bd4f169 15613
65f38f15 15614 case R_PPC64_REL24:
05d0e962 15615 case R_PPC64_REL24_NOTOC:
23cedd1d 15616 case R_PPC64_PLTCALL:
5663e321 15617 case R_PPC64_PLTCALL_NOTOC:
ad8e1ba5
AM
15618 /* Calls to functions with a different TOC, such as calls to
15619 shared objects, need to alter the TOC pointer. This is
15620 done using a linkage stub. A REL24 branching to these
15621 linkage stubs needs to be followed by a nop, as the nop
15622 will be replaced with an instruction to restore the TOC
15623 base pointer. */
8387904d 15624 fdh = h;
b31867b6
AM
15625 if (h != NULL
15626 && h->oh != NULL
15627 && h->oh->is_func_descriptor)
15628 fdh = ppc_follow_link (h->oh);
31c76678
DK
15629 stub_entry = ppc_get_stub_entry (input_section, sec, fdh, &orig_rel,
15630 htab);
5663e321
AM
15631 if ((r_type == R_PPC64_PLTCALL
15632 || r_type == R_PPC64_PLTCALL_NOTOC)
23cedd1d 15633 && stub_entry != NULL
05d0e962
AM
15634 && stub_entry->stub_type >= ppc_stub_plt_call
15635 && stub_entry->stub_type <= ppc_stub_plt_call_both)
23cedd1d
AM
15636 stub_entry = NULL;
15637
6abec6bc 15638 if (stub_entry != NULL
d0abeec8
AM
15639 && ((stub_entry->stub_type >= ppc_stub_plt_call
15640 && stub_entry->stub_type <= ppc_stub_plt_call_both)
ad8e1ba5 15641 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
05d0e962
AM
15642 || stub_entry->stub_type == ppc_stub_plt_branch_both
15643 || stub_entry->stub_type == ppc_stub_long_branch_r2off
15644 || stub_entry->stub_type == ppc_stub_long_branch_both))
41bd81ab 15645 {
b25116a9 15646 bfd_boolean can_plt_call = FALSE;
721956f4 15647
6e1816be
AM
15648 if (stub_entry->stub_type == ppc_stub_plt_call
15649 && !htab->opd_abi
15650 && htab->params->plt_localentry0 != 0
15651 && is_elfv2_localentry0 (&h->elf))
15652 {
15653 /* The function doesn't use or change r2. */
15654 can_plt_call = TRUE;
15655 }
05d0e962
AM
15656 else if (r_type == R_PPC64_REL24_NOTOC)
15657 {
15658 /* NOTOC calls don't need to restore r2. */
15659 can_plt_call = TRUE;
15660 }
6e1816be 15661
f378ab09 15662 /* All of these stubs may modify r2, so there must be a
ba8ca3e7
AM
15663 branch and link followed by a nop. The nop is
15664 replaced by an insn to restore r2. */
6e1816be 15665 else if (rel->r_offset + 8 <= input_section->size)
41bd81ab 15666 {
ba8ca3e7
AM
15667 unsigned long br;
15668
15669 br = bfd_get_32 (input_bfd,
15670 contents + rel->r_offset);
15671 if ((br & 1) != 0)
41bd81ab 15672 {
ba8ca3e7
AM
15673 unsigned long nop;
15674
15675 nop = bfd_get_32 (input_bfd,
15676 contents + rel->r_offset + 4);
23cedd1d
AM
15677 if (nop == LD_R2_0R1 + STK_TOC (htab))
15678 can_plt_call = TRUE;
15679 else if (nop == NOP
15680 || nop == CROR_151515
15681 || nop == CROR_313131)
a7f2871e 15682 {
ba8ca3e7 15683 if (h != NULL
ed7007c1 15684 && is_tls_get_addr (&h->elf, htab)
7c9cf415 15685 && htab->params->tls_get_addr_opt)
ba8ca3e7
AM
15686 {
15687 /* Special stub used, leave nop alone. */
15688 }
15689 else
a078d95a
AM
15690 bfd_put_32 (input_bfd,
15691 LD_R2_0R1 + STK_TOC (htab),
ba8ca3e7
AM
15692 contents + rel->r_offset + 4);
15693 can_plt_call = TRUE;
a7f2871e 15694 }
41bd81ab 15695 }
5bd4f169 15696 }
721956f4 15697
ba8ca3e7 15698 if (!can_plt_call && h != NULL)
721956f4 15699 {
ba8ca3e7
AM
15700 const char *name = h->elf.root.root.string;
15701
15702 if (*name == '.')
15703 ++name;
15704
15705 if (strncmp (name, "__libc_start_main", 17) == 0
15706 && (name[17] == 0 || name[17] == '@'))
6ab189d5 15707 {
ba8ca3e7
AM
15708 /* Allow crt1 branch to go via a toc adjusting
15709 stub. Other calls that never return could do
15710 the same, if we could detect such. */
b25116a9 15711 can_plt_call = TRUE;
6ab189d5 15712 }
ba8ca3e7
AM
15713 }
15714
15715 if (!can_plt_call)
15716 {
15717 /* g++ as of 20130507 emits self-calls without a
15718 following nop. This is arguably wrong since we
15719 have conflicting information. On the one hand a
15720 global symbol and on the other a local call
15721 sequence, but don't error for this special case.
15722 It isn't possible to cheaply verify we have
15723 exactly such a call. Allow all calls to the same
15724 section. */
15725 asection *code_sec = sec;
15726
15727 if (get_opd_info (sec) != NULL)
ad8e1ba5 15728 {
ba8ca3e7
AM
15729 bfd_vma off = (relocation + addend
15730 - sec->output_section->vma
15731 - sec->output_offset);
bc30df16 15732
ba8ca3e7 15733 opd_entry_value (sec, off, &code_sec, NULL, FALSE);
ad8e1ba5 15734 }
ba8ca3e7
AM
15735 if (code_sec == input_section)
15736 can_plt_call = TRUE;
15737 }
15738
15739 if (!can_plt_call)
15740 {
05d0e962
AM
15741 if (stub_entry->stub_type >= ppc_stub_plt_call
15742 && stub_entry->stub_type <= ppc_stub_plt_call_both)
4805fc55 15743 info->callbacks->einfo
695344c0 15744 /* xgettext:c-format */
c1c8c1ef 15745 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15746 "(plt call stub)\n"),
4805fc55
AM
15747 input_bfd, input_section, rel->r_offset, sym_name);
15748 else
15749 info->callbacks->einfo
695344c0 15750 /* xgettext:c-format */
c1c8c1ef 15751 (_("%H: call to `%pT' lacks nop, can't restore toc; "
f53ad3cf 15752 "(toc save/adjust stub)\n"),
4805fc55 15753 input_bfd, input_section, rel->r_offset, sym_name);
ba8ca3e7
AM
15754
15755 bfd_set_error (bfd_error_bad_value);
15756 ret = FALSE;
721956f4
AM
15757 }
15758
b25116a9 15759 if (can_plt_call
05d0e962
AM
15760 && stub_entry->stub_type >= ppc_stub_plt_call
15761 && stub_entry->stub_type <= ppc_stub_plt_call_both)
b25116a9
AM
15762 unresolved_reloc = FALSE;
15763 }
15764
6abec6bc
AM
15765 if ((stub_entry == NULL
15766 || stub_entry->stub_type == ppc_stub_long_branch
15767 || stub_entry->stub_type == ppc_stub_plt_branch)
8387904d
AM
15768 && get_opd_info (sec) != NULL)
15769 {
15770 /* The branch destination is the value of the opd entry. */
4cc603a5
AM
15771 bfd_vma off = (relocation + addend
15772 - sec->output_section->vma
15773 - sec->output_offset);
aef36ac1 15774 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL, FALSE);
8387904d
AM
15775 if (dest != (bfd_vma) -1)
15776 {
15777 relocation = dest;
15778 addend = 0;
bc30df16 15779 reloc_dest = DEST_OPD;
8387904d
AM
15780 }
15781 }
15782
b25116a9
AM
15783 /* If the branch is out of reach we ought to have a long
15784 branch stub. */
15785 from = (rel->r_offset
15786 + input_section->output_offset
15787 + input_section->output_section->vma);
15788
6911b7dc
AM
15789 relocation += PPC64_LOCAL_ENTRY_OFFSET (fdh
15790 ? fdh->elf.other
15791 : sym->st_other);
15792
6abec6bc
AM
15793 if (stub_entry != NULL
15794 && (stub_entry->stub_type == ppc_stub_long_branch
15795 || stub_entry->stub_type == ppc_stub_plt_branch)
15796 && (r_type == R_PPC64_ADDR14_BRTAKEN
15797 || r_type == R_PPC64_ADDR14_BRNTAKEN
15798 || (relocation + addend - from + max_br_offset
15799 < 2 * max_br_offset)))
15800 /* Don't use the stub if this branch is in range. */
15801 stub_entry = NULL;
b25116a9 15802
05d0e962
AM
15803 if (stub_entry != NULL
15804 && (stub_entry->stub_type == ppc_stub_long_branch_notoc
15805 || stub_entry->stub_type == ppc_stub_long_branch_both
15806 || stub_entry->stub_type == ppc_stub_plt_branch_notoc
15807 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15808 && (r_type != R_PPC64_REL24_NOTOC
15809 || ((fdh ? fdh->elf.other : sym->st_other)
4a4e7361 15810 & STO_PPC64_LOCAL_MASK) <= 1 << STO_PPC64_LOCAL_BIT)
05d0e962
AM
15811 && (relocation + addend - from + max_br_offset
15812 < 2 * max_br_offset))
15813 stub_entry = NULL;
15814
15815 if (stub_entry != NULL
15816 && (stub_entry->stub_type == ppc_stub_long_branch_r2off
15817 || stub_entry->stub_type == ppc_stub_long_branch_both
15818 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
15819 || stub_entry->stub_type == ppc_stub_plt_branch_both)
15820 && r_type == R_PPC64_REL24_NOTOC
15821 && (relocation + addend - from + max_br_offset
15822 < 2 * max_br_offset))
15823 stub_entry = NULL;
15824
b25116a9
AM
15825 if (stub_entry != NULL)
15826 {
15827 /* Munge up the value and addend so that we call the stub
15828 rather than the procedure directly. */
a4b6fadd
AM
15829 asection *stub_sec = stub_entry->group->stub_sec;
15830
15831 if (stub_entry->stub_type == ppc_stub_save_res)
15832 relocation += (stub_sec->output_offset
15833 + stub_sec->output_section->vma
15834 + stub_sec->size - htab->sfpr->size
15835 - htab->sfpr->output_offset
15836 - htab->sfpr->output_section->vma);
15837 else
15838 relocation = (stub_entry->stub_offset
15839 + stub_sec->output_offset
15840 + stub_sec->output_section->vma);
b25116a9 15841 addend = 0;
bc30df16 15842 reloc_dest = DEST_STUB;
3b421ab3 15843
05d0e962
AM
15844 if (((stub_entry->stub_type == ppc_stub_plt_call
15845 && ALWAYS_EMIT_R2SAVE)
15846 || stub_entry->stub_type == ppc_stub_plt_call_r2save
15847 || stub_entry->stub_type == ppc_stub_plt_call_both)
e81b4c93 15848 && !(h != NULL
ed7007c1 15849 && is_tls_get_addr (&h->elf, htab)
e81b4c93 15850 && htab->params->tls_get_addr_opt)
3b421ab3
AM
15851 && rel + 1 < relend
15852 && rel[1].r_offset == rel->r_offset + 4
15853 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOCSAVE)
15854 relocation += 4;
05d0e962
AM
15855 else if ((stub_entry->stub_type == ppc_stub_long_branch_both
15856 || stub_entry->stub_type == ppc_stub_plt_branch_both
15857 || stub_entry->stub_type == ppc_stub_plt_call_both)
15858 && r_type == R_PPC64_REL24_NOTOC)
15859 relocation += 4;
5663e321
AM
15860
15861 if (r_type == R_PPC64_REL24_NOTOC
15862 && (stub_entry->stub_type == ppc_stub_plt_call_notoc
15863 || stub_entry->stub_type == ppc_stub_plt_call_both))
15864 htab->notoc_plt = 1;
b25116a9
AM
15865 }
15866
15867 if (insn != 0)
15868 {
794e51c0 15869 if (is_isa_v2)
721956f4 15870 {
b25116a9
AM
15871 /* Set 'a' bit. This is 0b00010 in BO field for branch
15872 on CR(BI) insns (BO == 001at or 011at), and 0b01000
15873 for branch on CTR insns (BO == 1a00t or 1a01t). */
15874 if ((insn & (0x14 << 21)) == (0x04 << 21))
15875 insn |= 0x02 << 21;
15876 else if ((insn & (0x14 << 21)) == (0x10 << 21))
15877 insn |= 0x08 << 21;
15878 else
15879 break;
15880 }
15881 else
15882 {
15883 /* Invert 'y' bit if not the default. */
4cc603a5 15884 if ((bfd_signed_vma) (relocation + addend - from) < 0)
b25116a9 15885 insn ^= 0x01 << 21;
721956f4 15886 }
b25116a9 15887
95f0d0d2 15888 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
5bd4f169 15889 }
e86ce104 15890
06da1e8e
AM
15891 /* NOP out calls to undefined weak functions.
15892 We can thus call a weak function without first
15893 checking whether the function is defined. */
b25116a9 15894 else if (h != NULL
039b3fef 15895 && h->elf.root.type == bfd_link_hash_undefweak
766bc656 15896 && h->elf.dynindx == -1
05d0e962
AM
15897 && (r_type == R_PPC64_REL24
15898 || r_type == R_PPC64_REL24_NOTOC)
b25116a9 15899 && relocation == 0
4cc603a5 15900 && addend == 0)
e86ce104 15901 {
95f0d0d2 15902 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
c316a17c 15903 goto copy_reloc;
e86ce104 15904 }
65f38f15 15905 break;
066f4018
AM
15906
15907 case R_PPC64_GOT16_DS:
06507dab
AM
15908 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15909 break;
066f4018
AM
15910 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15911 if (relocation + addend - from + 0x8000 < 0x10000
15912 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15913 {
15914 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15915 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15916 {
15917 insn += (14u << 26) - (58u << 26);
15918 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15919 r_type = R_PPC64_TOC16;
15920 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15921 }
15922 }
15923 break;
15924
15925 case R_PPC64_GOT16_LO_DS:
15926 case R_PPC64_GOT16_HA:
06507dab
AM
15927 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15928 break;
066f4018
AM
15929 from = TOCstart + htab->sec_info[input_section->id].toc_off;
15930 if (relocation + addend - from + 0x80008000ULL < 0x100000000ULL
15931 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15932 {
15933 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 15934 if ((insn & (0x3fu << 26 | 0x3)) == 58u << 26 /* ld */)
066f4018
AM
15935 {
15936 insn += (14u << 26) - (58u << 26);
15937 bfd_put_32 (input_bfd, insn, contents + (rel->r_offset & ~3));
15938 r_type = R_PPC64_TOC16_LO;
15939 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15940 }
2365f8d7 15941 else if ((insn & (0x3fu << 26)) == 15u << 26 /* addis */)
066f4018
AM
15942 {
15943 r_type = R_PPC64_TOC16_HA;
15944 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15945 }
15946 }
15947 break;
4a421c53
AM
15948
15949 case R_PPC64_GOT_PCREL34:
06507dab
AM
15950 if ((h ? h->elf.type : ELF_ST_TYPE (sym->st_info)) == STT_GNU_IFUNC)
15951 break;
4a421c53
AM
15952 from = (rel->r_offset
15953 + input_section->output_section->vma
15954 + input_section->output_offset);
15955 if (relocation - from + (1ULL << 33) < 1ULL << 34
15956 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15957 {
15958 offset = rel->r_offset;
15959 pinsn = bfd_get_32 (input_bfd, contents + offset);
15960 pinsn <<= 32;
15961 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15962 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15963 == ((1ULL << 58) | (1ULL << 52) | (57ULL << 26) /* pld */))
15964 {
15965 /* Replace with paddi. */
15966 pinsn += (2ULL << 56) + (14ULL << 26) - (57ULL << 26);
15967 r_type = R_PPC64_PCREL34;
15968 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
15969 bfd_put_32 (input_bfd, pinsn >> 32, contents + offset);
15970 bfd_put_32 (input_bfd, pinsn, contents + offset + 4);
15971 goto pcrelopt;
15972 }
15973 }
15974 break;
15975
15976 case R_PPC64_PCREL34:
15977 if (SYMBOL_REFERENCES_LOCAL (info, &h->elf))
15978 {
15979 offset = rel->r_offset;
15980 pinsn = bfd_get_32 (input_bfd, contents + offset);
15981 pinsn <<= 32;
15982 pinsn |= bfd_get_32 (input_bfd, contents + offset + 4);
15983 if ((pinsn & ((-1ULL << 50) | (63ULL << 26)))
15984 == ((1ULL << 58) | (2ULL << 56) | (1ULL << 52)
15985 | (14ULL << 26) /* paddi */))
15986 {
15987 pcrelopt:
15988 if (rel + 1 < relend
15989 && rel[1].r_offset == offset
15990 && rel[1].r_info == ELF64_R_INFO (0, R_PPC64_PCREL_OPT))
15991 {
15992 bfd_vma off2 = rel[1].r_addend;
15993 if (off2 == 0)
15994 /* zero means next insn. */
15995 off2 = 8;
15996 off2 += offset;
15997 if (off2 + 4 <= input_section->size)
15998 {
15999 uint64_t pinsn2;
dd9b12c2 16000 bfd_signed_vma addend_off;
4a421c53
AM
16001 pinsn2 = bfd_get_32 (input_bfd, contents + off2);
16002 pinsn2 <<= 32;
16003 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
77486630
AM
16004 {
16005 if (off2 + 8 > input_section->size)
16006 break;
16007 pinsn2 |= bfd_get_32 (input_bfd,
16008 contents + off2 + 4);
16009 }
dd9b12c2 16010 if (xlate_pcrel_opt (&pinsn, &pinsn2, &addend_off))
4a421c53 16011 {
dd9b12c2
AM
16012 addend += addend_off;
16013 rel->r_addend = addend;
4a421c53
AM
16014 bfd_put_32 (input_bfd, pinsn >> 32,
16015 contents + offset);
16016 bfd_put_32 (input_bfd, pinsn,
16017 contents + offset + 4);
16018 bfd_put_32 (input_bfd, pinsn2 >> 32,
16019 contents + off2);
77486630
AM
16020 if ((pinsn2 & (63ULL << 58)) == 1ULL << 58)
16021 bfd_put_32 (input_bfd, pinsn2,
16022 contents + off2 + 4);
4a421c53
AM
16023 }
16024 }
16025 }
16026 }
16027 }
16028 break;
65f38f15 16029 }
5bd4f169 16030
411e1bfb 16031 tls_type = 0;
23cedd1d 16032 save_unresolved_reloc = unresolved_reloc;
65f38f15
AM
16033 switch (r_type)
16034 {
16035 default:
cf97bcb0
AM
16036 /* xgettext:c-format */
16037 _bfd_error_handler (_("%pB: %s unsupported"),
16038 input_bfd, ppc64_elf_howto_table[r_type]->name);
5bd4f169 16039
65f38f15 16040 bfd_set_error (bfd_error_bad_value);
b34976b6 16041 ret = FALSE;
c316a17c 16042 goto copy_reloc;
5bd4f169 16043
65f38f15 16044 case R_PPC64_NONE:
411e1bfb 16045 case R_PPC64_TLS:
727fc41e
AM
16046 case R_PPC64_TLSGD:
16047 case R_PPC64_TLSLD:
3b421ab3 16048 case R_PPC64_TOCSAVE:
04c9666a
AM
16049 case R_PPC64_GNU_VTINHERIT:
16050 case R_PPC64_GNU_VTENTRY:
006589cf 16051 case R_PPC64_ENTRY:
4a421c53 16052 case R_PPC64_PCREL_OPT:
c316a17c 16053 goto copy_reloc;
5bd4f169
AM
16054
16055 /* GOT16 relocations. Like an ADDR16 using the symbol's
16056 address in the GOT as relocation value instead of the
411e1bfb 16057 symbol's value itself. Also, create a GOT entry for the
5bd4f169 16058 symbol and put the symbol value there. */
411e1bfb
AM
16059 case R_PPC64_GOT_TLSGD16:
16060 case R_PPC64_GOT_TLSGD16_LO:
16061 case R_PPC64_GOT_TLSGD16_HI:
16062 case R_PPC64_GOT_TLSGD16_HA:
87c69f97 16063 case R_PPC64_GOT_TLSGD_PCREL34:
951fd09b 16064 tls_type = TLS_TLS | TLS_GD;
411e1bfb
AM
16065 goto dogot;
16066
16067 case R_PPC64_GOT_TLSLD16:
16068 case R_PPC64_GOT_TLSLD16_LO:
16069 case R_PPC64_GOT_TLSLD16_HI:
16070 case R_PPC64_GOT_TLSLD16_HA:
87c69f97 16071 case R_PPC64_GOT_TLSLD_PCREL34:
951fd09b 16072 tls_type = TLS_TLS | TLS_LD;
411e1bfb
AM
16073 goto dogot;
16074
16075 case R_PPC64_GOT_TPREL16_DS:
16076 case R_PPC64_GOT_TPREL16_LO_DS:
16077 case R_PPC64_GOT_TPREL16_HI:
16078 case R_PPC64_GOT_TPREL16_HA:
87c69f97 16079 case R_PPC64_GOT_TPREL_PCREL34:
411e1bfb
AM
16080 tls_type = TLS_TLS | TLS_TPREL;
16081 goto dogot;
16082
16083 case R_PPC64_GOT_DTPREL16_DS:
16084 case R_PPC64_GOT_DTPREL16_LO_DS:
16085 case R_PPC64_GOT_DTPREL16_HI:
16086 case R_PPC64_GOT_DTPREL16_HA:
87c69f97 16087 case R_PPC64_GOT_DTPREL_PCREL34:
411e1bfb
AM
16088 tls_type = TLS_TLS | TLS_DTPREL;
16089 goto dogot;
16090
65f38f15
AM
16091 case R_PPC64_GOT16:
16092 case R_PPC64_GOT16_LO:
16093 case R_PPC64_GOT16_HI:
16094 case R_PPC64_GOT16_HA:
16095 case R_PPC64_GOT16_DS:
16096 case R_PPC64_GOT16_LO_DS:
5663e321 16097 case R_PPC64_GOT_PCREL34:
411e1bfb 16098 dogot:
5bd4f169
AM
16099 {
16100 /* Relocation is to the entry for this symbol in the global
16101 offset table. */
e717da7e 16102 asection *got;
d881513a 16103 bfd_vma *offp;
5bd4f169 16104 bfd_vma off;
d881513a 16105 unsigned long indx = 0;
927be08e 16106 struct got_entry *ent;
65f38f15 16107
d881513a 16108 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 16109 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))
927be08e 16110 ent = ppc64_tlsld_got (input_bfd);
411e1bfb 16111 else
5bd4f169 16112 {
d881513a
AM
16113 if (h != NULL)
16114 {
f0158f44
AM
16115 if (!htab->elf.dynamic_sections_created
16116 || h->elf.dynindx == -1
16117 || SYMBOL_REFERENCES_LOCAL (info, &h->elf)
21d68fcd 16118 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
d881513a
AM
16119 /* This is actually a static link, or it is a
16120 -Bsymbolic link and the symbol is defined
16121 locally, or the symbol was forced to be local
16122 because of a version file. */
16123 ;
16124 else
16125 {
039b3fef 16126 indx = h->elf.dynindx;
d881513a
AM
16127 unresolved_reloc = FALSE;
16128 }
039b3fef 16129 ent = h->elf.got.glist;
d881513a 16130 }
411e1bfb 16131 else
5bd4f169 16132 {
d881513a
AM
16133 if (local_got_ents == NULL)
16134 abort ();
16135 ent = local_got_ents[r_symndx];
5bd4f169 16136 }
d881513a
AM
16137
16138 for (; ent != NULL; ent = ent->next)
133a1f60 16139 if (ent->addend == orig_rel.r_addend
e717da7e 16140 && ent->owner == input_bfd
d881513a
AM
16141 && ent->tls_type == tls_type)
16142 break;
5bd4f169 16143 }
411e1bfb 16144
927be08e
AM
16145 if (ent == NULL)
16146 abort ();
16147 if (ent->is_indirect)
16148 ent = ent->got.ent;
16149 offp = &ent->got.offset;
16150 got = ppc64_elf_tdata (ent->owner)->got;
e717da7e
AM
16151 if (got == NULL)
16152 abort ();
16153
411e1bfb
AM
16154 /* The offset must always be a multiple of 8. We use the
16155 least significant bit to record whether we have already
16156 processed this entry. */
d881513a 16157 off = *offp;
411e1bfb
AM
16158 if ((off & 1) != 0)
16159 off &= ~1;
5bd4f169
AM
16160 else
16161 {
411e1bfb
AM
16162 /* Generate relocs for the dynamic linker, except in
16163 the case of TLSLD where we'll use one entry per
16164 module. */
25f23106
AM
16165 asection *relgot;
16166 bfd_boolean ifunc;
e717da7e 16167
d881513a 16168 *offp = off | 1;
25f23106
AM
16169 relgot = NULL;
16170 ifunc = (h != NULL
16171 ? h->elf.type == STT_GNU_IFUNC
16172 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC);
19e08130 16173 if (ifunc)
82e66161
AM
16174 {
16175 relgot = htab->elf.irelplt;
efb2a7b4 16176 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16177 htab->elf.ifunc_resolvers = TRUE;
82e66161 16178 }
f0158f44
AM
16179 else if (indx != 0
16180 || (bfd_link_pic (info)
16181 && (h == NULL
f749f26e
AM
16182 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &h->elf))
16183 && !(tls_type != 0
f15d0b54
AM
16184 && bfd_link_executable (info)
16185 && SYMBOL_REFERENCES_LOCAL (info, &h->elf))))
19e08130 16186 relgot = ppc64_elf_tdata (ent->owner)->relgot;
25f23106 16187 if (relgot != NULL)
5bd4f169 16188 {
e717da7e
AM
16189 outrel.r_offset = (got->output_section->vma
16190 + got->output_offset
411e1bfb 16191 + off);
133a1f60 16192 outrel.r_addend = orig_rel.r_addend;
d881513a 16193 if (tls_type & (TLS_LD | TLS_GD))
5bd4f169 16194 {
411e1bfb 16195 outrel.r_addend = 0;
e515b051 16196 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
d881513a
AM
16197 if (tls_type == (TLS_TLS | TLS_GD))
16198 {
e717da7e
AM
16199 loc = relgot->contents;
16200 loc += (relgot->reloc_count++
d881513a
AM
16201 * sizeof (Elf64_External_Rela));
16202 bfd_elf64_swap_reloca_out (output_bfd,
16203 &outrel, loc);
e515b051 16204 outrel.r_offset += 8;
133a1f60 16205 outrel.r_addend = orig_rel.r_addend;
d881513a
AM
16206 outrel.r_info
16207 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
d881513a 16208 }
411e1bfb 16209 }
951fd09b 16210 else if (tls_type == (TLS_TLS | TLS_DTPREL))
411e1bfb 16211 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
951fd09b 16212 else if (tls_type == (TLS_TLS | TLS_TPREL))
411e1bfb 16213 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
25f23106
AM
16214 else if (indx != 0)
16215 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
16216 else
81407a69 16217 {
25f23106
AM
16218 if (ifunc)
16219 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16220 else
16221 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69
AM
16222
16223 /* Write the .got section contents for the sake
16224 of prelink. */
e717da7e 16225 loc = got->contents + off;
23fbd6fa
JJ
16226 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
16227 loc);
81407a69 16228 }
81407a69
AM
16229
16230 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
e515b051
AM
16231 {
16232 outrel.r_addend += relocation;
16233 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
16234 {
16235 if (htab->elf.tls_sec == NULL)
16236 outrel.r_addend = 0;
16237 else
16238 outrel.r_addend -= htab->elf.tls_sec->vma;
16239 }
e515b051 16240 }
e717da7e
AM
16241 loc = relgot->contents;
16242 loc += (relgot->reloc_count++
411e1bfb
AM
16243 * sizeof (Elf64_External_Rela));
16244 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16245 }
16246
ad8e1ba5 16247 /* Init the .got section contents here if we're not
81407a69 16248 emitting a reloc. */
d881513a 16249 else
411e1bfb 16250 {
133a1f60 16251 relocation += orig_rel.r_addend;
f0158f44 16252 if (tls_type != 0)
411e1bfb 16253 {
989f9879
AM
16254 if (htab->elf.tls_sec == NULL)
16255 relocation = 0;
16256 else
16257 {
f0158f44
AM
16258 if (tls_type & TLS_LD)
16259 relocation = 0;
16260 else
16261 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 16262 if (tls_type & TLS_TPREL)
989f9879
AM
16263 relocation += DTP_OFFSET - TP_OFFSET;
16264 }
5bd4f169 16265
f0158f44 16266 if (tls_type & (TLS_GD | TLS_LD))
7b609f53
AM
16267 {
16268 bfd_put_64 (output_bfd, relocation,
e717da7e 16269 got->contents + off + 8);
676ee2b5 16270 relocation = 1;
7b609f53 16271 }
411e1bfb
AM
16272 }
16273 bfd_put_64 (output_bfd, relocation,
e717da7e 16274 got->contents + off);
5bd4f169
AM
16275 }
16276 }
16277
65f38f15
AM
16278 if (off >= (bfd_vma) -2)
16279 abort ();
16280
bf102f86 16281 relocation = got->output_section->vma + got->output_offset + off;
133a1f60 16282 addend = 0;
c213164a 16283 if (!(r_type == R_PPC64_GOT_PCREL34
87c69f97
AM
16284 || r_type == R_PPC64_GOT_TLSGD_PCREL34
16285 || r_type == R_PPC64_GOT_TLSLD_PCREL34
16286 || r_type == R_PPC64_GOT_TPREL_PCREL34
16287 || r_type == R_PPC64_GOT_DTPREL_PCREL34))
5663e321 16288 addend = -(TOCstart + htab->sec_info[input_section->id].toc_off);
5bd4f169 16289 }
65f38f15
AM
16290 break;
16291
16292 case R_PPC64_PLT16_HA:
16293 case R_PPC64_PLT16_HI:
16294 case R_PPC64_PLT16_LO:
08be3224 16295 case R_PPC64_PLT16_LO_DS:
5663e321
AM
16296 case R_PPC64_PLT_PCREL34:
16297 case R_PPC64_PLT_PCREL34_NOTOC:
65f38f15
AM
16298 case R_PPC64_PLT32:
16299 case R_PPC64_PLT64:
23cedd1d 16300 case R_PPC64_PLTSEQ:
5663e321 16301 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d 16302 case R_PPC64_PLTCALL:
5663e321 16303 case R_PPC64_PLTCALL_NOTOC:
65f38f15
AM
16304 /* Relocation is to the entry for this symbol in the
16305 procedure linkage table. */
23cedd1d 16306 unresolved_reloc = TRUE;
cbf95972
AM
16307 {
16308 struct plt_entry **plt_list = NULL;
16309 if (h != NULL)
16310 plt_list = &h->elf.plt.plist;
16311 else if (local_got_ents != NULL)
16312 {
16313 struct plt_entry **local_plt = (struct plt_entry **)
16314 (local_got_ents + symtab_hdr->sh_info);
2d7ad24e 16315 plt_list = local_plt + r_symndx;
cbf95972
AM
16316 }
16317 if (plt_list)
16318 {
16319 struct plt_entry *ent;
65f38f15 16320
cbf95972
AM
16321 for (ent = *plt_list; ent != NULL; ent = ent->next)
16322 if (ent->plt.offset != (bfd_vma) -1
133a1f60 16323 && ent->addend == orig_rel.r_addend)
cbf95972
AM
16324 {
16325 asection *plt;
08be3224 16326 bfd_vma got;
cbf95972
AM
16327
16328 plt = htab->elf.splt;
16329 if (!htab->elf.dynamic_sections_created
16330 || h == NULL
16331 || h->elf.dynindx == -1)
2d7ad24e
AM
16332 {
16333 if (h != NULL
16334 ? h->elf.type == STT_GNU_IFUNC
16335 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16336 plt = htab->elf.iplt;
16337 else
16338 plt = htab->pltlocal;
16339 }
16340 relocation = (plt->output_section->vma
16341 + plt->output_offset
16342 + ent->plt.offset);
08be3224 16343 if (r_type == R_PPC64_PLT16_HA
2cdcc330
AM
16344 || r_type == R_PPC64_PLT16_HI
16345 || r_type == R_PPC64_PLT16_LO
16346 || r_type == R_PPC64_PLT16_LO_DS)
08be3224
AM
16347 {
16348 got = (elf_gp (output_bfd)
16349 + htab->sec_info[input_section->id].toc_off);
16350 relocation -= got;
16351 }
133a1f60 16352 addend = 0;
cbf95972
AM
16353 unresolved_reloc = FALSE;
16354 break;
16355 }
16356 }
16357 }
65f38f15 16358 break;
5bd4f169 16359
0b13192e
AM
16360 case R_PPC64_TOC:
16361 /* Relocation value is TOC base. */
16362 relocation = TOCstart;
cf35638d 16363 if (r_symndx == STN_UNDEF)
6f20ed8a 16364 relocation += htab->sec_info[input_section->id].toc_off;
8517fae7
AM
16365 else if (unresolved_reloc)
16366 ;
6f20ed8a
AM
16367 else if (sec != NULL && sec->id < htab->sec_info_arr_size)
16368 relocation += htab->sec_info[sec->id].toc_off;
0b13192e
AM
16369 else
16370 unresolved_reloc = TRUE;
ab96bf03 16371 goto dodyn;
0b13192e 16372
5bd4f169
AM
16373 /* TOC16 relocs. We want the offset relative to the TOC base,
16374 which is the address of the start of the TOC plus 0x8000.
16375 The TOC consists of sections .got, .toc, .tocbss, and .plt,
16376 in this order. */
65f38f15
AM
16377 case R_PPC64_TOC16:
16378 case R_PPC64_TOC16_LO:
16379 case R_PPC64_TOC16_HI:
16380 case R_PPC64_TOC16_DS:
16381 case R_PPC64_TOC16_LO_DS:
16382 case R_PPC64_TOC16_HA:
6f20ed8a 16383 addend -= TOCstart + htab->sec_info[input_section->id].toc_off;
1bdd8fac
AM
16384 if (h != NULL)
16385 goto dodyn;
5bd4f169
AM
16386 break;
16387
16388 /* Relocate against the beginning of the section. */
65f38f15
AM
16389 case R_PPC64_SECTOFF:
16390 case R_PPC64_SECTOFF_LO:
16391 case R_PPC64_SECTOFF_HI:
16392 case R_PPC64_SECTOFF_DS:
16393 case R_PPC64_SECTOFF_LO_DS:
16394 case R_PPC64_SECTOFF_HA:
4ce794b7 16395 if (sec != NULL)
65f38f15 16396 addend -= sec->output_section->vma;
5bd4f169
AM
16397 break;
16398
25f23106
AM
16399 case R_PPC64_REL16:
16400 case R_PPC64_REL16_LO:
16401 case R_PPC64_REL16_HI:
16402 case R_PPC64_REL16_HA:
4a969973
AM
16403 case R_PPC64_REL16_HIGH:
16404 case R_PPC64_REL16_HIGHA:
16405 case R_PPC64_REL16_HIGHER:
16406 case R_PPC64_REL16_HIGHERA:
16407 case R_PPC64_REL16_HIGHEST:
16408 case R_PPC64_REL16_HIGHESTA:
5663e321
AM
16409 case R_PPC64_REL16_HIGHER34:
16410 case R_PPC64_REL16_HIGHERA34:
16411 case R_PPC64_REL16_HIGHEST34:
16412 case R_PPC64_REL16_HIGHESTA34:
a680de9a 16413 case R_PPC64_REL16DX_HA:
721956f4
AM
16414 case R_PPC64_REL14:
16415 case R_PPC64_REL14_BRNTAKEN:
16416 case R_PPC64_REL14_BRTAKEN:
5d1634d7 16417 case R_PPC64_REL24:
05d0e962 16418 case R_PPC64_REL24_NOTOC:
5663e321
AM
16419 case R_PPC64_PCREL34:
16420 case R_PPC64_PCREL28:
5d1634d7
AM
16421 break;
16422
411e1bfb
AM
16423 case R_PPC64_TPREL16:
16424 case R_PPC64_TPREL16_LO:
16425 case R_PPC64_TPREL16_HI:
16426 case R_PPC64_TPREL16_HA:
16427 case R_PPC64_TPREL16_DS:
16428 case R_PPC64_TPREL16_LO_DS:
f9c6b907
AM
16429 case R_PPC64_TPREL16_HIGH:
16430 case R_PPC64_TPREL16_HIGHA:
411e1bfb
AM
16431 case R_PPC64_TPREL16_HIGHER:
16432 case R_PPC64_TPREL16_HIGHERA:
16433 case R_PPC64_TPREL16_HIGHEST:
16434 case R_PPC64_TPREL16_HIGHESTA:
c213164a 16435 case R_PPC64_TPREL34:
766bc656
AM
16436 if (h != NULL
16437 && h->elf.root.type == bfd_link_hash_undefweak
16438 && h->elf.dynindx == -1)
16439 {
16440 /* Make this relocation against an undefined weak symbol
16441 resolve to zero. This is really just a tweak, since
16442 code using weak externs ought to check that they are
16443 defined before using them. */
16444 bfd_byte *p = contents + rel->r_offset - d_offset;
16445
95f0d0d2 16446 insn = bfd_get_32 (input_bfd, p);
766bc656
AM
16447 insn = _bfd_elf_ppc_at_tprel_transform (insn, 13);
16448 if (insn != 0)
95f0d0d2 16449 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
16450 break;
16451 }
989f9879
AM
16452 if (htab->elf.tls_sec != NULL)
16453 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7c8bbca5
AM
16454 /* The TPREL16 relocs shouldn't really be used in shared
16455 libs or with non-local symbols as that will result in
16456 DT_TEXTREL being set, but support them anyway. */
16457 goto dodyn;
411e1bfb
AM
16458
16459 case R_PPC64_DTPREL16:
16460 case R_PPC64_DTPREL16_LO:
16461 case R_PPC64_DTPREL16_HI:
16462 case R_PPC64_DTPREL16_HA:
16463 case R_PPC64_DTPREL16_DS:
16464 case R_PPC64_DTPREL16_LO_DS:
f9c6b907
AM
16465 case R_PPC64_DTPREL16_HIGH:
16466 case R_PPC64_DTPREL16_HIGHA:
411e1bfb
AM
16467 case R_PPC64_DTPREL16_HIGHER:
16468 case R_PPC64_DTPREL16_HIGHERA:
16469 case R_PPC64_DTPREL16_HIGHEST:
16470 case R_PPC64_DTPREL16_HIGHESTA:
c213164a 16471 case R_PPC64_DTPREL34:
989f9879
AM
16472 if (htab->elf.tls_sec != NULL)
16473 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
411e1bfb
AM
16474 break;
16475
45965137
AM
16476 case R_PPC64_ADDR64_LOCAL:
16477 addend += PPC64_LOCAL_ENTRY_OFFSET (h != NULL
16478 ? h->elf.other
16479 : sym->st_other);
16480 break;
16481
e515b051
AM
16482 case R_PPC64_DTPMOD64:
16483 relocation = 1;
16484 addend = 0;
16485 goto dodyn;
16486
411e1bfb 16487 case R_PPC64_TPREL64:
989f9879
AM
16488 if (htab->elf.tls_sec != NULL)
16489 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
411e1bfb
AM
16490 goto dodyn;
16491
16492 case R_PPC64_DTPREL64:
989f9879
AM
16493 if (htab->elf.tls_sec != NULL)
16494 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
1a0670f3 16495 /* Fall through. */
411e1bfb 16496
65f38f15
AM
16497 /* Relocations that may need to be propagated if this is a
16498 dynamic object. */
04c9666a 16499 case R_PPC64_REL30:
65f38f15
AM
16500 case R_PPC64_REL32:
16501 case R_PPC64_REL64:
16502 case R_PPC64_ADDR14:
16503 case R_PPC64_ADDR14_BRNTAKEN:
16504 case R_PPC64_ADDR14_BRTAKEN:
16505 case R_PPC64_ADDR16:
16506 case R_PPC64_ADDR16_DS:
16507 case R_PPC64_ADDR16_HA:
16508 case R_PPC64_ADDR16_HI:
f9c6b907
AM
16509 case R_PPC64_ADDR16_HIGH:
16510 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16511 case R_PPC64_ADDR16_HIGHER:
16512 case R_PPC64_ADDR16_HIGHERA:
16513 case R_PPC64_ADDR16_HIGHEST:
16514 case R_PPC64_ADDR16_HIGHESTA:
16515 case R_PPC64_ADDR16_LO:
16516 case R_PPC64_ADDR16_LO_DS:
5663e321
AM
16517 case R_PPC64_ADDR16_HIGHER34:
16518 case R_PPC64_ADDR16_HIGHERA34:
16519 case R_PPC64_ADDR16_HIGHEST34:
16520 case R_PPC64_ADDR16_HIGHESTA34:
65f38f15 16521 case R_PPC64_ADDR24:
65f38f15
AM
16522 case R_PPC64_ADDR32:
16523 case R_PPC64_ADDR64:
16524 case R_PPC64_UADDR16:
16525 case R_PPC64_UADDR32:
16526 case R_PPC64_UADDR64:
5663e321
AM
16527 case R_PPC64_D34:
16528 case R_PPC64_D34_LO:
16529 case R_PPC64_D34_HI30:
16530 case R_PPC64_D34_HA30:
16531 case R_PPC64_D28:
411e1bfb 16532 dodyn:
5d1634d7 16533 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
16534 break;
16535
41bd81ab
AM
16536 if (NO_OPD_RELOCS && is_opd)
16537 break;
16538
8a9e8e72 16539 if (bfd_link_pic (info)
b1b07054 16540 ? ((h == NULL
190eb1dd 16541 || h->elf.dyn_relocs != NULL)
b1b07054
AM
16542 && ((h != NULL && pc_dynrelocs (h))
16543 || must_be_dyn_reloc (info, r_type)))
8a9e8e72 16544 : (h != NULL
190eb1dd 16545 ? h->elf.dyn_relocs != NULL
d311bc8b 16546 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
65f38f15 16547 {
b34976b6 16548 bfd_boolean skip, relocate;
65f38f15 16549 asection *sreloc;
1cf1f670 16550 bfd_vma out_off;
82e66161 16551 long indx = 0;
65f38f15
AM
16552
16553 /* When generating a dynamic object, these relocations
16554 are copied into the output file to be resolved at run
16555 time. */
16556
b34976b6
AM
16557 skip = FALSE;
16558 relocate = FALSE;
65f38f15 16559
1cf1f670
AM
16560 out_off = _bfd_elf_section_offset (output_bfd, info,
16561 input_section, rel->r_offset);
16562 if (out_off == (bfd_vma) -1)
b34976b6 16563 skip = TRUE;
1cf1f670 16564 else if (out_off == (bfd_vma) -2)
b34976b6 16565 skip = TRUE, relocate = TRUE;
1cf1f670
AM
16566 out_off += (input_section->output_section->vma
16567 + input_section->output_offset);
16568 outrel.r_offset = out_off;
411e1bfb 16569 outrel.r_addend = rel->r_addend;
65f38f15 16570
1cf1f670
AM
16571 /* Optimize unaligned reloc use. */
16572 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
16573 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
16574 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
16575 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
16576 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
16577 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
16578 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
16579 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
16580 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
16581
65f38f15 16582 if (skip)
0bb2d96a 16583 memset (&outrel, 0, sizeof outrel);
afe397ea 16584 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
0b13192e
AM
16585 && !is_opd
16586 && r_type != R_PPC64_TOC)
14acf4dc 16587 {
82e66161
AM
16588 indx = h->elf.dynindx;
16589 BFD_ASSERT (indx != -1);
16590 outrel.r_info = ELF64_R_INFO (indx, r_type);
14acf4dc 16591 }
65f38f15
AM
16592 else
16593 {
41bd81ab
AM
16594 /* This symbol is local, or marked to become local,
16595 or this is an opd section reloc which must point
16596 at a local function. */
65f38f15 16597 outrel.r_addend += relocation;
e86ce104 16598 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
65f38f15 16599 {
3fad3c7c 16600 if (is_opd && h != NULL)
afbe61cf
AM
16601 {
16602 /* Lie about opd entries. This case occurs
16603 when building shared libraries and we
16604 reference a function in another shared
3fad3c7c
AM
16605 lib. The same thing happens for a weak
16606 definition in an application that's
16607 overridden by a strong definition in a
16608 shared lib. (I believe this is a generic
16609 bug in binutils handling of weak syms.)
16610 In these cases we won't use the opd
1e2f5b6e 16611 entry in this lib. */
b34976b6 16612 unresolved_reloc = FALSE;
afbe61cf 16613 }
25f23106
AM
16614 if (!is_opd
16615 && r_type == R_PPC64_ADDR64
16616 && (h != NULL
16617 ? h->elf.type == STT_GNU_IFUNC
16618 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC))
16619 outrel.r_info = ELF64_R_INFO (0, R_PPC64_IRELATIVE);
16620 else
16621 {
16622 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
81407a69 16623
25f23106
AM
16624 /* We need to relocate .opd contents for ld.so.
16625 Prelink also wants simple and consistent rules
16626 for relocs. This make all RELATIVE relocs have
16627 *r_offset equal to r_addend. */
16628 relocate = TRUE;
16629 }
65f38f15
AM
16630 }
16631 else
16632 {
25f23106
AM
16633 if (h != NULL
16634 ? h->elf.type == STT_GNU_IFUNC
16635 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
16636 {
25f53a85 16637 info->callbacks->einfo
695344c0 16638 /* xgettext:c-format */
174d0a74 16639 (_("%H: %s for indirect "
c1c8c1ef 16640 "function `%pT' unsupported\n"),
25f53a85 16641 input_bfd, input_section, rel->r_offset,
25f23106
AM
16642 ppc64_elf_howto_table[r_type]->name,
16643 sym_name);
16644 ret = FALSE;
16645 }
cf35638d 16646 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
65f38f15
AM
16647 ;
16648 else if (sec == NULL || sec->owner == NULL)
16649 {
16650 bfd_set_error (bfd_error_bad_value);
b34976b6 16651 return FALSE;
65f38f15
AM
16652 }
16653 else
16654 {
f26a3287 16655 asection *osec = sec->output_section;
65f38f15 16656
f26a3287
AM
16657 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
16658 {
16659 /* TLS symbol values are relative to the
16660 TLS segment. Dynamic relocations for
16661 local TLS symbols therefore can't be
16662 reduced to a relocation against their
16663 section symbol because it holds the
16664 address of the section, not a value
16665 relative to the TLS segment. We could
16666 change the .tdata dynamic section symbol
16667 to be zero value but STN_UNDEF works
16668 and is used elsewhere, eg. for TPREL64
16669 GOT relocs against local TLS symbols. */
16670 osec = htab->elf.tls_sec;
16671 indx = 0;
16672 }
16673 else
74541ad4 16674 {
74541ad4 16675 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
16676 if (indx == 0)
16677 {
16678 if ((osec->flags & SEC_READONLY) == 0
16679 && htab->elf.data_index_section != NULL)
16680 osec = htab->elf.data_index_section;
16681 else
16682 osec = htab->elf.text_index_section;
16683 indx = elf_section_data (osec)->dynindx;
16684 }
16685 BFD_ASSERT (indx != 0);
74541ad4 16686 }
74541ad4 16687
65f38f15
AM
16688 /* We are turning this relocation into one
16689 against a section symbol, so subtract out
16690 the output section's address but not the
16691 offset of the input section in the output
16692 section. */
16693 outrel.r_addend -= osec->vma;
16694 }
16695
16696 outrel.r_info = ELF64_R_INFO (indx, r_type);
16697 }
16698 }
16699
16700 sreloc = elf_section_data (input_section)->sreloc;
19e08130
AM
16701 if (h != NULL
16702 ? h->elf.type == STT_GNU_IFUNC
16703 : ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
82e66161
AM
16704 {
16705 sreloc = htab->elf.irelplt;
efb2a7b4 16706 if (indx == 0 || is_static_defined (&h->elf))
cebd6b8a 16707 htab->elf.ifunc_resolvers = TRUE;
82e66161 16708 }
65f38f15
AM
16709 if (sreloc == NULL)
16710 abort ();
16711
dfbb6ac9
AM
16712 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
16713 >= sreloc->size)
16714 abort ();
947216bf
AM
16715 loc = sreloc->contents;
16716 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15
AM
16717 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
16718
e59a1001
AM
16719 if (!warned_dynamic
16720 && !ppc64_glibc_dynamic_reloc (ELF64_R_TYPE (outrel.r_info)))
16721 {
16722 info->callbacks->einfo
16723 /* xgettext:c-format */
16724 (_("%X%P: %pB: %s against %pT "
16725 "is not supported by glibc as a dynamic relocation\n"),
16726 input_bfd,
16727 ppc64_elf_howto_table[ELF64_R_TYPE (outrel.r_info)]->name,
16728 sym_name);
16729 warned_dynamic = TRUE;
16730 }
16731
65f38f15
AM
16732 /* If this reloc is against an external symbol, it will
16733 be computed at runtime, so there's no need to do
81407a69
AM
16734 anything now. However, for the sake of prelink ensure
16735 that the section contents are a known value. */
2cdcc330 16736 if (!relocate)
81407a69
AM
16737 {
16738 unresolved_reloc = FALSE;
16739 /* The value chosen here is quite arbitrary as ld.so
16740 ignores section contents except for the special
16741 case of .opd where the contents might be accessed
16742 before relocation. Choose zero, as that won't
16743 cause reloc overflow. */
16744 relocation = 0;
16745 addend = 0;
16746 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
16747 to improve backward compatibility with older
16748 versions of ld. */
16749 if (r_type == R_PPC64_ADDR64)
16750 addend = outrel.r_addend;
16751 /* Adjust pc_relative relocs to have zero in *r_offset. */
4ce794b7 16752 else if (ppc64_elf_howto_table[r_type]->pc_relative)
f0158f44 16753 addend = outrel.r_offset;
81407a69 16754 }
65f38f15 16755 }
5bd4f169
AM
16756 break;
16757
65f38f15
AM
16758 case R_PPC64_COPY:
16759 case R_PPC64_GLOB_DAT:
16760 case R_PPC64_JMP_SLOT:
25f23106 16761 case R_PPC64_JMP_IREL:
65f38f15
AM
16762 case R_PPC64_RELATIVE:
16763 /* We shouldn't ever see these dynamic relocs in relocatable
16764 files. */
ae9a127f 16765 /* Fall through. */
65f38f15
AM
16766
16767 case R_PPC64_PLTGOT16:
16768 case R_PPC64_PLTGOT16_DS:
16769 case R_PPC64_PLTGOT16_HA:
16770 case R_PPC64_PLTGOT16_HI:
16771 case R_PPC64_PLTGOT16_LO:
16772 case R_PPC64_PLTGOT16_LO_DS:
16773 case R_PPC64_PLTREL32:
16774 case R_PPC64_PLTREL64:
16775 /* These ones haven't been implemented yet. */
16776
25f53a85 16777 info->callbacks->einfo
695344c0 16778 /* xgettext:c-format */
c1c8c1ef 16779 (_("%P: %pB: %s is not supported for `%pT'\n"),
d003868e 16780 input_bfd,
4ce794b7 16781 ppc64_elf_howto_table[r_type]->name, sym_name);
5bd4f169
AM
16782
16783 bfd_set_error (bfd_error_invalid_operation);
b34976b6 16784 ret = FALSE;
c316a17c 16785 goto copy_reloc;
65f38f15 16786 }
5bd4f169 16787
67f0cbdb
AM
16788 /* Multi-instruction sequences that access the TOC can be
16789 optimized, eg. addis ra,r2,0; addi rb,ra,x;
07d6d2b8 16790 to nop; addi rb,r2,x; */
67f0cbdb
AM
16791 switch (r_type)
16792 {
16793 default:
16794 break;
16795
16796 case R_PPC64_GOT_TLSLD16_HI:
16797 case R_PPC64_GOT_TLSGD16_HI:
16798 case R_PPC64_GOT_TPREL16_HI:
16799 case R_PPC64_GOT_DTPREL16_HI:
16800 case R_PPC64_GOT16_HI:
16801 case R_PPC64_TOC16_HI:
16802 /* These relocs would only be useful if building up an
16803 offset to later add to r2, perhaps in an indexed
16804 addressing mode instruction. Don't try to optimize.
16805 Unfortunately, the possibility of someone building up an
16806 offset like this or even with the HA relocs, means that
16807 we need to check the high insn when optimizing the low
16808 insn. */
16809 break;
16810
5663e321
AM
16811 case R_PPC64_PLTCALL_NOTOC:
16812 if (!unresolved_reloc)
16813 htab->notoc_plt = 1;
16814 /* Fall through. */
23cedd1d
AM
16815 case R_PPC64_PLTCALL:
16816 if (unresolved_reloc)
16817 {
16818 /* No plt entry. Make this into a direct call. */
16819 bfd_byte *p = contents + rel->r_offset;
16820 insn = bfd_get_32 (input_bfd, p);
16821 insn &= 1;
16822 bfd_put_32 (input_bfd, B_DOT | insn, p);
5663e321
AM
16823 if (r_type == R_PPC64_PLTCALL)
16824 bfd_put_32 (input_bfd, NOP, p + 4);
23cedd1d
AM
16825 unresolved_reloc = save_unresolved_reloc;
16826 r_type = R_PPC64_REL24;
16827 }
16828 break;
16829
5663e321 16830 case R_PPC64_PLTSEQ_NOTOC:
23cedd1d
AM
16831 case R_PPC64_PLTSEQ:
16832 if (unresolved_reloc)
16833 {
16834 unresolved_reloc = FALSE;
16835 goto nop_it;
16836 }
16837 break;
16838
5663e321
AM
16839 case R_PPC64_PLT_PCREL34_NOTOC:
16840 if (!unresolved_reloc)
16841 htab->notoc_plt = 1;
16842 /* Fall through. */
16843 case R_PPC64_PLT_PCREL34:
16844 if (unresolved_reloc)
16845 {
16846 bfd_byte *p = contents + rel->r_offset;
16847 bfd_put_32 (input_bfd, PNOP >> 32, p);
16848 bfd_put_32 (input_bfd, PNOP, p + 4);
16849 unresolved_reloc = FALSE;
16850 goto copy_reloc;
16851 }
16852 break;
16853
23cedd1d
AM
16854 case R_PPC64_PLT16_HA:
16855 if (unresolved_reloc)
16856 {
16857 unresolved_reloc = FALSE;
16858 goto nop_it;
16859 }
16860 /* Fall through. */
67f0cbdb
AM
16861 case R_PPC64_GOT_TLSLD16_HA:
16862 case R_PPC64_GOT_TLSGD16_HA:
16863 case R_PPC64_GOT_TPREL16_HA:
16864 case R_PPC64_GOT_DTPREL16_HA:
16865 case R_PPC64_GOT16_HA:
16866 case R_PPC64_TOC16_HA:
98528052 16867 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16868 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
98528052 16869 {
23cedd1d
AM
16870 bfd_byte *p;
16871 nop_it:
16872 p = contents + (rel->r_offset & ~3);
98528052 16873 bfd_put_32 (input_bfd, NOP, p);
d830549d 16874 goto copy_reloc;
98528052 16875 }
67f0cbdb
AM
16876 break;
16877
23cedd1d
AM
16878 case R_PPC64_PLT16_LO:
16879 case R_PPC64_PLT16_LO_DS:
16880 if (unresolved_reloc)
16881 {
16882 unresolved_reloc = FALSE;
16883 goto nop_it;
16884 }
16885 /* Fall through. */
67f0cbdb
AM
16886 case R_PPC64_GOT_TLSLD16_LO:
16887 case R_PPC64_GOT_TLSGD16_LO:
16888 case R_PPC64_GOT_TPREL16_LO_DS:
16889 case R_PPC64_GOT_DTPREL16_LO_DS:
16890 case R_PPC64_GOT16_LO:
16891 case R_PPC64_GOT16_LO_DS:
16892 case R_PPC64_TOC16_LO:
16893 case R_PPC64_TOC16_LO_DS:
98528052 16894 if (htab->do_toc_opt && relocation + addend + 0x8000 < 0x10000
560c8763 16895 && !ppc64_elf_tdata (input_bfd)->unexpected_toc_insn)
67f0cbdb
AM
16896 {
16897 bfd_byte *p = contents + (rel->r_offset & ~3);
16898 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16899 if ((insn & (0x3fu << 26)) == 12u << 26 /* addic */)
560c8763
AM
16900 {
16901 /* Transform addic to addi when we change reg. */
2365f8d7 16902 insn &= ~((0x3fu << 26) | (0x1f << 16));
560c8763
AM
16903 insn |= (14u << 26) | (2 << 16);
16904 }
16905 else
67f0cbdb 16906 {
98528052
AM
16907 insn &= ~(0x1f << 16);
16908 insn |= 2 << 16;
67f0cbdb 16909 }
560c8763 16910 bfd_put_32 (input_bfd, insn, p);
67f0cbdb
AM
16911 }
16912 break;
9a23f96e
AM
16913
16914 case R_PPC64_TPREL16_HA:
16915 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16916 {
16917 bfd_byte *p = contents + (rel->r_offset & ~3);
16918 insn = bfd_get_32 (input_bfd, p);
2365f8d7 16919 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
16920 != ((15u << 26) | (13 << 16)) /* addis rt,13,imm */)
16921 /* xgettext:c-format */
16922 info->callbacks->minfo
16923 (_("%H: warning: %s unexpected insn %#x.\n"),
d830549d
AM
16924 input_bfd, input_section, rel->r_offset,
16925 ppc64_elf_howto_table[r_type]->name, insn);
9a23f96e 16926 else
d830549d
AM
16927 {
16928 bfd_put_32 (input_bfd, NOP, p);
16929 goto copy_reloc;
16930 }
9a23f96e
AM
16931 }
16932 break;
16933
16934 case R_PPC64_TPREL16_LO:
16935 case R_PPC64_TPREL16_LO_DS:
16936 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
16937 {
16938 bfd_byte *p = contents + (rel->r_offset & ~3);
16939 insn = bfd_get_32 (input_bfd, p);
16940 insn &= ~(0x1f << 16);
16941 insn |= 13 << 16;
16942 bfd_put_32 (input_bfd, insn, p);
16943 }
16944 break;
67f0cbdb
AM
16945 }
16946
65f38f15
AM
16947 /* Do any further special processing. */
16948 switch (r_type)
16949 {
16950 default:
16951 break;
16952
25f23106 16953 case R_PPC64_REL16_HA:
4a969973
AM
16954 case R_PPC64_REL16_HIGHA:
16955 case R_PPC64_REL16_HIGHERA:
16956 case R_PPC64_REL16_HIGHESTA:
a680de9a 16957 case R_PPC64_REL16DX_HA:
f9c6b907
AM
16958 case R_PPC64_ADDR16_HA:
16959 case R_PPC64_ADDR16_HIGHA:
65f38f15
AM
16960 case R_PPC64_ADDR16_HIGHERA:
16961 case R_PPC64_ADDR16_HIGHESTA:
65f38f15
AM
16962 case R_PPC64_TOC16_HA:
16963 case R_PPC64_SECTOFF_HA:
411e1bfb 16964 case R_PPC64_TPREL16_HA:
f9c6b907 16965 case R_PPC64_TPREL16_HIGHA:
411e1bfb 16966 case R_PPC64_TPREL16_HIGHERA:
411e1bfb 16967 case R_PPC64_TPREL16_HIGHESTA:
f9c6b907
AM
16968 case R_PPC64_DTPREL16_HA:
16969 case R_PPC64_DTPREL16_HIGHA:
411e1bfb 16970 case R_PPC64_DTPREL16_HIGHERA:
411e1bfb 16971 case R_PPC64_DTPREL16_HIGHESTA:
65f38f15
AM
16972 /* It's just possible that this symbol is a weak symbol
16973 that's not actually defined anywhere. In that case,
16974 'sec' would be NULL, and we should leave the symbol
16975 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
16976 if (sec == NULL)
16977 break;
1a0670f3 16978 /* Fall through. */
5c5f6e17
AM
16979
16980 case R_PPC64_GOT16_HA:
16981 case R_PPC64_PLTGOT16_HA:
16982 case R_PPC64_PLT16_HA:
16983 case R_PPC64_GOT_TLSGD16_HA:
16984 case R_PPC64_GOT_TLSLD16_HA:
16985 case R_PPC64_GOT_TPREL16_HA:
16986 case R_PPC64_GOT_DTPREL16_HA:
16987 /* Add 0x10000 if sign bit in 0:15 is set.
16988 Bits 0:15 are not used. */
16989 addend += 0x8000;
65f38f15
AM
16990 break;
16991
5663e321
AM
16992 case R_PPC64_D34_HA30:
16993 case R_PPC64_ADDR16_HIGHERA34:
16994 case R_PPC64_ADDR16_HIGHESTA34:
16995 case R_PPC64_REL16_HIGHERA34:
16996 case R_PPC64_REL16_HIGHESTA34:
16997 if (sec != NULL)
16998 addend += 1ULL << 33;
16999 break;
17000
65f38f15
AM
17001 case R_PPC64_ADDR16_DS:
17002 case R_PPC64_ADDR16_LO_DS:
17003 case R_PPC64_GOT16_DS:
17004 case R_PPC64_GOT16_LO_DS:
17005 case R_PPC64_PLT16_LO_DS:
17006 case R_PPC64_SECTOFF_DS:
17007 case R_PPC64_SECTOFF_LO_DS:
17008 case R_PPC64_TOC16_DS:
17009 case R_PPC64_TOC16_LO_DS:
17010 case R_PPC64_PLTGOT16_DS:
17011 case R_PPC64_PLTGOT16_LO_DS:
411e1bfb
AM
17012 case R_PPC64_GOT_TPREL16_DS:
17013 case R_PPC64_GOT_TPREL16_LO_DS:
17014 case R_PPC64_GOT_DTPREL16_DS:
17015 case R_PPC64_GOT_DTPREL16_LO_DS:
17016 case R_PPC64_TPREL16_DS:
17017 case R_PPC64_TPREL16_LO_DS:
17018 case R_PPC64_DTPREL16_DS:
17019 case R_PPC64_DTPREL16_LO_DS:
adadcc0c
AM
17020 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
17021 mask = 3;
a680de9a
PB
17022 /* If this reloc is against an lq, lxv, or stxv insn, then
17023 the value must be a multiple of 16. This is somewhat of
17024 a hack, but the "correct" way to do this by defining _DQ
17025 forms of all the _DS relocs bloats all reloc switches in
17026 this file. It doesn't make much sense to use these
17027 relocs in data, so testing the insn should be safe. */
2365f8d7
AM
17028 if ((insn & (0x3fu << 26)) == (56u << 26)
17029 || ((insn & (0x3fu << 26)) == (61u << 26) && (insn & 3) == 1))
adadcc0c 17030 mask = 15;
a680de9a
PB
17031 relocation += addend;
17032 addend = insn & (mask ^ 3);
17033 if ((relocation & mask) != 0)
65f38f15 17034 {
a680de9a 17035 relocation ^= relocation & mask;
25f53a85 17036 info->callbacks->einfo
695344c0 17037 /* xgettext:c-format */
174d0a74 17038 (_("%H: error: %s not a multiple of %u\n"),
25f53a85 17039 input_bfd, input_section, rel->r_offset,
d830549d 17040 ppc64_elf_howto_table[r_type]->name,
adadcc0c 17041 mask + 1);
65f38f15 17042 bfd_set_error (bfd_error_bad_value);
b34976b6 17043 ret = FALSE;
c316a17c 17044 goto copy_reloc;
65f38f15
AM
17045 }
17046 break;
5bd4f169
AM
17047 }
17048
239e1f3a
AM
17049 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
17050 because such sections are not SEC_ALLOC and thus ld.so will
17051 not process them. */
d830549d 17052 howto = ppc64_elf_howto_table[(int) r_type];
65f38f15 17053 if (unresolved_reloc
239e1f3a 17054 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
17055 && h->elf.def_dynamic)
17056 && _bfd_elf_section_offset (output_bfd, info, input_section,
17057 rel->r_offset) != (bfd_vma) -1)
9c07fe7c 17058 {
25f53a85 17059 info->callbacks->einfo
695344c0 17060 /* xgettext:c-format */
c1c8c1ef 17061 (_("%H: unresolvable %s against `%pT'\n"),
25f53a85 17062 input_bfd, input_section, rel->r_offset,
b80eed39 17063 howto->name,
039b3fef 17064 h->elf.root.root.string);
b34976b6 17065 ret = FALSE;
9c07fe7c 17066 }
5bd4f169 17067
b80eed39
AM
17068 /* 16-bit fields in insns mostly have signed values, but a
17069 few insns have 16-bit unsigned values. Really, we should
17070 have different reloc types. */
17071 if (howto->complain_on_overflow != complain_overflow_dont
17072 && howto->dst_mask == 0xffff
17073 && (input_section->flags & SEC_CODE) != 0)
17074 {
17075 enum complain_overflow complain = complain_overflow_signed;
17076
17077 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 17078 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac
AM
17079 complain = complain_overflow_bitfield;
17080 else if (howto->rightshift == 0
2365f8d7
AM
17081 ? ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
17082 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
17083 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
17084 : ((insn & (0x3fu << 26)) == 29u << 26 /* andis */
17085 || (insn & (0x3fu << 26)) == 25u << 26 /* oris */
17086 || (insn & (0x3fu << 26)) == 27u << 26 /* xoris */))
b80eed39
AM
17087 complain = complain_overflow_unsigned;
17088 if (howto->complain_on_overflow != complain)
17089 {
17090 alt_howto = *howto;
17091 alt_howto.complain_on_overflow = complain;
17092 howto = &alt_howto;
17093 }
17094 }
17095
5663e321 17096 switch (r_type)
a680de9a 17097 {
5663e321
AM
17098 /* Split field relocs aren't handled by _bfd_final_link_relocate. */
17099 case R_PPC64_D34:
17100 case R_PPC64_D34_LO:
17101 case R_PPC64_D34_HI30:
17102 case R_PPC64_D34_HA30:
17103 case R_PPC64_PCREL34:
17104 case R_PPC64_GOT_PCREL34:
c213164a
AM
17105 case R_PPC64_TPREL34:
17106 case R_PPC64_DTPREL34:
87c69f97
AM
17107 case R_PPC64_GOT_TLSGD_PCREL34:
17108 case R_PPC64_GOT_TLSLD_PCREL34:
17109 case R_PPC64_GOT_TPREL_PCREL34:
17110 case R_PPC64_GOT_DTPREL_PCREL34:
5663e321
AM
17111 case R_PPC64_PLT_PCREL34:
17112 case R_PPC64_PLT_PCREL34_NOTOC:
17113 case R_PPC64_D28:
17114 case R_PPC64_PCREL28:
17115 if (rel->r_offset + 8 > input_section->size)
17116 r = bfd_reloc_outofrange;
17117 else
17118 {
5663e321
AM
17119 relocation += addend;
17120 if (howto->pc_relative)
17121 relocation -= (rel->r_offset
17122 + input_section->output_offset
17123 + input_section->output_section->vma);
17124 relocation >>= howto->rightshift;
17125
17126 pinsn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17127 pinsn <<= 32;
17128 pinsn |= bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
17129
17130 pinsn &= ~howto->dst_mask;
17131 pinsn |= (((relocation << 16) | (relocation & 0xffff))
17132 & howto->dst_mask);
17133 bfd_put_32 (input_bfd, pinsn >> 32, contents + rel->r_offset);
17134 bfd_put_32 (input_bfd, pinsn, contents + rel->r_offset + 4);
17135 r = bfd_reloc_ok;
17136 if (howto->complain_on_overflow == complain_overflow_signed
17137 && (relocation + (1ULL << (howto->bitsize - 1))
17138 >= 1ULL << howto->bitsize))
17139 r = bfd_reloc_overflow;
17140 }
17141 break;
17142
17143 case R_PPC64_REL16DX_HA:
a680de9a
PB
17144 if (rel->r_offset + 4 > input_section->size)
17145 r = bfd_reloc_outofrange;
17146 else
17147 {
17148 relocation += addend;
17149 relocation -= (rel->r_offset
17150 + input_section->output_offset
17151 + input_section->output_section->vma);
3de43e7b 17152 relocation = (bfd_signed_vma) relocation >> 16;
a680de9a
PB
17153 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
17154 insn &= ~0x1fffc1;
3de43e7b 17155 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
a680de9a
PB
17156 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
17157 r = bfd_reloc_ok;
3de43e7b 17158 if (relocation + 0x8000 > 0xffff)
a680de9a
PB
17159 r = bfd_reloc_overflow;
17160 }
5663e321
AM
17161 break;
17162
17163 default:
17164 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
17165 contents, rel->r_offset,
17166 relocation, addend);
a680de9a 17167 }
5bd4f169 17168
ef60b7ff 17169 if (r != bfd_reloc_ok)
5bd4f169 17170 {
bc30df16 17171 char *more_info = NULL;
b80eed39 17172 const char *reloc_name = howto->name;
bc30df16
AM
17173
17174 if (reloc_dest != DEST_NORMAL)
17175 {
17176 more_info = bfd_malloc (strlen (reloc_name) + 8);
17177 if (more_info != NULL)
17178 {
17179 strcpy (more_info, reloc_name);
17180 strcat (more_info, (reloc_dest == DEST_OPD
17181 ? " (OPD)" : " (stub)"));
17182 reloc_name = more_info;
17183 }
17184 }
17185
cd27b276 17186 if (r == bfd_reloc_overflow)
5bd4f169 17187 {
8131c122
AM
17188 /* On code like "if (foo) foo();" don't report overflow
17189 on a branch to zero when foo is undefined. */
17190 if (!warned
17191 && (reloc_dest == DEST_STUB
17192 || !(h != NULL
17193 && (h->elf.root.type == bfd_link_hash_undefweak
17194 || h->elf.root.type == bfd_link_hash_undefined)
17195 && is_branch_reloc (r_type))))
1a72702b
AM
17196 info->callbacks->reloc_overflow (info, &h->elf.root,
17197 sym_name, reloc_name,
17198 orig_rel.r_addend,
17199 input_bfd, input_section,
17200 rel->r_offset);
ef60b7ff
AM
17201 }
17202 else
17203 {
25f53a85 17204 info->callbacks->einfo
695344c0 17205 /* xgettext:c-format */
c1c8c1ef 17206 (_("%H: %s against `%pT': error %d\n"),
25f53a85 17207 input_bfd, input_section, rel->r_offset,
bc30df16 17208 reloc_name, sym_name, (int) r);
b34976b6 17209 ret = FALSE;
ef60b7ff 17210 }
c9594989 17211 free (more_info);
5bd4f169 17212 }
c316a17c
AM
17213 copy_reloc:
17214 if (wrel != rel)
17215 *wrel = *rel;
17216 }
17217
17218 if (wrel != rel)
17219 {
17220 Elf_Internal_Shdr *rel_hdr;
17221 size_t deleted = rel - wrel;
17222
17223 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
17224 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17225 if (rel_hdr->sh_size == 0)
17226 {
17227 /* It is too late to remove an empty reloc section. Leave
17228 one NONE reloc.
17229 ??? What is wrong with an empty section??? */
17230 rel_hdr->sh_size = rel_hdr->sh_entsize;
17231 deleted -= 1;
17232 }
17233 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
17234 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
17235 input_section->reloc_count -= deleted;
5bd4f169
AM
17236 }
17237
645ea6a9
AM
17238 /* If we're emitting relocations, then shortly after this function
17239 returns, reloc offsets and addends for this section will be
17240 adjusted. Worse, reloc symbol indices will be for the output
8860955f
AM
17241 file rather than the input. Save a copy of the relocs for
17242 opd_entry_value. */
0e1862bb 17243 if (is_opd && (info->emitrelocations || bfd_link_relocatable (info)))
8860955f
AM
17244 {
17245 bfd_size_type amt;
17246 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
17247 rel = bfd_alloc (input_bfd, amt);
729eabd5
AM
17248 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd.relocs == NULL);
17249 ppc64_elf_tdata (input_bfd)->opd.relocs = rel;
8860955f
AM
17250 if (rel == NULL)
17251 return FALSE;
17252 memcpy (rel, relocs, amt);
17253 }
5bd4f169
AM
17254 return ret;
17255}
17256
754021d0
AM
17257/* Adjust the value of any local symbols in opd sections. */
17258
6e0b88f1 17259static int
754021d0
AM
17260ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
17261 const char *name ATTRIBUTE_UNUSED,
17262 Elf_Internal_Sym *elfsym,
17263 asection *input_sec,
17264 struct elf_link_hash_entry *h)
17265{
74f0fb50
AM
17266 struct _opd_sec_data *opd;
17267 long adjust;
754021d0
AM
17268 bfd_vma value;
17269
4025353c 17270 if (h != NULL)
6e0b88f1 17271 return 1;
4025353c 17272
74f0fb50
AM
17273 opd = get_opd_info (input_sec);
17274 if (opd == NULL || opd->adjust == NULL)
6e0b88f1 17275 return 1;
754021d0
AM
17276
17277 value = elfsym->st_value - input_sec->output_offset;
0e1862bb 17278 if (!bfd_link_relocatable (info))
754021d0
AM
17279 value -= input_sec->output_section->vma;
17280
51aecdc5 17281 adjust = opd->adjust[OPD_NDX (value)];
4025353c 17282 if (adjust == -1)
6e0b88f1
AM
17283 return 2;
17284
17285 elfsym->st_value += adjust;
17286 return 1;
754021d0
AM
17287}
17288
5bd4f169
AM
17289/* Finish up dynamic symbol handling. We set the contents of various
17290 dynamic sections here. */
17291
b34976b6 17292static bfd_boolean
4ce794b7
AM
17293ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
17294 struct bfd_link_info *info,
17295 struct elf_link_hash_entry *h,
4aef7643 17296 Elf_Internal_Sym *sym)
5bd4f169 17297{
65f38f15 17298 struct ppc_link_hash_table *htab;
8387904d 17299 struct plt_entry *ent;
5bd4f169 17300
65f38f15 17301 htab = ppc_hash_table (info);
4dfe6ac6
NC
17302 if (htab == NULL)
17303 return FALSE;
5bd4f169 17304
49c09209
AM
17305 if (!htab->opd_abi && !h->def_regular)
17306 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
17307 if (ent->plt.offset != (bfd_vma) -1)
17308 {
17309 /* Mark the symbol as undefined, rather than as
17310 defined in glink. Leave the value if there were
17311 any relocations where pointer equality matters
17312 (this is a clue for the dynamic linker, to make
17313 function pointer comparisons work between an
17314 application and shared library), otherwise set it
17315 to zero. */
17316 sym->st_shndx = SHN_UNDEF;
17317 if (!h->pointer_equality_needed)
17318 sym->st_value = 0;
17319 else if (!h->ref_regular_nonweak)
17320 {
17321 /* This breaks function pointer comparisons, but
17322 that is better than breaking tests for a NULL
17323 function pointer. */
17324 sym->st_value = 0;
17325 }
17326 break;
17327 }
5bd4f169 17328
1bdd8fac
AM
17329 if (h->needs_copy
17330 && (h->root.type == bfd_link_hash_defined
17331 || h->root.type == bfd_link_hash_defweak)
17332 && (h->root.u.def.section == htab->elf.sdynbss
17333 || h->root.u.def.section == htab->elf.sdynrelro))
5bd4f169 17334 {
65f38f15 17335 /* This symbol needs a copy reloc. Set it up. */
49c09209 17336 Elf_Internal_Rela rela;
5474d94f 17337 asection *srel;
49c09209 17338 bfd_byte *loc;
5bd4f169 17339
1bdd8fac 17340 if (h->dynindx == -1)
65f38f15 17341 abort ();
5bd4f169 17342
ed7007c1 17343 rela.r_offset = defined_sym_val (h);
5bd4f169
AM
17344 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
17345 rela.r_addend = 0;
afbf7e8e 17346 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
17347 srel = htab->elf.sreldynrelro;
17348 else
17349 srel = htab->elf.srelbss;
17350 loc = srel->contents;
17351 loc += srel->reloc_count++ * sizeof (Elf64_External_Rela);
65f38f15 17352 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
5bd4f169
AM
17353 }
17354
b34976b6 17355 return TRUE;
5bd4f169
AM
17356}
17357
65f38f15
AM
17358/* Used to decide how to sort relocs in an optimal manner for the
17359 dynamic linker, before writing them out. */
17360
17361static enum elf_reloc_type_class
7e612e98
AM
17362ppc64_elf_reloc_type_class (const struct bfd_link_info *info,
17363 const asection *rel_sec,
17364 const Elf_Internal_Rela *rela)
65f38f15 17365{
04c9666a 17366 enum elf_ppc64_reloc_type r_type;
7e612e98
AM
17367 struct ppc_link_hash_table *htab = ppc_hash_table (info);
17368
33e44f2e 17369 if (rel_sec == htab->elf.irelplt)
7e612e98 17370 return reloc_class_ifunc;
a33d1f77 17371
4ce794b7 17372 r_type = ELF64_R_TYPE (rela->r_info);
a33d1f77 17373 switch (r_type)
65f38f15
AM
17374 {
17375 case R_PPC64_RELATIVE:
17376 return reloc_class_relative;
17377 case R_PPC64_JMP_SLOT:
17378 return reloc_class_plt;
17379 case R_PPC64_COPY:
17380 return reloc_class_copy;
17381 default:
17382 return reloc_class_normal;
17383 }
17384}
17385
5bd4f169
AM
17386/* Finish up the dynamic sections. */
17387
b34976b6 17388static bfd_boolean
4ce794b7
AM
17389ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
17390 struct bfd_link_info *info)
5bd4f169 17391{
65f38f15
AM
17392 struct ppc_link_hash_table *htab;
17393 bfd *dynobj;
5bd4f169 17394 asection *sdyn;
5bd4f169 17395
65f38f15 17396 htab = ppc_hash_table (info);
4dfe6ac6
NC
17397 if (htab == NULL)
17398 return FALSE;
17399
65f38f15 17400 dynobj = htab->elf.dynobj;
3d4d4302 17401 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
5bd4f169 17402
65f38f15 17403 if (htab->elf.dynamic_sections_created)
5bd4f169 17404 {
5bd4f169
AM
17405 Elf64_External_Dyn *dyncon, *dynconend;
17406
33e44f2e 17407 if (sdyn == NULL || htab->elf.sgot == NULL)
65f38f15 17408 abort ();
5bd4f169
AM
17409
17410 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 17411 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
5bd4f169
AM
17412 for (; dyncon < dynconend; dyncon++)
17413 {
17414 Elf_Internal_Dyn dyn;
19397422 17415 asection *s;
5bd4f169
AM
17416
17417 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
17418
17419 switch (dyn.d_tag)
17420 {
65f38f15
AM
17421 default:
17422 continue;
5bd4f169 17423
5d1634d7 17424 case DT_PPC64_GLINK:
4ce794b7 17425 s = htab->glink;
6348e046 17426 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
ad8e1ba5
AM
17427 /* We stupidly defined DT_PPC64_GLINK to be the start
17428 of glink rather than the first entry point, which is
17429 what ld.so needs, and now have a bigger stub to
17430 support automatic multiple TOCs. */
9e390558 17431 dyn.d_un.d_ptr += GLINK_PLTRESOLVE_SIZE (htab) - 8 * 4;
5d1634d7
AM
17432 break;
17433
19397422
AM
17434 case DT_PPC64_OPD:
17435 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17436 if (s == NULL)
17437 continue;
17438 dyn.d_un.d_ptr = s->vma;
19397422
AM
17439 break;
17440
e8910a83 17441 case DT_PPC64_OPT:
5663e321
AM
17442 if ((htab->do_multi_toc && htab->multi_toc_needed)
17443 || htab->notoc_plt)
e8910a83 17444 dyn.d_un.d_val |= PPC64_OPT_MULTI_TOC;
f378ab09
AM
17445 if (htab->has_plt_localentry0)
17446 dyn.d_un.d_val |= PPC64_OPT_LOCALENTRY;
e8910a83
AM
17447 break;
17448
19397422
AM
17449 case DT_PPC64_OPDSZ:
17450 s = bfd_get_section_by_name (output_bfd, ".opd");
6348e046
AM
17451 if (s == NULL)
17452 continue;
eea6121a 17453 dyn.d_un.d_val = s->size;
19397422
AM
17454 break;
17455
65f38f15 17456 case DT_PLTGOT:
33e44f2e 17457 s = htab->elf.splt;
6348e046 17458 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15
AM
17459 break;
17460
17461 case DT_JMPREL:
33e44f2e 17462 s = htab->elf.srelplt;
6348e046 17463 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
65f38f15 17464 break;
5bd4f169 17465
65f38f15 17466 case DT_PLTRELSZ:
33e44f2e 17467 dyn.d_un.d_val = htab->elf.srelplt->size;
5d1634d7 17468 break;
82e66161
AM
17469
17470 case DT_TEXTREL:
cebd6b8a 17471 if (htab->elf.ifunc_resolvers)
82e66161
AM
17472 info->callbacks->einfo
17473 (_("%P: warning: text relocations and GNU indirect "
17474 "functions may result in a segfault at runtime\n"));
17475 continue;
5bd4f169 17476 }
5bd4f169 17477
65f38f15 17478 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
5bd4f169 17479 }
5bd4f169
AM
17480 }
17481
6528b6eb
AM
17482 if (htab->elf.sgot != NULL && htab->elf.sgot->size != 0
17483 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17484 {
17485 /* Fill in the first entry in the global offset table.
17486 We use it to hold the link-time TOCbase. */
17487 bfd_put_64 (output_bfd,
60ee0d4a 17488 elf_gp (output_bfd) + TOC_BASE_OFF,
33e44f2e 17489 htab->elf.sgot->contents);
5d1634d7
AM
17490
17491 /* Set .got entry size. */
2cdcc330
AM
17492 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize
17493 = 8;
5d1634d7
AM
17494 }
17495
6528b6eb
AM
17496 if (htab->elf.splt != NULL && htab->elf.splt->size != 0
17497 && htab->elf.splt->output_section != bfd_abs_section_ptr)
5d1634d7
AM
17498 {
17499 /* Set .plt entry size. */
33e44f2e 17500 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
b9e5796b 17501 = PLT_ENTRY_SIZE (htab);
5d1634d7
AM
17502 }
17503
84f5d08e
AM
17504 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
17505 brlt ourselves if emitrelocations. */
17506 if (htab->brlt != NULL
17507 && htab->brlt->reloc_count != 0
17508 && !_bfd_elf_link_output_relocs (output_bfd,
17509 htab->brlt,
d4730f92 17510 elf_section_data (htab->brlt)->rela.hdr,
84f5d08e
AM
17511 elf_section_data (htab->brlt)->relocs,
17512 NULL))
17513 return FALSE;
17514
176a0d42
AM
17515 if (htab->glink != NULL
17516 && htab->glink->reloc_count != 0
17517 && !_bfd_elf_link_output_relocs (output_bfd,
17518 htab->glink,
d4730f92 17519 elf_section_data (htab->glink)->rela.hdr,
176a0d42
AM
17520 elf_section_data (htab->glink)->relocs,
17521 NULL))
17522 return FALSE;
17523
da44f4e5 17524
df136d64
AM
17525 if (htab->glink_eh_frame != NULL
17526 && htab->glink_eh_frame->size != 0
17527 && htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
17528 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
17529 htab->glink_eh_frame,
17530 htab->glink_eh_frame->contents))
17531 return FALSE;
58d180e8 17532
e717da7e 17533 /* We need to handle writing out multiple GOT sections ourselves,
7b53ace3
AM
17534 since we didn't add them to DYNOBJ. We know dynobj is the first
17535 bfd. */
c72f2fb2 17536 while ((dynobj = dynobj->link.next) != NULL)
e717da7e
AM
17537 {
17538 asection *s;
7b53ace3 17539
0c8d6e5c 17540 if (!is_ppc64_elf (dynobj))
7b53ace3
AM
17541 continue;
17542
e717da7e
AM
17543 s = ppc64_elf_tdata (dynobj)->got;
17544 if (s != NULL
eea6121a 17545 && s->size != 0
e717da7e
AM
17546 && s->output_section != bfd_abs_section_ptr
17547 && !bfd_set_section_contents (output_bfd, s->output_section,
17548 s->contents, s->output_offset,
eea6121a 17549 s->size))
e717da7e
AM
17550 return FALSE;
17551 s = ppc64_elf_tdata (dynobj)->relgot;
17552 if (s != NULL
eea6121a 17553 && s->size != 0
e717da7e
AM
17554 && s->output_section != bfd_abs_section_ptr
17555 && !bfd_set_section_contents (output_bfd, s->output_section,
17556 s->contents, s->output_offset,
eea6121a 17557 s->size))
e717da7e
AM
17558 return FALSE;
17559 }
f6c52c13 17560
b34976b6 17561 return TRUE;
5bd4f169
AM
17562}
17563
5bd4f169 17564#include "elf64-target.h"
7b8e7dad
AM
17565
17566/* FreeBSD support */
17567
17568#undef TARGET_LITTLE_SYM
17569#undef TARGET_LITTLE_NAME
17570
17571#undef TARGET_BIG_SYM
6d00b590 17572#define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
7b8e7dad
AM
17573#undef TARGET_BIG_NAME
17574#define TARGET_BIG_NAME "elf64-powerpc-freebsd"
17575
17576#undef ELF_OSABI
17577#define ELF_OSABI ELFOSABI_FREEBSD
17578
17579#undef elf64_bed
17580#define elf64_bed elf64_powerpc_fbsd_bed
17581
17582#include "elf64-target.h"